Search dblp for Publications

export results for "author:Martín_Ochoa:"

 download as .bib file

@article{DBLP:journals/compsec/WongCOZ23,
  author       = {Ann Yi Wong and
                  Eyasu Getahun Chekole and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou},
  title        = {On the Security of Containers: Threat Modeling, Attack Analysis, and
                  Mitigation Strategies},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103140},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103140},
  doi          = {10.1016/J.COSE.2023.103140},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WongCOZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LopezSRTFCO23,
  author       = {Christian Lopez and
                  Jes{\'{u}}s Solano and
                  Esteban Rivera and
                  Lizzy Tengana and
                  Johana Florez{-}Lozano and
                  Alejandra Castelblanco and
                  Mart{\'{\i}}n Ochoa},
  title        = {Adversarial attacks against mouse- and keyboard-based biometric authentication:
                  black-box versus domain-specific techniques},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {6},
  pages        = {1665--1685},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-023-00711-0},
  doi          = {10.1007/S10207-023-00711-0},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LopezSRTFCO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BreierHOS23,
  author       = {Jakub Breier and
                  Xiaolu Hou and
                  Mart{\'{\i}}n Ochoa and
                  Jesus Solano},
  title        = {FooBaR: Fault Fooling Backdoor Attack on Neural Network Training},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {1895--1908},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3166671},
  doi          = {10.1109/TDSC.2022.3166671},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BreierHOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/OchoaVTB23,
  author       = {Mart{\'{\i}}n Ochoa and
                  Hern{\'{a}}n Vanegas and
                  Jorge Toro{-}Pozo and
                  David A. Basin},
  title        = {SealClub: Computer-aided Paper Document Authentication},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {163--177},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627176},
  doi          = {10.1145/3627106.3627176},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/OchoaVTB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasinGKNO23,
  author       = {David A. Basin and
                  Juan Guarnizo and
                  Srdan Krstic and
                  Hoang Nguyen Phuoc Bao and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Is Modeling Access Control Worth It?},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2830--2844},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623196},
  doi          = {10.1145/3576915.3623196},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BasinGKNO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CastelblancoRST22,
  author       = {Alejandra Castelblanco and
                  Esteban Rivera and
                  Jesus Solano and
                  Lizzy Tengana and
                  Christian Lopez and
                  Mart{\'{\i}}n Ochoa},
  title        = {Dynamic face authentication systems: Deep learning verification for
                  camera close-Up and head rotation paradigms},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102629},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102629},
  doi          = {10.1016/J.COSE.2022.102629},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CastelblancoRST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangHRTO22,
  author       = {Xueou Wang and
                  Xiaolu Hou and
                  Ruben Rios and
                  Nils Ole Tippenhauer and
                  Mart{\'{\i}}n Ochoa},
  title        = {Constrained Proximity Attacks on Mobile Targets},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {10:1--10:29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3498543},
  doi          = {10.1145/3498543},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WangHRTO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/RiveraTSLFO22,
  author       = {Esteban Rivera and
                  Lizzy Tengana and
                  Jesus Solano and
                  Christian Lopez and
                  Johana Fl{\'{o}}rez and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {Scalable and Secure {HTML5} Canvas-Based User Authentication},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  pages        = {554--574},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_30},
  doi          = {10.1007/978-3-031-16815-4\_30},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/RiveraTSLFO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SolanoRTLFO22,
  author       = {Jesus Solano and
                  Esteban Rivera and
                  Lizzy Tengana and
                  Christian Lopez and
                  Johana Fl{\'{o}}rez and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {A Siamese Neural Network for Scalable Behavioral Biometrics Authentication},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  pages        = {515--535},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_28},
  doi          = {10.1007/978-3-031-16815-4\_28},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/SolanoRTLFO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AungOZ22,
  author       = {Yan Lin Aung and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou},
  editor       = {Willy Susilo and
                  Xiaofeng Chen and
                  Fuchun Guo and
                  Yudi Zhang and
                  Rolly Intan},
  title        = {{ATLAS:} {A} Practical Attack Detection and Live Malware Analysis
                  System for IoT Threat Intelligence},
  booktitle    = {Information Security - 25th International Conference, {ISC} 2022,
                  Bali, Indonesia, December 18-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13640},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22390-7\_19},
  doi          = {10.1007/978-3-031-22390-7\_19},
  timestamp    = {Mon, 06 Nov 2023 13:38:03 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/AungOZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-07884,
  author       = {Mart{\'{\i}}n Ochoa and
                  Jorge Toro{-}Pozo and
                  David A. Basin},
  title        = {SealClub: Computer-aided Paper Document Authentication},
  journal      = {CoRR},
  volume       = {abs/2210.07884},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.07884},
  doi          = {10.48550/ARXIV.2210.07884},
  eprinttype    = {arXiv},
  eprint       = {2210.07884},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-07884.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChekoleOC21,
  author       = {Eyasu Getahun Chekole and
                  Mart{\'{\i}}n Ochoa and
                  Sudipta Chattopadhyay},
  title        = {{SCOPE:} Secure Compiling of PLCs in Cyber-Physical Systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100431},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100431},
  doi          = {10.1016/J.IJCIP.2021.100431},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChekoleOC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SolanoCCDVO21,
  author       = {Jesus Solano and
                  Luis David Camacho and
                  Alejandro Correa and
                  Claudio Deiro and
                  Javier Vargas and
