Reading Time: < 1 minute
44 entries « 3 of 3 »

Rodríguez, Ricardo J

Evolution and Characterization of Point-of-Sale RAM Scraping Malware Journal Article

In: Journal in Computer Virology and Hacking Techniques, vol. 13, no. 3, pp. 179–192, 2017, ISSN: 2263-8733.

Abstract | Links | BibTeX | Tags: Evolution, malware, POS RAM scraping, Software security, Taxonomy

Rodríguez, Ricardo J; Garcia-Escartin, Juan Carlos

Security Assessment of the Spanish Contactless Identity Card Journal Article

In: IET Information Security, vol. 11, no. 6, pp. 386–393(7), 2017, ISSN: 1751-8709.

Abstract | Links | BibTeX | Tags: contactless cards, identity cards, NFC, Security

Botas, Álvaro; Rodríguez, Ricardo J; Matellán, Vicente; García, Juan F

Empirical Study to Fingerprint Public Malware Analysis Services Proceedings Article

In: Proceedings of the International Joint Conference SOCO'17-CISIS'17-ICEUTE'17, pp. 589–599, Springer International Publishing, 2017, ISBN: 978-3-319-67180-2.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, characterization, Malware analysis service, sandbox

García, Laura; Rodríguez, Ricardo J

A Peek Under the Hood of iOS Malware Proceedings Article

In: Proceedings of the 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 590–598, 2016.

Abstract | Links | BibTeX | Tags: attacks, classification, iOS, malware, threats

Nardone, Roberto; Rodríguez, Ricardo J; Marrone, Stefano

Formal Security Assessment of Modbus Protocol Proceedings Article

In: Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, pp. 142–147, IEEE, 2016.

Abstract | Links | BibTeX | Tags: Cyber-Physical Security, Dynamic State Machines, Modbus, Model checking, SCADA control systems

Rodríguez, Ricardo J; Chang, Xiaolin; Li, Xiaodan; Trivedi, Kishor S

Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack Proceedings Article

In: Kordy, Barbara; Ekstedt, Mathias; Kim, Seong Dong (Ed.): Proceedings of the 3rd International Workshop on Graphical Models for Security, pp. 134–149, 2016.

Abstract | Links | BibTeX | Tags: APT, Cyberattacks, Markov chains, Security metrics, Stochastic reward nets, Survivability, Transient analysis

Rodríguez, Ricardo J; Marrone, Stefano

Model-Based Vulnerability Assessment of Self-Adaptive Protection Systems Book Section

In: Novais, Paulo; Camacho, David; Analide, Cesar; Seghrouchni, Amal El Fallah; Badica, Costin (Ed.): Intelligent Distributed Computing IX, vol. 616, pp. 439–449, Springer International Publishing, 2016, ISBN: 978-3-319-25015-1.

Abstract | Links | BibTeX | Tags: Dynamic Bayesian Networks, model-based, security assessment, vulnerability

Rodríguez, Ricardo J; Rodríguez-Gastón, Iñaki; Alonso, Javier

Towards the Detection of Isolation-Aware Malware Journal Article

In: IEEE Latin America Transactions (Revista IEEE America Latina), vol. 14, no. 2, pp. 1024–1036, 2016, ISSN: 1548-0992.

Abstract | Links | BibTeX | Tags: Analysis-aware malware, Dynamic binary instrumentation, program binary analysis

Botas, Alvaro; Rodríguez, Ricardo J; Vaisanen, Teemu; Zdzichowski, Patrycjusz

Counterfeiting and Defending the Digital Forensic Process Proceedings Article

In: Proceedings of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), pp. 1966–1971, IEEE, 2015.

Abstract | Links | BibTeX | Tags: anti-forensics, categorization, forensics

Marrone, Stefano; Rodríguez, Ricardo J; Nardone, Roberto; Flammini, Francesco; Vittorini, Valeria

On Synergies of Cyber and Physical Security Modelling in Vulnerability Assessment of Railway Systems Journal Article

In: Computers and Electrical Engineering, vol. 47, pp. 275–285, 2015, ISSN: 0045-7906.

Abstract | Links | BibTeX | Tags: Bayesian networks, Cyber-physical systems, Generalized stochastic Petri nets, UML, UML profile, Vulnerability assessment

Rodríguez, Ricardo J; Merseguer, José; Bernardi, Simona

Modelling Security of Critical Infrastructures: A Survivability Assessment Journal Article

In: The Computer Journal, vol. 58, no. 10, pp. 2313–2327, 2015.

Abstract | Links | BibTeX | Tags: Security, sensitive analysis, software system engineering, Survivability, UML

Vila, José; Rodríguez, Ricardo J

Practical Experiences on NFC Relay Attacks with Android: Virtual Pickpocketing Revisited Proceedings Article

In: Proceedings of the 11th International Workshop on RFID Security (RFIDsec), pp. 87–103, Springer, 2015.

Abstract | Links | BibTeX | Tags: Android, contactless cards, contactless payment, NFC, relay attacks, Security

Rodríguez, Ricardo J; Júlvez, Jorge; Merseguer, José

Quantification and Compensation of the Impact of Faults in System Throughput Journal Article

In: Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, vol. 227, no. 6, pp. 614–628, 2013.

Abstract | Links | BibTeX | Tags: fault-tolerant techniques, integer-linear programming, Performability, Petri nets

Rodríguez, Ricardo J; Merseguer, José; Bernardi, Simona

Modelling and Analysing Resilience as a Security Issue within UML Proceedings Article

In: Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems (SERENE), pp. 42–51, ACM, London, United Kingdom, 2010.

Abstract | Links | BibTeX | Tags: Petri nets, Petri nets, Security, software system engineering, UML

44 entries « 3 of 3 »