Reading Time: < 1 minute
27 entries « 1 of 2 »

Martín-Pérez, Miguel; Rodríguez, Ricardo J; Balzarotti, Davide

Pre-processing Memory Dumps to Improve Similarity Score of Windows Modules Journal Article

Computers & Security, 101 , pp. 102119, 2021, ISSN: 0167-4048.

Abstract | Links | BibTeX | Tags: memory forensics, relocation, similarity digest algorithms, Windows

Martín-Pérez, Miguel; Rodríguez, Ricardo J; Breitinger, Frank

Bringing Order to Approximate Matching: Classification and Attacks on Similarity Digest Algorithms Journal Article

Forensic Science International: Digital Investigation, 36 , pp. 301120, 2021, ISSN: 2666-2817.

Abstract | Links | BibTeX | Tags: Approximate matching, Bytewise, Classification scheme, Fuzzy hashing, Similarity digest algorithm, Similarity hashing

Hernández-Bejarano, Miguel; Rodríguez, Ricardo J; Merseguer, José

A Vision for Improving Business Continuity through Cyber-resilience Mechanisms and Frameworks Inproceedings

Proceedings of the 16th Iberian Conference on Information Systems and Technologies (CISTI), 2021, (Accepted for publication. To appear.).

Abstract | Links | BibTeX | Tags:

Uroz, Daniel; Rodríguez, Ricardo J

Evaluation of the Executional Power in Windows using Return Oriented Programming Inproceedings

Proceedings of the 15th IEEE Workshop on Offensive Technologies (WOOT), pp. 361–372, IEEE, 2021.

Abstract | Links | BibTeX | Tags: automatic exploit, evaluation, ROP chain, Turing-completeness, Windows

Filho, Ailton Santos; Rodríguez, Ricardo J; Feitosa, Eduardo L

Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks Inproceedings

Developments and Advances in Defense and Security, pp. 3–13, Springer Singapore, Singapore, 2020, ISBN: 978-981-13-9155-2.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, Anti-analysis, Anti-instrumentation, Dynamic binary instrumentation

Uroz, Daniel; Rodríguez, Ricardo J

On Challenges in Verifying Trusted Executable Files in Memory Forensics Journal Article

Digital Investigation, 2020, (Accepted for publication. To appear.).

Abstract | Links | BibTeX | Tags: Authenticode, code signing, digital signature verification, memory forensics, Volatility

Shi, Yu; Chang, Xiaolin; Rodríguez, Ricardo J; Zhang, Zhenjiang; Trivedi, Kishor S

Quantitative security analysis of a dynamic network system under lateral movement-based attacks Journal Article

Reliability Engineering & System Safety, 183 , pp. 213–225, 2019, ISSN: 0951-8320.

Abstract | Links | BibTeX | Tags: Dynamic transient analysis, Lateral movement-based attack, Non-homogeneous continuous-time Markov chain, Piecewise constant approximation

Selvi, Jose; Rodríguez, Ricardo J; Soria-Olivas, Emilio

Detection of Algorithmically Generated Malicious Domain Names using Masked N-Grams Journal Article

Expert Systems with Applications, 124 , pp. 156–163, 2019, ISSN: 0957-4174.

Abstract | Links | BibTeX | Tags: Domain-generated algorithms, malware, Random Forest

Uroz, Daniel; Rodríguez, Ricardo J

Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics Journal Article

Digital Investigation, 28 , pp. S95–S104, 2019, ISSN: 1742-2876.

Abstract | Links | BibTeX | Tags: Auto-start extensibility points, malware, memory forensics, System persistence, Volatility, Windows registry

Botas, Álvaro; Rodríguez, Ricardo J; Matellan, Vicente; Garcia, Juan F; Trobajo, M T; Carriegos, Miguel V

On Fingerprinting of Public Malware Analysis Services Journal Article

Logic Journal of the IGPL, 2019, ISSN: 1367-0751.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, characterization, Malware analysis service, sandbox, unlikeability

Rodríguez, Ricardo J; Martín-Pérez, Miguel; Abadía, Iñaki

A Tool to Compute Approximation Matching between Windows Processes Inproceedings

Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 313–318, 2018.

Abstract | Links | BibTeX | Tags: bytewise approximate matching, forensic memory analysis, Volatility, Windows

Chang, Xiaolin; Lv, Shaohua; Rodríguez, Ricardo J; Trivedi, Kishor

Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System Inproceedings

Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6, 2018, ISSN: 1095-2055.

Abstract | Links | BibTeX | Tags: Quantitative analysis, Reactive defense strategy, Security, Stochastic reward nets, Survivability

Rodríguez, Ricardo J; de Quirós, Jorge García

Desanonimización y categorización de servicios ocultos de la red Tor Inproceedings

Actas del VI Congreso Nacional de i+d en Defensa y Seguridad (DESEi+d 2018), 2018, (Accepted for publication. To appear.).

Links | BibTeX | Tags: deanonymization, hidden services, privacy, Tor

Rodríguez, Ricardo J

Evolution and Characterization of Point-of-Sale RAM Scraping Malware Journal Article

Journal in Computer Virology and Hacking Techniques, 13 (3), pp. 179–192, 2017, ISSN: 2263-8733.

Abstract | Links | BibTeX | Tags: Evolution, malware, POS RAM scraping, Software security, Taxonomy

Rodríguez, Ricardo J; Garcia-Escartin, Juan Carlos

Security Assessment of the Spanish Contactless Identity Card Journal Article

IET Information Security, 11 (6), pp. 386–393(7), 2017, ISSN: 1751-8709.

Abstract | Links | BibTeX | Tags: contactless cards, identity cards, NFC, Security

27 entries « 1 of 2 »