                  Mart{\'{\i}}n Ochoa},
  title        = {Combining behavioral biometrics and session context analytics to enhance
                  risk-based static authentication in web applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {2},
  pages        = {181--197},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00510-x},
  doi          = {10.1007/S10207-020-00510-X},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SolanoCCDVO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/AhmedO0M21,
  author       = {Chuadhry Mujeeb Ahmed and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou and
                  Aditya Mathur},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Scanning the Cycle: Timing-based Authentication on PLCs},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {886--900},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453102},
  doi          = {10.1145/3433210.3453102},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/AhmedO0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/TenganaSCRLO21,
  author       = {Lizzy Tengana and
                  Jesus Solano and
                  Alejandra Castelblanco and
                  Esteban Rivera and
                  Christian Lopez and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Leyla Bilge and
                  Lorenzo Cavallaro and
                  Giancarlo Pellegrino and
                  Nuno Neves},
  title        = {Centy: Scalable Server-Side Web Integrity Verification System Based
                  on Fuzzy Hashes},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 18th International Conference, {DIMVA} 2021, Virtual Event, July
                  14-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12756},
  pages        = {371--390},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80825-9\_19},
  doi          = {10.1007/978-3-030-80825-9\_19},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/TenganaSCRLO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CastellanosOCA021,
  author       = {John Henry Castellanos and
                  Mart{\'{\i}}n Ochoa and
                  Alvaro A. C{\'{a}}rdenas and
                  Owen Arden and
                  Jianying Zhou},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {AttkFinder: Discovering Attack Vectors in {PLC} Programs using Information
                  Flow Analysis},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {235--250},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471864},
  doi          = {10.1145/3471621.3471864},
  timestamp    = {Fri, 08 Oct 2021 09:46:25 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CastellanosOCA021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-08985,
  author       = {Chuadhry Mujeeb Ahmed and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou and
                  Aditya Mathur},
  title        = {Scanning the Cycle: Timing-based Authentication on PLCs},
  journal      = {CoRR},
  volume       = {abs/2102.08985},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.08985},
  eprinttype    = {arXiv},
  eprint       = {2102.08985},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-08985.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-11249,
  author       = {Jakub Breier and
                  Xiaolu Hou and
                  Mart{\'{\i}}n Ochoa and
                  Jesus Solano},
  title        = {FooBaR: Fault Fooling Backdoor Attack on Neural Network Training},
  journal      = {CoRR},
  volume       = {abs/2109.11249},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.11249},
  eprinttype    = {arXiv},
  eprint       = {2109.11249},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-11249.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-11475,
  author       = {Ann Yi Wong and
                  Eyasu Getahun Chekole and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou},
  title        = {Threat Modeling and Security Analysis of Containers: {A} Survey},
  journal      = {CoRR},
  volume       = {abs/2111.11475},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.11475},
  eprinttype    = {arXiv},
  eprint       = {2111.11475},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-11475.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChekoleCOGC20,
  author       = {Eyasu Getahun Chekole and
                  Sudipta Chattopadhyay and
                  Mart{\'{\i}}n Ochoa and
                  Huaqun Guo and
                  Unnikrishnan Cheramangalath},
  title        = {{CIMA:} Compiler-Enforced Resilience Against Memory Safety Attacks
                  in Cyber-Physical Systems},
  journal      = {Comput. Secur.},
  volume       = {94},
  pages        = {101832},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101832},
  doi          = {10.1016/J.COSE.2020.101832},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChekoleCOGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AhmedMO20,
  author       = {Chuadhry Mujeeb Ahmed and
                  Aditya P. Mathur and
                  Mart{\'{\i}}n Ochoa},
  title        = {\emph{NoiSense Print}: Detecting Data Integrity Attacks on Sensor
                  Measurements Using Hardware-based Fingerprints},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {2:1--2:35},
  year         = {2020},
  url          = {https://doi.org/10.1145/3410447},
  doi          = {10.1145/3410447},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AhmedMO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RiveraTSCLO20,
  author       = {Esteban Rivera and
                  Lizzy Tengana and
                  Jesus Solano and
                  Alejandra Castelblanco and
                  Christian Lopez and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {Risk-based Authentication Based on Network Latency Profiling},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {105--115},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421377},
  doi          = {10.1145/3411508.3421377},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RiveraTSCLO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SolanoLRCTO20,
  author       = {Jesus Solano and
                  Christian Lopez and
                  Esteban Rivera and
                  Alejandra Castelblanco and
                  Lizzy Tengana and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Jay Ligatti and
                  Xinming Ou},
  title        = {{SCRAP:} Synthetically Composed Replay Attacks vs. Adversarial Machine
                  Learning Attacks against Mouse-based Biometric Authentication},
  booktitle    = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, USA, 13 November 2020},
  pages        = {37--47},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411508.3421378},
  doi          = {10.1145/3411508.3421378},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SolanoLRCTO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mcpr2/CastelblancoSLR20,
  author       = {Alejandra Castelblanco and
                  Jesus Solano and
                  Christian Lopez and
                  Esteban Rivera and
                  Lizzy Tengana and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Karina Mariela Figueroa{-}Mora and
                  Juan Anzurez Mar{\'{\i}}n and
                  Jaime Cerd{\'{a}} Jacobo and
                  Jes{\'{u}}s Ariel Carrasco{-}Ochoa and
                  Jos{\'{e}} Francisco Mart{\'{\i}}nez Trinidad and
                  Jos{\'{e}} Arturo Olvera{-}L{\'{o}}pez},
  title        = {Machine Learning Techniques for Identity Document Verification in
                  Uncontrolled Environments: {A} Case Study},
