Reading Time: < 1 minute
42 entries « 1 of 3 »

Fernández-Álvarez, Pedro; Rodríguez, Ricardo J.

Module Extraction and DLL Hijacking Detection via Single or Multiple Memory Dumps Journal Article

In: Forensic Science International: Digital Investigation, vol. 44, pp. 301505, 2023, ISSN: 2666-2817, (Accepted for publication. To appear. Selected Papers of the Tenth Annual DFRWS Europe Conference).

Abstract | Links | BibTeX | Tags: digital forensics, DLL hijacking, memory forensics, Volatility, Windows

Bai, Jing; Chang, Xiaolin; Rodríguez, Ricardo J.; Trivedi, Kishor; Li, Shupan

Towards UAV-based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach Journal Article

In: IEEE Transactions on Vehicular Technology, vol. 72, no. 4, pp. 5181–5194, 2023.

Abstract | Links | BibTeX | Tags: resilience, Resource Degradation, Semi-Markov Process, Unmanned Aerial Vehicle

Filho, Ailton Santos; Rodríguez, Ricardo J; Feitosa, Eduardo L

Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks Journal Article

In: Digital Threats: Research and Practice, vol. 3, no. 2, pp. 28, 2022.

Abstract | Links | BibTeX | Tags: analysis evasion, Analysis-aware malware, Dynamic binary instrumentation

Fernández-Álvarez, Pedro; Rodríguez, Ricardo J

Extraction and Analysis of Retrievable Memory Artifacts from Windows Telegram Desktop Application Journal Article

In: Forensic Science International: Digital Investigation, vol. 40, pp. 301342, 2022, ISBN: 2666-2817.

Abstract | Links | BibTeX | Tags: digital forensics, instant messaging, memory forensics, Telegram Desktop, Windows

Uroz, Daniel; Rodríguez, Ricardo J

Characterization and Evaluation of IoT Protocols for Data Exfiltration Journal Article

In: IEEE Internet of Things Journal, vol. PP, pp. PP, 2022, (Accepted for publication. To appear in press.).

Abstract | Links | BibTeX | Tags: AMQP 1.0, CoAP 1.0, Data Exfiltration, IoT Protocols, MQTT 3.1.1, MQTT 5.0

Raducu, Razvan; Rodríguez, Ricardo J; Alvarez, Pedro

Defense and Attack Techniques against File-based TOCTOU Vulnerabilities: a Systematic Review Journal Article

In: IEEE Access, vol. 10, pp. 21742–21758, 2022.

Abstract | Links | BibTeX | Tags: avoidance techniques, file-based race condition, TOCTOU vulnerability

Wang, Yixiang; Liu, Jiqiang; Chang, Xiaolin; Wang, Jianhua; Rodríguez, Ricardo J.

AB-FGSM: AdaBelief Optimizer and FGSM-Based Approach to Generate Adversarial Examples Journal Article

In: Journal of Information Security and Applications, vol. 68, pp. 103227, 2022, ISSN: 2214-2126.

Abstract | Links | BibTeX | Tags: adversarial examples, deep learning, generalization, optimization, Security, Transferability

Wang, Jianhua; Chang, Xialoin; Rodríguez, Ricardo J.; Wang, Yixiang

Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning Inproceedings

In: Proceedings of the 2022 IEEE Symposium on Computers and Communications, pp. 6, IEEE, 2022.

Abstract | Links | BibTeX | Tags: federated learning, free-rider attack, privacy data

Wang, Yixiang; Liu, Jiqiang; Chang, Xiaolin; Rodríguez, Ricardo J.; Wang, Jianhua

DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks Journal Article

In: Information Sciences, vol. 610, pp. 14–32, 2022, ISSN: 0020-0255.

Abstract | Links | BibTeX | Tags: adversarial example, deep learning, interpretability, robustness, white-box attack

Blanco, Roberto; Rodríguez, Ricardo J.

OCamello: A Course and Summer School with Learn-OCaml Inproceedings

In: pp. 2, 2022, (Accepted for publication. To appear).

Abstract | Links | BibTeX | Tags: learning outcomes, OCaml, summer school

Raducu, Razvan; Rodríguez, Ricardo J.; Álvarez, Pedro

Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices Inproceedings

In: Applied Cryptography in Computer and Communications, pp. 65–75, Springer Nature Switzerland, Cham, 2022, ISBN: 978-3-031-17081-2.

Abstract | Links | BibTeX | Tags: cryptographic libraries, memory usage, performance evaluation, resource-constrained devices

Mlot, Esteban Damián Gutiérrez; Saldana, Jose; Rodrı́guez, Ricardo J.

Towards a Testbed for Critical Industrial Systems: SunSpec Protocol on DER Systems as a Case Study Inproceedings

In: Proceedings of the 27th International Conference on Emerging Technologies and Factory Automation, pp. 1–4, IEEE, 2022.

Abstract | Links | BibTeX | Tags: critical infrastructure, cybersecurity, testbed

Martín-Pérez, Miguel; Rodríguez, Ricardo J; Balzarotti, Davide

Pre-processing Memory Dumps to Improve Similarity Score of Windows Modules Journal Article

In: Computers & Security, vol. 101, pp. 102119, 2021, ISSN: 0167-4048.

Abstract | Links | BibTeX | Tags: memory forensics, relocation, similarity digest algorithms, Windows

Martín-Pérez, Miguel; Rodríguez, Ricardo J; Breitinger, Frank

Bringing Order to Approximate Matching: Classification and Attacks on Similarity Digest Algorithms Journal Article

In: Forensic Science International: Digital Investigation, vol. 36, pp. 301120, 2021, ISSN: 2666-2817.

Abstract | Links | BibTeX | Tags: Approximate matching, Bytewise, Classification scheme, Fuzzy hashing, Similarity digest algorithm, Similarity hashing

Hernández-Bejarano, Miguel; Rodríguez, Ricardo J; Merseguer, José

A Vision for Improving Business Continuity through Cyber-resilience Mechanisms and Frameworks Inproceedings

In: Proceedings of the 16th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1–5, 2021.

Abstract | Links | BibTeX | Tags: cyber-attacks, cybersecurity, menaces, resilience, vulnerabilities

42 entries « 1 of 3 »