default search action
Juan Caballero
Person information
Other persons with a similar name
- Juan A. Caballero
- Juan Antonio Caballero (aka: Juan Antonio Caballero Hernández)
- Juan Escorcia Caballero
- Juan P. Caballero-Villalobos
- Juan Pablo Caballero-Villalobos
- Juan P. Escorcia-Caballero (aka: Juan Pablo Escorcia-Caballero)
- Juan Carlos Fernández 0001 (aka: Juan Carlos Fernández Caballero) — University of Córdoba, Department of Computer Science and Numerical Analysis, Spain
- Juan Luis Gonzalez-Caballero
- Juan Carlos Trujillo-Caballero
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Juan Caballero, Gibran Gómez, Srdjan Matic, Gustavo Sánchez, Silvia Sebastián, Arturo Villacañas:
The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools. Future Gener. Comput. Syst. 144: 74-89 (2023) - [j9]Lorna J. Richardson, Ben Allen, Germana Baldi, Martin Beracochea, Maxwell L. Bileschi, Tony Burdett, Josephine Burgin, Juan Caballero, Guy Cochrane, Lucy J. Colwell, Tom Curtis, Alejandra Escobar-Zepeda, Tatiana A. Gurbich, Varsha Kale, Anton I. Korobeynikov, Shriya Raj, Alexander B. Rogers, Ekaterina A. Sakharova, Santiago Sanchez, Darren J. Wilkinson, Robert D. Finn:
MGnify: the microbiome sequence data analysis resource in 2023. Nucleic Acids Res. 51(D1): 753-759 (2023) - [c53]Silvia Sebastián, Raluca-Georgia Diugan, Juan Caballero, Iskander Sánchez-Rola, Leyla Bilge:
Domain and Website Attribution beyond WHOIS. ACSAC 2023: 124-137 - [c52]Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. CCS 2023: 60-74 - [c51]Gibran Gómez, Kevin van Liebergen, Juan Caballero:
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage. CCS 2023: 3183-3197 - [c50]Kevin van Liebergen, Juan Caballero, Platon Kotzias, Chris Gates:
A Deep Dive into the VirusTotal File Feed. DIMVA 2023: 155-176 - [c49]Daniel Domínguez-Álvarez, Alejandro de la Cruz, Alessandra Gorla, Juan Caballero:
LibKit: Detecting Third-Party Libraries in iOS Apps. ESEC/SIGSOFT FSE 2023: 1407-1418 - [c48]Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero:
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles. USENIX Security Symposium 2023: 5683-5700 - [i14]Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero:
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles. CoRR abs/2301.07346 (2023) - [i13]Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. CoRR abs/2307.14657 (2023) - [i12]Gibran Gómez, Kevin van Liebergen, Juan Caballero:
Cybercrime Bitcoin Revenue Estimations: Quantifying the Impact of Methodology and Coverage. CoRR abs/2309.03592 (2023) - 2022
- [j8]Irfan Ul Haq, Juan Caballero:
A Survey of Binary Code Similarity. ACM Comput. Surv. 54(3): 51:1-51:38 (2022) - [c47]Gibran Gómez, Pedro Moreno-Sanchez, Juan Caballero:
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration. CCS 2022: 1291-1305 - [c46]Daniel Domínguez-Álvarez, Alessandra Gorla, Juan Caballero:
On the Usage of Programming Languages in the iOS Ecosystem. SCAM 2022: 176-180 - [i11]Gibran Gómez, Pedro Moreno-Sanchez, Juan Caballero:
Detecting Cybercriminal Bitcoin Relationships through Backwards Exploration. CoRR abs/2206.00375 (2022) - [i10]Juan Caballero, Gibran Gómez, Srdjan Matic, Gustavo Sánchez, Silvia Sebastián, Arturo Villacañas:
GoodFATR: A Platform for Automated Threat Report Collection and IOC Extraction. CoRR abs/2208.00042 (2022) - [i9]Kevin van Liebergen, Juan Caballero, Platon Kotzias, Chris Gates:
A Deep Dive into VirusTotal: Characterizing and Clustering a Massive File Feed. CoRR abs/2210.15973 (2022) - 2021
- [c45]Platon Kotzias, Juan Caballero, Leyla Bilge:
How Did That Get In My Phone? Unwanted App Distribution on Android Devices. SP 2021: 53-69 - [c44]Daniel Wilms, Carsten Stöcker, Juan Caballero:
Data Provenance in Vehicle Data Chains. VTC Spring 2021: 1-5 - [i8]Gibran Gómez, Platon Kotzias, Matteo Dell'Amico, Leyla Bilge, Juan Caballero:
Unsupervised Detection and Clustering of Malicious TLS Flows. CoRR abs/2109.03878 (2021) - 2020
- [c43]Silvia Sebastián, Juan Caballero:
AVclass2: Massive Malware Tag Extraction from AV Labels. ACSAC 2020: 42-53 - [c42]Silvia Sebastián, Juan Caballero:
Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism. CCS 2020: 771-785 - [c41]Avinash Sudhodanan, Soheil Khodayari, Juan Caballero:
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks. NDSS 2020 - [i7]Silvia Sebastián, Juan Caballero:
AVClass2: Massive Malware Tag Extraction from AV Labels. CoRR abs/2006.10615 (2020) - [i6]Platon Kotzias, Juan Caballero, Leyla Bilge:
