Julio César Hernández Castro

Orcid: 0000-0002-6432-5328

Affiliations:
  • University of Kent, Canterbury, UK
  • Charles III University of Madrid, Madrid, Spain (former)


According to our database1, Julio César Hernández Castro authored at least 168 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cashing out crypto: state of practice in ransom payments.
Int. J. Inf. Sec., April, 2024

Analysis of Security Mechanisms of Dark Web Markets.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs.
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024

2023
Further analysis of the statistical independence of the NIST SP 800-22 randomness tests.
Appl. Math. Comput., December, 2023

Dark Ending: What Happens when a Dark Web Market Closes down.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023

Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Artificial Intelligence for the Design of Symmetric Cryptographic Primitives.
Security and Artificial Intelligence, 2022

On the Unbearable Lightness of FIPS 140-2 Randomness Tests.
IEEE Trans. Inf. Forensics Secur., 2022

Sensitivity and uniformity in statistical randomness tests.
J. Inf. Secur. Appl., 2022

Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2).
Entropy, 2022

A new approach to analyze the independence of statistical tests of randomness.
Appl. Math. Comput., 2022

Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps.
IEEE Access, 2022

Identifying Incentives for Extortion in Proof of Stake Consensus Protocols.
Proceedings of the International Conference on Deep Learning, 2022

Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022

2021
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains.
J. Netw. Comput. Appl., 2021

Investigating the impact of ransomware splash screens.
J. Inf. Secur. Appl., 2021

On the Effectiveness of Ransomware Decryption Tools.
Comput. Secur., 2021

PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone.
IEEE Access, 2021

Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Industrialising Blackmail: Privacy Invasion Based IoT Ransomware.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators.
ACM Trans. Priv. Secur., 2020

Reducing the Forensic Footprint with Android Accessibility Attacks.
Proceedings of the Security and Trust Management - 16th International Workshop, 2020

Persistence in Linux-Based IoT Malware.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Why Current Statistical Approaches to Ransomware Detection Fail.
Proceedings of the Information Security - 23rd International Conference, 2020

Using Eyetracker to Find Ways to Mitigate Ransomware.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

What Is Your MOVE: Modeling Adversarial Network Environments.
Proceedings of the Applications of Evolutionary Computation - 23rd European Conference, 2020

PaperW8: an IoT bricking ransomware proof of concept.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
To pay or not: game theoretic models of ransomware.
J. Cybersecur., 2019

A Roadmap for Improving the Impact of Anti-ransomware Research.
Proceedings of the Secure IT Systems, 2019

2018
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG.
IEEE Trans. Inf. Forensics Secur., 2018

Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.
Sensors, 2018

Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
Sensors, 2018

Dismantling OpenPuff PDF steganography.
Digit. Investig., 2018

An in-Depth Study of the Jisut Family of Android Ransomware.
IEEE Access, 2018

Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018

Security Analysis of Contiki IoT Operating System.
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018

2017
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation.
IEEE Trans. Inf. Forensics Secur., 2017

Detecting discussion communities on vaccination in twitter.
Future Gener. Comput. Syst., 2017

A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Gener. Comput. Syst., 2017

Economic Analysis of Ransomware.
CoRR, 2017

Earworms Make Bad Passwords: An Analysis of the Nokē Smart Lock Manual Override.
Proceedings of the 2017 International Workshop on Secure Internet of Things, 2017

An Analysis of Bitcoin Laundry Services.
Proceedings of the Secure IT Systems, 2017

GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017

2016
Pitfalls in Ultralightweight Authentication Protocol Designs.
IEEE Trans. Mob. Comput., 2016

Image source acquisition identification of mobile devices based on the use of features.
Multim. Tools Appl., 2016

No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA.
IACR Cryptol. ePrint Arch., 2016

Identification of smartphone brand and model via forensic video analysis.
Expert Syst. Appl., 2016

A Survey of Security and Privacy Issues in ePassport Protocols.
ACM Comput. Surv., 2016

