Carlos Gañán

Orcid: 0000-0002-4699-3007

Affiliations:
  • Delft University of Technology, The Netherlands


According to our database1, Carlos Gañán authored at least 69 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH Service.
Proc. ACM Meas. Anal. Comput. Syst., 2024

2023
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom.
Proc. Priv. Enhancing Technol., April, 2023

Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices.
CoRR, 2023

Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices.
Proceedings of the 32nd USENIX Security Symposium, 2023

Two Sides of the Shield: Understanding Protective DNS adoption factors.
Proceedings of the 32nd USENIX Security Symposium, 2023

Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible.
Proceedings of the 32nd USENIX Security Symposium, 2023

Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

How Ready is DNS for an IPv6-Only World?
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Intercept and Inject: DNS Response Manipulation in the Wild.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Lessons in Prevention and Cure: A User Study of Recovery from Flubot Smartphone Malware.
Proceedings of the 2023 European Symposium on Usable Security, 2023

Towards more rigorous domain-based metrics: quantifying the prevalence and implications of "Active" Domains.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks.
Proceedings of the Computer Security - ESORICS 2023, 2023

Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Block and Roll: A Metric-based Evaluation of Reputation Block Lists.
Proceedings of Research papers at APWG.EU TECH 2023 co-located with the APWG.EU Tech 2023 Summit & Researchers Sync-Up (APWG.EU Tech 2023), 2023

2022
Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure.
J. Inf. Process., 2022

We have to go back: A Historic IP Attribution Service for Network Measurement.
CoRR, 2022

Helping hands: Measuring the impact of a large threat intelligence sharing community.
Proceedings of the 31st USENIX Security Symposium, 2022

Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
User compliance and remediation success after IoT malware notifications.
J. Cybersecur., 2021

Heads in the Clouds: Measuring the Implications of Universities Migrating to Public Clouds.
CoRR, 2021

WHOIS sunset? A primer in Registration Data Access Protocol (RDAP) performance.
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021

"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

NURSE: eNd-UseR IoT malware detection tool for Smart homEs.
Proceedings of the IoT '21: 11th International Conference on the Internet of Things, St. Gallen, Switzerland, November 8, 2021

SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers.
IEICE Trans. Commun., 2020

Beneath the radar: Exploring the economics of business fraud via underground markets.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Disposable botnets: examining the anatomy of IoT botnet infrastructure.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
MalPaCA: Malware Packet Sequence Clustering and Analysis.
CoRR, 2019

Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Proceedings of the 28th USENIX Security Symposium, 2019

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse.
ACM Trans. Internet Techn., 2018

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Proceedings of the 27th USENIX Security Symposium, 2018

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
Abuse Reporting and the Fight Against Cybercrime.
ACM Comput. Surv., 2017

Partial Device Fingerprints.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Beyond the pretty penny: the Economic Impact of Cybercrime.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Understanding the role of sender reputation in abuse reporting and cleanup.
J. Cybersecur., 2016

Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Apples, oranges and hosting providers: Heterogeneity and security in the hosting market.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

2015
EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks.
Pervasive Mob. Comput., 2015

A model for revocation forecasting in public-key infrastructures.
Knowl. Inf. Syst., 2015

How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation.
Proceedings of the 14th IFIP Networking Conference, 2015

An Empirical Analysis of ZeuS C&C Lifetime.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
MHT-Based Mechanism for Certificate Revocation in VANETs.
Proceedings of the Wireless Networking for Moving Objects, 2014

Vespa: Emulating Infotainment Applications in Vehicular Networks.
IEEE Pervasive Comput., 2014

PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks.
Comput. Stand. Interfaces, 2014

Certificate Revocation List Distribution System for the KAD Network.
Comput. J., 2014

2013
Certificate status information distribution and validation in vehicular networks.
PhD thesis, 2013

Low-cost group rekeying for unattended wireless sensor networks.
Wirel. Networks, 2013

BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs.
Mob. Inf. Syst., 2013

COACH: COllaborative certificate stAtus CHecking mechanism for VANETs.
J. Netw. Comput. Appl., 2013

Secure handoffs for V2I communications in 802.11 networks.
Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2013

2012
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces.
IEEE Trans. Inf. Forensics Secur., 2012

RAR: Risk Aware Revocation Mechanism for Vehicular Networks.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Toward Revocation Data Handling Efficiency in VANETs.
Proceedings of the Communication Technologies for Vehicles - 4th International Workshop, 2012

Analysis of Inter-RSU Beaconing Interference in VANETs.
Proceedings of the Multiple Access Communications - 5th International Workshop, 2012

On the Self-similarity Nature of the Revocation Data.
Proceedings of the Information Security - 15th International Conference, 2012

Impact of the Revocation Service in PKI Prices.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
NeuroCast: Adaptive Multi-source P2P Video Streaming Application for Wireless Networks.
Proceedings of the Wired/Wireless Internet Communications, 2011

2009
PKIX Certificate Status in Hybrid MANETs.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009


  Loading...