Carlos Gañán
Orcid: 0000-0002-4699-3007Affiliations:
- Delft University of Technology, The Netherlands
According to our database1,
Carlos Gañán
authored at least 76 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. ACM Meas. Anal. Comput. Syst., 2024
IoT Market Dynamics: An Analysis of Device Sales, Security and Privacy Signals, and their Interactions.
Proceedings of the 33rd USENIX Security Symposium, 2024
Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Patch Pilgrimage: Exploring the Landscape of TCP Reflective Attacks and User Patching Expedition.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
VT-SOS: A Cost-effective URL Warning utilizing VirusTotal as a Second Opinion Service.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
2023
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom.
Proc. Priv. Enhancing Technol., April, 2023
Easier Said Than Done: The Failure of Top-Level Cybersecurity Advice for Consumer IoT Devices.
CoRR, 2023
Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible.
Proceedings of the 32nd USENIX Security Symposium, 2023
Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023
Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023
Lessons in Prevention and Cure: A User Study of Recovery from Flubot Smartphone Malware.
Proceedings of the 2023 European Symposium on Usable Security, 2023
Towards more rigorous domain-based metrics: quantifying the prevalence and implications of "Active" Domains.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of Research papers at APWG.EU TECH 2023 co-located with the APWG.EU Tech 2023 Summit & Researchers Sync-Up (APWG.EU Tech 2023), 2023
2022
J. Inf. Process., 2022
CoRR, 2022
Helping hands: Measuring the impact of a large threat intelligence sharing community.
Proceedings of the 31st USENIX Security Symposium, 2022
Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
J. Cybersecur., 2021
Heads in the Clouds: Measuring the Implications of Universities Migrating to Public Clouds.
CoRR, 2021
Proceedings of the 5th Network Traffic Measurement and Analysis Conference, 2021
"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Proceedings of the IoT '21: 11th International Conference on the Internet of Things, St. Gallen, Switzerland, November 8, 2021
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
IEICE Trans. Commun., 2020
Beneath the radar: Exploring the economics of business fraud via underground markets.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and Economics of Bullet-Proof Hosting.
Proceedings of the 28th USENIX Security Symposium, 2019
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
2018
ACM Trans. Internet Techn., 2018
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets.
Proceedings of the 27th USENIX Security Symposium, 2018
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
2017
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017
Proceedings of the 2017 New Security Paradigms Workshop, 2017
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
J. Cybersecur., 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Apples, oranges and hosting providers: Heterogeneity and security in the hosting market.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
2015
EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks.
Pervasive Mob. Comput., 2015
Knowl. Inf. Syst., 2015
Proceedings of the 14th IFIP Networking Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the Wireless Networking for Moving Objects, 2014
IEEE Pervasive Comput., 2014
Comput. Stand. Interfaces, 2014
Comput. J., 2014
2013
PhD thesis, 2013
Wirel. Networks, 2013
BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs.
Mob. Inf. Syst., 2013
J. Netw. Comput. Appl., 2013
Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2013
2012
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces.
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012
Proceedings of the Communication Technologies for Vehicles - 4th International Workshop, 2012
Proceedings of the Multiple Access Communications - 5th International Workshop, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
NeuroCast: Adaptive Multi-source P2P Video Streaming Application for Wireless Networks.
Proceedings of the Wired/Wireless Internet Communications, 2011
2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009