How Did That Get In My Phone? Unwanted App Distribution on Android Devices. CoRR abs/2010.10088 (2020)
2010 – 2019
- 2019
- [j7]Richard Rivera, Platon Kotzias, Avinash Sudhodanan, Juan Caballero:
Costly freeware: a systematic analysis of abuse in download portals. IET Inf. Secur. 13(1): 27-35 (2019) - [j6]Alejandro Calleja, Juan Tapiador, Juan Caballero:
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. IEEE Trans. Inf. Forensics Secur. 14(12): 3175-3190 (2019) - [c40]Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero:
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises. NDSS 2019 - [i5]Avinash Sudhodanan, Soheil Khodayari, Juan Caballero:
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks. CoRR abs/1908.02204 (2019) - [i4]Irfan Ul Haq, Juan Caballero:
A Survey of Binary Code Similarity. CoRR abs/1909.11424 (2019) - 2018
- [j5]Irfan Ul Haq, Sergio Chica, Juan Caballero, Somesh Jha:
Malware lineage in the wild. Comput. Secur. 78: 347-363 (2018) - [c39]Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, Kevin W. Hamlen:
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. AsiaCCS 2018: 393-398 - [c38]Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. CCS 2018: 412-425 - [c37]Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez, Juan Caballero:
Coming of Age: A Longitudinal Study of TLS Deployment. Internet Measurement Conference 2018: 415-428 - [i3]Alejandro Calleja, Juan E. Tapiador, Juan Caballero:
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. CoRR abs/1811.06888 (2018) - 2017
- [c36]Srdjan Matic, Carmela Troncoso, Juan Caballero:
Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures. NDSS 2017 - [c35]Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, Manos Antonakakis:
A Lustrum of Malware Network Communication: Evolution and Insights. IEEE Symposium on Security and Privacy 2017: 788-804 - [i2]Irfan Ul Haq, Sergio Chica, Juan Caballero, Somesh Jha:
Malware Lineage in the Wild. CoRR abs/1710.05202 (2017) - 2016
- [j4]Juan Caballero, Zhiqiang Lin:
Type Inference on Executables. ACM Comput. Surv. 48(4): 65:1-65:35 (2016) - [c34]Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero:
RevProbe: detecting silent reverse proxies in malicious server infrastructures. ACSAC 2016: 101-112 - [c33]Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero:
AVclass: A Tool for Massive Malware Labeling. RAID 2016: 230-253 - [c32]Alejandro Calleja, Juan E. Tapiador, Juan Caballero:
A Look into 30 Years of Malware Development from a Software Metrics Perspective. RAID 2016: 325-345 - [c31]Platon Kotzias, Leyla Bilge, Juan Caballero:
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services. USENIX Security Symposium 2016: 739-756 - [e5]Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez:
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings. Lecture Notes in Computer Science 9721, Springer 2016, ISBN 978-3-319-40666-4 [contents] - [e4]Juan Caballero, Eric Bodden, Elias Athanasopoulos:
Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9639, Springer 2016, ISBN 978-3-319-30805-0 [contents] - 2015
- [j3]Antonio Nappa, M. Zubair Rafique, Juan Caballero:
The MALICIA dataset: identification and analysis of drive-by download operations. Int. J. Inf. Sec. 14(1): 15-33 (2015) - [c30]Platon Kotzias, Srdjan Matic, Richard Rivera, Juan Caballero:
Certified PUP: Abuse in Authenticode Code Signing. CCS 2015: 465-478 - [c29]Srdjan Matic, Platon Kotzias, Juan Caballero:
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services. CCS 2015: 1455-1466 - [c28]Irfan Ul Haq, Juan Caballero, Michael D. Ernst:
Ayudante: identifying undesired variable interactions. WODA@SPLASH 2015: 8-13 - [c27]Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dumitras:
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching. IEEE Symposium on Security and Privacy 2015: 692-708 - [e3]Frank Piessens, Juan Caballero, Nataliia Bielova:
Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings. Lecture Notes in Computer Science 8978, Springer 2015, ISBN 978-3-319-15617-0 [contents] - [e2]Juan Caballero, Michalis Polychronakis:
Proceedings of the Eighth European Workshop on System Security, EuroSec 2015, Bordeaux, France, April 21, 2015. ACM 2015, ISBN 978-1-4503-3479-2 [contents] - 2014
- [c26]M. Zubair Rafique, Juan Caballero, Christophe Huygens, Wouter Joosen:
Network dialog minimization and network dialog diffing: two novel primitives for network security applications. ACSAC 2014: 166-175 - [c25]Zhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu:
