Novella Lorente, Eduardo Pablo(Universitat Politècnica de València, 2013-09-12)
This paper presents a security analysis of the online banking system of
one of the most important banks of the Netherlands. New security devices
have been designed in order to authorize transactions in a handy and ...
Argente Garrigós, Clara(Universitat Politècnica de València, 2019-10-15)
[ES] Hay estimaciones que sugieren que el coste por delitos cibernéticos va a ser
de 6 billones de dólares de forma anual hasta el 2021. La protección de la información y la infraestructura informática es una prioridad ...
García Martínez, José Vicente(Universitat Politècnica de València, 2012-10-30)
The purpose of this project is to analyze the requirements, prepare the
technologic environment and perform the deployment of a Digital Repository
to improve the information processes of an organization.
Villalón-Huerta, Antonio; Marco-Gisbert, Héctor; Ripoll-Ripoll, Ismael(Institute of Electrical and Electronics Engineers, 2022)
[EN] Different kill chain models have been defined and analyzed to provide a common sequence of actions followed in offensive cyber operations. These models allow analysts to identify these operations and to understand how ...
Marco Gisbert, Héctor; Ripoll Ripoll, José Ismael(Springer-Verlag, 2019-08)
[EN] In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack bufferoverflow attacks, fails to protect the Android operating system and thus causes a false ...
Lahoz Ortega, Vicente(Universitat Politècnica de València, 2020-05-04)
[EN] Much of the race to get faster processors has been based in the use
of techniques as the speculative execution, deeper levels of cache
or better jump predictors. Even though the most "classic" aspects
in security, ...
Gil Pascual, Javier(Universitat Politècnica de València, 2017-12-05)
[EN] HTML5 has several new components like XHR-Level2, DOM, Storage. With any major
introduction of new features, HTML5 also brings with it potential security vulnerabilities. It
allows crafting stealth attack vectors ...
Martínez Fernández, Víctor(Universitat Politècnica de València, 2020-10-14)
[EN] The following document explores the development of a small operating
system, which goal is to allow microcontrollers, despite its limitations, to be used
as an UNIX-like machine, with the capability of running code ...