EPS Electrónica e Informática
Departamento
Universidad de Deusto
Bilbao, EspañaPublicaciones en colaboración con investigadores/as de Universidad de Deusto (104)
2024
-
AA5754 aluminium alloy springback reduction by post forming electro plastic effect (PFEPE)
Mechanics of Materials, Vol. 198
-
Detection, exploitation and mitigation of memory errors
Logic Journal of the IGPL, Vol. 32, Núm. 2, pp. 281-292
2023
-
When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs
IEEE Access, Vol. 11, pp. 44725-44740
2020
-
Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing
Digital Threats: Research and Practice, Vol. 1, Núm. 4
-
Dirty Clicks: A Study of the Usability and Security Implications of Click-related Behaviors on the Web
The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020
-
TRILATERAL: A Model-Based Approach for Industrial CPS – Monitoring and Control
Communications in Computer and Information Science
2019
-
BakingTimer: Privacy analysis of server-side request processing time
ACM International Conference Proceeding Series
-
Can i opt out yet? GDPR and the global illusion of cookie control
AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
2018
-
Clock around the clock: Time-based device fingerprinting
Proceedings of the ACM Conference on Computer and Communications Security
-
Knockin’ on trackers’ door: Large-scale automatic analysis of web tracking
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
-
Data is flowing in the wind: A review of data-flow integrity methods to overcome non-control-data attacks
Advances in Intelligent Systems and Computing
-
Extension breakdown: Security analysis of browsers extension resources control policies
Proceedings of the 26th USENIX Security Symposium
-
Feel me flow: A review of control-flow integrity methods for user and kernel space
Advances in Intelligent Systems and Computing
-
The onions have eyes: A comprehensive structure and privacy analysis of Tor hidden services
26th International World Wide Web Conference, WWW 2017
-
The web is watching you: A comprehensive review of web-tracking techniques and countermeasures
Logic Journal of the IGPL, Vol. 25, Núm. 1, pp. 18-29
2016
-
Anomaly-based user comments detection in social news websites using troll user comments as normality representation
Logic Journal of the IGPL, Vol. 24, Núm. 6, pp. 883-898
-
Epidemic model for malware targeting telephony networks
2016 23rd International Conference on Telecommunications, ICT 2016
-
RAMBO: Run-time packer analysis with multiple branch observation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Static analysis: A brief survey
Logic Journal of the IGPL, Vol. 24, Núm. 6, pp. 871-882
-
Text normalization and semantic indexing to enhance Instant Messaging and SMS spam filtering
Knowledge-Based Systems, Vol. 108, pp. 25-32