Juan Caballero
Orcid: 0000-0003-2962-1348
According to our database1,
Juan Caballero
authored at least 70 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
1
1
2
4
1
2
1
1
1
1
1
1
6
2
2
3
1
3
2
4
4
5
3
2
2
3
4
2
4
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
CoRR, 2024
2023
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools.
Future Gener. Comput. Syst., July, 2023
Nucleic Acids Res., January, 2023
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
CoRR, 2022
CoRR, 2022
CoRR, 2022
Proceedings of the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation, 2022
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IET Inf. Secur., 2019
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Int. J. Inf. Sec., 2015
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 13th International Workshop on Dynamic Analysis, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification.
Proceedings of the Computer Security - ESORICS 2014, 2014
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Network dialog minimization and network dialog diffing: two novel primitives for network security applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Automatic protocol reverse-engineering: Message format extraction and field semantics inference.
Comput. Networks, 2013
FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities.
Proceedings of the International Symposium on Software Testing and Analysis, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Differential Slicing: Identifying Causal Execution Differences for Security Applications.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 2009 IEEE International Workshop on Genomic Signal Processing and Statistics, 2009
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
2007
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Detection of Intrusions and Malware, 2007
Polyglot: automatic extraction of protocol message format using dynamic binary analysis.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006