Publications

Journals  |   Conferences  |   PhD Theses

Journal papers

  1. de Fuentes, J.M; González-Manzano, L.; Peris, P.; Tapiador, J.E PRACIS: Privacy-preserving and Aggregatable Cybersecurity Information Sharing. International Journal of Computers & Security, 69:127-141 (2017) [doi]
  2. de Fuentes, J.M; González-Manzano, L.; Serna-Olvera, J.; Veseli, F. Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities. Personal and Ubiquitous Computing, 21(5):869-891 (2017) [doi]
  3. Carmen Camara, Pedro Peris-Lopez, Lorena Gonzalez-Manzano, Juan Tapiador. Real-time Electrocardiogram Streams for Continuous Authentication. Applied Soft Computing. In press. [doi]
  4. Pedro Peris-Lopez, Honorio Martín. Hardware Trojans against virtual keyboards on e-banking plat- forms–A proof of concept. AEU - International Journal of Electronics and Communications, 76:146-151 (2017) [doi]
  5. L. González-Manzano, P. Peris, J. M de Fuentes, C. Camara. Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation. Future Generation Computer Systems, 77:136-148 (2017) [doi]
  6. Ana I. González-Tablas, J.E. Tapiador. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs. Sensors 16.5, 674, 16(5):674 (2016) [doi]
  7. de Fuentes, J. M.; González-Manzano, L. ; Mirzaei, O. Privacy models in Wireless Sensor Networks - A survey. Journal of Sensors, 2016:18 (2016) [doi]
  8. H. Martin, P. Peris-Lopez, J. E. Tapiador, E. San Millan. A New TRNG based on Coherent Sampling with Self-timed Rings. IEEE Transactions on Industrial Informatics, 12(1):91-100 (2016) [doi]
  9. L. González-Manzano, J. M de Fuentes, S. Pastrana, P. Peris, L. Hernandez. PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things. Journal of Network and Computer Applications, 71:59-71 (2016) [doi]
  10. G. Suarez-Tangil, J.E. Tapiador, F. Lombardi, R. Di Pietro. Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware. IEEE Transactions on Mobile Computing, 15(4):789-802 (2016) [doi]
  11. C. Camara, P. Peris-Lopez, J.E. Tapiador, G. Suarez-Tangil. A Non-invasive Multi-modal Human Identification System combining ECG, GSR and Airflow Biosignals. Journal of Medical and Biological Engineering, 35(6):735-748 (2015) [doi]
  12. C. Camara, P. Peris-Lopez, J.E. Tapiador. Human Identification Using Compressed ECG Signals. Journal of Medical Systems, 39(11):148 (2015) [doi]
  13. Jose M. de Fuentes, P. Peris-Lopez, J.E. Tapiador, S. Pastrana. Probabilistic Yoking Proofs for Large Scale IoT Systems. Ad Hoc Networks, 32:43-52 (2015) [doi]
  14. C. Camara, P. Peris-Lopez, J.E. Tapiador. Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey. Journal of Biomedical Informatics, 55:272-289 (2015) [doi]
  15. G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez, S. Pastrana. Power-aware Anomaly Detection in Smartphones: An Analysis of On-Platform versus Externalized Operation. Pervasive and Mobile Computing, 18:137-151 (2015) [doi]
  16. J. Blasco, J.E. Tapiador, P. Peris-Lopez, G. Suarez-Tangil. Hindering Data Theft with Encrypted Data Trees. Journal of Systems and Software, 101:147-158 (2015) [doi]
  17. P. Picazo, J.E. Tapiador, P. Peris-Lopez, G. Suarez-Tangil. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks. Sensors, 14(12):22619-22642 (2014) [doi]
  18. G. Suarez-Tangil, F. Lombardi, J.E. Tapiador, R. Di Pietro. Thwarting Obfuscated Malware via Differential Fault Analysis. IEEE Computer, 47(6):24-31 (2014) [doi]
  19. G. Suarez-Tangil, J.E. Tapiador, P. Peris, A. Ribagorda. Evolution, Detection and Analysis of Malware in Smart Devices. IEEE Communications Surveys & Tutorials, 16(2):961-987 (2014) [doi]
  20. G. Suarez-Tangil, J.E. Tapiador, P. Peris, J. Blasco. Dendroid: A Text Mining Approach to Analyzing and Classifying Code Structures in Android Malware Families. Expert Systems With Applications, 41(4):1104-1117 (2014) [doi]

Conference/Workshop papers

  1. Mirzaei, O.; Tapiador, J.E; Tangil, G.; de Fuentes, J.M. Triaging Android Applications using Speculative Information Flows. Asia CCS, 640:651 (2017) [doi]
  2. L. González-Manzano, M. Slaymaker, J. M de Fuentes, D. Vayenas. SoNeUCON_{ABC}Pro: an access control model for social networks with translucent user provenance. SecureComm 2017.
  3. Ana I. González-Tablas. Analysis of the alignment of Spanish Master's programs to US National Cybersecurity Workforce Framework. JNIC 2016, 185:191 (2016)
  4. S. Pastrana, J. Rodriguez-Canseco, A. Calleja. ArduWorm: A Functional Malware Targeting Arduino Devices. JNIC 2016, 116:124 (2016)
  5. A. Calleja, J.E. Tapiador, J. Caballero. A Look into 30 Years of Malware Development from a Software Metrics Perspective. RAID 2016.
  6. R. Garrido-Pelaz, L. González-Manzano, S. Pastrana. Shall We Collaborate?: A Model to Analyse the Benefits of Information Sharing. WISCS 2016.
  7. L. González-Manzano, J. M de Fuentes, K.-K. R. Choo. ase-PoW: a Proof of Ownership mechanism for cloud deduplication in hierarchical environments. SecureComm 2016.
  8. G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez. Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. NSS 2015.
  9. L. Gonzalez-Manzano, J. M de Fuentes, A. Orfila. Access control for the Cloud based on multi-device authentication. TrustCom 2015.
  10. A. Calleja, P. Peris-Lopez, J.E. Tapiador. Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols. WISTP 2015, LNCS 9311:36-51 (2015). Springer-Verlag.
  11. H. Martin, P. Peris-Lopez, J.E. Tapiador, E. San Millan, N. Sklavos. Hardware Trojans in TRNGs. TRUDEVICE 2015, Workshop on Trustworthy Manufacturing and Utilization of Secure Devices.
  12. G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez. Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. INSCRYPT 2014, LNCS 8957:496-515 (2014). Springer-Verlag.
  13. G. Suarez-Tangil, M. Conti, J.E. Tapiador, P. Peris-Lopez. Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models. ESORICS 2014, LNCS 8712:183-201. Springer-Verlag. [doi]
  14. M. Safkhani, N. Bagheri, P. Peris-Lopez, J.E. Tapiador. Employing a Secure Cipher Does Not guarantee the Security of RFID Protocols. ISCTURKEY 2014.

PhD Theses

  1. Alejandro Calleja (Ongoing). Dynamic Malware Analysis.
  2. Carmen Camara (Ongoing). Biosignals and Security.
  3. Pablo Picazo (Ongoing). Security Protocols for Medical WBANs.
  4. Guillermo Suarez-Tangil (2014). Mining Structural and Behavioral Patterns in Smart Malware.