Sergio Pastrana

Orcid: 0000-0003-1036-6359

Affiliations:
  • Universidad Carlos III de Madrid, Spain


According to our database1, Sergio Pastrana authored at least 36 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Art of Cybercrime Community Research.
ACM Comput. Surv., June, 2024

2023
Towards automated homomorphic encryption parameter selection with fuzzy logic and linear programming.
Expert Syst. Appl., November, 2023

<i>HEFactory</i>: A symbolic execution compiler for privacy-preserving Deep Learning with Homomorphic Encryption.
SoftwareX, May, 2023

Critical Path Prioritization Dashboard for Alert-driven Attack Graphs.
CoRR, 2023

Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls.
CoRR, 2023

An analysis of fake social media engagement services.
Comput. Secur., 2023

2022
Towards Improving Code Stylometry Analysis in Underground Forums.
Proc. Priv. Enhancing Technol., 2022

Examining the trends and operations of modern Dark-Web marketplaces.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting.
IEEE Trans. Netw. Serv. Manag., 2021

SoK: Privacy-Preserving Computation Techniques for Deep Learning.
Proc. Priv. Enhancing Technol., 2021

Avaddon ransomware: An in-depth analysis and decryption of infected systems.
Comput. Secur., 2021

A Methodology For Large-Scale Identification of Related Accounts in Underground Forums.
Comput. Secur., 2021

Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Detecting Video-Game Injectors Exchanged in Game Cheating Communities.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
A tight scrape: methodological approaches to cybercrime research data collection in adversarial environments.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth.
Proceedings of the Internet Measurement Conference, 2019

Measuring eWhoring.
Proceedings of the Internet Measurement Conference, 2019

Understanding eWhoring.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Aggressive language in an online hacking forum.
Proceedings of the 2nd Workshop on Abusive Language Online, 2018

2017
Ethical issues in research using datasets of illicit origin.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.
J. Netw. Comput. Appl., 2016

AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Security analysis and exploitation of arduino devices in the internet of things.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Shall We Collaborate?: A Model to Analyse the Benefits of Information Sharing.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2015
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.
Pervasive Mob. Comput., 2015

DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks.
Comput. Networks, 2015

Probabilistic yoking proofs for large scale IoT systems.
Ad Hoc Networks, 2015

2014
Randomized Anagram revisited.
J. Netw. Comput. Appl., 2014

Anomalous Web Payload Detection: Evaluating the Resilience of 1-Grams Based Classifiers.
Proceedings of the Intelligent Distributed Computing VIII, 2014

2012
Evaluation of classification algorithms for intrusion detection in MANETs.
Knowl. Based Syst., 2012

2011
Artificial Immunity-based Correlation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A Functional Framework to Evade Network IDS.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Modeling NIDS Evasion with Genetic Programming.
Proceedings of the 2010 International Conference on Security & Management, 2010


  Loading...