  booktitle    = {Pattern Recognition - 12th Mexican Conference, {MCPR} 2020, Morelia,
                  Mexico, June 24-27, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12088},
  pages        = {271--281},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49076-8\_26},
  doi          = {10.1007/978-3-030-49076-8\_26},
  timestamp    = {Wed, 28 Feb 2024 00:16:32 +0100},
  biburl       = {https://dblp.org/rec/conf/mcpr2/CastelblancoSLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2020w,
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0},
  doi          = {10.1007/978-3-030-61638-0},
  isbn         = {978-3-030-61637-3},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2020w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-12529,
  author       = {Eyasu Getahun Chekole and
                  Mart{\'{\i}}n Ochoa and
                  Sudipta Chattopadhyay},
  title        = {{SCOPE:} Secure Compiling of PLCs in Cyber-Physical Systems},
  journal      = {CoRR},
  volume       = {abs/2012.12529},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.12529},
  eprinttype    = {arXiv},
  eprint       = {2012.12529},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-12529.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/HomoliakTGEO19,
  author       = {Ivan Homoliak and
                  Flavio Toffalini and
                  Juan Guarnizo and
                  Yuval Elovici and
                  Mart{\'{\i}}n Ochoa},
  title        = {Insight Into Insiders and {IT:} {A} Survey of Insider Threat Taxonomies,
                  Analysis, Modeling, and Countermeasures},
  journal      = {{ACM} Comput. Surv.},
  volume       = {52},
  number       = {2},
  pages        = {30:1--30:40},
  year         = {2019},
  url          = {https://doi.org/10.1145/3303771},
  doi          = {10.1145/3303771},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/HomoliakTGEO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HomoliakTOBHH19,
  author       = {Ivan Homoliak and
                  Martin Teknos and
                  Mart{\'{\i}}n Ochoa and
                  Dominik Breitenbacher and
                  Saeid Hosseini and
                  Petr Han{\'{a}}cek},
  title        = {Improving Network Intrusion Detection Classifiers by Non-payload-Based
                  Exploit-Independent Obfuscations: An Adversarial Approach},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {17},
  pages        = {e4},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.10-1-2019.156245},
  doi          = {10.4108/EAI.10-1-2019.156245},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HomoliakTOBHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/ToffaliniSO19,
  author       = {Flavio Toffalini and
                  Jun Sun and
                  Mart{\'{\i}}n Ochoa},
  title        = {Practical static analysis of context leaks in Android applications},
  journal      = {Softw. Pract. Exp.},
  volume       = {49},
  number       = {2},
  pages        = {233--251},
  year         = {2019},
  url          = {https://doi.org/10.1002/spe.2659},
  doi          = {10.1002/SPE.2659},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/ToffaliniSO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuchnerCOP19,
  author       = {Tobias W{\"{u}}chner and
                  Aleksander Cislak and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  title        = {Leveraging Compression-Based Graph Mining for Behavior-Based Malware
                  Detection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {99--112},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2675881},
  doi          = {10.1109/TDSC.2017.2675881},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuchnerCOP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SolanoCCDVO19,
  author       = {Jesus Solano and
                  Luis David Camacho and
                  Alejandro Correa and
                  Claudio Deiro and
                  Javier Vargas and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Jianying Zhou and
                  Robert H. Deng and
                  Zhou Li and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Lingyu Wang and
                  Kehuan Zhang},
  title        = {Risk-Based Static Authentication in Web Applications with Behavioral
                  Biometrics and Session Context Analytics},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2019
                  Satellite Workshops, SiMLA, Cloud S{\&}P, AIBlock, and AIoTS,
                  Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11605},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29729-9\_1},
  doi          = {10.1007/978-3-030-29729-9\_1},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SolanoCCDVO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TambeASOTSE19,
  author       = {Amit Tambe and
                  Yan Lin Aung and
                  Ragav Sridharan and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300024},
  doi          = {10.1145/3292006.3300024},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/TambeASOTSE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ToffaliniO0019,
  author       = {Flavio Toffalini and
                  Mart{\'{\i}}n Ochoa and
                  Jun Sun and
                  Jianying Zhou},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Careful-Packing: {A} Practical and Scalable Anti-Tampering Software
                  Protection enforced by Trusted Computing},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {231--242},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300029},
  doi          = {10.1145/3292006.3300029},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ToffaliniO0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2019,
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2},
  doi          = {10.1007/978-3-030-21568-2},
  isbn         = {978-3-030-21567-5},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HallgrenKOS18,
  author       = {Per A. Hallgren and
                  Ravi Kishore and
                  Mart{\'{\i}}n Ochoa and
                  Andrei Sabelfeld},
  title        = {Assuring BetterTimes},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {557--587},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-171085},
  doi          = {10.3233/JCS-171085},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HallgrenKOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HarilalTHCGMO18,
  author       = {Athul Harilal and
                  Flavio Toffalini and
                  Ivan Homoliak and
                  John Henry Castellanos and
                  Juan Guarnizo and
                  Soumik Mondal and
                  Mart{\'{\i}}n Ochoa},
  title        = {The Wolf Of {SUTD} {(TWOS):} {A} Dataset of Malicious Insider Threat
                  Behavior Based on a Gamified Competition},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {1},
  pages        = {54--85},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.03.31.054},
  doi          = {10.22667/JOWUA.2018.03.31.054},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/HarilalTHCGMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CastellanosO018,
  author       = {John Henry Castellanos and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou},
  title        = {Finding Dependencies between Cyber-Physical Domains for Security Testing
                  of Industrial Control Systems},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {582--594},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274745},
