Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "author:Martín_Ochoa:"
@article{DBLP:journals/compsec/WongCOZ23, author = {Ann Yi Wong and Eyasu Getahun Chekole and Mart{\'{\i}}n Ochoa and Jianying Zhou}, title = {On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies}, journal = {Comput. Secur.}, volume = {128}, pages = {103140}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103140}, doi = {10.1016/J.COSE.2023.103140}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WongCOZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LopezSRTFCO23, author = {Christian Lopez and Jes{\'{u}}s Solano and Esteban Rivera and Lizzy Tengana and Johana Florez{-}Lozano and Alejandra Castelblanco and Mart{\'{\i}}n Ochoa}, title = {Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {6}, pages = {1665--1685}, year = {2023}, url = {https://doi.org/10.1007/s10207-023-00711-0}, doi = {10.1007/S10207-023-00711-0}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LopezSRTFCO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BreierHOS23, author = {Jakub Breier and Xiaolu Hou and Mart{\'{\i}}n Ochoa and Jesus Solano}, title = {FooBaR: Fault Fooling Backdoor Attack on Neural Network Training}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {1895--1908}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3166671}, doi = {10.1109/TDSC.2022.3166671}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BreierHOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/OchoaVTB23, author = {Mart{\'{\i}}n Ochoa and Hern{\'{a}}n Vanegas and Jorge Toro{-}Pozo and David A. Basin}, title = {SealClub: Computer-aided Paper Document Authentication}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {163--177}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627176}, doi = {10.1145/3627106.3627176}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/OchoaVTB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinGKNO23, author = {David A. Basin and Juan Guarnizo and Srdan Krstic and Hoang Nguyen Phuoc Bao and Mart{\'{\i}}n Ochoa}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Is Modeling Access Control Worth It?}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2830--2844}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623196}, doi = {10.1145/3576915.3623196}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BasinGKNO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CastelblancoRST22, author = {Alejandra Castelblanco and Esteban Rivera and Jesus Solano and Lizzy Tengana and Christian Lopez and Mart{\'{\i}}n Ochoa}, title = {Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms}, journal = {Comput. Secur.}, volume = {115}, pages = {102629}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102629}, doi = {10.1016/J.COSE.2022.102629}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CastelblancoRST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangHRTO22, author = {Xueou Wang and Xiaolu Hou and Ruben Rios and Nils Ole Tippenhauer and Mart{\'{\i}}n Ochoa}, title = {Constrained Proximity Attacks on Mobile Targets}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {2}, pages = {10:1--10:29}, year = {2022}, url = {https://doi.org/10.1145/3498543}, doi = {10.1145/3498543}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WangHRTO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/RiveraTSLFO22, author = {Esteban Rivera and Lizzy Tengana and Jesus Solano and Christian Lopez and Johana Fl{\'{o}}rez and Mart{\'{\i}}n Ochoa}, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {Scalable and Secure {HTML5} Canvas-Based User Authentication}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, pages = {554--574}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4\_30}, doi = {10.1007/978-3-031-16815-4\_30}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/RiveraTSLFO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SolanoRTLFO22, author = {Jesus Solano and Esteban Rivera and Lizzy Tengana and Christian Lopez and Johana Fl{\'{o}}rez and Mart{\'{\i}}n Ochoa}, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {A Siamese Neural Network for Scalable Behavioral Biometrics Authentication}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, pages = {515--535}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4\_28}, doi = {10.1007/978-3-031-16815-4\_28}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/SolanoRTLFO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AungOZ22, author = {Yan Lin Aung and Mart{\'{\i}}n Ochoa and Jianying Zhou}, editor = {Willy Susilo and Xiaofeng Chen and Fuchun Guo and Yudi Zhang and Rolly Intan}, title = {{ATLAS:} {A} Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence}, booktitle = {Information Security - 25th International Conference, {ISC} 2022, Bali, Indonesia, December 18-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13640}, pages = {319--338}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22390-7\_19}, doi = {10.1007/978-3-031-22390-7\_19}, timestamp = {Mon, 06 Nov 2023 13:38:03 +0100}, biburl = {https://dblp.org/rec/conf/isw/AungOZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-07884, author = {Mart{\'{\i}}n Ochoa and Jorge Toro{-}Pozo and David A. Basin}, title = {SealClub: Computer-aided Paper Document Authentication}, journal = {CoRR}, volume = {abs/2210.07884}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07884}, doi = {10.48550/ARXIV.2210.07884}, eprinttype = {arXiv}, eprint = {2210.07884}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07884.