Michel van Eeten

Orcid: 0000-0002-0338-2812

Affiliations:
  • Delft University of Technology, Netherlands


According to our database1, Michel van Eeten authored at least 72 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Finding Harmony in the Noise: Blending Security Alerts for Attack Detection.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

2023
Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions.
Gov. Inf. Q., October, 2023

Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices.
CoRR, 2023

Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices.
Proceedings of the 32nd USENIX Security Symposium, 2023

Two Sides of the Shield: Understanding Protective DNS adoption factors.
Proceedings of the 32nd USENIX Security Symposium, 2023

An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible.
Proceedings of the 32nd USENIX Security Symposium, 2023

No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Tough Decisions? Supporting System Classification According to the AI Act.
Proceedings of the Legal Knowledge and Information Systems, 2023

Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Disposable Botnets: Long-term Analysis of IoT Botnet Infrastructure.
J. Inf. Process., 2022

DomainPrio: Prioritizing Domain Name Investigations to Improve SOC Efficiency.
IEEE Access, 2022

Helping hands: Measuring the impact of a large threat intelligence sharing community.
Proceedings of the 31st USENIX Security Symposium, 2022

Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
User compliance and remediation success after IoT malware notifications.
J. Cybersecur., 2021

Human Factors in Security Research: Lessons Learned from 2008-2018.
CoRR, 2021

"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Pay the Piper: DDoS Mitigation Technique to Deter Financially-Motivated Attackers.
IEICE Trans. Commun., 2020

Governance Challenges for European Cybersecurity Policies: Stakeholder Views.
IEEE Secur. Priv., 2020

Go See a Specialist? Predicting Cybercrime Sales on Online Anonymous Markets from Vendor and Product Characteristics.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

A different cup of TI? The added value of commercial threat intelligence.
Proceedings of the 29th USENIX Security Symposium, 2020

Disposable botnets: examining the anatomy of IoT botnet infrastructure.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Proceedings of the 28th USENIX Security Symposium, 2019

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Detect Me If You... Oh Wait. An Internet-Wide View of Self-Revealing Honeypots.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse.
ACM Trans. Internet Techn., 2018

Collectively exercising the right of access: individual effort, societal effect.
Internet Policy Rev., 2018

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Proceedings of the 27th USENIX Security Symposium, 2018

Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
Abuse Reporting and the Fight Against Cybercrime.
ACM Comput. Surv., 2017

Partial Device Fingerprints.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Using Loops Observed in Traceroute to Infer the Ability to Spoof.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Beyond the pretty penny: the Economic Impact of Cybercrime.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461).
Dagstuhl Reports, 2016

Introduction.
J. Cybersecur., 2016

Understanding the role of sender reputation in abuse reporting and cleanup.
J. Cybersecur., 2016

Developing Security Reputation Metrics for Hosting Providers.
CoRR, 2016

Evaluating the Impact of AbuseHUB on Botnet Mitigation.
CoRR, 2016

Evaluating Malware Mitigation by Android Market Operators.
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016

Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Apples, oranges and hosting providers: Heterogeneity and security in the hosting market.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

A time-dependent SIS-model for long-term computer worm evolution.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Economics of Fighting Botnets: Lessons from a Decade of Mitigation.
IEEE Secur. Priv., 2015

Post-Mortem of a Zombie: Conficker Cleanup After Six Years.
Proceedings of the 24th USENIX Security Symposium, 2015

How dynamic is the ISPs address space? Towards internet-wide DHCP churn estimation.
Proceedings of the 14th IFIP Networking Conference, 2015

An Empirical Analysis of ZeuS C&C Lifetime.
Proceedings of the 10th ACM Symposium on Information, 2015

Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Images of innovation in discourses of free and open source software.
First Monday, 2014

Security collapse in the HTTPS market.
Commun. ACM, 2014

Towards Incentivizing ISPs to Mitigate Botnets.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
Where is the governance in Internet governance?
New Media Soc., 2013

Internet Measurements and Public Policy: Mind the Gap.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013

Measuring the Cost of Cybercrime.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Measuring the Cost of Cybercrime.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

2010
Empirical findings on European critical infrastructure dependencies.
Int. J. Syst. Syst. Eng., 2010

The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

2008
Empirical Findings on Critical Infrastructure Dependencies in Europe.
Proceedings of the Critical Information Infrastructure Security, 2008

2006
The governance of cybersecurity: a framework for policy.
Int. J. Crit. Infrastructures, 2006

Assuring high reliability of service provision in critical infrastructures.
Int. J. Crit. Infrastructures, 2006


  Loading...