[EN] Cloud computing has completely changed our lives. This technology dramatically impacted on how we play, work and live. It has been widely adopted in many sectors mainly because it reduces the cost of performing tasks ...
[EN] Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise. These indicators are the main source of tactical cyber intelligence most organizations benefit from. They are expressed in ...
[EN] A webshell is a command execution environment in the form of web pages. It is often used by attackers as a backdoor tool for web server operations. Accurately detecting webshells is of great significance to web server ...
Villalón Huerta, Antonio(Universitat Politècnica de València, 2023-06-05)
[ES] La información y los sistemas que la tratan son un activo a proteger para personas, organizaciones e incluso países enteros. Nuestra dependencia en las tecnologías de la información es cada día mayor, por lo que su ...
[EN] The blockchain is a distributed ledger technology that is growing in importance since inception. Besides cryptocurrencies, it has also crossed its boundary inspiring various organizations, enterprises, or business ...
Argente Garrigós, Clara(Universitat Politècnica de València, 2019-10-15)
[ES] Hay estimaciones que sugieren que el coste por delitos cibernéticos va a ser
de 6 billones de dólares de forma anual hasta el 2021. La protección de la información y la infraestructura informática es una prioridad ...
Sayeed, Sarwar; Marco-Gisbert, Héctor; Caira, Tom(Institute of Electrical and Electronics Engineers, 2020)
[EN] Smart contracts are programs that reside within decentralized blockchains and are executed pursuant to triggered instructions. A smart contract acts in a similar way to a traditional agreement but negates the necessity ...
Villalón-Huerta, Antonio; Marco-Gisbert, Héctor; Ripoll-Ripoll, Ismael(Institute of Electrical and Electronics Engineers, 2022)
[EN] Different kill chain models have been defined and analyzed to provide a common sequence of actions followed in offensive cyber operations. These models allow analysts to identify these operations and to understand how ...
Marco Gisbert, Héctor; Ripoll Ripoll, José Ismael(Springer-Verlag, 2019-08)
[EN] In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack bufferoverflow attacks, fails to protect the Android operating system and thus causes a false ...
Lahoz Ortega, Vicente(Universitat Politècnica de València, 2020-05-04)
[EN] Much of the race to get faster processors has been based in the use
of techniques as the speculative execution, deeper levels of cache
or better jump predictors. Even though the most "classic" aspects
in security, ...