Juan Tapiador

Juan Tapiador

Contact Details

Office: 2.1.B29
Email address: jestevez+totally-not-span@infuc3mes
Phone number: +34 91 624 8847
Fax number: +34 91 624 9129

External links

Short bio

I am a computer scientist in the Computer Security Lab (COSEC) at UC3M. I obtained a B.Sc. in Computer Science in 2000 from the University of Granada, and then a Ph.D in 2004 from the same university with a dissertation on statistical anomaly detection for network security. Prior to joining UC3M, I worked at the University of York, UK. My work there was mainly funded by the ITA project, a joint effort between the UK Ministry of Defence and the US Army Research Lab led by IBM. In July 2012, I was appointed Associate Professor of Computer Science at UC3M.

Research

My research focuses on engineering secure software and systems. I am particularly interested in malware analysis, reverse engineering, anomaly and intrusion detection, and automating defense and analysis techniques. Over the last 15 years I have worked in various system and network security topics, including cryptographic protocols, statistical anomaly detection, cyber range systems, and security in new operating systems such as Android. Starting with my early work on anomaly detection, I developed a keen interest in the applications of machine learning and large-scale data analysis techniques to security problems.My research focuses on engineering secure software and systems. I am particularly interested in malware analysis, reverse engineering, anomaly and intrusion detection, and automating defense and analysis techniques. Over the last 15 years I have worked in various system and network security topics, including cryptographic protocols, statistical anomaly detection, cyber range systems, and security in new operating systems such as Android. Starting with my early work on anomaly detection, I developed a keen interest in the applications of machine learning and large-scale data analysis techniques to security problems.

Publications

Moreno, José Miguel; Pastrana, Sergio; Reelfs, Jens Helge; Vallina, Pelayo; Zannettou, Savvas; Panchenko, Andriy; Smaragdakis, Georgios; Hohlfeld, Oliver; Vallina-Rodriguez, Narseo; Tapiador, Juan. Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls. Proceedings of the 2024 AAAI International Conference on Web and Social Media (ICWSM). AAAI.

Moreno, José Miguel; Vallina-Rodriguez, Narseo; Tapiador, Juan. Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API. Proceedings of the 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). IEEE Computer Society.

Moreno, José Miguel; Matic, Srdjan; Vallina-Rodriguez, Narseo; Tapiador, Juan. Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem. Proceedings of the 2023 Network Traffic Measurement and Analysis Conference (TMA). IEEE Computer Society.

Blázquez, Eduardo; Pastrana, Sergio; Feal, Álvaro; Gamba, Julien; Kotzias, Platon; Vallina-Rodriguez, Narseo; Tapiador, Juan. Trouble Over-the-Air: An Analysis of FOTA Apps in the Android Ecosystem. IEEE Computer Society.

Ortiz-Martin, Lara; Picazo-Sanchez, Pablo; Peris-López, Pedro; Tapiador, Juan; Schneider, Gerardo. Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors. Future Generation Computer Systems. Elsevier B.V..

Gamba, Julien; Rashed, Mohammed; Razaghpanah, Abbas; Tapiador, Juan; Vallina-Rodriguez, Narseo. An Analysis of Pre-installed Android Software.

Calleja, Alejandro; Alejandro Martín; Menéndez, Héctor D.; Tapiador, Juan; Clark, David. Picking on the family: Disrupting android malware triage by forcing misclassification. Expert Syst. Appl..

Calleja, Alejandro; Tapiador, Juan; Caballero, Juan. The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. IEEE Transactions on Information Forensics and Security.

Wang, Haoyu; Liu, Zhe; Liang, Jingyue; Vallina-Rodriguez, Narseo; Guo, Yao; Li, Li; Tapiador, Juan; Cao, Jingcun; Xu, Guoai. Beyond Google play: A large-scale comparative study of Chinese android app markets. Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC. ACM.

Honorio Martín; Pedro Peris-López; Enrique San Millán; Tapiador, Juan. A lightweight implementation of the Tav-128 hash function. IEICE Electronic Express.

Mirzaei, Omid; Tapiador, Juan; de Fuentes, José María. TriFlow: Triaging Android Applications using Speculative Information Flows. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017. ACM.

Honorio Martín; Peris-López, Pedro; Tapiador, Juan; Enrique San Millán. A New TRNG Based on Coherent Sampling With Self-Timed Rings. IEEE Trans. Industrial Informatics.

Suárez-Tangil, Guillermo; Tapiador, Juan; Flavio Lombardi; Roberto Di Pietro. Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware. IEEE Trans. Mob. Comput..

