Juan Caballero

Orcid: 0000-0003-2962-1348

According to our database1, Juan Caballero authored at least 68 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools.
Future Gener. Comput. Syst., July, 2023

MGnify: the microbiome sequence data analysis resource in 2023.
Nucleic Acids Res., January, 2023

One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles.
Proceedings of the 32nd USENIX Security Symposium, 2023

LibKit: Detecting Third-Party Libraries in iOS Apps.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

A Deep Dive into the VirusTotal File Feed.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Domain and Website Attribution beyond WHOIS.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
A Survey of Binary Code Similarity.
ACM Comput. Surv., 2022

A Deep Dive into VirusTotal: Characterizing and Clustering a Massive File Feed.
CoRR, 2022

GoodFATR: A Platform for Automated Threat Report Collection and IOC Extraction.
CoRR, 2022

Detecting Cybercriminal Bitcoin Relationships through Backwards Exploration.
CoRR, 2022

On the Usage of Programming Languages in the iOS Ecosystem.
Proceedings of the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation, 2022

Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Unsupervised Detection and Clustering of Malicious TLS Flows.
CoRR, 2021

Data Provenance in Vehicle Data Chains.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

How Did That Get In My Phone? Unwanted App Distribution on Android Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

AVclass2: Massive Malware Tag Extraction from AV Labels.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development.
IEEE Trans. Inf. Forensics Secur., 2019

Costly freeware: a systematic analysis of abuse in download portals.
IET Inf. Secur., 2019

Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Malware lineage in the wild.
Comput. Secur., 2018

Coming of Age: A Longitudinal Study of TLS Deployment.
Proceedings of the Internet Measurement Conference 2018, 2018

K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
A Lustrum of Malware Network Communication: Evolution and Insights.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Type Inference on Executables.
ACM Comput. Surv., 2016

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.
Proceedings of the 25th USENIX Security Symposium, 2016

AVclass: A Tool for Massive Malware Labeling.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

A Look into 30 Years of Malware Development from a Software Metrics Perspective.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

RevProbe: detecting silent reverse proxies in malicious server infrastructures.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
The MALICIA dataset: identification and analysis of drive-by download operations.
Int. J. Inf. Sec., 2015

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Ayudante: identifying undesired variable interactions.
Proceedings of the 13th International Workshop on Dynamic Analysis, 2015

CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Certified PUP: Abuse in Authenticode Code Signing.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds.
Proceedings of the 2014 Internet Measurement Conference, 2014

SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification.
Proceedings of the Computer Security - ESORICS 2014, 2014

AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Network dialog minimization and network dialog diffing: two novel primitives for network security applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Automatic protocol reverse-engineering: Message format extraction and field semantics inference.
Comput. Networks, 2013

FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

Cross-platform malware: write once, infect everywhere.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Understanding the Role of Malware in Cybercrime.
ERCIM News, 2012

Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities.
Proceedings of the International Symposium on Software Testing and Analysis, 2012


2011
Kaviar: an accessible system for testing SNV novelty.
Bioinform., 2011

Measuring Pay-per-Install: The Commoditization of Malware Distribution.
Proceedings of the 20th USENIX Security Symposium, 2011

Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
Binary Code Extraction and Interface Identification for Security Applications.
Proceedings of the Network and Distributed System Security Symposium, 2010

Insights from the Inside: A View of Botnet Management from Infiltration.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

Input generation via decomposition and re-stitching: finding bugs in Malware.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Enhancing gene detection with computer generated intergenic regions.
Proceedings of the 2009 IEEE International Workshop on Genomic Signal Processing and Statistics, 2009

Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?
Proceedings of the Network and Distributed System Security Symposium, 2008

BitBlaze: A New Approach to Computer Security via Binary Analysis.
Proceedings of the Information Systems Security, 4th International Conference, 2008

2007
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Fig: Automatic Fingerprint Generation.
Proceedings of the Network and Distributed System Security Symposium, 2007

Distributed Evasive Scan Techniques and Countermeasures.
Proceedings of the Detection of Intrusions and Malware, 2007

Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Black Box Anomaly Detection: Is It Utopian?.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006


  Loading...