Xabier Ugarte-Pedrero

According to our database1, Xabier Ugarte-Pedrero authored at least 29 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

A Close Look at a Daily Dataset of Malware Samples.
ACM Trans. Priv. Secur., 2019

The web is watching you: A comprehensive review of web-tracking techniques and countermeasures.
Log. J. IGPL, 2017

Anomaly-based user comments detection in social news websites using troll user comments as normality representation.
Log. J. IGPL, 2016

RAMBO: Run-Time Packer Analysis with Multiple Branch Observation.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Tracking Users Like There is No Tomorrow: Privacy on the Current Internet.
Proceedings of the International Joint Conference, 2015

Study on the effectiveness of anomaly detection for spam filtering.
Inf. Sci., 2014

On the adoption of anomaly detection for packed executable filtering.
Comput. Secur., 2014

Anomalous User Comment Detection in Social News Websites.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Opcode sequences as representation of executables for data-mining-based unknown malware detection.
Inf. Sci., 2013

Collective Classification for Packed Executable Identification.
Comput. Syst. Sci. Eng., 2013

Mama: manifest Analysis for Malware Detection in Android.
Cybern. Syst., 2013

NOA: An Information Retrieval Based Malware Detection System.
Comput. Informatics, 2013

Anomaly Detection Using String Analysis for Android Malware Detection.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Instance-based Anomaly Method for Android Malware Detection.
Proceedings of the SECRYPT 2013, 2013

PUMA: Permission Usage to Detect Malware in Android.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Supervised classification of packets coming from a HTTP botnet.
Proceedings of the 2012 XXXVIII Conferencia Latinoamericana En Informatica (CLEI), 2012

Countering entropy measure attacks on packed software detection.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the automatic categorisation of android applications.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

On the study of anomaly-based spam filtering using spam as representation of normality.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Anomaly-based Spam Filtering.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Semi-supervised learning for packed executable detection.
Proceedings of the 5th International Conference on Network and System Security, 2011

Spam Filtering through Anomaly Detection.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Anomaly Detection for the Prediction of Ultimate Tensile Strength in Iron Casting Production.
Proceedings of the Database and Expert Systems Applications, 2011

Structural Feature Based Anomaly Detection for Packed Executable Identification.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Boosting Scalability in Anomaly-Based Packed Executable Filtering.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Enhancing scalability in anomaly-based email spam filtering.
Proceedings of the 8th Annual Collaboration, 2011