  doi          = {10.1145/3274694.3274745},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/CastellanosO018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhmedOZMQMR18,
  author       = {Chuadhry Mujeeb Ahmed and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou and
                  Aditya P. Mathur and
                  Rizwan Qadeer and
                  Carlos Murguia and
                  Justin Ruths},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {\emph{NoisePrint}: Attack Detection Using Sensor and Process Noise
                  Fingerprint in Cyber Physical Systems},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {483--497},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196532},
  doi          = {10.1145/3196494.3196532},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AhmedOZMQMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangHRHTO18,
  author       = {Xueou Wang and
                  Xiaolu Hou and
                  Ruben Rios and
                  Per A. Hallgren and
                  Nils Ole Tippenhauer and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Location Proximity Attacks Against Mobile Targets: Analytical Bounds
                  and Attacker Strategies},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {373--392},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_19},
  doi          = {10.1007/978-3-319-98989-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangHRHTO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/ChekoleCOG18,
  author       = {Eyasu Getahun Chekole and
                  Sudipta Chattopadhyay and
                  Mart{\'{\i}}n Ochoa and
                  Huaqun Guo},
  editor       = {Mathias Payer and
                  Awais Rashid and
                  Jose M. Such},
  title        = {Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems},
  booktitle    = {Engineering Secure Software and Systems - 10th International Symposium,
                  ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10953},
  pages        = {9--26},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94496-8\_2},
  doi          = {10.1007/978-3-319-94496-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/ChekoleCOG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ToffaliniSO18,
  author       = {Flavio Toffalini and
                  Jun Sun and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Frances Paulisch and
                  Jan Bosch},
  title        = {Static analysis of context leaks in android applications},
  booktitle    = {Proceedings of the 40th International Conference on Software Engineering:
                  Software Engineering in Practice, {ICSE} {(SEIP)} 2018, Gothenburg,
                  Sweden, May 27 - June 03, 2018},
  pages        = {215--224},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183519.3183530},
  doi          = {10.1145/3183519.3183530},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/ToffaliniSO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ToffaliniHHBO18,
  author       = {Flavio Toffalini and
                  Ivan Homoliak and
                  Athul Harilal and
                  Alexander Binder and
                  Mart{\'{\i}}n Ochoa},
  title        = {Detection of Masqueraders Based on Graph Partitioning of File System
                  Access Events},
  booktitle    = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San
                  Francisco, CA, USA, May 24, 2018},
  pages        = {217--227},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPW.2018.00037},
  doi          = {10.1109/SPW.2018.00037},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ToffaliniHHBO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-01612,
  author       = {Ivan Homoliak and
                  Flavio Toffalini and
                  Juan Guarnizo and
                  Yuval Elovici and
                  Mart{\'{\i}}n Ochoa},
  title        = {Insight into Insiders: {A} Survey of Insider Threat Taxonomies, Analysis,
                  Modeling, and Countermeasures},
  journal      = {CoRR},
  volume       = {abs/1805.01612},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.01612},
  eprinttype    = {arXiv},
  eprint       = {1805.01612},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-01612.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-02684,
  author       = {Ivan Homoliak and
                  Martin Teknos and
                  Mart{\'{\i}}n Ochoa and
                  Dominik Breitenbacher and
                  Saeid Hosseini and
                  Petr Han{\'{a}}cek},
  title        = {Improving Network Intrusion Detection Classifiers by Non-payload-Based
                  Exploit-Independent Obfuscations: An Adversarial Approach},
  journal      = {CoRR},
  volume       = {abs/1805.02684},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.02684},
  eprinttype    = {arXiv},
  eprint       = {1805.02684},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-02684.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-07477,
  author       = {Eyasu Getahun Chekole and
                  Unnikrishnan Cheramangalath and
                  Sudipta Chattopadhyay and
                  Mart{\'{\i}}n Ochoa and
                  Huaqun Guo},
  title        = {Taming the War in Memory: {A} Resilient Mitigation Strategy Against
                  Memory Safety Attacks in {CPS}},
  journal      = {CoRR},
  volume       = {abs/1809.07477},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.07477},
  eprinttype    = {arXiv},
  eprint       = {1809.07477},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-07477.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/JimenezOR17,
  author       = {Lina M. Jimenez and
                  Mart{\'{\i}}n Ochoa and
                  Sandra Julieta Rueda},
  title        = {Jif-Based Verification of Information Flow Policies for Android Apps},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {28--42},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJSSE.2017010102},
  doi          = {10.4018/IJSSE.2017010102},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/JimenezOR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CastellanosATO17,
  author       = {John Henry Castellanos and
                  Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Legacy-Compliant Data Authentication for Industrial Control System
                  Traffic},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {665--685},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_33},
  doi          = {10.1007/978-3-319-61204-1\_33},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CastellanosATO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AntonioliGAOT17,
  author       = {Daniele Antonioli and
                  Hamid Reza Ghaeini and
                  Sridhar Adepu and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer},
  editor       = {Bhavani Thuraisingham and
                  Rakesh B. Bobba and
                  Awais Rashid},
  title        = {Gamifying {ICS} Security Training and Research: Design, Implementation,
                  and Results of {S3}},
  booktitle    = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security
                  and PrivaCy, Dallas, TX, USA, November 3, 2017},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140241.3140253},
  doi          = {10.1145/3140241.3140253},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AntonioliGAOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuarnizoTBOTSE17,
  author       = {Juan David Guarnizo and
                  Amit Tambe and
