Elmer Lastdrager

Dr.ir. Elmer Lastdrager works as a Research Engineer for SIDN Labs, focussing on security and privacy in home networks that contain one or more Internet of Things devices. Prior to that, he worked at the Services, Cyber Security and Safety group at the University of Twente, working in the field of cybercrime science, focussing on the prevention of phishing attacks. Elmer Lastdrager received a Bachelor of Science in Computer Science (2009) and a Master of Science in Computer Security (2011), and a PhD from the University of Twente (2018).

Contact Information

Phone: +31 85 303 42 49

Email: elmer.lastdrager (mail) sidn.nl

PGP key: Download

PGP fingerprint: 6038 F3DC 17DB 49E8 F7E5   73C6 CFB8 426D 0E54 D20F


Noroozian, A. and Turcios Rodriguez, E. and Lastdrager, E. and Kasama, T. and van Eeten, M. and Ganán C.H. Can ISPs Help Mitigate IoT Malware? A Longitudinal Study of Broadband ISP Security Efforts. Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS&P). Virtual event, 6-10 September 2021.

Lastdrager, E.E.H. and Hesselman, C.E.W. and Jansen, J. and Davids, M. Protecting Home Networks From Insecure IoT Devices. Proceedings of the 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Bugapest, Hungary, 20-24 April 2020.

Lastdrager, E.E.H. (2018) From Fishing to Phishing. PhD thesis. Enschede, the Netherlands. ISBN 978-90-365-4479-5. ISSN 1381-3617. DOI 10.3990/1.9789036544795.

Lastdrager, E.E.H. and Carvajal Gallardo, I. and Hartel, P.H. and Junger, M. (2017) How Effective is Anti-Phishing Training for Children?. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 12-14 July 2017, Santa Clara, California, USA. USENIX Association. ** Distinguished paper award **

Lastdrager, E.E.H. and Hartel, P.H. and Junger, M. (2015) Apate: Anti-Phishing Analysing and Triaging Environment (Poster). In: 36th IEEE Symposium on Security and Privacy, 18-21 May 2015, San Jose, California, USA. IEEE Computer Society.

Lastdrager, E.E.H. (2014) Achieving a Consensual Definition of Phishing Based on a Systematic Review of the Literature. Crime Science, 3. 9:1-9:16. DOI 10.1186/s40163-014-0009-y. ISSN 2193-7680.

Lastdrager, E.E.H. and Montoya Morales, A.L. and Hartel, P.H. and Junger, M. (2013) Applying the Lost-Letter Technique to Assess IT Risk Behaviour. In: Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, 29 Jun 2013, New Orleans, USA. pp. 2-9. IEEE Computer Society. DOI 10.1186/s40163-014-0009-y. ISBN 978-0-7695-5065-7.

Lastdrager, E.E.H. (2011) Securing Patient Information in Medical Databases. Master’s thesis, University of Twente.

Lastdrager, E.E.H. and Pras, A. (2009) Consistency of Network Traffic Repositories: An Overview. In: Proceedings of the Third International Conference on Autonomous Infrastructure, Management and Security (AIMS 2009), 30 Jun - 02 Jul 2009, Enschede, The Netherlands. pp. 173-178. Lecture Notes in Computer Science 5637. Springer Verlag. ISSN 0302-9743. ISBN 978-3-642-02626-3.

Lastdrager, E.E.H. and Pras, A. (2009) Consistency analysis of network traffic repositories. In: The Internet of the Future, 15th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2009, 7-9 Sep 2009, Barcelona, Spain. pp. 217-226. Lecture Notes in Computer Science 5733. Springer Verlag. ISSN 0302-9743. ISBN 978-3-642-03699-6.