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChekoleOC21, author = {Eyasu Getahun Chekole and Mart{\'{\i}}n Ochoa and Sudipta Chattopadhyay}, title = {{SCOPE:} Secure Compiling of PLCs in Cyber-Physical Systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100431}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100431}, doi = {10.1016/J.IJCIP.2021.100431}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ChekoleOC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SolanoCCDVO21, author = {Jesus Solano and Luis David Camacho and Alejandro Correa and Claudio Deiro and Javier Vargas and Mart{\'{\i}}n Ochoa}, title = {Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {2}, pages = {181--197}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00510-x}, doi = {10.1007/S10207-020-00510-X}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SolanoCCDVO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/AhmedO0M21, author = {Chuadhry Mujeeb Ahmed and Mart{\'{\i}}n Ochoa and Jianying Zhou and Aditya Mathur}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Scanning the Cycle: Timing-based Authentication on PLCs}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {886--900}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453102}, doi = {10.1145/3433210.3453102}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/AhmedO0M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/TenganaSCRLO21, author = {Lizzy Tengana and Jesus Solano and Alejandra Castelblanco and Esteban Rivera and Christian Lopez and Mart{\'{\i}}n Ochoa}, editor = {Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves}, title = {Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, {DIMVA} 2021, Virtual Event, July 14-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12756}, pages = {371--390}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80825-9\_19}, doi = {10.1007/978-3-030-80825-9\_19}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/TenganaSCRLO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CastellanosOCA021, author = {John Henry Castellanos and Mart{\'{\i}}n Ochoa and Alvaro A. C{\'{a}}rdenas and Owen Arden and Jianying Zhou}, editor = {Leyla Bilge and Tudor Dumitras}, title = {AttkFinder: Discovering Attack Vectors in {PLC} Programs using Information Flow Analysis}, booktitle = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021}, pages = {235--250}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3471621.3471864}, doi = {10.1145/3471621.3471864}, timestamp = {Fri, 08 Oct 2021 09:46:25 +0200}, biburl = {https://dblp.org/rec/conf/raid/CastellanosOCA021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-08985, author = {Chuadhry Mujeeb Ahmed and Mart{\'{\i}}n Ochoa and Jianying Zhou and Aditya Mathur}, title = {Scanning the Cycle: Timing-based Authentication on PLCs}, journal = {CoRR}, volume = {abs/2102.08985}, year = {2021}, url = {https://arxiv.org/abs/2102.08985}, eprinttype = {arXiv}, eprint = {2102.08985}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-08985.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-11249, author = {Jakub Breier and Xiaolu Hou and Mart{\'{\i}}n Ochoa and Jesus Solano}, title = {FooBaR: Fault Fooling Backdoor Attack on Neural Network Training}, journal = {CoRR}, volume = {abs/2109.11249}, year = {2021}, url = {https://arxiv.org/abs/2109.11249}, eprinttype = {arXiv}, eprint = {2109.11249}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-11249.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-11475, author = {Ann Yi Wong and Eyasu Getahun Chekole and Mart{\'{\i}}n Ochoa and Jianying Zhou}, title = {Threat Modeling and Security Analysis of Containers: {A} Survey}, journal = {CoRR}, volume = {abs/2111.11475}, year = {2021}, url = {https://arxiv.org/abs/2111.11475}, eprinttype = {arXiv}, eprint = {2111.11475}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-11475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChekoleCOGC20, author = {Eyasu Getahun Chekole and Sudipta Chattopadhyay and Mart{\'{\i}}n Ochoa and Huaqun Guo and Unnikrishnan Cheramangalath}, title = {{CIMA:} Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems}, journal = {Comput. Secur.}, volume = {94}, pages = {101832}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101832}, doi = {10.1016/J.COSE.2020.101832}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChekoleCOGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AhmedMO20, author = {Chuadhry Mujeeb Ahmed and Aditya P. Mathur and Mart{\'{\i}}n Ochoa}, title = {\emph{NoiSense Print}: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {1}, pages = {2:1--2:35}, year = {2020}, url = {https://doi.org/10.1145/3410447}, doi = {10.1145/3410447}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AhmedMO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RiveraTSCLO20, author = {Esteban Rivera and Lizzy Tengana and Jesus Solano and Alejandra Castelblanco and Christian Lopez and Mart{\'{\i}}n Ochoa}, editor = {Jay Ligatti and Xinming Ou}, title = {Risk-based Authentication Based on Network Latency Profiling}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {105--115}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421377}, doi = {10.1145/3411508.3421377}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RiveraTSCLO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SolanoLRCTO20, author = {Jesus Solano and Christian Lopez and Esteban Rivera and Alejandra Castelblanco and Lizzy Tengana and Mart{\'{\i}}n Ochoa}, editor = {Jay Ligatti and Xinming Ou}, title = {{SCRAP:} Synthetically Composed Replay Attacks vs. Adversarial Machine Learning Attacks against Mouse-based Biometric Authentication}, booktitle = {AISec@CCS 2020: Proceedings of the 13th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, USA, 13 November 2020}, pages = {37--47}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411508.3421378}, doi = {10.1145/3411508.3421378}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SolanoLRCTO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcpr2/CastelblancoSLR20, author = {Alejandra Castelblanco and Jesus Solano and Christian Lopez and Esteban Rivera and Lizzy Tengana and Mart{\'{\i}}n Ochoa}, editor = {Karina Mariela Figueroa{-}Mora and Juan Anzurez Mar{\'{\i}}n and Jaime Cerd{\'{a}} Jacobo and Jes{\'{u}}s Ariel Carrasco{-}Ochoa and Jos{\'{e}} Francisco Mart{\'{\i}}nez Trinidad and Jos{\'{e}} Arturo Olvera{-}L{\'{o}}pez}, title = {Machine Learning Techniques for Identity Document Verification in Uncontrolled Environments: {A} Case Study}, booktitle = {Pattern Recognition - 12th Mexican Conference, {MCPR} 2020, Morelia, Mexico, June 24-27, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12088}, pages = {271--281}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49076-8\_26}, doi = {10.1007/978-3-030-49076-8\_26}, timestamp = {Wed, 28 Feb 2024 00:16:32 +0100}, biburl = {https://dblp.org/rec/conf/mcpr2/CastelblancoSLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2020w, editor = {Jianying Zhou and Mauro Conti and Chuadhry Mujeeb Ahmed and Man Ho Au and Lejla Batina and Zhou Li and Jingqiang Lin and Eleonora Losiouk and Bo Luo and Suryadipta Majumdar and Weizhi Meng and Mart{\'{\i}}n Ochoa and Stjepan Picek and Georgios Portokalidis and Cong Wang and Kehuan Zhang}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12418}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61638-0}, doi = {10.1007/978-3-030-61638-0}, isbn = {978-3-030-61637-3}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2020w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-12529, author = {Eyasu Getahun Chekole and Mart{\'{\i}}n Ochoa and Sudipta Chattopadhyay}, title = {{SCOPE:} Secure Compiling of PLCs in Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/2012.12529}, year = {2020}, url = {https://arxiv.org/abs/2012.12529}, eprinttype = {arXiv}, eprint = {2012.12529}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-12529.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/HomoliakTGEO19, author = {Ivan Homoliak and Flavio Toffalini and Juan Guarnizo and Yuval Elovici and Mart{\'{\i}}n Ochoa}, title = {Insight Into Insiders and {IT:} {A} Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures}, journal = {{ACM} Comput. Surv.}, volume = {52}, number = {2}, pages = {30:1--30:40}, year = {2019}, url = {https://doi.org/10.1145/3303771}, doi = {10.1145/3303771}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/HomoliakTGEO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HomoliakTOBHH19, author = {Ivan Homoliak and Martin Teknos and Mart{\'{\i}}n Ochoa and Dominik Breitenbacher and Saeid Hosseini and Petr Han{\'{a}}cek}, title = {Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {17}, pages = {e4}, year = {2019}, url = {https://doi.org/10.4108/eai.10-1-2019.156245}, doi = {10.4108/EAI.10-1-2019.156245}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HomoliakTOBHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/ToffaliniSO19, author = {Flavio Toffalini and Jun Sun and Mart{\'{\i}}n Ochoa}, title = {Practical static analysis of context leaks in Android applications}, journal = {Softw. Pract. Exp.}, volume = {49}, number = {2}, pages = {233--251}, year = {2019}, url = {https://doi.org/10.1002/spe.2659}, doi = {10.1002/SPE.2659}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/ToffaliniSO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuchnerCOP19, author = {Tobias W{\"{u}}chner and Aleksander Cislak and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, title = {Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {99--112}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2675881}, doi = {10.1109/TDSC.2017.2675881}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuchnerCOP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SolanoCCDVO19, author = {Jesus Solano and Luis David Camacho and Alejandro Correa and Claudio Deiro and Javier Vargas and Mart{\'{\i}}n Ochoa}, editor = {Jianying Zhou and Robert H. Deng and Zhou Li and Suryadipta Majumdar and Weizhi Meng and Lingyu Wang and Kehuan Zhang}, title = {Risk-Based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2019 Satellite Workshops, SiMLA, Cloud S{\&}P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11605}, pages = {3--23}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29729-9\_1}, doi = {10.1007/978-3-030-29729-9\_1}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SolanoCCDVO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/TambeASOTSE19, author = {Amit Tambe and Yan Lin Aung and Ragav Sridharan and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Asaf Shabtai and Yuval Elovici}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {85--96}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300024}, doi = {10.1145/3292006.3300024}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/TambeASOTSE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ToffaliniO0019, author = {Flavio Toffalini and Mart{\'{\i}}n Ochoa and Jun Sun and Jianying Zhou}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Careful-Packing: {A} Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {231--242}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300029}, doi = {10.1145/3292006.3300029}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ToffaliniO0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2019, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2}, doi = {10.1007/978-3-030-21568-2}, isbn = {978-3-030-21567-5}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HallgrenKOS18, author = {Per A. Hallgren and Ravi Kishore and Mart{\'{\i}}n Ochoa and Andrei Sabelfeld}, title = {Assuring BetterTimes}, journal = {J. Comput. Secur.}, volume = {26}, number = {4}, pages = {557--587}, year = {2018}, url = {https://doi.org/10.3233/JCS-171085}, doi = {10.3233/JCS-171085}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HallgrenKOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HarilalTHCGMO18, author = {Athul Harilal and Flavio Toffalini and Ivan Homoliak and John Henry Castellanos and Juan Guarnizo and Soumik Mondal and Mart{\'{\i}}n Ochoa}, title = {The Wolf Of {SUTD} {(TWOS):} {A} Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {1}, pages = {54--85}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.03.31.054}, doi = {10.22667/JOWUA.2018.03.31.054}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/HarilalTHCGMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CastellanosO018, author = {John Henry Castellanos and Mart{\'{\i}}n Ochoa and Jianying Zhou}, title = {Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {582--594}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274745}, doi = {10.1145/3274694.3274745}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/CastellanosO018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhmedOZMQMR18, author = {Chuadhry Mujeeb Ahmed and Mart{\'{\i}}n Ochoa and Jianying Zhou and Aditya P. Mathur and Rizwan Qadeer and Carlos Murguia and Justin Ruths}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {\emph{NoisePrint}: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {483--497}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196532}, doi = {10.1145/3196494.3196532}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AhmedOZMQMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangHRHTO18, author = {Xueou Wang and Xiaolu Hou and Ruben Rios and Per A. Hallgren and Nils Ole Tippenhauer and Mart{\'{\i}}n Ochoa}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {373--392}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_19}, doi = {10.1007/978-3-319-98989-1\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangHRHTO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/ChekoleCOG18, author = {Eyasu Getahun Chekole and Sudipta Chattopadhyay and Mart{\'{\i}}n Ochoa and Huaqun Guo}, editor = {Mathias Payer and Awais Rashid and Jose M. Such}, title = {Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems}, booktitle = {Engineering Secure Software and Systems - 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10953}, pages = {9--26}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94496-8\_2}, doi = {10.1007/978-3-319-94496-8\_2}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/ChekoleCOG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ToffaliniSO18, author = {Flavio Toffalini and Jun Sun and Mart{\'{\i}}n Ochoa}, editor = {Frances Paulisch and Jan Bosch}, title = {Static analysis of context leaks in android applications}, booktitle = {Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, {ICSE} {(SEIP)} 2018, Gothenburg, Sweden, May 27 - June 03, 2018}, pages = {215--224}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3183519.3183530}, doi = {10.1145/3183519.3183530}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/ToffaliniSO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ToffaliniHHBO18, author = {Flavio Toffalini and Ivan Homoliak and Athul Harilal and Alexander Binder and Mart{\'{\i}}n Ochoa}, title = {Detection of Masqueraders Based on Graph Partitioning of File System Access Events}, booktitle = {2018 {IEEE} Security and Privacy Workshops, {SP} Workshops 2018, San Francisco, CA, USA, May 24, 2018}, pages = {217--227}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SPW.2018.00037}, doi = {10.1109/SPW.2018.00037}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ToffaliniHHBO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-01612, author = {Ivan Homoliak and Flavio Toffalini and Juan Guarnizo and Yuval Elovici and Mart{\'{\i}}n Ochoa}, title = {Insight into Insiders: {A} Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures}, journal = {CoRR}, volume = {abs/1805.01612}, year = {2018}, url = {http://arxiv.org/abs/1805.01612}, eprinttype = {arXiv}, eprint = {1805.01612}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-01612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-02684, author = {Ivan Homoliak and Martin Teknos and Mart{\'{\i}}n Ochoa and Dominik Breitenbacher and Saeid Hosseini and Petr Han{\'{a}}cek}, title = {Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach}, journal = {CoRR}, volume = {abs/1805.02684}, year = {2018}, url = {http://arxiv.org/abs/1805.02684}, eprinttype = {arXiv}, eprint = {1805.02684}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-02684.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-07477, author = {Eyasu Getahun Chekole and Unnikrishnan Cheramangalath and Sudipta Chattopadhyay and Mart{\'{\i}}n Ochoa and Huaqun Guo}, title = {Taming the War in Memory: {A} Resilient Mitigation Strategy Against Memory Safety Attacks in {CPS}}, journal = {CoRR}, volume = {abs/1809.07477}, year = {2018}, url = {http://arxiv.org/abs/1809.07477}, eprinttype = {arXiv}, eprint = {1809.07477}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-07477.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/JimenezOR17, author = {Lina M. Jimenez and Mart{\'{\i}}n Ochoa and Sandra Julieta Rueda}, title = {Jif-Based Verification of Information Flow Policies for Android Apps}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {1}, pages = {28--42}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017010102}, doi = {10.4018/IJSSE.2017010102}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/JimenezOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CastellanosATO17, author = {John Henry Castellanos and Daniele Antonioli and Nils Ole Tippenhauer and Mart{\'{\i}}n Ochoa}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Legacy-Compliant Data Authentication for Industrial Control System Traffic}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {665--685}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_33}, doi = {10.1007/978-3-319-61204-1\_33}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/CastellanosATO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AntonioliGAOT17, author = {Daniele Antonioli and Hamid Reza Ghaeini and Sridhar Adepu and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer}, editor = {Bhavani Thuraisingham and Rakesh B. Bobba and Awais Rashid}, title = {Gamifying {ICS} Security Training and Research: Design, Implementation, and Results of {S3}}, booktitle = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017}, pages = {93--102}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140241.3140253}, doi = {10.1145/3140241.3140253}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AntonioliGAOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuarnizoTBOTSE17, author = {Juan David Guarnizo and Amit Tambe and Suman Sankar Bhunia and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Asaf Shabtai and Yuval Elovici}, editor = {Jianying Zhou and Ernesto Damiani}, title = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {57--68}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055186.3055192}, doi = {10.1145/3055186.3055192}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuarnizoTBOTSE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HarilalTCGHO17, author = {Athul Harilal and Flavio Toffalini and John Henry Castellanos and Juan Guarnizo and Ivan Homoliak and Mart{\'{\i}}n Ochoa}, title = {{TWOS:} {A} Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {45--56}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139929}, doi = {10.1145/3139923.3139929}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HarilalTCGHO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MorrisMO17, author = {Eric Rothstein Morris and Carlos G. Murguia and Mart{\'{\i}}n Ochoa}, title = {Design-time Quantification of Integrity in Cyber-physical Systems}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {63--74}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139347}, doi = {10.1145/3139337.3139347}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MorrisMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChekoleCOY17, author = {Eyasu Getahun Chekole and John Henry Castellanos and Mart{\'{\i}}n Ochoa and David K. Y. Yau}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Enforcing Memory Safety in Cyber-Physical Systems}, booktitle = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, pages = {127--144}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72817-9\_9}, doi = {10.1007/978-3-319-72817-9\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChekoleCOY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/OchoaBDBG17, author = {Mart{\'{\i}}n Ochoa and Sebastian Banescu and Cynthia Disenfeld and Gilles Barthe and Vijay Ganesh}, title = {Reasoning about Probabilistic Defense Mechanisms against Remote Attacks}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {499--513}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.30}, doi = {10.1109/EUROSP.2017.30}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/OchoaBDBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/MeidanBSGOTE17, author = {Yair Meidan and Michael Bohadana and Asaf Shabtai and Juan David Guarnizo and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Yuval Elovici}, editor = {Ahmed Seffah and Birgit Penzenstadler and Carina Alves and Xin Peng}, title = {ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis}, booktitle = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech, Morocco, April 3-7, 2017}, pages = {506--509}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3019612.3019878}, doi = {10.1145/3019612.3019878}, timestamp = {Wed, 01 Feb 2023 17:58:48 +0100}, biburl = {https://dblp.org/rec/conf/sac/MeidanBSGOTE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AntonioliGAOT17, author = {Daniele Antonioli and Hamid Reza Ghaeini and Sridhar Adepu and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer}, title = {Gamifying Education and Research on {ICS} Security: Design, Implementation and Results of {S3}}, journal = {CoRR}, volume = {abs/1702.03067}, year = {2017}, url = {http://arxiv.org/abs/1702.03067}, eprinttype = {arXiv}, eprint = {1702.03067}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AntonioliGAOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GuarnizoTBOTSE17, author = {Juan Guarnizo and Amit Tambe and Suman Sankar Bhunia and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Asaf Shabtai and Yuval Elovici}, title = {{SIPHON:} Towards Scalable High-Interaction Physical Honeypots}, journal = {CoRR}, volume = {abs/1701.02446}, year = {2017}, url = {http://arxiv.org/abs/1701.02446}, eprinttype = {arXiv}, eprint = {1701.02446}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GuarnizoTBOTSE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/OchoaBDBG17, author = {Mart{\'{\i}}n Ochoa and Sebastian Banescu and Cynthia Disenfeld and Gilles Barthe and Vijay Ganesh}, title = {Reasoning about Probabilistic Defense Mechanisms against Remote Attacks}, journal = {CoRR}, volume = {abs/1701.06743}, year = {2017}, url = {http://arxiv.org/abs/1701.06743}, eprinttype = {arXiv}, eprint = {1701.06743}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/OchoaBDBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-04798, author = {Eric Rothstein Morris and Carlos G. Murguia and Mart{\'{\i}}n Ochoa}, title = {Design-Time Quantification of Integrity in Cyber-Physical-Systems}, journal = {CoRR}, volume = {abs/1708.04798}, year = {2017}, url = {http://arxiv.org/abs/1708.04798}, eprinttype = {arXiv}, eprint = {1708.04798}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-04798.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-04647, author = {Yair Meidan and Michael Bohadana and Asaf Shabtai and Mart{\'{\i}}n Ochoa and Nils Ole Tippenhauer and Juan David Guarnizo and Yuval Elovici}, title = {Detection of Unauthorized IoT Devices Using Machine Learning Techniques}, journal = {CoRR}, volume = {abs/1709.04647}, year = {2017}, url = {http://arxiv.org/abs/1709.04647}, eprinttype = {arXiv}, eprint = {1709.04647}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-04647.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-01598, author = {Chuadhry Mujeeb Ahmed and Aditya Mathur and Mart{\'{\i}}n Ochoa}, title = {NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints}, journal = {CoRR}, volume = {abs/1712.01598}, year = {2017}, url = {http://arxiv.org/abs/1712.01598}, eprinttype = {arXiv}, eprint = {1712.01598}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-01598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HallgrenOS16, author = {Per A. Hallgren and Mart{\'{\i}}n Ochoa and Andrei Sabelfeld}, title = {MaxPace: Speed-constrained location queries}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {136--144}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860479}, doi = {10.1109/CNS.2016.7860479}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/HallgrenOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/LovatOP16, author = {Enrico Lovat and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, editor = {Juan Caballero and Eric Bodden and Elias Athanasopoulos}, title = {Sound and Precise Cross-Layer Data Flow Tracking}, booktitle = {Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9639}, pages = {38--55}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30806-7\_3}, doi = {10.1007/978-3-319-30806-7\_3}, timestamp = {Tue, 01 Jun 2021 15:22:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/LovatOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/OgnawalaOPL16, author = {Saahil Ognawala and Mart{\'{\i}}n Ochoa and Alexander Pretschner and Tobias Limmer}, editor = {David Lo and Sven Apel and Sarfraz Khurshid}, title = {{MACKE:} compositional analysis of low-level vulnerabilities with symbolic execution}, booktitle = {Proceedings of the 31st {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2016, Singapore, September 3-7, 2016}, pages = {780--785}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2970276.2970281}, doi = {10.1145/2970276.2970281}, timestamp = {Sat, 30 Sep 2023 09:51:40 +0200}, biburl = {https://dblp.org/rec/conf/kbse/OgnawalaOPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/WuchnerOLP16, author = {Tobias W{\"{u}}chner and Mart{\'{\i}}n Ochoa and Enrico Lovat and Alexander Pretschner}, title = {Generating behavior-based malware detection models with genetic programming}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {506--511}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7907008}, doi = {10.1109/PST.2016.7907008}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/WuchnerOLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/WuchnerOGSSP16, author = {Tobias W{\"{u}}chner and Mart{\'{\i}}n Ochoa and Mojdeh Golagha and Gaurav Srivastava and Thomas Schreck and Alexander Pretschner}, editor = {Sascha Ossowski}, title = {MalFlow: identification of C{\&}C servers through host-based data flow profiling}, booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016}, pages = {2087--2094}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2851613.2851802}, doi = {10.1145/2851613.2851802}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/WuchnerOGSSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/WenzelPJO16, author = {Sven Wenzel and Daniel Poggenpohl and Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa}, editor = {Jens Knoop and Uwe Zdun}, title = {Umlchange - specifying model changes to support security verification of potential evolution}, booktitle = {Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik, 23.-26. Februar 2016, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-252}}, pages = {91--92}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/738}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/WenzelPJO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AhmadvandSOP16, author = {Mohsen Ahmadvand and Antoine Scemama and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Enhancing Operation Security using Secret Sharing}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {446--451}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005992104460451}, doi = {10.5220/0005992104460451}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/AhmadvandSOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/CastellanosWOR16, author = {John Henry Castellanos and Tobias W{\"{u}}chner and Mart{\'{\i}}n Ochoa and Sandra Julieta Rueda}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Q-Floid: Android Malware detection with Quantitative Data Flow Graphs}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {13--25}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-13}, doi = {10.3233/978-1-61499-617-0-13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/CastellanosWOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WuchnerOP15, author = {Tobias W{\"{u}}chner and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, editor = {Magnus Almgren and Vincenzo Gulisano and Federico Maggi}, title = {Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, {DIMVA} 2015, Milan, Italy, July 9-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9148}, pages = {98--118}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20550-2\_6}, doi = {10.1007/978-3-319-20550-2\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WuchnerOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/GaneshBO15, author = {Vijay Ganesh and Sebastian Banescu and Mart{\'{\i}}n Ochoa}, editor = {Michael Clarkson and Limin Jia}, title = {Short Paper: The Meaning of Attack-Resistant Systems}, booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, pages = {49--55}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558.2786562}, doi = {10.1145/2786558.2786562}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/GaneshBO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/BanescuOKP15, author = {Sebastian Banescu and Mart{\'{\i}}n Ochoa and Nils Kunze and Alexander Pretschner}, editor = {Frank Piessens and Juan Caballero and Nataliia Bielova}, title = {Idea: Benchmarking Indistinguishability Obfuscation - {A} Candidate Implementation}, booktitle = {Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8978}, pages = {149--156}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-15618-7\_12}, doi = {10.1007/978-3-319-15618-7\_12}, timestamp = {Mon, 01 May 2023 13:01:13 +0200}, biburl = {https://dblp.org/rec/conf/essos/BanescuOKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/OchoaCPH15, author = {Mart{\'{\i}}n Ochoa and Jorge Cu{\'{e}}llar and Alexander Pretschner and Per A. Hallgren}, editor = {Frank Piessens and Juan Caballero and Nataliia Bielova}, title = {Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs}, booktitle = {Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8978}, pages = {34--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-15618-7\_3}, doi = {10.1007/978-3-319-15618-7\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/essos/OchoaCPH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BanescuOP15, author = {Sebastian Banescu and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, editor = {Paolo Falcarin and Brecht Wyseur}, title = {A Framework for Measuring Software Obfuscation Resilience against Automated Attacks}, booktitle = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO} 2015, Florence, Italy, May 19, 2015}, pages = {45--51}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SPRO.2015.16}, doi = {10.1109/SPRO.2015.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BanescuOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/BanescuWSGOP15, author = {Sebastian Banescu and Tobias W{\"{u}}chner and Aleieldin Salem and Marius Guggenmos and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, title = {A framework for empirical evaluation of malware detection resilience against behavior obfuscation}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {40--47}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413683}, doi = {10.1109/MALWARE.2015.7413683}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/BanescuWSGOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/HallgrenOS15, author = {Per A. Hallgren and Mart{\'{\i}}n Ochoa and Andrei Sabelfeld}, editor = {Man Ho Au and Atsuko Miyaji}, title = {BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {291--309}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_16}, doi = {10.1007/978-3-319-26059-4\_16}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/HallgrenOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HallgrenOS15, author = {Per A. Hallgren and Mart{\'{\i}}n Ochoa and Andrei Sabelfeld}, editor = {Ali A. Ghorbani and Vicen{\c{c}} Torra and H{\"{u}}seyin Hisil and Ali Miri and Ahmet Koltuksuz and Jie Zhang and Murat Sensoy and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ibrahim Zincir}, title = {InnerCircle: {A} parallelizable decentralized privacy-preserving location proximity protocol}, booktitle = {13th Annual Conference on Privacy, Security and Trust, {PST} 2015, Izmir, Turkey, July 21-23, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PST.2015.7232947}, doi = {10.1109/PST.2015.7232947}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/HallgrenOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BanescuWGOP15, author = {Sebastian Banescu and Tobias W{\"{u}}chner and Marius Guggenmos and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, title = {{FEEBO:} An Empirical Evaluation Framework for Malware Behavior Obfuscation}, journal = {CoRR}, volume = {abs/1502.03245}, year = {2015}, url = {http://arxiv.org/abs/1502.03245}, eprinttype = {arXiv}, eprint = {1502.03245}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BanescuWGOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GaneshBO15, author = {Vijay Ganesh and Sebastian Banescu and Mart{\'{\i}}n Ochoa}, title = {The Meaning of Attack-Resistant Programs}, journal = {CoRR}, volume = {abs/1502.04023}, year = {2015}, url = {http://arxiv.org/abs/1502.04023}, eprinttype = {arXiv}, eprint = {1502.04023}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GaneshBO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuchnerOP15, author = {Tobias W{\"{u}}chner and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, title = {Robust and Effective Malware Detection through Quantitative Data Flow Graph Metrics}, journal = {CoRR}, volume = {abs/1502.01609}, year = {2015}, url = {http://arxiv.org/abs/1502.01609}, eprinttype = {arXiv}, eprint = {1502.01609}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuchnerOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WenzelPJO14, author = {Sven Wenzel and Daniel Poggenpohl and Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa}, title = {Specifying model changes with UMLchange to support security verification of potential evolution}, journal = {Comput. Stand. Interfaces}, volume = {36}, number = {4}, pages = {776--791}, year = {2014}, url = {https://doi.org/10.1016/j.csi.2013.12.011}, doi = {10.1016/J.CSI.2013.12.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/WenzelPJO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FeldererKKJOPTT14, author = {Michael Felderer and Basel Katt and Philipp Kalb and Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa and Federica Paci and Le Minh Sang Tran and Thein Than Tun and Koen Yskout and Riccardo Scandariato and Frank Piessens and Dries Vanoverberghe and Elizabeta Fourneret and Matthias Gander and Bj{\o}rnar Solhaug and Ruth Breu}, title = {Evolution of Security Engineering Artifacts: {A} State of the Art Survey}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {4}, pages = {48--98}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014100103}, doi = {10.4018/IJSSE.2014100103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FeldererKKJOPTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuchnerOP14, author = {Tobias W{\"{u}}chner and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Malware detection with quantitative data flow graphs}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {271--282}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590319}, doi = {10.1145/2590296.2590319}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuchnerOP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/BartheKMO14, author = {Gilles Barthe and Boris K{\"{o}}pf and Laurent Mauborgne and Mart{\'{\i}}n Ochoa}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Leakage Resilience against Concurrent Cache Attacks}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {140--158}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_8}, doi = {10.1007/978-3-642-54792-8\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/BartheKMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/RocchettoOD14, author = {Marco Rocchetto and Mart{\'{\i}}n Ochoa and Mohammad Torabi Dashti}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {Model-Based Detection of {CSRF}}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {30--43}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_3}, doi = {10.1007/978-3-642-55415-5\_3}, timestamp = {Wed, 25 Sep 2019 18:08:09 +0200}, biburl = {https://dblp.org/rec/conf/sec/RocchettoOD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/WuchnerPO14, author = {Tobias W{\"{u}}chner and Alexander Pretschner and Mart{\'{\i}}n Ochoa}, editor = {Kirsten Whitley and Sophie Engle and Lane Harrison and Fabian Fischer and Nicolas Prigent}, title = {{DAVAST:} data-centric system level activity visualization}, booktitle = {11th Workshop on Visualization for Cyber Security, VizSec 2014, Paris, France, November 10, 2014}, pages = {25--32}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671491.2671499}, doi = {10.1145/2671491.2671499}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/WuchnerPO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/BlomeOLPD13, author = {Abian Blome and Mart{\'{\i}}n Ochoa and Keqin Li and Michele Peroli and Mohammad Torabi Dashti}, title = {{VERA:} {A} Flexible Model-Based Vulnerability Testing Tool}, booktitle = {Sixth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2013, Luxembourg, Luxembourg, March 18-22, 2013}, pages = {471--478}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICST.2013.65}, doi = {10.1109/ICST.2013.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/BlomeOLPD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Ronderos12, author = {Mart{\'{\i}}n Ochoa Ronderos}, title = {Model based security guarantees and change}, school = {Dortmund University of Technology}, year = {2012}, url = {https://hdl.handle.net/2003/29594}, urn = {urn:nbn:de:101:1-201605033563}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Ronderos12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/KopfMO12, author = {Boris K{\"{o}}pf and Laurent Mauborgne and Mart{\'{\i}}n Ochoa}, editor = {P. Madhusudan and Sanjit A. Seshia}, title = {Automatic Quantification of Cache Side-Channels}, booktitle = {Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7358}, pages = {564--580}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31424-7\_40}, doi = {10.1007/978-3-642-31424-7\_40}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/KopfMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/OchoaJW12, author = {Mart{\'{\i}}n Ochoa and Jan J{\"{u}}rjens and Daniel Warzecha}, editor = {Gilles Barthe and Benjamin Livshits and Riccardo Scandariato}, title = {A Sound Decision Procedure for the Compositionality of Secrecy}, booktitle = {Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7159}, pages = {97--105}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28166-2\_10}, doi = {10.1007/978-3-642-28166-2\_10}, timestamp = {Sat, 19 Oct 2019 20:24:21 +0200}, biburl = {https://dblp.org/rec/conf/essos/OchoaJW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/CuellarOR12, author = {Jorge Cu{\'{e}}llar and Mart{\'{\i}}n Ochoa and Ruben Rios}, editor = {Sascha Ossowski and Paola Lecca}, title = {Indistinguishable regions in geographic privacy}, booktitle = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012, Riva, Trento, Italy, March 26-30, 2012}, pages = {1463--1469}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2245276.2232010}, doi = {10.1145/2245276.2232010}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/CuellarOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tools/OchoaJC12, author = {Mart{\'{\i}}n Ochoa and Jan J{\"{u}}rjens and Jorge Cu{\'{e}}llar}, editor = {Carlo A. Furia and Sebastian Nanz}, title = {Non-interference on {UML} State-Charts}, booktitle = {Objects, Models, Components, Patterns - 50th International Conference, {TOOLS} 2012, Prague, Czech Republic, May 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7304}, pages = {219--235}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30561-0\_16}, doi = {10.1007/978-3-642-30561-0\_16}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/tools/OchoaJC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KopfMO12, author = {Boris K{\"{o}}pf and Laurent Mauborgne and Mart{\'{\i}}n Ochoa}, title = {Automatic Quantification of Cache Side-Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2012}, url = {http://eprint.iacr.org/2012/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KopfMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FourneretOBBJY11, author = {Elizabeta Fourneret and Mart{\'{\i}}n Ochoa and Fabrice Bouquet and Julien Botella and Jan J{\"{u}}rjens and Parvaneh Yousefi}, title = {Model-Based Security Verification and Testing for Smart-cards}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {272--279}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.46}, doi = {10.1109/ARES.2011.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/FourneretOBBJY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecmdafa/JurjensMOS11, author = {Jan J{\"{u}}rjens and Lo{\"{\i}}c Marchal and Mart{\'{\i}}n Ochoa and Holger Schmidt}, editor = {Robert B. France and Jochen Malte K{\"{u}}ster and Behzad Bordbar and Richard F. Paige}, title = {Incremental Security Verification for Evolving UMLsec models}, booktitle = {Modelling Foundations and Applications - 7th European Conference, {ECMFA} 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6698}, pages = {52--68}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21470-7\_5}, doi = {10.1007/978-3-642-21470-7\_5}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/ecmdafa/JurjensMOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sfm/JurjensOSMHI11, author = {Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa and Holger Schmidt and Lo{\"{\i}}c Marchal and Siv Hilde Houmb and Shareeful Islam}, editor = {Marco Bernardo and Val{\'{e}}rie Issarny}, title = {Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications}, booktitle = {Formal Methods for Eternal Networked Software Systems - 11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, {SFM} 2011, Bertinoro, Italy, June 13-18, 2011. Advanced Lectures}, series = {Lecture Notes in Computer Science}, volume = {6659}, pages = {504--526}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21455-4\_15}, doi = {10.1007/978-3-642-21455-4\_15}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/sfm/JurjensOSMHI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.