Reading Time: < 1 minute
34 entries « 2 of 3 »

Uroz, Daniel; Rodríguez, Ricardo J

Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics Journal Article

In: Digital Investigation, vol. 28, pp. S95–S104, 2019, ISSN: 1742-2876.

Abstract | Links | BibTeX | Tags: Auto-start extensibility points, malware, memory forensics, System persistence, Volatility, Windows registry

Botas, Álvaro; Rodríguez, Ricardo J; Matellan, Vicente; Garcia, Juan F; Trobajo, M T; Carriegos, Miguel V

On Fingerprinting of Public Malware Analysis Services Journal Article

In: Logic Journal of the IGPL, 2019, ISSN: 1367-0751.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, characterization, Malware analysis service, sandbox, unlikeability

Rodríguez, Ricardo J; Martín-Pérez, Miguel; Abadía, Iñaki

A Tool to Compute Approximation Matching between Windows Processes Inproceedings

In: Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 313–318, 2018.

Abstract | Links | BibTeX | Tags: bytewise approximate matching, forensic memory analysis, Volatility, Windows

Chang, Xiaolin; Lv, Shaohua; Rodríguez, Ricardo J; Trivedi, Kishor

Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System Inproceedings

In: Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6, 2018, ISSN: 1095-2055.

Abstract | Links | BibTeX | Tags: Quantitative analysis, Reactive defense strategy, Security, Stochastic reward nets, Survivability

Rodríguez, Ricardo J; de Quirós, Jorge García

Desanonimización y categorización de servicios ocultos de la red Tor Inproceedings

In: Actas del VI Congreso Nacional de i+d en Defensa y Seguridad (DESEi+d 2018), pp. 259, 2018.

Links | BibTeX | Tags: deanonymization, hidden services, privacy, Tor

Rodríguez, Ricardo J

Evolution and Characterization of Point-of-Sale RAM Scraping Malware Journal Article

In: Journal in Computer Virology and Hacking Techniques, vol. 13, no. 3, pp. 179–192, 2017, ISSN: 2263-8733.

Abstract | Links | BibTeX | Tags: Evolution, malware, POS RAM scraping, Software security, Taxonomy

Rodríguez, Ricardo J; Garcia-Escartin, Juan Carlos

Security Assessment of the Spanish Contactless Identity Card Journal Article

In: IET Information Security, vol. 11, no. 6, pp. 386–393(7), 2017, ISSN: 1751-8709.

Abstract | Links | BibTeX | Tags: contactless cards, identity cards, NFC, Security

Botas, Álvaro; Rodríguez, Ricardo J; Matellán, Vicente; García, Juan F

Empirical Study to Fingerprint Public Malware Analysis Services Inproceedings

In: Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, pp. 589–599, Springer International Publishing, 2017, ISBN: 978-3-319-67180-2.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, characterization, Malware analysis service, sandbox

García, Laura; Rodríguez, Ricardo J

A Peek Under the Hood of iOS Malware Inproceedings

In: Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 590–598, 2016.

Abstract | Links | BibTeX | Tags: attacks, classification, iOS, malware, threats

Nardone, Roberto; Rodríguez, Ricardo J; Marrone, Stefano

Formal Security Assessment of Modbus Protocol Inproceedings

In: Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, pp. 142–147, IEEE, 2016.

Abstract | Links | BibTeX | Tags: Cyber-Physical Security, Dynamic State Machines, Modbus, Model checking, SCADA control systems

Rodríguez, Ricardo J; Chang, Xiaolin; Li, Xiaodan; Trivedi, Kishor S

Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack Inproceedings

In: Kordy, Barbara; Ekstedt, Mathias; Kim, Seong Dong (Ed.): Proceedings of the 3rd International Workshop on Graphical Models for Security, pp. 134–149, 2016.

Abstract | Links | BibTeX | Tags: APT, Cyberattacks, Markov chains, Security metrics, Stochastic reward nets, Survivability, Transient analysis

Rodríguez, Ricardo J; Marrone, Stefano

Model-Based Vulnerability Assessment of Self-Adaptive Protection Systems Incollection

In: Novais, Paulo; Camacho, David; Analide, Cesar; Seghrouchni, Amal El Fallah; Badica, Costin (Ed.): Intelligent Distributed Computing IX, vol. 616, pp. 439–449, Springer International Publishing, 2016, ISBN: 978-3-319-25015-1.

Abstract | Links | BibTeX | Tags: Dynamic Bayesian Networks, model-based, security assessment, vulnerability

Rodríguez, Ricardo J; Rodríguez-Gastón, Iñaki; Alonso, Javier

Towards the Detection of Isolation-Aware Malware Journal Article

In: IEEE Latin America Transactions (Revista IEEE America Latina), vol. 14, no. 2, pp. 1024–1036, 2016, ISSN: 1548-0992.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, Dynamic binary instrumentation, program binary analysis

Botas, Alvaro; Rodríguez, Ricardo J; Vaisanen, Teemu; Zdzichowski, Patrycjusz

Counterfeiting and Defending the Digital Forensic Process Inproceedings

In: Proceedings of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), pp. 1966–1971, IEEE, 2015.

Abstract | Links | BibTeX | Tags: anti-forensics, categorization, forensics

Marrone, Stefano; Rodríguez, Ricardo J; Nardone, Roberto; Flammini, Francesco; Vittorini, Valeria

On Synergies of Cyber and Physical Security Modelling in Vulnerability Assessment of Railway Systems Journal Article

In: Computers and Electrical Engineering, vol. 47, pp. 275–285, 2015, ISSN: 0045-7906.

Abstract | Links | BibTeX | Tags: Bayesian networks, Cyber-physical systems, Generalized stochastic Petri nets, UML, UML profile, Vulnerability assessment

34 entries « 2 of 3 »