Guillermo Suarez-Tangil

Orcid: 0000-0002-0455-2553

Affiliations:
  • IMDEA Networks Institute, Spain


According to our database1, Guillermo Suarez-Tangil authored at least 65 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Transformer-Based Quantification of the Echo Chamber Effect in Online Communities.
Proc. ACM Hum. Comput. Interact., 2024

A Holistic Indicator of Polarization to Measure Online Sexism.
CoRR, 2024

Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security.
Proceedings of the 33rd USENIX Security Symposium, 2024

Reversing the Virtual Maze: An Overview of the Technical and Methodological Challenges for Metaverse App Analysis.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024

Differences in the Toxic Language of Cross-Platform Communities.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

Position: On Potential Malware & New Attack Vectors for Internet-of-Brains (IoB).
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums.
Proceedings of the Computer Security - ESORICS 2024, 2024

I love pineapple on pizza != I hate pineapple on pizza: Stance-Aware Sentence Transformers for Opinion Mining.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

A Review on Privacy and Monetization Aspects Within BCI and XR-BCI Ecosystems.
Proceedings of the Business Modeling and Software Design - 14th International Symposium, 2024

2023
Analysis of security and data control in smart personal assistants from the user's perspective.
Future Gener. Comput. Syst., July, 2023

HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants.
IEEE Internet Things J., May, 2023

SkillVet: Automated Traceability Analysis of Amazon Alexa Skills.
IEEE Trans. Dependable Secur. Comput., 2023

Lady and the Tramp Nextdoor: Online Manifestations of Economic Inequalities in the Nextdoor Social Network.
CoRR, 2023

Lady and the Tramp Nextdoor: Online Manifestations of Real-World Inequalities in the Nextdoor Social Network.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

Visualizing Cyber-Threats in Underground Forums.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Misinformation in Third-party Voice Applications.
Proceedings of the 5th International Conference on Conversational User Interfaces, 2023

AI in the Gray: Exploring Moderation Policies in Dialogic Large Language Models vs. Human Answers in Controversial Topics.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Eight Years of Rider Measurement in the Android Malware Ecosystem.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Improving Code Stylometry Analysis in Underground Forums.
Proc. Priv. Enhancing Technol., 2022

ObfSec: Measuring the security of obfuscations from a testing perspective.
Expert Syst. Appl., 2022

On how VoIP attacks foster the malicious call ecosystem.
Comput. Secur., 2022

Measuring Alexa Skill Privacy Practices across Three Years.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Exploring online manifestations of real-world inequalities.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Exploring the security and privacy risks of chatbots in messaging services.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Leakage of Sensitive Information to Third-Party Voice Applications.
Proceedings of the CUI 2022: 4th Conference on Conversational User Interfaces, Glasgow, United Kingdom, July 26, 2022

2021
Novel Tools for the Management, Representation, and Exploitation of Textual Information.
Sci. Program., 2021

An Analysis of Android Malware Classification Services.
Sensors, 2021

Smart Home Personal Assistants: A Security and Privacy Review.
ACM Comput. Surv., 2021

Memes, Radicalisation, and the Promotion of Violence on Chan Sites.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

Detecting Video-Game Injectors Exchanged in Game Cheating Communities.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Automatically Dismantling Online Dating Fraud.
IEEE Trans. Inf. Forensics Secur., 2020

Characterizing Linux-based malware: Findings and recent trends.
Future Gener. Comput. Syst., 2020

WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Multi-country Study of Third Party Trackers from Real Browser Histories.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Proc. ACM Hum. Comput. Interact., 2019

A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth.
Proceedings of the Internet Measurement Conference, 2019

BorderPatrol: Securing BYOD using Fine-Grained Contextual Information.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Anomaly-based exploratory analysis and detection of exploits in android mediaserver.
IET Inf. Secur., 2018

Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned.
CoRR, 2018

On the Origins of Memes by Means of Fringe Web Communities.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection.
Comput. Secur., 2017

Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

TriFlow: Triaging Android Applications using Speculative Information Flows.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Ex-Ray: Detection of History-Leaking Browser Extensions.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware.
IEEE Trans. Mob. Comput., 2016

DroidScribe: Classifying Android Malware Based on Runtime Behavior.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Security analysis and exploitation of arduino devices in the internet of things.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2015
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.
Pervasive Mob. Comput., 2015

Hindering data theft with encrypted data trees.
J. Syst. Softw., 2015

Providing SIEM systems with self-adaptation.
Inf. Fusion, 2015

Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014

Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014

Evolution, Detection and Analysis of Malware for Smart Devices.
IEEE Commun. Surv. Tutorials, 2014

Thwarting Obfuscated Malware via Differential Fault Analysis.
Computer, 2014

Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
Proceedings of the Computer Security - ESORICS 2014, 2014

Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Information sharing models for cooperative cyber defence.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

2011
Artificial Immunity-based Correlation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2011

2009
Automatic Rule Generation Based on Genetic Programming for Event Correlation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009


  Loading...