Theia: a tool for the forensic analysis of mobile devices pictures.
Computing, 2016

Bias in the Mifare DESFire EV1 TRNG.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

2015
Forensic analysis of video steganography tools.
PeerJ Comput. Sci., 2015

Automatic detection of potentially illegal online sales of elephant ivory via data mining.
PeerJ Comput. Sci., 2015

Analysis of errors in exif metadata on mobile devices.
Multim. Tools Appl., 2015

Smartphone image acquisition forensics using sensor fingerprint.
IET Comput. Vis., 2015

Steganalysis of OpenPuff through atomic concatenation of MP4 flags.
Digit. Investig., 2015

On the limits of engine analysis for cheating detection in chess.
Comput. Secur., 2015

2014
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol.
J. Comput. Appl. Math., 2014

A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol.
Expert Syst. J. Knowl. Eng., 2014

Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
Computing, 2014

A Survey of Social Web Mining Applications for Disease Outbreak Detection.
Proceedings of the Intelligent Distributed Computing VIII, 2014

2013
Cryptanalysis of the RNTS system.
J. Supercomput., 2013

A study on the false positive rate of Stegdetect.
Digit. Investig., 2013

Measuring Software Diversity, with Applications to Security.
CoRR, 2013

Source smartphone identification using sensor pattern noise and wavelet transform.
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013

2012
A secure distance-based RFID identification protocol with an off-line back-end database.
Pers. Ubiquitous Comput., 2012

Online Randomization Strategies to Obfuscate User Behavioral Patterns.
J. Netw. Syst. Manag., 2012

A framework for avoiding steganography usage over HTTP.
J. Netw. Comput. Appl., 2012

Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
Int. J. Found. Comput. Sci., 2012

Bypassing information leakage protection with trusted applications.
Comput. Secur., 2012

Another Fallen Hash-Based RFID Authentication Protocol.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Weaknesses in another Gen2-based RFID authentication protocol.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

On the Security of Tan et al. Serverless RFID Authentication and Search Protocols.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

2011
Flaws on RFID grouping-proofs. Guidelines for future sound protocols.
J. Netw. Comput. Appl., 2011

Cryptanalysis of Cho <i>et al.</i>'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
Eng. Appl. Artif. Intell., 2011

Cryptanalysis of Song's advanced smart card based password authentication protocol
CoRR, 2011

Prime number generation using memetic programming.
Artif. Life Robotics, 2011

On the Strength of Egglue and Other Logic CAPTCHAs.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Studying the pseudo random number generator of a low-cost RFID tag.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

AKARI-X: A pseudorandom number generator for secure lightweight systems.
Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 2011

On the Key Schedule Strength of PRESENT.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Blind Steganalysis of Mp3stego.
J. Inf. Sci. Eng., 2010

Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard.
IEICE Trans. Inf. Syst., 2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.
IEEE Commun. Lett., 2010

Vulnerability analysis of RFID protocols for tag ownership transfer.
Comput. Networks, 2010

A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Fine-Grained Timing Using Genetic Programming.
Proceedings of the Genetic Programming, 13th European Conference, 2010

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009

LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification.
Comput. Stand. Interfaces, 2009

Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard.
Comput. Stand. Interfaces, 2009

Security Flaws in a Recent Ultralightweight RFID Protocol
CoRR, 2009

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
CoRR, 2009

Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Comput. Commun., 2009

Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

Steganalysis of Hydan.
Proceedings of the Emerging Challenges for Security, 2009

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels.
IEEE Trans. Inf. Forensics Secur., 2008

Automated design of a lightweight block cipher with Genetic Programming.
Int. J. Knowl. Based Intell. Eng. Syst., 2008

Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008

Cryptanalysis of Syverson's Rational Exchange Protocol.
Int. J. Netw. Secur., 2008

Bayesian rational exchange.
Int. J. Inf. Sec., 2008

Cryptanalysis of the RSA-CEGD protocol
CoRR, 2008

Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR, 2008

Secure content access and replication in pure P2P networks.
Comput. Commun., 2008

Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

CSteg: Talking in C Code - Steganography of C Source Code in Text.
Proceedings of the SECRYPT 2008, 2008

Nature-Inspired Synthesis of Rational Protocols.
Proceedings of the Parallel Problem Solving from Nature, 2008

Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol.
Proceedings of the Modelling, 2008

On the Salsa20 Core Function.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007

Bayesian Analysis of Secure P2P Sharing Protocols.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Multi-party Rational Exchange Protocol.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes.
Proceedings of the Cryptography and Coding, 2007

Towards Automated Design of Multi-party Rational Exchange Security Protocols.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Heuristic search for non-linear cryptanalytic approximations.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
Steganography in games: A general methodology and its application to the game of Go.
Comput. Secur., 2006

Guest Editorial.
J. Res. Pract. Inf. Technol., 2006

M<sup>2</sup>AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming.
Proceedings of the Parallel Problem Solving from Nature, 2006

Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming.
Proceedings of the Parallel Problem Solving from Nature, 2006

Certificate-based Access Control in Pure P2P Networks.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

RFID Systems: A Survey on Security Threats and Proposed Solutions.
Proceedings of the Personal Wireless Communications, 2006

Evolving hash functions by means of genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Security in P2P Networks: Survey and Research Directions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A P2P Content Authentication Protocol Based on Byzantine Agreement.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

A Protocol for Secure Content Distribution in Pure P2P Networks.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
Reference Chromosome to Overcome User Fatigue in IEC.
New Gener. Comput., 2005

New Results on the Genetic Cryptanalysis of TEA and Reduced-round Versions of XTEA.
New Gener. Comput., 2005

Evolutionary Computation in Computer Security and Cryptography.
New Gener. Comput., 2005

The strict avalanche criterion randomness test.
Math. Comput. Simul., 2005

Marketing on Internet Communications Security for Online Bank Transactions.
Proceedings of the Computational Science and Its Applications, 2005

Attacks on Port Knocking Authentication Mechanism.
Proceedings of the Computational Science and Its Applications, 2005

2004
Filtering Spam at E-Mail Server Level with Improved CRM114.
Inf. Secur. J. A Glob. Perspect., 2004

Beware of the Security Software.
Inf. Secur. J. A Glob. Perspect., 2004

Hiding Data in Games.
J. Int. Comput. Games Assoc., 2004

Low computational cost integrity for block ciphers.
Future Gener. Comput. Syst., 2004

Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography.
Comput. Intell., 2004

Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA.
Comput. Intell., 2004

Secure Communications in Multi-Agent Systems Protecting KQML.
Proceedings of the Security In Information Systems, 2004

Forecasting Time Series by Means of Evolutionary Algorithms.
Proceedings of the Parallel Problem Solving from Nature, 2004

Validating the Use of BAN LOGIC.
Proceedings of the Computational Science and Its Applications, 2004

Security Issues in Network File Systems.
Proceedings of the Computational Science and Its Applications, 2004

The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis.
Proceedings of the Computational Science and Its Applications, 2004

On the design of state-of-the-art pseudorandom number generators by means of genetic programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
Finding Efficient Nonlinear Functions by Means of Genetic Programming.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

Protection of Multiagent Systems.
Proceedings of the Computational Science and Its Applications, 2003

On MARS's s-boxes Strength against Linear Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2003

2002
Genetic Cryptoanalysis of Two Rounds TEA.
Proceedings of the Computational Science - ICCS 2002, 2002

2001
Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators.
Cryptologia, 2001

Search Engines as a Security Threat.
Computer, 2001

Search Engines as a security thread.
Proceedings of WebNet 2001, 2001

Project WebOracle: Developing an advanced web server security assesment tool.
Proceedings of WebNet 2001, 2001

Robust New Method in Frequency Domain Watermarking.
Proceedings of the Information Security, 4th International Conference, 2001

Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
Proceedings of the Cryptography and Coding, 2001


  Loading...