                  Suman Sankar Bhunia and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Asaf Shabtai and
                  Yuval Elovici},
  editor       = {Jianying Zhou and
                  Ernesto Damiani},
  title        = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017},
  pages        = {57--68},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055186.3055192},
  doi          = {10.1145/3055186.3055192},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuarnizoTBOTSE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HarilalTCGHO17,
  author       = {Athul Harilal and
                  Flavio Toffalini and
                  John Henry Castellanos and
                  Juan Guarnizo and
                  Ivan Homoliak and
                  Mart{\'{\i}}n Ochoa},
  title        = {{TWOS:} {A} Dataset of Malicious Insider Threat Behavior Based on
                  a Gamified Competition},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139929},
  doi          = {10.1145/3139923.3139929},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HarilalTCGHO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MorrisMO17,
  author       = {Eric Rothstein Morris and
                  Carlos G. Murguia and
                  Mart{\'{\i}}n Ochoa},
  title        = {Design-time Quantification of Integrity in Cyber-physical Systems},
  booktitle    = {Proceedings of the 2017 Workshop on Programming Languages and Analysis
                  for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139337.3139347},
  doi          = {10.1145/3139337.3139347},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MorrisMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChekoleCOY17,
  author       = {Eyasu Getahun Chekole and
                  John Henry Castellanos and
                  Mart{\'{\i}}n Ochoa and
                  David K. Y. Yau},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Enforcing Memory Safety in Cyber-Physical Systems},
  booktitle    = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72817-9\_9},
  doi          = {10.1007/978-3-319-72817-9\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChekoleCOY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/OchoaBDBG17,
  author       = {Mart{\'{\i}}n Ochoa and
                  Sebastian Banescu and
                  Cynthia Disenfeld and
                  Gilles Barthe and
                  Vijay Ganesh},
  title        = {Reasoning about Probabilistic Defense Mechanisms against Remote Attacks},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {499--513},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.30},
  doi          = {10.1109/EUROSP.2017.30},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/OchoaBDBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MeidanBSGOTE17,
  author       = {Yair Meidan and
                  Michael Bohadana and
                  Asaf Shabtai and
                  Juan David Guarnizo and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Yuval Elovici},
  editor       = {Ahmed Seffah and
                  Birgit Penzenstadler and
                  Carina Alves and
                  Xin Peng},
  title        = {ProfilIoT: a machine learning approach for IoT device identification
                  based on network traffic analysis},
  booktitle    = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech,
                  Morocco, April 3-7, 2017},
  pages        = {506--509},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3019612.3019878},
  doi          = {10.1145/3019612.3019878},
  timestamp    = {Wed, 01 Feb 2023 17:58:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/MeidanBSGOTE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AntonioliGAOT17,
  author       = {Daniele Antonioli and
                  Hamid Reza Ghaeini and
                  Sridhar Adepu and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer},
  title        = {Gamifying Education and Research on {ICS} Security: Design, Implementation
                  and Results of {S3}},
  journal      = {CoRR},
  volume       = {abs/1702.03067},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.03067},
  eprinttype    = {arXiv},
  eprint       = {1702.03067},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AntonioliGAOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GuarnizoTBOTSE17,
  author       = {Juan Guarnizo and
                  Amit Tambe and
                  Suman Sankar Bhunia and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots},
  journal      = {CoRR},
  volume       = {abs/1701.02446},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.02446},
  eprinttype    = {arXiv},
  eprint       = {1701.02446},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GuarnizoTBOTSE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/OchoaBDBG17,
  author       = {Mart{\'{\i}}n Ochoa and
                  Sebastian Banescu and
                  Cynthia Disenfeld and
                  Gilles Barthe and
                  Vijay Ganesh},
  title        = {Reasoning about Probabilistic Defense Mechanisms against Remote Attacks},
  journal      = {CoRR},
  volume       = {abs/1701.06743},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.06743},
  eprinttype    = {arXiv},
  eprint       = {1701.06743},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/OchoaBDBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-04798,
  author       = {Eric Rothstein Morris and
                  Carlos G. Murguia and
                  Mart{\'{\i}}n Ochoa},
  title        = {Design-Time Quantification of Integrity in Cyber-Physical-Systems},
  journal      = {CoRR},
  volume       = {abs/1708.04798},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.04798},
  eprinttype    = {arXiv},
  eprint       = {1708.04798},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-04798.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-04647,
  author       = {Yair Meidan and
                  Michael Bohadana and
                  Asaf Shabtai and
                  Mart{\'{\i}}n Ochoa and
                  Nils Ole Tippenhauer and
                  Juan David Guarnizo and
                  Yuval Elovici},
  title        = {Detection of Unauthorized IoT Devices Using Machine Learning Techniques},
  journal      = {CoRR},
  volume       = {abs/1709.04647},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.04647},
  eprinttype    = {arXiv},
  eprint       = {1709.04647},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-04647.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-01598,
  author       = {Chuadhry Mujeeb Ahmed and
                  Aditya Mathur and
                  Mart{\'{\i}}n Ochoa},
  title        = {NoiSense: Detecting Data Integrity Attacks on Sensor Measurements
                  using Hardware based Fingerprints},
  journal      = {CoRR},
  volume       = {abs/1712.01598},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.01598},
  eprinttype    = {arXiv},
  eprint       = {1712.01598},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-01598.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HallgrenOS16,
  author       = {Per A. Hallgren and
                  Mart{\'{\i}}n Ochoa and
                  Andrei Sabelfeld},
  title        = {MaxPace: Speed-constrained location queries},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {136--144},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860479},
  doi          = {10.1109/CNS.2016.7860479},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HallgrenOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/LovatOP16,
