Dr Jorge Blasco Alis

  1. 2021
  2. Forthcoming

    Detecting video-game injectors exchanged in game cheating communities

    Blasco Alis, J., Karkallis, P., Pastrana, S. & Suarez de Tangil Rotaeche, G., 19 Jul 2021, (Accepted/In press) 26th European Symposium on Research in Computer Security (ESORICS) 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Forthcoming

    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

    Sivakumaran, P. & Blasco Alis, J., 1 Jul 2021, (Accepted/In press) Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks: SECURECOMM 2021. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Mesh Messaging in Large-scale Protests: Breaking Bridgefy

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 11 May 2021, (E-pub ahead of print) CT-RSA 2021. Springer, p. 375-398 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 30 Apr 2021, (Accepted/In press) USENIX.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2020
  7. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    How private is your period? A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 2020, Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020). Vol. 2020(4). p. 491-510 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2019
  10. Published
  11. Published

    Wearables Security and Privacy

    Blasco, J., Chen, T. M., Kupwade Patil, H. & Wolff, D., 1 Jan 2019, Studies in Systems, Decision and Control. Springer International Publishing AG, p. 351-380 30 p. (Studies in Systems, Decision and Control; vol. 164).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. 2018
  13. Published

    A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes

    Blasco Alis, J., Alario, C., Estévez-Ayres, I., Gallego-Romero, J. M., Delgado Kloos, C., Fernández-Panadero, C., Crespo-García, R. M., Almenares, F., Ibáñez, M. B., Villena-Román, J. & Ruiz-Magaña, J., 28 Aug 2018, In: Journal of Universal Computer Science. 24, 8, p. 1015-1033 19 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification

    Blasco, J. & Peris-Lopez, P., 24 Aug 2018, In: Sensors (Switzerland). 18, 9, p. 1-20 20 p., 2782.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In: Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals

    Sivakumaran, P. & Blasco Alis, J., 13 Mar 2018, p. 152-154. 3 p.

    Research output: Contribution to conferencePosterpeer-review

  17. Published

    Detection of app collusion potential using logic programming

    Blasco Alis, J., Chen, T. M., Muttik, I. & Roggenbach, M., 1 Mar 2018, In: Journal of Network and Computer Applications. 105, p. 88-104 17 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    InfoSec Cinema: Using Films for Information Security Teaching

    Blasco Alis, J. & Quaglia, E., 2018, ASE '18: 2018 USENIX Workshop on Advances in Security Education. USENIX, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. 2017
  20. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  21. E-pub ahead of print

    Detecting Malicious Collusion Between Mobile Software Applications: The AndroidTM Case

    Blasco Alis, J., 2 Aug 2017, (E-pub ahead of print) Data Analytics and Decision Support for Cybersecurity. Springer, p. 55-97 43 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. 2016
  23. Published

    A survey of wearable biometric recognition systems

    Blasco, J., Chen, T. M., Tapiador, J. & Peris-Lopez, P., 1 Sep 2016, In: ACM Computing Surveys. 49, 3, 43.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Towards Automated Android App Collusion Detection

    AsǍvoae, I. M., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., Roggenbach, M. & Shaikh, S. A., 2016, p. 29-37. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  25. 2015
  26. Published

    Hindering data theft with encrypted data trees

    Blasco, J., Tapiador, J. E., Pens-Lopez, P. & Suarez-Tangil, G., Mar 2015, In: Journal of Systems and Software. 101, p. 147-158 12 p.

    Research output: Contribution to journalArticlepeer-review

  27. 2014
  28. Published

    A tunable proof of ownership scheme for deduplication using Bloom filters

    Blasco, J., Di Pietro, R., Orfila, A. & Sorniotti, A., 29 Dec 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 481-489 9 p. 6997518. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families

    Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P. & Blasco, J., Mar 2014, In: Expert Systems with Applications. 41, 4, Part 1, p. 1104-1117 14 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In: International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Security models in vehicular ad-hoc networks: A survey

    De Fuentes, J. M., González-Manzano, L., González-Tablas, A. I. & Blasco, J., 1 Jan 2014, In: IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India). 31, 1, p. 47-64 18 p.

    Research output: Contribution to journalReview articlepeer-review

  32. 2012
  33. Published

    Bypassing information leakage protection with trusted applications

    Blasco, J., Hernandez-Castro, J. C., Tapiador, J. E. & Ribagorda, A., 1 Jun 2012, In: Computers and Security. 31, 4, p. 557-568 12 p.

    Research output: Contribution to journalArticlepeer-review

  34. 2011
  35. Published

    Analysis of update delays in signature-based network intrusion detection systems

    Gascon, H., Orfila, A. & Blasco, J., 1 Nov 2011, In: Computers and Security. 30, 8, p. 613-624 12 p.

    Research output: Contribution to journalArticlepeer-review