Security in Network and Systems
Malware is defined as any computer software explicitly designed to damage computers or networks. Their major motivation has evolved to malicious economic considerations. The anti-malware software or intrusion prevention systems are highly dependent on a signature database. A signature is a sequence of bits that is present within malicious executables and in the files already infected. Another features that can be used to face obfuscated and previously unseen malware are techniques based on dynamically extracted characteristics. Dynamic analysis executes the inspected specimen in a controlled environment called ‘sandbox’. The main advantages of static techniques are that they are safer because they do not execute malware, they are able to analyse all the execution paths of the executable, and the analysis and detection is usually fast.
Topics:
-
- Malware detection based on machine learning and semi-supervised learning
-
- Intrusion Detection System for IoT and/or IIoT infraestructure
-
- Forensics
Relevant Publications:
-
- J. Carrillo-Mondejar, H. Turtiainen, A. Costin, J.L. Martinez and G. Suarez-Tangil, “HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants”. IEEE Internet of Things Journal, November 2022.
Impact: 10,238. Position: 9/164 (1st quarter) - José Roldán-Gómez, J.M. del Rincon, J. Boubeta-Puig and J.L. Martinez, “An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection”. Wireless Networks, January, 2023. ISSN: 1572-8196
Impact: 2,701. Position: 138/276 (2nd quarter) - Javier Carrillo-Mondejar, José Luis Martinez and Guillermo Suarez-Tangil, “On how VoIP attacks foster the malicious call ecosystem”, Computers & Security, Volume 119, August 2022, ISSN: 0167-4048.
Impact: 4,438 Position: 40/161 (1st quarter) - José Roldán, Juan Boubeta-Puig, José Luis Martínez and Guadalupe Ortiz, “Integrating Complex Event Processing and Machine Learning: an Intelligent Architecture for Detecting IoT Security Attacks”, Expert Systems With Applications, ISSN: 0957-4174, Vol. 149(113251), July, 2020.
Impact: 4,292. Position: 7/84 (1st quarter) - J. Carrillo-Mondéjar, J.L. Martínez and G. Suarez-Tangil, “Characterizing Linux-based malware: Findings and recent trends”, Future Generation Computer Systems , ISSN: 0167-739X, Vol. 110, pp 267-281, September, 2020.
Impact: 5,678. Position: 8/105 (1st quarter)
- J. Carrillo-Mondejar, H. Turtiainen, A. Costin, J.L. Martinez and G. Suarez-Tangil, “HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants”. IEEE Internet of Things Journal, November 2022.
People:
Jose Luis Martinez, PhD Full Professor Phone number: +34 967 599 200 – Ext. 2294 Email: joseluis.martinez@uclm.es |
|
Javier Carrillo Mondejar PostDoc Fellow at University of Zaragoza Email: jcarrillo@unizar.es |
|
José Roldán Gómez Substitute Professor at University of Oviedo Email: roldangjose@uniovi.es |
|
Juan Manuel Castelo Gómez PostDoc Email: JuanManuel.Castelo@uclm.es |
|
Sergio Ruiz Villafranca PhD student Email: Sergio.rvillafranca@ucln.es |