  author       = {Enrico Lovat and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  editor       = {Juan Caballero and
                  Eric Bodden and
                  Elias Athanasopoulos},
  title        = {Sound and Precise Cross-Layer Data Flow Tracking},
  booktitle    = {Engineering Secure Software and Systems - 8th International Symposium,
                  ESSoS 2016, London, UK, April 6-8, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9639},
  pages        = {38--55},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30806-7\_3},
  doi          = {10.1007/978-3-319-30806-7\_3},
  timestamp    = {Tue, 01 Jun 2021 15:22:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/LovatOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/OgnawalaOPL16,
  author       = {Saahil Ognawala and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner and
                  Tobias Limmer},
  editor       = {David Lo and
                  Sven Apel and
                  Sarfraz Khurshid},
  title        = {{MACKE:} compositional analysis of low-level vulnerabilities with
                  symbolic execution},
  booktitle    = {Proceedings of the 31st {IEEE/ACM} International Conference on Automated
                  Software Engineering, {ASE} 2016, Singapore, September 3-7, 2016},
  pages        = {780--785},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2970276.2970281},
  doi          = {10.1145/2970276.2970281},
  timestamp    = {Sat, 30 Sep 2023 09:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/OgnawalaOPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/WuchnerOLP16,
  author       = {Tobias W{\"{u}}chner and
                  Mart{\'{\i}}n Ochoa and
                  Enrico Lovat and
                  Alexander Pretschner},
  title        = {Generating behavior-based malware detection models with genetic programming},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {506--511},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7907008},
  doi          = {10.1109/PST.2016.7907008},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/WuchnerOLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/WuchnerOGSSP16,
  author       = {Tobias W{\"{u}}chner and
                  Mart{\'{\i}}n Ochoa and
                  Mojdeh Golagha and
                  Gaurav Srivastava and
                  Thomas Schreck and
                  Alexander Pretschner},
  editor       = {Sascha Ossowski},
  title        = {MalFlow: identification of C{\&}C servers through host-based data
                  flow profiling},
  booktitle    = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
                  Pisa, Italy, April 4-8, 2016},
  pages        = {2087--2094},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2851613.2851802},
  doi          = {10.1145/2851613.2851802},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/WuchnerOGSSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/se/WenzelPJO16,
  author       = {Sven Wenzel and
                  Daniel Poggenpohl and
                  Jan J{\"{u}}rjens and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Jens Knoop and
                  Uwe Zdun},
  title        = {Umlchange - specifying model changes to support security verification
                  of potential evolution},
  booktitle    = {Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik,
                  23.-26. Februar 2016, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-252}},
  pages        = {91--92},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/738},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/se/WenzelPJO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AhmadvandSOP16,
  author       = {Mohsen Ahmadvand and
                  Antoine Scemama and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Enhancing Operation Security using Secret Sharing},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {446--451},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005992104460451},
  doi          = {10.5220/0005992104460451},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/AhmadvandSOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/CastellanosWOR16,
  author       = {John Henry Castellanos and
                  Tobias W{\"{u}}chner and
                  Mart{\'{\i}}n Ochoa and
                  Sandra Julieta Rueda},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Q-Floid: Android Malware detection with Quantitative Data Flow Graphs},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {13--25},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-13},
  doi          = {10.3233/978-1-61499-617-0-13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/CastellanosWOR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/WuchnerOP15,
  author       = {Tobias W{\"{u}}chner and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  editor       = {Magnus Almgren and
                  Vincenzo Gulisano and
                  Federico Maggi},
  title        = {Robust and Effective Malware Detection Through Quantitative Data Flow
                  Graph Metrics},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 12th International Conference, {DIMVA} 2015, Milan, Italy, July
                  9-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9148},
  pages        = {98--118},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20550-2\_6},
  doi          = {10.1007/978-3-319-20550-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/WuchnerOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/GaneshBO15,
  author       = {Vijay Ganesh and
                  Sebastian Banescu and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Michael Clarkson and
                  Limin Jia},
  title        = {Short Paper: The Meaning of Attack-Resistant Systems},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Programming Languages and
                  Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July
                  4-10, 2015},
  pages        = {49--55},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786558.2786562},
  doi          = {10.1145/2786558.2786562},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecoop/GaneshBO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/BanescuOKP15,
  author       = {Sebastian Banescu and
                  Mart{\'{\i}}n Ochoa and
                  Nils Kunze and
                  Alexander Pretschner},
  editor       = {Frank Piessens and
                  Juan Caballero and
                  Nataliia Bielova},
  title        = {Idea: Benchmarking Indistinguishability Obfuscation - {A} Candidate
                  Implementation},
  booktitle    = {Engineering Secure Software and Systems - 7th International Symposium,
                  ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8978},
  pages        = {149--156},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-15618-7\_12},
  doi          = {10.1007/978-3-319-15618-7\_12},
  timestamp    = {Mon, 01 May 2023 13:01:13 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/BanescuOKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/OchoaCPH15,
  author       = {Mart{\'{\i}}n Ochoa and
                  Jorge Cu{\'{e}}llar and
                  Alexander Pretschner and
                  Per A. Hallgren},
  editor       = {Frank Piessens and
                  Juan Caballero and
                  Nataliia Bielova},
  title        = {Idea: Unwinding Based Model-Checking and Testing for Non-Interference
                  on EFSMs},
  booktitle    = {Engineering Secure Software and Systems - 7th International Symposium,
                  ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8978},
  pages        = {34--42},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-15618-7\_3},
  doi          = {10.1007/978-3-319-15618-7\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/essos/OchoaCPH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BanescuOP15,
  author       = {Sebastian Banescu and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  editor       = {Paolo Falcarin and
                  Brecht Wyseur},
  title        = {A Framework for Measuring Software Obfuscation Resilience against
                  Automated Attacks},
  booktitle    = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO}
                  2015, Florence, Italy, May 19, 2015},
  pages        = {45--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SPRO.2015.16},
  doi          = {10.1109/SPRO.2015.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/BanescuOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/BanescuWSGOP15,
  author       = {Sebastian Banescu and
                  Tobias W{\"{u}}chner and
                  Aleieldin Salem and
                  Marius Guggenmos and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  title        = {A framework for empirical evaluation of malware detection resilience
                  against behavior obfuscation},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {40--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413683},
  doi          = {10.1109/MALWARE.2015.7413683},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/BanescuWSGOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HallgrenOS15,
  author       = {Per A. Hallgren and
                  Mart{\'{\i}}n Ochoa and
                  Andrei Sabelfeld},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {BetterTimes - Privacy-Assured Outsourced Multiplications for Additively
                  Homomorphic Encryption on Finite Fields},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {291--309},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_16},
  doi          = {10.1007/978-3-319-26059-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/HallgrenOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HallgrenOS15,
  author       = {Per A. Hallgren and
                  Mart{\'{\i}}n Ochoa and
                  Andrei Sabelfeld},
  editor       = {Ali A. Ghorbani and
                  Vicen{\c{c}} Torra and
                  H{\"{u}}seyin Hisil and
                  Ali Miri and
                  Ahmet Koltuksuz and
                  Jie Zhang and
                  Murat Sensoy and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ibrahim Zincir},
  title        = {InnerCircle: {A} parallelizable decentralized privacy-preserving location
                  proximity protocol},
  booktitle    = {13th Annual Conference on Privacy, Security and Trust, {PST} 2015,
                  Izmir, Turkey, July 21-23, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PST.2015.7232947},
  doi          = {10.1109/PST.2015.7232947},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/HallgrenOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BanescuWGOP15,
  author       = {Sebastian Banescu and
                  Tobias W{\"{u}}chner and
                  Marius Guggenmos and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  title        = {{FEEBO:} An Empirical Evaluation Framework for Malware Behavior Obfuscation},
  journal      = {CoRR},
  volume       = {abs/1502.03245},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.03245},
  eprinttype    = {arXiv},
  eprint       = {1502.03245},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BanescuWGOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GaneshBO15,
  author       = {Vijay Ganesh and
                  Sebastian Banescu and
                  Mart{\'{\i}}n Ochoa},
  title        = {The Meaning of Attack-Resistant Programs},
  journal      = {CoRR},
  volume       = {abs/1502.04023},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.04023},
  eprinttype    = {arXiv},
  eprint       = {1502.04023},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GaneshBO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuchnerOP15,
  author       = {Tobias W{\"{u}}chner and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  title        = {Robust and Effective Malware Detection through Quantitative Data Flow
                  Graph Metrics},
  journal      = {CoRR},
  volume       = {abs/1502.01609},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.01609},
  eprinttype    = {arXiv},
  eprint       = {1502.01609},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuchnerOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/WenzelPJO14,
  author       = {Sven Wenzel and
                  Daniel Poggenpohl and
                  Jan J{\"{u}}rjens and
                  Mart{\'{\i}}n Ochoa},
  title        = {Specifying model changes with UMLchange to support security verification
                  of potential evolution},
  journal      = {Comput. Stand. Interfaces},
  volume       = {36},
  number       = {4},
  pages        = {776--791},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.csi.2013.12.011},
  doi          = {10.1016/J.CSI.2013.12.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/WenzelPJO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FeldererKKJOPTT14,
  author       = {Michael Felderer and
                  Basel Katt and
                  Philipp Kalb and
                  Jan J{\"{u}}rjens and
                  Mart{\'{\i}}n Ochoa and
                  Federica Paci and
                  Le Minh Sang Tran and
                  Thein Than Tun and
                  Koen Yskout and
                  Riccardo Scandariato and
                  Frank Piessens and
                  Dries Vanoverberghe and
                  Elizabeta Fourneret and
                  Matthias Gander and
                  Bj{\o}rnar Solhaug and
                  Ruth Breu},
  title        = {Evolution of Security Engineering Artifacts: {A} State of the Art
                  Survey},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {48--98},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014100103},
  doi          = {10.4018/IJSSE.2014100103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/FeldererKKJOPTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuchnerOP14,
  author       = {Tobias W{\"{u}}chner and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Malware detection with quantitative data flow graphs},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {271--282},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590319},
  doi          = {10.1145/2590296.2590319},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WuchnerOP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/BartheKMO14,
  author       = {Gilles Barthe and
                  Boris K{\"{o}}pf and
                  Laurent Mauborgne and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Leakage Resilience against Concurrent Cache Attacks},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {140--158},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_8},
  doi          = {10.1007/978-3-642-54792-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/BartheKMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RocchettoOD14,
  author       = {Marco Rocchetto and
                  Mart{\'{\i}}n Ochoa and
                  Mohammad Torabi Dashti},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Model-Based Detection of {CSRF}},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_3},
  doi          = {10.1007/978-3-642-55415-5\_3},
