Reading Time: < 1 minute
47 entries « 1 of 4 »

Carrillo-Mondéjar, Javier; Rodríguez, Ricardo J.

Identifying Runtime Libraries in Statically Linked Linux Binaries Journal Article

In: Future Generation Computer Systems, vol. 164, pp. 107602, 2025, ISSN: 0167-739X.

Abstract | Links | BibTeX | Tags: Binary code analysis, IoT, malware, Runtime library identification, Statically linked binaries

Uroz, Daniel; Rodr'ıguez, Ricardo J.; Gañán, Carlos H.

Poster: Empirical Analysis of Lifespan Increase of IoT C&C Domains Proceedings Article

In: Proceedings of the 2024 ACM on Internet Measurement Conference, pp. 767–768, Association for Computing Machinery, Madrid, Spain, 2024, ISBN: 9798400705922.

Abstract | Links | BibTeX | Tags: c&c lifetime, iot malware

Cambronero​, María Emilia; Martínez, Miguel A.; Llana​, Luis; Rodríguez, Ricardo J.; Russo, Alejandro

Towards a GDPR-compliant cloud architecture with data privacy controlled through sticky policies Journal Article

In: PeerJ Computer Science, vol. 10:e1898, pp. 1–44, 2024.

Abstract | Links | BibTeX | Tags: Cloud computing, Data privacy, Datatracking, General data protection regulation, Model validation, Object Constraint Language, Sticky policies, UMLprofiling, Unified Modeling Language

Carrillo-Mondéjar, Javier; Suárez-Tangil, Guillermo; Costin, Andrei; Rodríguez, Ricardo J.

Exploring Shifting Patterns in Recent IoT Malware Proceedings Article

In: Proceedings of the 23rd European Conference on Cyber Warfare and Security (ECCWS), pp. 96–106, ACI, 2024.

Abstract | Links | BibTeX | Tags: Dynamic Analysis, Malware Evolution, Malware IoT, Malware lineage, Static Analysis

Fernández-Álvarez, Pedro; Rodríguez, Ricardo J.

Module Extraction and DLL Hijacking Detection via Single or Multiple Memory Dumps Journal Article

In: Forensic Science International: Digital Investigation, vol. 44, pp. 301505, 2023, ISSN: 2666-2817, (Accepted for publication. To appear. Selected Papers of the Tenth Annual DFRWS Europe Conference).

Abstract | Links | BibTeX | Tags: digital forensics, DLL hijacking, memory forensics, Volatility, Windows

Bai, Jing; Chang, Xiaolin; Rodríguez, Ricardo J.; Trivedi, Kishor; Li, Shupan

Towards UAV-based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach Journal Article

In: IEEE Transactions on Vehicular Technology, vol. 72, no. 4, pp. 5181–5194, 2023.

Abstract | Links | BibTeX | Tags: resilience, Resource Degradation, Semi-Markov Process, Unmanned Aerial Vehicle

Rodríguez, Ricardo J.; Marrone, Stefano; Marcos, Ibai; Porzio, Giuseppe

MOSTO: A Toolkit to Facilitate Security Auditing of ICS Devices using Modbus/TCP Journal Article

In: Computers & Security, vol. 132, pp. 103373, 2023.

Abstract | Links | BibTeX | Tags: Industrial Control Systems, Modbus, Penetration Testing, Security Auditing

Filho, Ailton Santos; Rodríguez, Ricardo J; Feitosa, Eduardo L

Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks Journal Article

In: Digital Threats: Research and Practice, vol. 3, no. 2, pp. 28, 2022.

Abstract | Links | BibTeX | Tags: analysis evasion, Analysis-aware malware, Dynamic binary instrumentation

Fernández-Álvarez, Pedro; Rodríguez, Ricardo J

Extraction and Analysis of Retrievable Memory Artifacts from Windows Telegram Desktop Application Journal Article

In: Forensic Science International: Digital Investigation, vol. 40, pp. 301342, 2022, ISBN: 2666-2817.

Abstract | Links | BibTeX | Tags: digital forensics, instant messaging, memory forensics, Telegram Desktop, Windows

Uroz, Daniel; Rodríguez, Ricardo J

Characterization and Evaluation of IoT Protocols for Data Exfiltration Journal Article

In: IEEE Internet of Things Journal, vol. PP, pp. PP, 2022, (Accepted for publication. To appear in press.).

Abstract | Links | BibTeX | Tags: AMQP 1.0, CoAP 1.0, Data Exfiltration, IoT Protocols, MQTT 3.1.1, MQTT 5.0

Raducu, Razvan; Rodríguez, Ricardo J; Alvarez, Pedro

Defense and Attack Techniques against File-based TOCTOU Vulnerabilities: a Systematic Review Journal Article

In: IEEE Access, vol. 10, pp. 21742–21758, 2022.

Abstract | Links | BibTeX | Tags: avoidance techniques, file-based race condition, TOCTOU vulnerability

Wang, Yixiang; Liu, Jiqiang; Chang, Xiaolin; Wang, Jianhua; Rodríguez, Ricardo J.

AB-FGSM: AdaBelief Optimizer and FGSM-Based Approach to Generate Adversarial Examples Journal Article

In: Journal of Information Security and Applications, vol. 68, pp. 103227, 2022, ISSN: 2214-2126.

Abstract | Links | BibTeX | Tags: adversarial examples, deep learning, generalization, optimization, Security, Transferability

Wang, Jianhua; Chang, Xialoin; Rodríguez, Ricardo J.; Wang, Yixiang

Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning Proceedings Article

In: Proceedings of the 2022 IEEE Symposium on Computers and Communications, pp. 6, IEEE, 2022.

Abstract | Links | BibTeX | Tags: federated learning, free-rider attack, privacy data

Wang, Yixiang; Liu, Jiqiang; Chang, Xiaolin; Rodríguez, Ricardo J.; Wang, Jianhua

DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks Journal Article

In: Information Sciences, vol. 610, pp. 14–32, 2022, ISSN: 0020-0255.

Abstract | Links | BibTeX | Tags: adversarial example, deep learning, interpretability, robustness, white-box attack

Blanco, Roberto; Rodríguez, Ricardo J.

OCamello: A Course and Summer School with Learn-OCaml Proceedings Article

In: pp. 2, 2022, (Accepted for publication. To appear).

Abstract | Links | BibTeX | Tags: learning outcomes, OCaml, summer school

47 entries « 1 of 4 »