Pastrana, Sergio; Tapiador, Juan; Suárez-Tangil, Guillermo; Pedro Peris-López. AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices. Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings. Springer.

Calleja, Alejandro; Tapiador, Juan; Caballero, Juan. A Look into 30 Years of Malware Development from a Software Metrics Perspective. Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings. Springer.

Martín, Alejandro; Calleja, Alejandro; Menéndez, Héctor D.; Tapiador, Juan; Camacho, David. ADROIT: Android malware detection using meta-information. 2016 IEEE Symposium Series on Computational Intelligence, SSCI 2016, Athens, Greece, December 6-9, 2016. IEEE.

Pedro García-Teodoro; Jesús E. Díaz-Verdejo; Tapiador, Juan; Rolando Salazar-Hernández. Automatic generation of HTTP intrusion signatures by selective identification of anomalies. Computers & Security.

Blasco, Jorge; Tapiador, Juan; Peris-López, Pedro; Suárez-Tangil, Guillermo. Hindering data theft with encrypted data trees. Journal of Systems and Software.

Tapiador, Juan; Orfila, Agustín; Ribagorda, Arturo; Ramos, Benjamín. Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. IEEE Trans. Dependable Sec. Comput..

Suárez-Tangil, Guillermo; Tapiador, Juan; Peris-López, Pedro. Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings. Springer.

Calleja, Alejandro; Peris-López, Pedro; Tapiador, Juan. Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols. Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings. Springer.

Hernández-Ardieta, Jorge López; Santos, David; Parra, Pascual; Tapiador, Juan; Peris-López, Pedro; López, Javier; Navarrete, Gerardo Fernández. An Intelligent and Adaptive Live Simulator : A New Concept for Cybersecurity Training. Future Security Conference.

Manuel Gil Pérez; Tapiador, Juan; John A. Clark; Gregorio Martínez Pérez; Antonio Fernandez Gómez-Skarmeta. Trustworthy placements: Improving quality and resilience in collaborative attack detection. Computer Networks.

Suárez-Tangil, Guillermo; Tapiador, Juan; Flavio Lombardi; Roberto Di Pietro. Thwarting Obfuscated Malware via Differential Fault Analysis. IEEE Computer.

Suárez-Tangil, Guillermo; Tapiador, Juan; Peris-López, Pedro; Ribagorda, Arturo. Evolution, Detection and Analysis of Malware for Smart Devices. IEEE Communications Surveys and Tutorials.

Pastrana, Sergio; Orfila, Agustín; Tapiador, Juan; Peris-López, Pedro. Randomized Anagram revisited. J. Network and Computer Applications.

Picazo-Sánchez, Pablo; Tapiador, Juan; Pedro Peris-López; Suárez-Tangil, Guillermo. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks. Sensors.

Honorio Martín; Peris-López, Pedro; Tapiador, Juan; Enrique San Millán. An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms. IEEE Trans. Industrial Informatics.

Suárez-Tangil, Guillermo; Tapiador, Juan; Peris-López, Pedro. Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers. Springer.

Suárez-Tangil, Guillermo; Mauro Conti; Tapiador, Juan; Peris-López, Pedro. Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models. Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Springer.

Hernández-Ardieta, Jorge López; Tapiador, Juan; Suárez-Tangil, Guillermo. Information sharing models for cooperative cyber defence. 5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013. IEEE.

Blasco, Jorge; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. Bypassing information leakage protection with trusted applications. Computers & Security.

Hernández Castro, Julio César; Tapiador, Juan; Peris-López, Pedro; John A. Clark; El-Ghazali Talbi. Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. Int. J. Found. Comput. Sci..

Nasour Bagheri; Masoumeh Safkhani; Peris-López, Pedro; Tapiador, Juan. Cryptanalysis of RAPP, an RFID Authentication Protocol. IACR Cryptology ePrint Archive.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Jan C. A. van der Lubbe. Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Eng. Appl. of AI.

Tapiador, Juan; Mudhakar Srivatsa; John A. Clark; John A. McDermid. Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing. NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers. Springer.

Tapiador, Juan; Hernández Castro, Julio César; Peris-López, Pedro; John A. Clark. Cryptanalysis of Song's advanced smart card based password authentication protocol. CoRR.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Tieyan Li; Yingjiu Li. Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks.

Hernández Castro, Julio César; Tapiador, Juan; Esther Palomar; Angel Romero-Gonzalex. Blind Steganalysis of Mp3stego. J. Inf. Sci. Eng..

Tapiador, Juan; John A. Clark. Learning Autonomic Security Reconfiguration Policies. 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010. IEEE Computer Society.

