Name
Affiliation
Papers
JUAN CABALLERO
Inst Syst Biol, Seattle, WA 98109 USA
52
Collaborators
Citations 
PageRank 
100
1335
67.83
Referers 
Referees 
References 
2791
1385
888
Search Limit
1001000
Title
Citations
PageRank
Year
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration00.342022
A Survey of Binary Code Similarity00.342021
How Did That Get In My Phone? Unwanted App Distribution on Android Devices10.342021
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks10.352020
Towards Attribution in Mobile Markets: Identifying Developer Account Polymorphism00.342020
AVClass2: Massive Malware Tag Extraction from AV Labels20.362020
Costly freeware: a systematic analysis of abuse in download portals.00.342019
Mind Your Own Business - A Longitudinal Study of Threats and Vulnerabilities in Enterprises.00.342019
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.20.362018
Malware Lineage in the Wild.10.362018
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development.10.352018
Coming of Age: A Longitudinal Study of TLS Deployment.40.442018
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.20.362018
A Lustrum of Malware Network Communication: Evolution and Insights120.592017
Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.00.342017
Measuring Pup Prevalence And Pup Distribution Through Pay-Per-Install Services120.722016
RevProbe: detecting silent reverse proxies in malicious server infrastructures.10.362016
Type Inference on Executables.90.512016
Certified PUP: Abuse in Authenticode Code Signing110.732015
The MALICIA dataset: identification and analysis of drive-by download operations110.702015
Ayudante: identifying undesired variable interactions20.392015
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services120.672015
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching291.322015
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.00.342014
Network dialog minimization and network dialog diffing: two novel primitives for network security applications.20.372014
AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis80.502014
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds60.532014
Automatic protocol reverse-engineering: Message format extraction and field semantics inference181.062013
Can machine learning techniques help to improve the common fisheries policy?10.382013
Cross-platform malware: write once, infect everywhere.00.342013
Firma: Malware Clustering And Network Signature Generation With Mixed Network Behaviors180.742013
Driving in the cloud: an analysis of drive-by download operations and abuse reporting401.322013
Manufacturing compromise: the emergence of exploit-as-a-service983.622012
Understanding The Role Of Malware In Cybercrime00.342012
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities260.832012
Kaviar: an accessible system for testing SNV novelty.60.592011
Measuring pay-per-install: the commoditization of malware distribution1015.222011
Differential Slicing: Identifying Causal Execution Differences for Security Applications341.052011
Input generation via decomposition and re-stitching: finding bugs in Malware271.462010
Insights from the inside: a view of botnet management from infiltration372.102010
Binary Code Extraction and Interface Identification for Security Applications.562.532010
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering953.662009
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration140.742009
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves382.562009
Enhancing gene detection with computer generated intergenic regions00.342009
BitBlaze: A New Approach to Computer Security via Binary Analysis32510.142008
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?70.532008
Distributed Evasive Scan Techniques and Countermeasures201.352007
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation564.392007
Polyglot: automatic extraction of protocol message format using dynamic binary analysis1577.472007
  • 1
  • 2