Reading Time: < 1 minute
27 entries « 1 of 2 »

Martín-Pérez, Miguel; Rodríguez, Ricardo J; Balzarotti, Davide

Pre-processing Memory Dumps to Improve Similarity Score of Windows Modules Journal Article

Computers & Security, 101 , pp. 102119, 2021, ISSN: 0167-4048.

Abstract | Links | BibTeX | Tags: memory forensics, relocation, similarity digest algorithms, Windows

Martín-Pérez, Miguel; Rodríguez, Ricardo J; Breitinger, Frank

Bringing Order to Approximate Matching: Classification and Attacks on Similarity Digest Algorithms Journal Article

Forensic Science International: Digital Investigation, 36 , pp. 301120, 2021, ISSN: 2666-2817.

Abstract | Links | BibTeX | Tags: Approximate matching, Bytewise, Classification scheme, Fuzzy hashing, Similarity digest algorithm, Similarity hashing

Uroz, Daniel; Rodríguez, Ricardo J

Evaluation of the Executional Power in Windows using Return Oriented Programming Inproceedings

Proceedings of the 15th IEEE Workshop on Offensive Technologies (WOOT), pp. 12, IEEE, 2021, (Accepted for publication. To appear.).

Abstract | Links | BibTeX | Tags:

Hernández-Bejarano, Miguel; Rodríguez, Ricardo J; Merseguer, José

A Vision for Improving Business Continuity through Cyber-resilience Mechanisms and Frameworks Inproceedings

Proceedings of the 16th Iberian Conference on Information Systems and Technologies (CISTI), 2021, (Accepted for publication. To appear.).

Abstract | Links | BibTeX | Tags:

Filho, Ailton Santos; Rodríguez, Ricardo J; Feitosa, Eduardo L

Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks Inproceedings

Developments and Advances in Defense and Security, pp. 3–13, Springer Singapore, Singapore, 2020, ISBN: 978-981-13-9155-2.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, Anti-analysis, Anti-instrumentation, Dynamic binary instrumentation

Uroz, Daniel; Rodríguez, Ricardo J

On Challenges in Verifying Trusted Executable Files in Memory Forensics Journal Article

Digital Investigation, 2020, (Accepted for publication. To appear.).

Abstract | Links | BibTeX | Tags: Authenticode, code signing, digital signature verification, memory forensics, Volatility

Shi, Yu; Chang, Xiaolin; Rodríguez, Ricardo J; Zhang, Zhenjiang; Trivedi, Kishor S

Quantitative security analysis of a dynamic network system under lateral movement-based attacks Journal Article

Reliability Engineering & System Safety, 183 , pp. 213–225, 2019, ISSN: 0951-8320.

Abstract | Links | BibTeX | Tags: Dynamic transient analysis, Lateral movement-based attack, Non-homogeneous continuous-time Markov chain, Piecewise constant approximation

Selvi, Jose; Rodríguez, Ricardo J; Soria-Olivas, Emilio

Detection of Algorithmically Generated Malicious Domain Names using Masked N-Grams Journal Article

Expert Systems with Applications, 124 , pp. 156–163, 2019, ISSN: 0957-4174.

Abstract | Links | BibTeX | Tags: Domain-generated algorithms, malware, Random Forest

Uroz, Daniel; Rodríguez, Ricardo J

Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics Journal Article

Digital Investigation, 28 , pp. S95–S104, 2019, ISSN: 1742-2876.

Abstract | Links | BibTeX | Tags: Auto-start extensibility points, malware, memory forensics, System persistence, Volatility, Windows registry

Botas, Álvaro; Rodríguez, Ricardo J; Matellan, Vicente; Garcia, Juan F; Trobajo, M T; Carriegos, Miguel V

On Fingerprinting of Public Malware Analysis Services Journal Article

Logic Journal of the IGPL, 2019, ISSN: 1367-0751.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, characterization, Malware analysis service, sandbox, unlikeability

Rodríguez, Ricardo J; Martín-Pérez, Miguel; Abadía, Iñaki

A Tool to Compute Approximation Matching between Windows Processes Inproceedings

Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 313–318, 2018.

Abstract | Links | BibTeX | Tags: bytewise approximate matching, forensic memory analysis, Volatility, Windows

Chang, Xiaolin; Lv, Shaohua; Rodríguez, Ricardo J; Trivedi, Kishor

Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System Inproceedings

Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6, 2018, ISSN: 1095-2055.

Abstract | Links | BibTeX | Tags: Quantitative analysis, Reactive defense strategy, Security, Stochastic reward nets, Survivability

Rodríguez, Ricardo J; de Quirós, Jorge García

Desanonimización y categorización de servicios ocultos de la red Tor Inproceedings

Actas del VI Congreso Nacional de i+d en Defensa y Seguridad (DESEi+d 2018), 2018, (Accepted for publication. To appear.).

Links | BibTeX | Tags: deanonymization, hidden services, privacy, Tor

Rodríguez, Ricardo J

Evolution and Characterization of Point-of-Sale RAM Scraping Malware Journal Article

Journal in Computer Virology and Hacking Techniques, 13 (3), pp. 179–192, 2017, ISSN: 2263-8733.

Abstract | Links | BibTeX | Tags: Evolution, malware, POS RAM scraping, Software security, Taxonomy

Rodríguez, Ricardo J; Garcia-Escartin, Juan Carlos

Security Assessment of the Spanish Contactless Identity Card Journal Article

IET Information Security, 11 (6), pp. 386–393(7), 2017, ISSN: 1751-8709.

Abstract | Links | BibTeX | Tags: contactless cards, identity cards, NFC, Security

27 entries « 1 of 2 »