Peris-López, Pedro; Hernández Castro, Julio César; Raphael C.-W. Phan; Tapiador, Juan; Tieyan Li. Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers. Springer.

David Robert White; Tapiador, Juan; Hernández Castro, Julio César; John A. Clark. Fine-Grained Timing Using Genetic Programming. Genetic Programming, 13th European Conference, EuroGP 2010, Istanbul, Turkey, April 7-9, 2010. Proceedings. Springer.

John A. Clark; Tapiador, Juan; John A. McDermid; Pau-Chen Cheng; Dakshi Agrawal; Natalie Ivanic; Dave Slogget. Modelling Uncertain and Time-Dependent Security Labels in MLS Systems. e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers. Springer.

Tapiador, Juan; John A. Clark. Information-Theoretic Detection of Masquerade Mimicry Attacks. Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010. IEEE Computer Society.

Hernández Castro, Julio César; Peris-López, Pedro; Raphael C.-W. Phan; Tapiador, Juan. Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers. Springer.

John A. Clark; Tapiador, Juan; John A. McDermid; Pau-Chen Cheng; Dakshi Agrawal; Natalie Ivanic; Dave Slogget. Risk based Access Control with Uncertain and Time-dependent Sensitivity. SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. J. Inf. Sci. Eng..

Sevil Sen; John A. Clark; Tapiador, Juan. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks. Ad Hoc Networks, First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers. Springer.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Tieyan Li; Jan C. A. van der Lubbe. Weaknesses in Two Recent Lightweight RFID Authentication Protocols. Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Springer.

Hao Chen; John A. Clark; Tapiador, Juan; Siraj A. Shaikh; Howard Chivers; Philip Nobles. A Multi-objective Optimisation Approach to IDS Sensor Placement. Computational Intelligence in Security for Information Systems - CISIS'09, 2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings. Springer.

Orfila, Agustín; Tapiador, Juan; Ribagorda, Arturo. Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, T"ubingen, Germany, April 15-17, 2009. Proceedings. Springer.

Hernández Castro, Julio César; Tapiador, Juan; Peris-López, Pedro; John A. Clark; El-Ghazali Talbi. Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009. IEEE.

Blasco, Jorge; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo; Miguel A. Orellana-Quiros. Steganalysis of Hydan. Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings. Springer.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Enrique San Millán; Jan C. A. van der Lubbe. Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments. Security in Emerging Wireless Communication and Networking Systems - First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers. Springer.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Jan C. A. van der Lubbe. Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. CoRR.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Jan C. A. van der Lubbe. Security Flaws in a Recent Ultralightweight RFID Protocol. CoRR.

Esther Palomar; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. Secure content access and replication in pure P2P networks. Computer Communications.

Tapiador, Juan; Almudena Alcaide; Hernández Castro, Julio César; Ribagorda, Arturo. Bayesian rational exchange. Int. J. Inf. Sec..

Almudena Alcaide; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. Cryptanalysis of Syverson's Rational Exchange Protocol. I. J. Network Security.

Tapiador, Juan; Hernández Castro, Julio César; Peris-López, Pedro; Ribagorda, Arturo. Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. J. Inf. Sci. Eng..

Javier Polimón; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. Automated design of a lightweight block cipher with Genetic Programming. KES Journal.

Tapiador, Juan; Hernández Castro, Julio César; Almudena Alcaide; Ribagorda, Arturo. On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Trans. Information Forensics and Security.

Hernández Castro, Julio César; Tapiador, Juan; Jean-Jacques Quisquater. On the Salsa20 Core Function. Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers. Springer.

Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. Modelling, Computation and Optimization in Information Systems and Management Sciences, Second International Conference, MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings. Springer.

Almudena Alcaide; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. Nature-Inspired Synthesis of Rational Protocols. Parallel Problem Solving from Nature - PPSN X, 10th International Conference Dortmund, Germany, September 13-17, 2008, Proceedings. Springer.

Blasco, Jorge; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. CSteg: Talking in C Code - Steganography of C Source Code in Text. SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers. Springer.

Hernández Castro, Julio César; Tapiador, Juan; Peris-López, Pedro; Jean-Jacques Quisquater. Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations. CoRR.

Tapiador, Juan; Almudena Alcaide; Hernández Castro, Julio César; Ribagorda, Arturo. Cryptanalysis of the RSA-CEGD protocol. CoRR.

Tapiador, Juan; Hernández Castro, Julio César; John A. Clark. Heuristic search for non-linear cryptanalytic approximations. Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2007, 25-28 September 2007, Singapore. IEEE.

