Seguir
Juan Caballero
Juan Caballero
Associate Research Professor, IMDEA Software Institute
Dirección de correo verificada de imdea.org - Página principal
Título
Citado por
Citado por
Año
BitBlaze: A new approach to computer security via binary analysis
D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ...
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
10402008
Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
J Caballero, H Yin, Z Liang, D Song
Proceedings of the 14th ACM conference on Computer and Communications …, 2007
5572007
AVclass: A Tool for Massive Malware Labeling
M Sebastián, R Rivera, P Kotzias, J Caballero
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
4322016
Measuring pay-per-install: The commoditization of malware distribution
J Caballero, C Grier, C Kreibich, V Paxson
Proceedings of the 20th USENIX Security Symposium, 187 - 202, 2011
3872011
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
J Caballero, P Poosankam, C Kreibich, D Song
Proceedings of the 16th ACM conference on Computer and Communications …, 2009
3452009
Manufacturing compromise: the emergence of exploit-as-a-service
C Grier, L Ballard, J Caballero, N Chachra, CJ Dietrich, K Levchenko, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2902012
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
J Caballero, G Grieco, M Marron, A Nappa
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
1932012
Binary Code Extraction and Interface Identification for Security Applications
J Caballero, N Johnson, S McCamant, D Song
Proceedings of the 17th Annual Network and Distributed System Security …, 2009
1782009
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
D Brumley, J Caballero, Z Liang, J Newsome, D Song
Proceedings of the 16th USENIX Security Symposium, 213-228, 2007
1612007
The attack of the clones: A study of the impact of shared code on vulnerability patching
A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras
2015 IEEE symposium on security and privacy, 692-708, 2015
1562015
Secure content sniffing for web browsers, or how to stop papers from reviewing themselves
A Barth, J Caballero, D Song
Proceedings of the 30th IEEE Symposium on Security and Privacy, 360-371, 2009
1472009
Firma: Malware clustering and network signature generation with mixed network behaviors
MZ Rafique, J Caballero
Research in Attacks, Intrusions, and Defenses: 16th International Symposium …, 2013
1332013
Insights from the inside: A view of botnet management from infiltration
CY Cho, J Caballero, C Grier, V Paxson, D Song
Proceedings of the 3rd USENIX conference on Large-scale Exploits and …, 2010
1252010
Driving in the cloud: An analysis of drive-by download operations and abuse reporting
A Nappa, MZ Rafique, J Caballero
Detection of Intrusions and Malware, and Vulnerability Assessment: 10th …, 2013
1132013
Differential slicing: Identifying causal execution differences for security applications
NM Johnson, J Caballero, KZ Chen, S McCamant, P Poosankam, ...
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 347-362, 2011
1032011
Automatic protocol reverse-engineering: Message format extraction and field semantics inference
J Caballero, D Song
Computer Networks 57 (2), 451-474, 2013
982013
A lustrum of malware network communication: Evolution and insights
C Lever, P Kotzias, D Balzarotti, J Caballero, M Antonakakis
2017 IEEE Symposium on Security and Privacy (SP), 788-804, 2017
952017
The MALICIA dataset: identification and analysis of drive-by download operations
A Nappa, MZ Rafique, J Caballero
International Journal of Information Security 14, 15-33, 2015
952015
Input generation via decomposition and re-stitching: Finding bugs in malware
J Caballero, P Poosankam, S McCamant, D Song
Proceedings of the 17th ACM conference on Computer and Communications …, 2010
892010
FiG: Automatic fingerprint generation
J Caballero, S Venkataraman, P Poosankam, MG Kang, D Song, A Blum
Proceedings of the 14th Annual Network and Distributed System Security …, 2007
812007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20