Reading Time: < 1 minute
42 entries « 2 of 3 »

Uroz, Daniel; Rodríguez, Ricardo J

Evaluation of the Executional Power in Windows using Return Oriented Programming Inproceedings

In: Proceedings of the 15th IEEE Workshop on Offensive Technologies (WOOT), pp. 361–372, IEEE, 2021.

Abstract | Links | BibTeX | Tags: automatic exploit, evaluation, ROP chain, Turing-completeness, Windows

Martín-Pérez, Miguel; Rodríguez, Ricardo J

Quantifying Paging on Recoverable Data from Windows User-Space Modules Inproceedings

In: Proceedings of the 12th EAI International Conference on Digital Forensics & Cyber Crime, Springer, 2021, (Accepted for publication. To appear).

Abstract | Links | BibTeX | Tags: digital forensics, malware, memory forensics, paging, Windows modules

Selvi, Jose; Rodríguez, Ricardo J; Soria-Olivas, Emilio

Towards Optimal LSTM Neural Networks for Detecting Algorithmically Generated Domain Names Journal Article

In: IEEE Access, vol. 9, pp. 126446–126456, 2021.

Abstract | Links | BibTeX | Tags: deep learning, domain generation algorithms, LSTM, malware

Wang, Jianhua; Chang, Xiaolin; Wang, Yixiang; Rodríguez, Ricardo J; Zhang, Jianan

LSGAN-AT: Enhancing Malware Detector Robustness against Adversarial Examples Journal Article

In: Cybersecurity, vol. 4:38, no. 1, pp. 15, 2021, ISSN: 2523-3246.

Abstract | Links | BibTeX | Tags: Adversarial malware example, Generative adversarial network, Machine learning, Malware detector, Transferability

Filho, Ailton Santos; Rodríguez, Ricardo J; Feitosa, Eduardo L

Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks Inproceedings

In: Developments and Advances in Defense and Security, pp. 3–13, Springer Singapore, Singapore, 2020, ISBN: 978-981-13-9155-2.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, Anti-analysis, Anti-instrumentation, Dynamic binary instrumentation

Uroz, Daniel; Rodríguez, Ricardo J

On Challenges in Verifying Trusted Executable Files in Memory Forensics Journal Article

In: Forensic Science International: Digital Investigation, vol. 32, pp. 300917, 2020.

Abstract | Links | BibTeX | Tags: Authenticode, code signing, digital signature verification, memory forensics, Volatility

Shi, Yu; Chang, Xiaolin; Rodríguez, Ricardo J; Zhang, Zhenjiang; Trivedi, Kishor S

Quantitative security analysis of a dynamic network system under lateral movement-based attacks Journal Article

In: Reliability Engineering & System Safety, vol. 183, pp. 213–225, 2019, ISSN: 0951-8320.

Abstract | Links | BibTeX | Tags: Dynamic transient analysis, Lateral movement-based attack, Non-homogeneous continuous-time Markov chain, Piecewise constant approximation

Selvi, Jose; Rodríguez, Ricardo J; Soria-Olivas, Emilio

Detection of Algorithmically Generated Malicious Domain Names using Masked N-Grams Journal Article

In: Expert Systems with Applications, vol. 124, pp. 156–163, 2019, ISSN: 0957-4174.

Abstract | Links | BibTeX | Tags: Domain-generated algorithms, malware, Random Forest

Uroz, Daniel; Rodríguez, Ricardo J

Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics Journal Article

In: Digital Investigation, vol. 28, pp. S95–S104, 2019, ISSN: 1742-2876.

Abstract | Links | BibTeX | Tags: Auto-start extensibility points, malware, memory forensics, System persistence, Volatility, Windows registry

Botas, Álvaro; Rodríguez, Ricardo J; Matellan, Vicente; Garcia, Juan F; Trobajo, M T; Carriegos, Miguel V

On Fingerprinting of Public Malware Analysis Services Journal Article

In: Logic Journal of the IGPL, 2019, ISSN: 1367-0751.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, characterization, Malware analysis service, sandbox, unlikeability

Rodríguez, Ricardo J; Martín-Pérez, Miguel; Abadía, Iñaki

A Tool to Compute Approximation Matching between Windows Processes Inproceedings

In: Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 313–318, 2018.

Abstract | Links | BibTeX | Tags: bytewise approximate matching, forensic memory analysis, Volatility, Windows

Chang, Xiaolin; Lv, Shaohua; Rodríguez, Ricardo J; Trivedi, Kishor

Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System Inproceedings

In: Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6, 2018, ISSN: 1095-2055.

Abstract | Links | BibTeX | Tags: Quantitative analysis, Reactive defense strategy, Security, Stochastic reward nets, Survivability

Rodríguez, Ricardo J; de Quirós, Jorge García

Desanonimización y categorización de servicios ocultos de la red Tor Inproceedings

In: Actas del VI Congreso Nacional de i+d en Defensa y Seguridad (DESEi+d 2018), pp. 259, 2018.

Links | BibTeX | Tags: deanonymization, hidden services, privacy, Tor

Rodríguez, Ricardo J

Evolution and Characterization of Point-of-Sale RAM Scraping Malware Journal Article

In: Journal in Computer Virology and Hacking Techniques, vol. 13, no. 3, pp. 179–192, 2017, ISSN: 2263-8733.

Abstract | Links | BibTeX | Tags: Evolution, malware, POS RAM scraping, Software security, Taxonomy

Rodríguez, Ricardo J; Garcia-Escartin, Juan Carlos

Security Assessment of the Spanish Contactless Identity Card Journal Article

In: IET Information Security, vol. 11, no. 6, pp. 386–393(7), 2017, ISSN: 1751-8709.

Abstract | Links | BibTeX | Tags: contactless cards, identity cards, NFC, Security

42 entries « 2 of 3 »