- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Security in Wireless Sensor Networks
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Privacy, Security, and Data Protection
- Advanced Authentication Protocols Security
- Energy Efficient Wireless Sensor Networks
- Cloud Data Security Solutions
- Network Security and Intrusion Detection
- Mobile Crowdsensing and Crowdsourcing
- IoT and Edge/Fog Computing
- Spam and Phishing Detection
- Blockchain Technology Applications and Security
- Complexity and Algorithms in Graphs
- Mobile Ad Hoc Networks
- Cloud Computing and Resource Management
- Cryptographic Implementations and Security
- Caching and Content Delivery
- Human Mobility and Location-Based Analysis
- Advanced Steganography and Watermarking Techniques
- Digital Rights Management and Security
- Chaos-based Image/Signal Encryption
Universidad Europea
2016-2022
Sharp Laboratories of Europe (United Kingdom)
2019-2022
NEC (Japan)
2022
Telefonica Research and Development
2016-2017
Telefónica (Spain)
2016-2017
ETH Zurich
2011-2015
Institute of Information Security
2015
Board of the Swiss Federal Institutes of Technology
2014
Universidad Politécnica de Madrid
2010-2012
University of California, Irvine
2006-2010
Many applications in several domains such as telecommunications, network security, large-scale sensor networks, require online processing of continuous data flows. They produce very high loads that requires aggregating the capacity many nodes. Current Stream Processing Engines do not scale with input load due to single-node bottlenecks. Additionally, they are based on static configurations lead either under or overprovisioning. In this paper, we present StreamCloud, a scalable and elastic...
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware the impossibility to physically access devices be attested, makes embedded devices, applications such as Wireless Sensor Networks, a prominent challenge. Several software-based techniques have been proposed that either rely on tight time constraints or free space store malicious code. This paper investigates shortcomings existing techniques. We first present two generic...
In the last several years, micro-blogging Online Social Networks (OSNs), such as Twitter, have taken world by storm, now boasting over 100 million subscribers. As an unparalleled stage for enormous audience, they offer fast and reliable centralized diffusion of pithy tweets to great multitudes information-hungry always-connected followers. At same time, this information gathering dissemination paradigm prompts some important privacy concerns about relationships between tweeters, followers...
The Internet of Things (IoT) bears unprecedented security and scalability challenges due to the magnitude data produced exchanged by IoT devices platforms. Some those are currently being addressed coupling applications with blockchains. However, current blockchain-backed systems simply use blockchain store access control policies, thereby underutilizing power technology. In this paper, we propose a new framework named Sash that couples platforms provides number advantages compared state art....
Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary. The unattended sensor's inability to off-load - real time sensitive safe external entity makes it easy adversary mount focused attack aimed at eliminating certain data. In order facilitate survival of this data, sensors can collectively attempt confuse by changing its location and content, i.e., periodically moving around network encrypting it. paper, we...
We propose a novel location-based second-factor authentication solution for modern smartphones. demonstrate our in the context of point sale transactions and show how it can be effectively used detection fraudulent caused by card theft or counterfeiting. Our scheme makes use Trusted Execution Environments (TEEs), such as ARM TrustZone, commonly available on smartphones, resists strong attackers, even those capable compromising victim phone applications OS. It does not require any changes...
Participatory Sensing combines the ubiquity of mobile phones with sensing capabilities Wireless Sensor Networks. It targets pervasive collection information, e.g., temperature, traffic conditions, or medical data. Users produce measurements from their devices, thus, a number privacy concerns -- due to personal information conveyed by reports may hinder large-scale deployment participatory applications. Prior work has attempted protect in sensing, but it relied on unrealistic assumptions and...
Participatory sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows increasing number mobile phone users to share local knowledge acquired their sensor-equipped devices (e.g., monitor temperature, pollution level, or consumer pricing information). While research initiatives and prototypes proliferate, real-world impact often bounded comprehensive user participation. If have no incentive, feel privacy might be...
Participatory sensing is emerging as an innovative computing paradigm that targets the ubiquity of always-connected mobile phones and their capabilities. In this paper, a multitude pioneering applications increasingly carry out pervasive collection dissemination information environmental data, such traffic conditions, pollution, temperature, so on. Participants collect report measurements from devices entrust them to cloud be made available users. Naturally, due personal associated reports...
Two-factor authentication protects online accounts even if passwords are leaked. Most users, however, prefer password-only authentication. One reason why two-factor is so unpopular the extra steps that user must complete in order to log in. Currently deployed mechanisms require interact with his phone to, for example, copy a verification code browser. schemes eliminate user-phone interaction exist, but additional software be deployed. In this paper we propose Sound-Proof, usable and...
In recent years, wireless sensor networks (WSNs) have been a very popular research topic, offering treasure trove of systems, networking, hardware, security, and application-related problems. Much prior assumes that the WSN is supervised by constantly present sink sensors can quickly offload collected data. this paper, we focus on unattended WSNs (UWSNs) characterized intermittent presence operation in hostile settings. Potentially lengthy intervals absence offer greatly increased...
Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is periodically collected by a visiting sink. mode operation, deployment in hostile environments value (or criticality) some the factors that complicate UWSN security. This paper makes two contributions. First, it explores new threat model involving mobile adversary who compromises releases sensors aiming to maximize its advantage overall...
Secure pairing of electronic devices is an important issue that must be addressed in many contexts. In the absence prior security context, need to involve user process a prominent challenge. this paper, we investigate use audio channel for human-assisted device pairing. First assume common (insecure) wireless between devices. We then obviate assumption pre-existing with single-channel approach only based on audio. Both approaches are applicable wide range and place light burden user.
Some wireless sensor networks preclude the constant presence of a centralized data collection point, that is, sink. In such disconnected or unattended setting, nodes must accumulate sensed until it can be off loaded to an itinerant Furthermore, if operating environment is hostile, there very real danger node and compromise. The nature network makes attractive target for attacks aim learn, erase, modify potentially valuable collected held by sensors. We argue adversarial models defense...
Tracking users within and across websites is the base for profiling their interests, demographic types, other information that can be monetised through targeted advertising big data analytics. The advent of HTTPS was supposed to make harder anyone beyond communicating end-points. In this paper we examine what extent above true. We first show by knowing domain a user visits, either Server Name Indication TLS protocol or DNS, an eavesdropper already derive basic information, especially domains...
An unattended wireless sensor network (UWSN) might collect valuable data representing an attractive target for the adversary. Since a sink visits infrequently, sensors cannot immediately off-load to some safe external entity. With sufficient time between visits, powerful mobile adversary can easily compromise sensor-collected data.