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis. CCS 2014: 179-190 - [c24]David I. Urbina, Yufei Gu, Juan Caballero, Zhiqiang Lin:
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification. ESORICS (2) 2014: 237-256 - [c23]Liang Wang, Antonio Nappa, Juan Caballero, Thomas Ristenpart, Aditya Akella:
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds. Internet Measurement Conference 2014: 101-114 - [c22]Antonio Nappa, Zhaoyan Xu, M. Zubair Rafique, Juan Caballero, Guofei Gu:
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers. NDSS 2014 - [e1]Davide Balzarotti, Juan Caballero:
Proceedings of the Seventh European Workshop on System Security, EuroSec 2014, April 13, 2014, Amsterdam, The Netherlands. ACM 2014, ISBN 978-1-4503-2715-2 [contents] - 2013
- [j2]Juan Caballero, Dawn Song:
Automatic protocol reverse-engineering: Message format extraction and field semantics inference. Comput. Networks 57(2): 451-474 (2013) - [c21]Martina Lindorfer, Matthias Neumayr, Juan Caballero, Christian Platzer:
Cross-platform malware: write once, infect everywhere. CCS 2013: 1425-1428 - [c20]Antonio Nappa, M. Zubair Rafique, Juan Caballero:
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting. DIMVA 2013: 1-20 - [c19]M. Zubair Rafique, Juan Caballero:
FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors. RAID 2013: 144-163 - 2012
- [c18]Chris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker:
Manufacturing compromise: the emergence of exploit-as-a-service. CCS 2012: 821-832 - [c17]Juan Caballero, Gustavo Grieco, Mark Marron, Antonio Nappa:
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities. ISSTA 2012: 133-143 - [i1]Juan Caballero:
Understanding the Role of Malware in Cybercrime. ERCIM News 2012(90) (2012) - 2011
- [j1]Gustavo Glusman, Juan Caballero, Denise E. Mauldin, Leroy E. Hood, Jared C. Roach:
Kaviar: an accessible system for testing SNV novelty. Bioinform. 27(22): 3216-3217 (2011) - [c16]Noah M. Johnson, Juan Caballero, Kevin Zhijie Chen, Stephen McCamant, Pongsin Poosankam, Daniel Reynaud, Dawn Song:
Differential Slicing: Identifying Causal Execution Differences for Security Applications. IEEE Symposium on Security and Privacy 2011: 347-362 - [c15]Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson:
Measuring Pay-per-Install: The Commoditization of Malware Distribution. USENIX Security Symposium 2011 - 2010
- [c14]Juan Caballero, Pongsin Poosankam, Stephen McCamant, Domagoj Babic, Dawn Song:
Input generation via decomposition and re-stitching: finding bugs in Malware. CCS 2010: 413-425 - [c13]Chia Yuan Cho, Juan Caballero, Chris Grier, Vern Paxson, Dawn Song:
Insights from the Inside: A View of Botnet Management from Infiltration. LEET 2010 - [c12]Juan Caballero, Noah M. Johnson, Stephen McCamant, Dawn Song:
Binary Code Extraction and Interface Identification for Security Applications. NDSS 2010
2000 – 2009
- 2009
- [c11]Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song:
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. CCS 2009: 621-634 - [c10]Juan Caballero, Gustavo Glusman:
Enhancing gene detection with computer generated intergenic regions. GENSiPS 2009: 1-4 - [c9]Juan Caballero, Zhenkai Liang, Pongsin Poosankam, Dawn Song:
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration. RAID 2009: 161-181 - [c8]Adam Barth, Juan Caballero, Dawn Song:
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. SP 2009: 360-371 - 2008
- [c7]Dawn Xiaodong Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25 - [c6]Juan Caballero, Theocharis Kampouris, Dawn Song, Jia Wang:
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? NDSS 2008 - 2007
- [c5]Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiaodong Song:
Polyglot: automatic extraction of protocol message format using dynamic binary analysis. CCS 2007: 317-329 - [c4]Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song:
Distributed Evasive Scan Techniques and Countermeasures. DIMVA 2007: 157-174 - [c3]Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Xiaodong Song:
Fig: Automatic Fingerprint Generation. NDSS 2007 - [c2]David Brumley, Juan Caballero, Zhenkai Liang, James Newsome:
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation. USENIX Security Symposium 2007 - 2006
- [c1]Shobha Venkataraman, Juan Caballero, Dawn Song, Avrim Blum, Jennifer Yates:
Black Box Anomaly Detection: Is It Utopian?. HotNets 2006
Coauthor Index
aka: Dawn Xiaodong Song
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint