default search action
Jorge Blasco Alís
Person information
- affiliation: Royal Holloway, University of London
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Jason Gray, Daniele Sgandurra, Lorenzo Cavallaro, Jorge Blasco Alís:
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets. ACM Comput. Surv. 56(8): 212:1-212:36 (2024) - [c23]Aakanksha Saha, Jorge Blasco, Martina Lindorfer:
Exploring the Malicious Document Threat Landscape: Towards a Systematic Approach to Detection and Analysis. EuroS&P Workshops 2024: 533-544 - [c22]Marcos Tileria, Jorge Blasco, Santanu Kumar Dash:
DocFlow: Extracting Taint Specifications from Software Documentation. ICSE 2024: 61:1-61:12 - [c21]Aakanksha Saha, Jorge Blasco, Lorenzo Cavallaro, Martina Lindorfer:
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files. RAID 2024: 114-129 - [c20]Giuseppe Raffa, Jorge Blasco, Daniel O'Keeffe, Santanu Kumar Dash:
Towards Inter-Service Data Flow Analysis of Serverless Applications. SANER 2024: 654-658 - 2023
- [c19]Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco:
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. AsiaCCS 2023: 1004-1015 - [c18]Giuseppe Raffa, Jorge Blasco Alís, Daniel O'Keeffe, Santanu Kumar Dash:
AWSomePy: A Dataset and Characterization of Serverless Applications. SESAME@EuroSys 2023: 50-56 - 2022
- [j18]Michal Tereszkowski-Kaminski, Sergio Pastrana, Jorge Blasco, Guillermo Suarez-Tangil:
Towards Improving Code Stylometry Analysis in Underground Forums. Proc. Priv. Enhancing Technol. 2022(1): 126-147 (2022) - [j17]Marcos Tileria, Jorge Blasco:
Watch Over Your TV: A Security and Privacy Analysis of the Android TV Ecosystem. Proc. Priv. Enhancing Technol. 2022(3): 692-710 (2022) - [c17]Qingchuan Zhao, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin:
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals. AsiaCCS 2022: 521-533 - 2021
- [c16]Pallavi Sivakumaran, Jorge Blasco:
argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries. ACSAC 2021: 861-876 - [c15]Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková:
Mesh Messaging in Large-Scale Protests: Breaking Bridgefy. CT-RSA 2021: 375-398 - [c14]Panicos Karkallis, Jorge Blasco, Guillermo Suarez-Tangil, Sergio Pastrana:
Detecting Video-Game Injectors Exchanged in Game Cheating Communities. ESORICS (1) 2021: 305-324 - [c13]Pallavi Sivakumaran, Jorge Blasco:
Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy. SecureComm (2) 2021: 252-272 - [c12]Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková:
Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. USENIX Security Symposium 2021: 3363-3380 - [i6]Pallavi Sivakumaran, Jorge Blasco:
argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Binaries. CoRR abs/2105.03135 (2021) - [i5]Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková:
Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. CoRR abs/2105.14869 (2021) - [i4]Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, Lenka Mareková:
Mesh Messaging in Large-scale Protests: Breaking Bridgefy. IACR Cryptol. ePrint Arch. 2021: 214 (2021) - 2020
- [j16]Laura Shipp, Jorge Blasco:
How private is your period?: A systematic analysis of menstrual app privacy policies. Proc. Priv. Enhancing Technol. 2020(4): 491-510 (2020) - [c11]Marcos Tileria, Jorge Blasco, Guillermo Suarez-Tangil:
WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS. RAID 2020: 63-75
2010 – 2019
- 2019
- [c10]Pallavi Sivakumaran, Jorge Blasco:
A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape. USENIX Security Symposium 2019: 1-18 - [p2]Jorge Blasco, Thomas M. Chen, Harsh Kupwade Patil, Daniel Wolff:
Wearables Security and Privacy. Mission-Oriented Sensor Networks and Systems (2) 2019: 351-380 - [p1]Thomas M. Chen, Jorge Blasco, Harsh Kupwade Patil:
Cryptography in WSNs. Mission-Oriented Sensor Networks and Systems (1) 2019: 783-820 - 2018
- [j15]Jorge Blasco, Thomas M. Chen, Igor Muttik, Markus Roggenbach:
Detection of app collusion potential using logic programming. J. Netw. Comput. Appl. 105: 88-104 (2018) - [j14]Carlos Alario-Hoyos, Jorge Ruiz-Magaña, Jorge Blasco, Iria Estévez-Ayres, Jesús M. Gallego-Romero, Carlos Delgado Kloos, M. Carmen Fernández Panadero, Raquel M. Crespo García, Florina Almenáres, María-Blanca Ibáñez-Espiga, Julio Villena-Román:
A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes. J. Univers. Comput. Sci. 24(8): 1015-1033 (2018) - [j13]Jorge Blasco, Pedro Peris-Lopez:
On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification. Sensors 18(9): 2782 (2018) - [j12]Jorge Blasco, Thomas M. Chen:
Automated generation of colluding apps for experimental research. J. Comput. Virol. Hacking Tech. 14(2): 127-138 (2018) - [c9]Pallavi Sivakumaran, Jorge Blasco Alís:
A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals. CODASPY 2018: 152-154 - [c8]Jorge Blasco, Elizabeth A. Quaglia:
InfoSec Cinema: Using Films for Information Security Teaching. ASE @ USENIX Security Symposium 2018 - [i3]Pallavi Sivakumaran, Jorge Blasco:
Attacks Against BLE Devices by Co-located Mobile Applications. CoRR abs/1808.03778 (2018) - 2017
- [i2]Jorge Blasco, Thomas M. Chen, Igor Muttik, Markus Roggenbach:
Detection of App Collusion Potential Using Logic Programming. CoRR abs/1706.02387 (2017) - 2016
- [j11]Jorge Blasco, Thomas M. Chen, Juan E. Tapiador, Pedro Peris-Lopez:
A Survey of Wearable Biometric Recognition Systems. ACM Comput. Surv. 49(3): 43:1-43:35 (2016) - [j10]Jameel Qadri, Thomas M. Chen, Jorge Blasco:
A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices. Int. J. Cyber Situational Aware. 1(1): 210-230 (2016) - [c7]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. IMPS@ESSoS 2016: 29-37 - [i1]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. CoRR abs/1603.02308 (2016) - 2015
- [j9]Jorge Blasco Alís, Juan E. Tapiador, Pedro Peris-Lopez, Guillermo Suarez-Tangil:
Hindering data theft with encrypted data trees. J. Syst. Softw. 101: 147-158 (2015) - 2014
- [j8]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Jorge Blasco Alís:
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families. Expert Syst. Appl. 41(4): 1104-1117 (2014) - [j7]José María de Fuentes, Jorge Blasco Alís, Ana Isabel González-Tablas Ferreres, Lorena González-Manzano:
Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles. Int. J. Distributed Sens. Networks 10 (2014) - [c6]Jorge Blasco Alís, Roberto Di Pietro, Agustín Orfila, Alessandro Sorniotti:
A tunable proof of ownership scheme for deduplication using Bloom filters. CNS 2014: 481-489 - 2013
- [j6]José María de Fuentes, Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, Jorge Blasco Alís:
WEVAN - A mechanism for evidence creation and verification in VANETs. J. Syst. Archit. 59(10-B): 985-995 (2013) - 2012
- [j5]Jorge Blasco Alís, Julio César Hernández Castro, Juan E. Tapiador, Arturo Ribagorda:
Bypassing information leakage protection with trusted applications. Comput. Secur. 31(4): 557-568 (2012) - [j4]Jorge Blasco Alís, Julio César Hernández Castro, José María de Fuentes, Benjamín Ramos:
A framework for avoiding steganography usage over HTTP. J. Netw. Comput. Appl. 35(1): 491-501 (2012) - 2011
- [j3]Hugo Gascon, Agustín Orfila, Jorge Blasco Alís:
Analysis of update delays in signature-based network intrusion detection systems. Comput. Secur. 30(8): 613-624 (2011) - 2010
- [c5]Jorge Blasco Alís, Agustín Orfila, Arturo Ribagorda:
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming. ARES 2010: 327-332 - [c4]Elena Castro Galán, Almudena Alcaide, Agustín Orfila, Jorge Blasco Alís:
A multi-agent scanner to detect stored-XSS vulnerabilities. ICITST 2010: 1-6
2000 – 2009
- 2009
- [c3]Guillermo Suarez-Tangil, Esther Palomar, José María de Fuentes, Jorge Blasco Alís, Arturo Ribagorda:
Automatic Rule Generation Based on Genetic Programming for Event Correlation. CISIS 2009: 127-134 - [c2]Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros:
Steganalysis of Hydan. SEC 2009: 132-142 - 2008
- [c1]Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho:
CSteg: Talking in C Code - Steganography of C Source Code in Text. SECRYPT 2008: 399-406 - 2007
- [j2]A. German, M. Espino, Jorge Blasco, Manuel Maidana:
Finite element modelling of the thermal outflow of three power plants in Huelva Estuary. Adv. Eng. Softw. 38(6): 379-385 (2007) - 2003
- [j1]Jose Abad, Agustin Badenes, Jorge Blasco, Judit Carreras, Victor Dominguez, Chano Gomez, Salvador Iranzo, Juan Carlos Riveiro, David Ruiz, Luis Manuel Torres, Jose Comabella:
Extending the power line LAN up to the neighborhood transformer. IEEE Commun. Mag. 41(4): 64-70 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint