Jorge Blasco Alís

Orcid: 0000-0003-4392-9023

Affiliations:
  • Royal Holloway, University of London


According to our database1, Jorge Blasco Alís authored at least 46 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets.
ACM Comput. Surv., August, 2024

Towards Inter-Service Data Flow Analysis of Serverless Applications.
Proceedings of the IEEE International Conference on Software Analysis, 2024

ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

DocFlow: Extracting Taint Specifications from Software Documentation.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Exploring the Malicious Document Threat Landscape: Towards a Systematic Approach to Detection and Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2023
AWSomePy: A Dataset and Characterization of Serverless Applications.
Proceedings of the 1st Workshop on SErverless Systems, Applications and MEthodologies, 2023

Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem.
Proc. Priv. Enhancing Technol., 2022

Towards Improving Code Stylometry Analysis in Underground Forums.
Proc. Priv. Enhancing Technol., 2022

PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Mesh Messaging in Large-scale Protests: Breaking Bridgefy.
IACR Cryptol. ePrint Arch., 2021

argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Binaries.
CoRR, 2021

Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong.
Proceedings of the 30th USENIX Security Symposium, 2021

Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy.
Proceedings of the Security and Privacy in Communication Networks, 2021

Detecting Video-Game Injectors Exchanged in Game Cheating Communities.
Proceedings of the Computer Security - ESORICS 2021, 2021

argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
How private is your period?: A systematic analysis of menstrual app privacy policies.
Proc. Priv. Enhancing Technol., 2020

WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2019
A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape.
Proceedings of the 28th USENIX Security Symposium, 2019

Cryptography in WSNs.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

Wearables Security and Privacy.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

2018
Automated generation of colluding apps for experimental research.
J. Comput. Virol. Hacking Tech., 2018

On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification.
Sensors, 2018

A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes.
J. Univers. Comput. Sci., 2018

Detection of app collusion potential using logic programming.
J. Netw. Comput. Appl., 2018

Attacks Against BLE Devices by Co-located Mobile Applications.
CoRR, 2018

InfoSec Cinema: Using Films for Information Security Teaching.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2016
A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices.
Int. J. Cyber Situational Aware., 2016

A Survey of Wearable Biometric Recognition Systems.
ACM Comput. Surv., 2016

Towards Automated Android App Collusion Detection.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

2015
Hindering data theft with encrypted data trees.
J. Syst. Softw., 2015

2014
Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles.
Int. J. Distributed Sens. Networks, 2014

Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014

A tunable proof of ownership scheme for deduplication using Bloom filters.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
WEVAN - A mechanism for evidence creation and verification in VANETs.
J. Syst. Archit., 2013

2012
A framework for avoiding steganography usage over HTTP.
J. Netw. Comput. Appl., 2012

Bypassing information leakage protection with trusted applications.
Comput. Secur., 2012

2011
Analysis of update delays in signature-based network intrusion detection systems.
Comput. Secur., 2011

2010
A multi-agent scanner to detect stored-XSS vulnerabilities.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming.
Proceedings of the ARES 2010, 2010

2009
Steganalysis of Hydan.
Proceedings of the Emerging Challenges for Security, 2009

Automatic Rule Generation Based on Genetic Programming for Event Correlation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
CSteg: Talking in C Code - Steganography of C Source Code in Text.
Proceedings of the SECRYPT 2008, 2008

2007
Finite element modelling of the thermal outflow of three power plants in Huelva Estuary.
Adv. Eng. Softw., 2007

2003
Extending the power line LAN up to the neighborhood transformer.
IEEE Commun. Mag., 2003


  Loading...