Juan Tapiador

Orcid: 0000-0002-4573-3967

Affiliations:
  • Charles III University of Madrid, Spain
  • University of York, UK (2009 - 2011)


According to our database1, Juan Tapiador authored at least 145 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild.
IEEE Trans. Dependable Secur. Comput., 2024

EU Cyber Resilience Act: Socio-Technical and Research Challenges (Dagstuhl Seminar 24112).
Dagstuhl Reports, 2024

Did I Vet You Before? Assessing the Chrome Web Store Vetting Process through Browser Extension Similarity.
CoRR, 2024

Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

2023
Kunai: A static analysis framework for Android apps.
SoftwareX, May, 2023

Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem.
IEEE Trans. Software Eng., April, 2023

Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls.
CoRR, 2023

An analysis of fake social media engagement services.
Comput. Secur., 2023

Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023

Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion.
J. Comput. Secur., 2022

Optimization of code caves in malware binaries to evade machine learning detectors.
Comput. Secur., 2022

Towards an extensible privacy analysis framework for smart homes.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods.
Proceedings of the 3rd International CoNEXT Student Workshop, 2022

2021
Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting.
IEEE Trans. Netw. Serv. Manag., 2021

POW-HOW: An enduring timing side-channel to evadeonline malware sandboxes.
CoRR, 2021

A year in lockdown: how the waves of COVID-19 impact internet traffic.
Commun. ACM, 2021

Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Framework Proposal to Measure the Stress as Adversarial Factor on Cyber Decision Making.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes.
Proceedings of the Computer Security - ESORICS 2021, 2021

The Stress as Adversarial Factor for Cyber Decision Making.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
After you, please: browser extensions order attacks and countermeasures.
Int. J. Inf. Sec., 2020

An Analysis of Pre-installed Android Software.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development.
IEEE Trans. Inf. Forensics Secur., 2019

Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors.
Future Gener. Comput. Syst., 2019

AndrODet: An adaptive Android obfuscation detector.
Future Gener. Comput. Syst., 2019

Measuring eWhoring.
Proceedings of the Internet Measurement Conference, 2019

AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Picking on the family: Disrupting android malware triage by forcing misclassification.
Expert Syst. Appl., 2018

Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals.
Entropy, 2018

Real-time electrocardiogram streams for continuous authentication.
Appl. Soft Comput., 2018

Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
A lightweight implementation of the Tav-128 hash function.
IEICE Electron. Express, 2017

PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing.
Comput. Secur., 2017

TriFlow: Triaging Android Applications using Speculative Information Flows.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware.
IEEE Trans. Mob. Comput., 2016

A New TRNG Based on Coherent Sampling With Self-Timed Rings.
IEEE Trans. Ind. Informatics, 2016

Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs.
Sensors, 2016

A Survey of Wearable Biometric Recognition Systems.
ACM Comput. Surv., 2016

ADROIT: Android malware detection using meta-information.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

A Look into 30 Years of Malware Development from a Software Metrics Perspective.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System.
IEEE Trans. Dependable Secur. Comput., 2015

Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.
Pervasive Mob. Comput., 2015

Hindering data theft with encrypted data trees.
J. Syst. Softw., 2015

Human Identification Using Compressed ECG Signals.
J. Medical Syst., 2015

Security and privacy issues in implantable medical devices: A comprehensive survey.
J. Biomed. Informatics, 2015

Automatic generation of HTTP intrusion signatures by selective identification of anomalies.
Comput. Secur., 2015

DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks.
Comput. Networks, 2015

Probabilistic yoking proofs for large scale IoT systems.
Ad Hoc Networks, 2015

Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols.
Proceedings of the Information Security Theory and Practice, 2015

Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms.
IEEE Trans. Ind. Informatics, 2014

Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014

Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP.
Secur. Commun. Networks, 2014

Randomized Anagram revisited.
J. Netw. Comput. Appl., 2014

Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014

Evolution, Detection and Analysis of Malware for Smart Devices.
IEEE Commun. Surv. Tutorials, 2014

Thwarting Obfuscated Malware via Differential Fault Analysis.
Computer, 2014

Trustworthy placements: Improving quality and resilience in collaborative attack detection.
Comput. Networks, 2014

Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
Proceedings of the Computer Security - ESORICS 2014, 2014

Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Two RFID Standard-based Security Protocols for Healthcare Environments.
J. Medical Syst., 2013

Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6".
IEEE Commun. Lett., 2013

The placement-configuration problem for intrusion detection nodes in wireless sensor networks.
Comput. Electr. Eng., 2013

Information sharing models for cooperative cyber defence.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

