Juan Tapiador
Orcid: 0000-0002-4573-3967Affiliations:
- Charles III University of Madrid, Spain
- University of York, UK (2009 - 2011)
According to our database1,
Juan Tapiador
authored at least 147 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild.
IEEE Trans. Dependable Secur. Comput., 2024
EU Cyber Resilience Act: Socio-Technical and Research Challenges (Dagstuhl Seminar 24112).
Dagstuhl Reports, 2024
Did I Vet You Before? Assessing the Chrome Web Store Vetting Process through Browser Extension Similarity.
CoRR, 2024
Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
2023
IEEE Trans. Software Eng., April, 2023
Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls.
CoRR, 2023
Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023
In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion.
J. Comput. Secur., 2022
DTRAP, 2022
Comput. Secur., 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods.
Proceedings of the 3rd International CoNEXT Student Workshop, 2022
2021
IEEE Trans. Netw. Serv. Manag., 2021
CoRR, 2021
Commun. ACM, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Framework Proposal to Measure the Stress as Adversarial Factor on Cyber Decision Making.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Int. J. Inf. Sec., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Picking on the family: Disrupting android malware triage by forcing misclassification.
Expert Syst. Appl., 2018
Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals.
Entropy, 2018
Appl. Soft Comput., 2018
Proceedings of the Internet Measurement Conference 2018, 2018
2017
IEICE Electron. Express, 2017
Comput. Secur., 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Mob. Comput., 2016
IEEE Trans. Ind. Informatics, 2016
Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs.
Sensors, 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.
Pervasive Mob. Comput., 2015
J. Biomed. Informatics, 2015
Automatic generation of HTTP intrusion signatures by selective identification of anomalies.
Comput. Secur., 2015
DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks.
Comput. Networks, 2015
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols.
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
2014
IEEE Trans. Ind. Informatics, 2014
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014
Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP.
Secur. Commun. Networks, 2014
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014
IEEE Commun. Surv. Tutorials, 2014
Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Comput. Networks, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
2013
J. Medical Syst., 2013
Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6".
IEEE Commun. Lett., 2013
The placement-configuration problem for intrusion detection nodes in wireless sensor networks.
Comput. Electr. Eng., 2013
Proceedings of the 5th International Conference on Cyber Conflict, 2013
2012
J. Netw. Syst. Manag., 2012
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
Int. J. Found. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Comput. Secur., 2012
2011
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
Eng. Appl. Artif. Intell., 2011
CoRR, 2011
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011
2010
Comput. Networks, 2010
Risk based Access Control with Uncertain and Time-dependent Sensitivity.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the Genetic Programming, 13th European Conference, 2010
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
CoRR, 2009
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Comput. Commun., 2009
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming.
Proceedings of the Applications of Evolutionary Computing, 2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Int. J. Knowl. Based Intell. Eng. Syst., 2008
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR, 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
CSteg: Talking in C Code - Steganography of C Source Code in Text.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Parallel Problem Solving from Nature, 2008
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol.
Proceedings of the Modelling, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
2007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007
Proceedings of the Cryptography and Coding, 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
2006
Comput. Secur., 2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Parallel Problem Solving from Nature, 2006
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
2005
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
2004
Comput. Commun., 2004
Comput. Networks, 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin).
IEEE Distributed Syst. Online, 2003
NSDF: a computer network system description framework and its application to network security.
Comput. Networks, 2003
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003