  timestamp    = {Wed, 25 Sep 2019 18:08:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/RocchettoOD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/WuchnerPO14,
  author       = {Tobias W{\"{u}}chner and
                  Alexander Pretschner and
                  Mart{\'{\i}}n Ochoa},
  editor       = {Kirsten Whitley and
                  Sophie Engle and
                  Lane Harrison and
                  Fabian Fischer and
                  Nicolas Prigent},
  title        = {{DAVAST:} data-centric system level activity visualization},
  booktitle    = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris,
                  France, November 10, 2014},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671491.2671499},
  doi          = {10.1145/2671491.2671499},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/WuchnerPO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/BlomeOLPD13,
  author       = {Abian Blome and
                  Mart{\'{\i}}n Ochoa and
                  Keqin Li and
                  Michele Peroli and
                  Mohammad Torabi Dashti},
  title        = {{VERA:} {A} Flexible Model-Based Vulnerability Testing Tool},
  booktitle    = {Sixth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2013, Luxembourg, Luxembourg, March 18-22,
                  2013},
  pages        = {471--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICST.2013.65},
  doi          = {10.1109/ICST.2013.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/BlomeOLPD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Ronderos12,
  author       = {Mart{\'{\i}}n Ochoa Ronderos},
  title        = {Model based security guarantees and change},
  school       = {Dortmund University of Technology},
  year         = {2012},
  url          = {https://hdl.handle.net/2003/29594},
  urn          = {urn:nbn:de:101:1-201605033563},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Ronderos12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/KopfMO12,
  author       = {Boris K{\"{o}}pf and
                  Laurent Mauborgne and
                  Mart{\'{\i}}n Ochoa},
  editor       = {P. Madhusudan and
                  Sanjit A. Seshia},
  title        = {Automatic Quantification of Cache Side-Channels},
  booktitle    = {Computer Aided Verification - 24th International Conference, {CAV}
                  2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7358},
  pages        = {564--580},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31424-7\_40},
  doi          = {10.1007/978-3-642-31424-7\_40},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/KopfMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/OchoaJW12,
  author       = {Mart{\'{\i}}n Ochoa and
                  Jan J{\"{u}}rjens and
                  Daniel Warzecha},
  editor       = {Gilles Barthe and
                  Benjamin Livshits and
                  Riccardo Scandariato},
  title        = {A Sound Decision Procedure for the Compositionality of Secrecy},
  booktitle    = {Engineering Secure Software and Systems - 4th International Symposium,
                  ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7159},
  pages        = {97--105},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28166-2\_10},
  doi          = {10.1007/978-3-642-28166-2\_10},
  timestamp    = {Sat, 19 Oct 2019 20:24:21 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/OchoaJW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/CuellarOR12,
  author       = {Jorge Cu{\'{e}}llar and
                  Mart{\'{\i}}n Ochoa and
                  Ruben Rios},
  editor       = {Sascha Ossowski and
                  Paola Lecca},
  title        = {Indistinguishable regions in geographic privacy},
  booktitle    = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
                  Riva, Trento, Italy, March 26-30, 2012},
  pages        = {1463--1469},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2245276.2232010},
  doi          = {10.1145/2245276.2232010},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/CuellarOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tools/OchoaJC12,
  author       = {Mart{\'{\i}}n Ochoa and
                  Jan J{\"{u}}rjens and
                  Jorge Cu{\'{e}}llar},
  editor       = {Carlo A. Furia and
                  Sebastian Nanz},
  title        = {Non-interference on {UML} State-Charts},
  booktitle    = {Objects, Models, Components, Patterns - 50th International Conference,
                  {TOOLS} 2012, Prague, Czech Republic, May 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7304},
  pages        = {219--235},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30561-0\_16},
  doi          = {10.1007/978-3-642-30561-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/tools/OchoaJC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KopfMO12,
  author       = {Boris K{\"{o}}pf and
                  Laurent Mauborgne and
                  Mart{\'{\i}}n Ochoa},
  title        = {Automatic Quantification of Cache Side-Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KopfMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FourneretOBBJY11,
  author       = {Elizabeta Fourneret and
                  Mart{\'{\i}}n Ochoa and
                  Fabrice Bouquet and
                  Julien Botella and
                  Jan J{\"{u}}rjens and
                  Parvaneh Yousefi},
  title        = {Model-Based Security Verification and Testing for Smart-cards},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {272--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.46},
  doi          = {10.1109/ARES.2011.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FourneretOBBJY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecmdafa/JurjensMOS11,
  author       = {Jan J{\"{u}}rjens and
                  Lo{\"{\i}}c Marchal and
                  Mart{\'{\i}}n Ochoa and
                  Holger Schmidt},
  editor       = {Robert B. France and
                  Jochen Malte K{\"{u}}ster and
                  Behzad Bordbar and
                  Richard F. Paige},
  title        = {Incremental Security Verification for Evolving UMLsec models},
  booktitle    = {Modelling Foundations and Applications - 7th European Conference,
                  {ECMFA} 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6698},
  pages        = {52--68},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21470-7\_5},
  doi          = {10.1007/978-3-642-21470-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ecmdafa/JurjensMOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sfm/JurjensOSMHI11,
  author       = {Jan J{\"{u}}rjens and
                  Mart{\'{\i}}n Ochoa and
                  Holger Schmidt and
                  Lo{\"{\i}}c Marchal and
                  Siv Hilde Houmb and
                  Shareeful Islam},
  editor       = {Marco Bernardo and
                  Val{\'{e}}rie Issarny},
  title        = {Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications},
  booktitle    = {Formal Methods for Eternal Networked Software Systems - 11th International
                  School on Formal Methods for the Design of Computer, Communication
                  and Software Systems, {SFM} 2011, Bertinoro, Italy, June 13-18, 2011.
                  Advanced Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {6659},
  pages        = {504--526},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21455-4\_15},
  doi          = {10.1007/978-3-642-21455-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/sfm/JurjensOSMHI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics