sample of publications
-
articles
- Kunai: A static analysis framework for Android apps. SoftwareX. 22. 2023
- Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING. 2023
- Scramblesuit: An effective timing side-channels framework for malware sandbox evasion. Journal of Computer Security. 30:851-876. 2022
- Optimization of code caves in malware binaries to evade machine learning detectors. COMPUTERS & SECURITY. 116:102643-1-102643-15. 2022
- A year in lockdown: how the waves of COVID-19 impact internet traffic. COMMUNICATIONS OF THE ACM. 64:101-108. 2021
- Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting. IEEE Transactions on Network and Service Management. 18:1334-1349. 2021
- After you, please: browser extensions order attacks and countermeasures. International Journal of Information Security. 19:623-638. 2020
- The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. IEEE Transactions on Information Forensics and Security. 14:3175-3190. 2019
- Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors. Future Generation Computer Systems-The International Journal of eScience. 96:283-296. 2019
- ANDRODET: An adaptive Android obfuscation detector. Future Generation Computer Systems-The International Journal of eScience. 90:240-261. 2019
- Real-time electrocardiogram streams for continuous authentication. APPLIED SOFT COMPUTING. 68:784-794. 2018
- Picking on the family: Disrupting android malware triage by forcing misclassification. EXPERT SYSTEMS WITH APPLICATIONS. 95:113-126. 2018
- Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals. Entropy. 20. 2018
- PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing. COMPUTERS & SECURITY. 69:127-141. 2017
- A lightweight implementation of the Tav-128 hash function. IEICE Electronics Express. 14:1-9. 2017
- A Survey of Wearable Biometric Recognition Systems.. ACM COMPUTING SURVEYS. 49. 2016
- Bootstrapping security policies for wearable Apps using attributed structural graphs. SENSORS. 16. 2016
- ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware. IEEE TRANSACTIONS ON MOBILE COMPUTING. 15:789-802. 2016
- A new TRNG based on coherent sampling with self-timed rings. IEEE Transactions on Industrial Informatics. 12:91-100. 2016
- Non-invasive multi-modal human identification system combining ECG, GSR, and airflow biosignals. Journal of Medical and Biological Engineering. 35:735-748. 2015
- Automatic generation of HTTP intrusion signatures by selective identification of anomalies. COMPUTERS & SECURITY. 55:159-174. 2015
- Human identification using compressed ECG signals. JOURNAL OF MEDICAL SYSTEMS. 39. 2015
- Probabilistic yoking proofs for large scale IoT systems. Ad Hoc Networks. 32:43-52. 2015
- Security and privacy issues in implantable medical devices: A comprehensive survey. JOURNAL OF BIOMEDICAL INFORMATICS. 55:272-289. 2015
- Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. IEEE Transactions on Dependable and Secure Computing. 12:312-325. 2015
- DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks. Computer Networks. 80:66-88. 2015
- Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation. Pervasive and Mobile Computing. 18:137-151. 2015
- Hindering data theft with encrypted data trees. JOURNAL OF SYSTEMS AND SOFTWARE. 101:147-158. 2015
- Secure publish-subscribe protocols for heterogeneous medical wireless body area networks. SENSORS. 14:22619-22642. 2014
- Thwarting obfuscated malware via differential fault analysis. COMPUTER. 47:24-31. 2014
- Weaknesses in a new ultralightweight RFID authentication protocol with permutation-RAPP. Security and Communication Networks (discontinued). 7:945-949. 2014
- Evolution, Detection and Analysis of Malware for Smart Devices. IEEE Communications Surveys and Tutorials. 16:961-987. 2014
- An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms. IEEE Transactions on Industrial Informatics. 10:1216-1225. 2014
- Randomized anagram revisited. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 41:182-196. 2014
- DENDROID: A text mining approach to analyzing and classifying code structures in Android malware families. EXPERT SYSTEMS WITH APPLICATIONS. 41:1104-1117. 2014
- Trustworthy placements: Improving quality and resilience in collaborative attack detection. Computer Networks. 58:70-86. 2014
- Efficient ASIC implementation and analysis of two EPC-C1G2 RFID authentication protocols. IEEE SENSORS JOURNAL. 13:3537-3547. 2013
- The placement-configuration problem for intrusion detection nodes in wireless sensor networks. COMPUTERS & ELECTRICAL ENGINEERING. 39:2306-2317. 2013
- Two RFID Standard-based Security Protocols for Healthcare Environments. JOURNAL OF MEDICAL SYSTEMS. 37. 2013
- Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6". IEEE COMMUNICATIONS LETTERS. 17:805-807. 2013
- Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management. 20:561-578. 2012
- Bypassing information leakage protection with trusted applications. COMPUTERS & SECURITY. 31:557-568. 2012
- Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE. 23:543-553. 2012
- Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE. 24:1061-1069. 2011
- Masquerade mimicry attack detection: A randomised approach. COMPUTERS & SECURITY. 30:297-310. 2011
- Blind Steganalysis of Mp3Stego. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. 26:1787-1799. 2010
- Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer. Computer Networks. 54:1502-1508. 2010
- Practical Attacks on a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard. COMPUTER COMMUNICATIONS. 32:1185-1193. 2009
- Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard. COMPUTER STANDARDS & INTERFACES. 31:372-380. 2009
- An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. 25:33-57. 2009
- LAMED - A PRNG for EPC Class-1 Generation-2 RFID Specification. COMPUTER STANDARDS & INTERFACES. 31:88-97. 2009
- Automated Synthesis of Multiparty Rational Exchange Security Protocols. International transactions on systems science and applications. 4:312-321. 2008
- Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. 24:1485-1504. 2008
- On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security. 3:166-172. 2008
- Secure Content Access and Replication in Pure P2P Networks. COMPUTER COMMUNICATIONS. 31:266-279. 2008
- Bayesian Rational Exchange. International Journal of Information Security. 7:85-100. 2008
- Cryptanalysis of Syverson's Rational Exchange Protocol. International journal of network security. 7:151-156. 2008
-
book chapters
- Trends, Problems and Misconceptions on Testing Network Intrusion Detection Systems Effectiveness. In: Computer Security: Intrusion, Detection and Prevention. NOVA SCIENCE PUBLISHERS INC. 51-62. 2010
- Cooperative Security in Peer-to-Peer and Mobile ad hoc Networks. In: Cooperative Wireless Communications. AUERBACH PUBLICATIONS. 391-412. 2009
- Game Theroy and Cooperation Analysis. In: Cooperative Wireless Communications. AUERBACH PUBLICATIONS. 2009
- Trends, Problems and Misconceptions on Testing Network Intrusion Detection Systems Effectiveness. In: Computer Security: Intrusion, Detection and Prevention. NOVA SCIENCE PUBLISHERS INC. 51-62. 2009
- RFID Specification Revisited. In: In The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems. AUERBACH PUBLICATIONS. 127-156. 2008
- Secure Content Distribution in Pure Peer-to-Peer and Ad Hoc Networks. In: Handbook of Research on Secure Multimedia Distribution. IGI GLOBAL. 385-404. 2008
- Secure Content Access and Replication in Pure P2P Networks. In: Computer Communications. 266-279. 2008
-
conference contributions
- In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes. 437-456. 2023
- Framework Proposal to Measure the Stress as Adversarial Factor on Cyber Decision Making. 517-536. 2022
- Towards an extensible privacy analysis framework for Smart Homes. 754-755. 2022
- The Stress as Adversarial Factor for Cyber Decision Making. 1-10. 2021
- Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services 2020
- The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic 2020
- AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families. 307-314. 2019
- Measuring ewhoring. 463-477. 2019
- An Analysis of Pre-installed Android Software. 69-70. 2018
- Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. 293-307. 2018
- TriFlow: Triaging Android Applications using Speculative Information Flows. 640-651. 2017
- A Look into 30 Years of Malware Development from a Software Metrics Perspective. 325-345. 2016
- ADROIT: Android malware detection using meta-information. 1-8. 2016
- Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. 63-77. 2015
- Hardware Trojans in TRNGs 2015
- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. 496-515. 2015
- An Intelligent and Adaptive Live Simulator: A New Concept for Cybersecurity Training. 558-565. 2014
- Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models. 183-201. 2014
- Employing a Secure Cipher Does Not guarantee the Security of RFID Protocols 2014
- Information Sharing Models for Cooperative Cyber Defence. 63-90. 2013
- Modelling Uncertain and Time-Dependent Security Labels in MLS Systems. 158-171. 2012
- Simulador Avanzado para la Ciberdefensa 2012
- Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing. 207-218. 2011
- Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol. 56-68. 2008
- Ayin: A Collision-Free Function for Low-Cost RFID Systems 2008
- CSteg: Talking on C Code - Steganography of C Source Code into Text 2008
- Nature-Inspired Synthesis of Rational Protocols. 981-990. 2008
- Non-Standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol 2008
- On the Salsa20 Core Function 2008
- Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard 2008