If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

Disposable botnets: Examining the anatomy of IoT botnet infrastructure

Tanabe, R., Tamai, T., Fujita, A., Isawa, R., Yoshioka, K., Matsumoto, T., Gañán, C. & Van Eeten, M., 2020, Proceedings of the 15th International Conference on Availability, Reliability and Security, ARES 2020. Association for Computing Machinery (ACM), 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2019

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai

Cetin, O., Hernandez Ganan, C., Altena, L., Kasama, T., Inoue, D., Tamiya, K., Tie, Y., Yoshioka, K. & van Eeten, M., 2019, Network and Distributed System Security Symposium (NDSS) 2019.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
500 Downloads (Pure)

Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots

Morishita, S., Hoizumi, T., Ueno, W., Tanabe, R., Hernandez Ganan, C., van Eeten, M., Yoshioka, K. & Matsumoto, T., 16 May 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, IM 2019. IEEE, p. 134-143 10 p. 8717918

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
4 Citations (Scopus)
280 Downloads (Pure)

Measuring the Changing Cost of Cybercrime

Anderson, R., Barton, C., Böhme, R., Clayton, R., Hernandez Ganan, C., Grasso, T., Levi, M., Moore, T. & Vasek, M., 3 Jun 2019, The 2019 Workshop on the Economics of Information Security (WEIS 2019).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
139 Downloads (Pure)

Tell me you fixed it: Evaluating vulnerability notifications via quarantine networks

Cetin, O., Ganan, C., Altena, L., Tajalizadehkhoob, S. & Van Eeten, M., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Institute of Electrical and Electronics Engineers (IEEE), p. 326-339 14 p. 8806733

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2018

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens

Cetin, O., Altena, E. M., Hernandez Ganan, C. & van Eeten, M., 2018, Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, p. 251-263

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
2 Downloads (Pure)

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets

van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Hernandez Ganan, C., Klievink, B., Christin, N. & van Eeten, M., 15 Aug 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1009-1026 18 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
2017

Beyond the pretty penny: the Economic Impact of Cybercrime

Gañán, C. H., Ciere, M. & van Eeten, M., 2017, Proceedings of the 2017 New Security Paradigms Workshop on ZZZ. Association for Computing Machinery (ACM), p. 35-45 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)

Make notifications great again: learning how to notify in the age of large-scale vulnerability scanning

Cetin, F. O., Ganán, C., Korczynski, M. & van Eeten, M., 2017, 16th Workshop on the Economics of Information Security (WEIS 2017). p. 1-23 23 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
21 Downloads (Pure)

Partial Device Fingerprints

Ciere, M., Gañán, C. & van Eeten, M., 2017, proceedings of Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, p. 222-237 16 p. (Lecture Notes in Computer Science; vol. 10535).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
1 Citation (Scopus)
15 Downloads (Pure)

The role of hosting providers in fighting command and control infrastructure of financial malware

Tajalizadehkhoob, S., Hernandez Ganan, C., Noroozian, A. & Van Eeten, M., 2 Apr 2017, Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security -ASIA CCS 2017. Association for Computing Machinery (ACM), p. 575-586 12 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
6 Citations (Scopus)
220 Downloads (Pure)
2016

Apples, oranges and hosting providers: Heterogeneity and security in the hosting market

Tajalizadehkhoob, S., Korczyński, M., Noroozian, A., Gañán, C. & Van Eeten, M., 30 Jun 2016, Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Institute of Electrical and Electronics Engineers (IEEE), p. 289-297 9 p. 7502824

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

12 Citations (Scopus)

Estimating the costs of consumer-facing cybercrime: A tailored instrument and representative data for six EU countries.

Riek, M., Boehme, R., Ciere, M., Hernandez Ganan, C. & van Eeten, M., 2016, Proceedings of Workshop of Economics of Information Security . p. 1-43

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
78 Downloads (Pure)

Risk Management for Third Party Payment Networks

van Driel, W., Hernandez Ganan, C., Lobbezoo, M. & van Eeten, M., 2016, Proceedings of Workshop of Economics of Information Security 2016. p. 1-10

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
173 Downloads (Pure)

Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service

Noroozian, A., Korczynski, M., Hernandez Ganan, C., Makita, D., Yoshioka, K. & van Eeten, M., 2016, Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016: Research in Attacks, Intrusions, and Defenses. Springer, (Lecture Notes in Computer Science; vol. 9854).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

15 Citations (Scopus)
2015

An empirical analysis of ZeuS CC lifetime

Gañán, C., Cetin, F. O. & van Eeten, M., 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery (ACM), p. 97-108 12 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2013

Secure handoffs for V2I communications in 802.11 networks

Gañán, C. H., Reñé, S., Muñoz-Tapia, J. L., Esparza, O., Mata-Diaz, J. & Alins, J., 2013, Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, ubiquitous networks. p. 49-56 8 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)
2012

Analysis of inter-RSU beaconing interference in VANETs

Gañán, C., Loo, J., Ghosh, A., Esparza, O., Reñé, S. & Muñoz, J. L., 2012, International Workshop on Multiple Access Communications. p. 49-59 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

8 Citations (Scopus)

Impact of the revocation service in PKI prices

Gañán, C., Muñoz, J. L., Esparza, O., Mata-Diaz, J. & Alins, J., 2012, International Conference on Information and Communications Security. p. 22-32 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

On the self-similarity nature of the revocation data

Gañán, C., Mata-Diaz, J., Muñoz, J. L., Esparza, O. & Alins, J., 2012, International Conference on Information Security. p. 387-400 14 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

RAR: risk aware revocation mechanism for vehicular networks

Ganan, C., Munoz, J. L., Esparza, O., Mata-Diaz, J., Alins, J., Silva-Cardenas, C. & Bartra-Gardini, G., 2012, Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th. p. 1-5 5 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

5 Citations (Scopus)

Toward revocation data handling efficiency in VANETs

Gañán, C., Muñoz, J. L., Esparza, O., Mata-Diaz, J. & Alins, J., 2012, International Workshop on Communication Technologies for Vehicles. p. 80-90 11 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

12 Citations (Scopus)
2011

Analysis of video streaming performance in vehicular networks

Rene, S., Ganan, C., Caubet, J., Alins, J., Mata, J. & Munoz, J. L., 2011, The First International Conference on Advanced Communications and Computation. Vol. 10. p. 2011 1 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2009

PKIX certificate status in hybrid MANETS

Munoz, J. L., Esparza, O., Ganán, C. & Parra-Arnau, J., 2009, IFIP International Workshop on Information Security Theory and Practices. p. 153-166 14 p.

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

10 Citations (Scopus)