Esther Palomar; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany. IEEE Computer Society.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings. Springer.

Almudena Alcaide; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. Towards Automated Design of Multi-party Rational Exchange Security Protocols. Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, USA. IEEE Computer Society.

Tapiador, Juan; John A. Clark; Hernández Castro, Julio César. Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Springer.

Almudena Alcaide; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. A Multi-party Rational Exchange Protocol. On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, OTM Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys, PPN, RDDS, SSWS, and SWWS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part I. Springer.

Esther Palomar; Almudena Alcaide; Tapiador, Juan; Hernández Castro, Julio César. Bayesian Analysis of Secure P2P Sharing Protocols. On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II. Springer.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags. Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007. IEEE Computer Society.

González-Tablas, Ana Isabel; Ramos, Benjamín; Ribagorda, Arturo; Tapiador, Juan. Mecanismo de certificación espacio-temporal basado en el estándar SAML. IX Reunión Española de Criptología y Seguridad de la Información (RECSI 2006).

Hernández Castro, Julio César; Ignacio Blasco-Lopez; Tapiador, Juan; Ribagorda, Arturo. Steganography in games: A general methodology and its application to the game of Go. Computers & Security.

Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo; Ramos, Benjamín. Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming. IEEE International Conference on Evolutionary Computation, CEC 2006, part of WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006. IEEE.

Esther Palomar; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. A Protocol for Secure Content Distribution in Pure P2P Networks. 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 4-8 September 2006, Krakow, Poland. IEEE Computer Society.

Esther Palomar; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. A P2P Content Authentication Protocol Based on Byzantine Agreement. Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings. Springer.

Almudena Alcaide; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings. Springer.

Esther Palomar; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. Security in P2P Networks: Survey and Research Directions. Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings. Springer.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. RFID Systems: A Survey on Security Threats and Proposed Solutions. Personal Wireless Communications, IFIP TC6 11th International Conference, PWC 2006, Albacete, Spain, September 20-22, 2006, Proceedings. Springer.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I. Springer.

Esther Palomar; Tapiador, Juan; Hernández Castro, Julio César; Ribagorda, Arturo. Certificate-based Access Control in Pure P2P Networks. Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2-4 October 2006, Cambridge, United Kingdom. IEEE Computer Society.

Carlos Lamenca-Martinez; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. Parallel Problem Solving from Nature - PPSN IX, 9th International Conference, Reykjavik, Iceland, September 9-13, 2006, Procedings. Springer.

Peris-López, Pedro; Hernández Castro, Julio César; Tapiador, Juan; Ribagorda, Arturo. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings. Springer.

Izquierdo, Antonio; Torres Márquez, Joaquín; Tapiador, Juan; Hernández Castro, Julio César. Attacks on Port Knocking Authentication Mechanism. Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV. Springer.

Almudena Alcaide; Tapiador, Juan; Izquierdo, Antonio; Sierra, José María. A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV. Springer.

Tapiador, Juan; Pedro García-Teodoro; Jesús E. Díaz-Verdejo. Detection of Web-Based Attacks through Markovian Protocol Parsing. Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain. IEEE Computer Society.

Gabriel Maciá-Fernández; Jesús E. Díaz-Verdejo; Tapiador, Juan. PIM-DM Cost Analysis in Loop Free Topologies. Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain. IEEE Computer Society.

Tapiador, Juan; Almudena Alcaide. Unfairness of a protocol for certified delivery. IACR Cryptology ePrint Archive.

Tapiador, Juan; Pedro García-Teodoro; Jesús E. Díaz-Verdejo. Measuring normality in HTTP traffic for anomaly-based intrusion detection. Computer Networks.

Tapiador, Juan; Pedro García-Teodoro; Jesús E. Díaz-Verdejo. Anomaly detection methods in wired networks: a survey and taxonomy. Computer Communications.

Tapiador, Juan. Moving Web Services to the Secure Side. IEEE Distributed Systems Online.

Tapiador, Juan. The Emergence of Cyber-Terrorism. IEEE Distributed Systems Online.

Tapiador, Juan; Pedro García-Teodoro; Jesús E. Díaz-Verdejo. N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I. Springer.

Tapiador, Juan. Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin). IEEE Distributed Systems Online.

Tapiador, Juan; Pedro García-Teodoro; Jesús E. Díaz-Verdejo. Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), March 24, 2003, Darmstadt, Germany. IEEE Computer Society.

Published on Monday, Oct 18, 2021 Last Modified on Tuesday, May 30, 2023