What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Carlos Gañán
Google Scholar
ORCID:
0000-0002-4699-3007
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation.
Arwa Abdulkarim Al Alsadi
Mathew Vermeer
Takayuki Sasaki
Katsunari Yoshioka
Michel van Eeten
Carlos Gañán
2025
conf/uss
Regulating Smart Device Support Periods: User Expectations and the European Cyber Resilience Act.
Lorenz Kustosch
Carlos Gañán
Mattis van 't Schip
Michel van Eeten
Simon Parkin
2025
conf/uss
Patching Up: Stakeholder Experiences of Security Updates for Connected Medical Devices.
Lorenz Kustosch
Carlos Gañán
Michel van Eeten
Simon Parkin
2023
journals/popets
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom.
Tobias Fiebig
Seda F. Gürses
Carlos Gañán
Erna Kotkamp
Fernando Kuipers
Martina Lindorfer
Menghua Prisse
Taritha Sari
2023
conf/ccs
Alert Alchemy: SOC Workflows and Decisions in the Management of NIDS Rules.
Mathew Vermeer
Natalia Kadenko
Michel van Eeten
Carlos Gañán
Simon Parkin
2023
conf/uss
Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical Basis for Holding IoT Manufacturers Legally Responsible.
Lorenz Kustosch
Carlos Gañán
Mattis van 't Schip
Michel van Eeten
Simon Parkin
2023
conf/uss
Two Sides of the Shield: Understanding Protective DNS adoption factors.
Elsa Turcios Rodriguez
Radu Anghel
Simon Parkin
Michel van Eeten
Carlos Gañán
2023
conf/esorics
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks.
Radu Anghel
Swaathi Vetrivel
Elsa Turcios Rodriguez
Kaichi Sameshima
Daisuke Makita
Katsunari Yoshioka
Carlos Gañán
Yury Zhauniarovich
2022
conf/sp
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial.
Qasim Lone
Alisa Frik
Matthew Luckie
Maciej Korczynski
Michel van Eeten
Carlos Gañán
2022
conf/eurosp
Difficult for Thee, But Not for Me: Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware.
Elsa Turcios Rodriguez
Max Fukkink
Simon Parkin
Michel van Eeten
Carlos Gañán
2022
conf/asiaccs
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection.
Mathew Vermeer
Michel van Eeten
Carlos Gañán
2021
conf/soups
"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security.
Brennen Bouwmeester
Elsa Turcios Rodriguez
Carlos Gañán
Michel van Eeten
Simon Parkin
2021
conf/eurosp
Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts.
Arman Noroozian
Elsa Turcios Rodriguez
Elmer Lastdrager
Takahiro Kasama
Michel van Eeten
Carlos Gañán
2021
conf/eurosp
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Mathew Vermeer
Jonathan West
Alejandro Cuevas
Shuonan Niu
Nicolas Christin
Michel van Eeten
Tobias Fiebig
Carlos Gañán
Tyler Moore
2019
conf/eurosp
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks.
Orçun Çetin
Carlos Gañán
Lisette Altena
Samaneh Tajalizadehkhoob
Michel van Eeten
2019
conf/ndss
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Orçun Çetin
Carlos Gañán
Lisette Altena
Takahiro Kasama
Daisuke Inoue
Kazuki Tamiya
Ying Tie
Katsunari Yoshioka
Michel van Eeten
2018
conf/soups
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens.
Orçun Çetin
Carlos Gañán
Lisette Altena
Samaneh Tajalizadehkhoob
Michel van Eeten
2017
conf/ccs
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware.
Samaneh Tajalizadehkhoob
Carlos Gañán
Arman Noroozian
Michel van Eeten
2015
conf/ccs
An Empirical Analysis of ZeuS C&C Lifetime.
Carlos Gañán
Orçun Çetin
Michel van Eeten
2012
journals/tifs
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces.
Carlos Gañán
Jorge Mata-Díaz
Jose L. Muñoz
Juan Hernández-Serrano
Oscar Esparza
Juanjo Alins
2012
conf/icics
Impact of the Revocation Service in PKI Prices.
Carlos Gañán
Jose L. Muñoz
Oscar Esparza
Jorge Mata-Díaz
Juanjo Alins
Coauthors
Alejandro Cuevas
(1)
Alisa Frik
(1)
Arman Noroozian
(2)
Arwa Abdulkarim Al Alsadi
(1)
Brennen Bouwmeester
(1)
Carlos Gañán
(21)
Daisuke Inoue
(1)
Daisuke Makita
(1)
Elmer Lastdrager
(1)
Elsa Turcios Rodriguez
(5)
Erna Kotkamp
(1)
Fernando Kuipers
(1)
Jonathan West
(1)
Jorge Mata-Díaz
(2)
Jose L. Muñoz
(2)
Juan Hernández-Serrano
(1)
Juanjo Alins
(2)
Kaichi Sameshima
(1)
Katsunari Yoshioka
(3)
Kazuki Tamiya
(1)
Lisette Altena
(3)
Lorenz Kustosch
(3)
Maciej Korczynski
(1)
Martina Lindorfer
(1)
Mathew Vermeer
(4)
Matthew Luckie
(1)
Mattis van 't Schip
(2)
Max Fukkink
(1)
Menghua Prisse
(1)
Michel van Eeten
(17)
Natalia Kadenko
(1)
Nicolas Christin
(1)
Orçun Çetin
(4)
Oscar Esparza
(2)
Qasim Lone
(1)
Radu Anghel
(2)
Samaneh Tajalizadehkhoob
(3)
Seda F. Gürses
(1)
Shuonan Niu
(1)
Simon Parkin
(7)
Swaathi Vetrivel
(1)
Takahiro Kasama
(2)
Takayuki Sasaki
(1)
Taritha Sari
(1)
Tobias Fiebig
(2)
Tyler Moore
(1)
Ying Tie
(1)
Yury Zhauniarovich
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to