Search For:

Displaying 1-7 out of 7 total
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol
Found in: Parallel and Distributed Processing Symposium, International
By Julio C. Hernandez-Castro,Juan E. Tapiador,Pedro Peris-Lopez,John A. Clark,El-Ghazali Talbi
Issue Date:May 2009
pp. 1-5
We present a metaheuristic-based attack against the traceability of an ultra-lightweight authentication protocol for RFID environments called SLMAP, and analyse its implications. The main interest of our approach is that it is a complete black-box techniqu...
Message from ACS Workshop Chairs
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Juan E. Tapiador,Ruixuan Li,Bart Preneel,Guihua Duan
Issue Date:June 2012
pp. xxxvii
No summary available.
Information-Theoretic Detection of Masquerade Mimicry Attacks
Found in: Network and System Security, International Conference on
By Juan E. Tapiador, John A. Clark
Issue Date:September 2010
pp. 183-190
In a masquerade attack, an adversary who has stolen a legitimate user's credentials attempts to impersonate him to carry out malicious actions. Automatic detection of such attacks is often undertaken constructing models of normal behaviour of each user and...
Learning Autonomic Security Reconfiguration Policies
Found in: Computer and Information Technology, International Conference on
By Juan E. Tapiador, John A. Clark
Issue Date:July 2010
pp. 902-909
We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context in which it operates changes. To illustrate our approach, we consider the case of a MA...
Effects of Cooperation--Based Peer-to-Peer Authentication on System Performance
Found in: Multimedia Information Networking and Security, International Conference on
By Esther Palomar, Arturo Ribagorda, Juan E. Tapiador, Julio Hernandez-Castro
Issue Date:November 2009
pp. 444-448
Fully distributed file sharing systems, where participants share content and collaborate in a Peer--to--Peer (P2P) manner, have to deal with a highly dynamic environment to ensure that even when some nodes are unavailable, others can still perform the task...
Thwarting Obfuscated Malware via Differential Fault Analysis
Found in: Computer
By Guillermo Suarez-Tangil,Juan E. Tapiador,Flavio Lombardi,Roberto Di Pietro
Issue Date:June 2014
pp. 24-31
Detecting malware in mobile applications has become increasingly complex as malware developers turn to advanced techniques to hide or obfuscate malicious components. Alterdroid is a dynamic-analysis tool that compares the behavioral differences between an ...
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
Found in: IEEE Transactions on Dependable and Secure Computing
By Juan E. Tapiador,Agustin Orfila,Arturo Ribagorda,Benjamin Ramos
Issue Date:September 2013
pp. 1
Most anomaly detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Some works conducted over the last years have pointed out that such algorithms are generally susceptible to de...