2012
Online Randomization Strategies to Obfuscate User Behavioral Patterns.
J. Netw. Syst. Manag., 2012

Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
Int. J. Found. Comput. Sci., 2012

Cryptanalysis of RAPP, an RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2012

Bypassing information leakage protection with trusted applications.
Comput. Secur., 2012

2011
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
Eng. Appl. Artif. Intell., 2011

Cryptanalysis of Song's advanced smart card based password authentication protocol
CoRR, 2011

Masquerade mimicry attack detection: A randomised approach.
Comput. Secur., 2011

Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

2010
Blind Steganalysis of Mp3stego.
J. Inf. Sci. Eng., 2010

Vulnerability analysis of RFID protocols for tag ownership transfer.
Comput. Networks, 2010

Risk based Access Control with Uncertain and Time-dependent Sensitivity.
Proceedings of the SECRYPT 2010, 2010

Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Information-Theoretic Detection of Masquerade Mimicry Attacks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Modelling Uncertain and Time-Dependent Security Labels in MLS Systems.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Fine-Grained Timing Using Genetic Programming.
Proceedings of the Genetic Programming, 13th European Conference, 2010

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Learning Autonomic Security Reconfiguration Policies.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009

LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification.
Comput. Stand. Interfaces, 2009

Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard.
Comput. Stand. Interfaces, 2009

Security Flaws in a Recent Ultralightweight RFID Protocol
CoRR, 2009

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
CoRR, 2009

Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Comput. Commun., 2009

Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

Steganalysis of Hydan.
Proceedings of the Emerging Challenges for Security, 2009

Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming.
Proceedings of the Applications of Evolutionary Computing, 2009

A Multi-objective Optimisation Approach to IDS Sensor Placement.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Power-Aware Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels.
IEEE Trans. Inf. Forensics Secur., 2008

Automated design of a lightweight block cipher with Genetic Programming.
Int. J. Knowl. Based Intell. Eng. Syst., 2008

Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008

Cryptanalysis of Syverson's Rational Exchange Protocol.
Int. J. Netw. Secur., 2008

Bayesian rational exchange.
Int. J. Inf. Sec., 2008

Cryptanalysis of the RSA-CEGD protocol
CoRR, 2008

Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR, 2008

Secure content access and replication in pure P2P networks.
Comput. Commun., 2008

Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

CSteg: Talking in C Code - Steganography of C Source Code in Text.
Proceedings of the SECRYPT 2008, 2008

Nature-Inspired Synthesis of Rational Protocols.
Proceedings of the Parallel Problem Solving from Nature, 2008

Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol.
Proceedings of the Modelling, 2008

On the Salsa20 Core Function.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007

Bayesian Analysis of Secure P2P Sharing Protocols.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Multi-party Rational Exchange Protocol.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes.
Proceedings of the Cryptography and Coding, 2007

Towards Automated Design of Multi-party Rational Exchange Security Protocols.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Heuristic search for non-linear cryptanalytic approximations.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
Book Review: Practical Intrusion Prevention.
IEEE Distributed Syst. Online, 2006

Steganography in games: A general methodology and its application to the game of Go.
Comput. Secur., 2006

M<sup>2</sup>AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming.
Proceedings of the Parallel Problem Solving from Nature, 2006

Certificate-based Access Control in Pure P2P Networks.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

RFID Systems: A Survey on Security Threats and Proposed Solutions.
Proceedings of the Personal Wireless Communications, 2006

Security in P2P Networks: Survey and Research Directions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A P2P Content Authentication Protocol Based on Byzantine Agreement.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

A Protocol for Secure Content Distribution in Pure P2P Networks.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
Unfairness of a protocol for certified delivery.
IACR Cryptol. ePrint Arch., 2005

PIM-DM Cost Analysis in Loop Free Topologies.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Detection of Web-Based Attacks through Markovian Protocol Parsing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Attacks on Port Knocking Authentication Mechanism.
Proceedings of the Computational Science and Its Applications, 2005

A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol.
Proceedings of the Computational Science and Its Applications, 2005

2004
The Emergence of Cyber-Terrorism.
IEEE Distributed Syst. Online, 2004

Moving Web Services to the Secure Side.
IEEE Distributed Syst. Online, 2004

Anomaly detection methods in wired networks: a survey and taxonomy.
Comput. Commun., 2004

Measuring normality in HTTP traffic for anomaly-based intrusion detection.
Comput. Networks, 2004

N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer.
Proceedings of the Computational Science and Its Applications, 2004

2003
Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin).
IEEE Distributed Syst. Online, 2003

NSDF: a computer network system description framework and its application to network security.
Comput. Networks, 2003

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003


  Loading...