Jorge Blasco Alís
Orcid: 0000-0003-4392-9023Affiliations:
- Royal Holloway, University of London
According to our database1,
Jorge Blasco Alís
authored at least 46 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on github.com
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Comput. Surv., August, 2024
Proceedings of the IEEE International Conference on Software Analysis, 2024
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Exploring the Malicious Document Threat Landscape: Towards a Systematic Approach to Detection and Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Proceedings of the 1st Workshop on SErverless Systems, Applications and MEthodologies, 2023
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Proc. Priv. Enhancing Technol., 2022
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Binaries.
CoRR, 2021
Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
How private is your period?: A systematic analysis of menstrual app privacy policies.
Proc. Priv. Enhancing Technol., 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
2019
A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019
2018
J. Comput. Virol. Hacking Tech., 2018
On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification.
Sensors, 2018
A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes.
J. Univers. Comput. Sci., 2018
J. Netw. Comput. Appl., 2018
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2016
A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices.
Int. J. Cyber Situational Aware., 2016
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016
2015
2014
Int. J. Distributed Sens. Networks, 2014
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
J. Syst. Archit., 2013
2012
Comput. Secur., 2012
2011
Comput. Secur., 2011
2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
2008
CSteg: Talking in C Code - Steganography of C Source Code in Text.
Proceedings of the SECRYPT 2008, 2008
2007
Finite element modelling of the thermal outflow of three power plants in Huelva Estuary.
Adv. Eng. Softw., 2007
2003
IEEE Commun. Mag., 2003