Assessing blockchain consensus and security mechanisms against the 51% attack S Sayeed, H Marco-Gisbert Applied sciences 9 (9), 1788, 2019 | 387 | 2019 |
Smart contract: Attacks and protections S Sayeed, H Marco-Gisbert, T Caira Ieee Access 8, 24416-24427, 2020 | 280 | 2020 |
DNS-IdM: A blockchain identity management system to secure personal data sharing in a network J Alsayed Kassem, S Sayeed, H Marco-Gisbert, Z Pervez, K Dahal Applied Sciences 9 (15), 2953, 2019 | 94 | 2019 |
Preventing brute force attacks against stack canary protection on networking servers H Marco-Gisbert, I Ripoll 2013 IEEE 12th International Symposium on Network Computing and Applications …, 2013 | 59 | 2013 |
On the effectiveness of nx, ssp, renewssp, and aslr against stack buffer overflows HM Gisbert, I Ripoll 2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014 | 52 | 2014 |
Address space layout randomization next generation H Marco-Gisbert, I Ripoll Ripoll Applied Sciences 9 (14), 2928, 2019 | 47 | 2019 |
On the Effectiveness of Full-ASLR on 64-bit Linux H Marco-Gisbert, I Ripoll Proceedings of the In-Depth Security Conference, 2014 | 46 | 2014 |
Mitigating webshell attacks through machine learning techniques Y Guo, H Marco-Gisbert, P Keir Future Internet 12 (1), 12, 2020 | 30 | 2020 |
Proof of adjourn (poaj): A novel approach to mitigate blockchain attacks S Sayeed, H Marco-Gisbert Applied Sciences 10 (18), 6607, 2020 | 29 | 2020 |
Control-flow integrity: Attacks and protections S Sayeed, H Marco-Gisbert, I Ripoll, M Birch Applied Sciences 9 (20), 4229, 2019 | 19 | 2019 |
Exploiting Linux and PaX ASLR’s weaknesses on 32-and 64-bit systems H Marco-Gisbert, I Ripoll-Ripoll BlackHat Asia, 2016 | 17 | 2016 |
Key requirements for the detection and sharing of behavioral indicators of compromise A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert Electronics 11 (3), 416, 2022 | 16 | 2022 |
KASLR-MT: Kernel address space layout randomization for multi-tenant cloud systems F Vano-Garcia, H Marco-Gisbert Journal of Parallel and Distributed Computing 137, 77-90, 2020 | 16 | 2020 |
On the effectiveness of blockchain against cryptocurrency attacks S Sayeed, H Marco-Gisbert Proceedings of the UBICOMM, 2018 | 16 | 2018 |
SOC critical path: A defensive kill chain model A Villalón-Huerta, HM Gisbert, I Ripoll-Ripoll Ieee Access 10, 13570-13581, 2022 | 10 | 2022 |
Method for Preventing Information Leaks on the Stack Smashing Protector Technique JI Ripoll, H Marco US Patent App. 14/341,118, 2016 | 10 | 2016 |
Return-to-csu: A new method to bypass 64-bit Linux ASLR H Marco-Gisbert, I Ripoll Black Hat Asia 2018, 2018 | 9 | 2018 |
A taxonomy for threat actors’ delivery techniques A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert Applied Sciences 12 (8), 3929, 2022 | 7 | 2022 |
On the effectiveness of control-flow integrity against modern attack techniques S Sayeed, H Marco-Gisbert ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 7 | 2019 |
How kernel randomization is canceling memory deduplication in cloud computing systems F Vano-Garcia, H Marco-Gisbert 2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018 | 7 | 2018 |