@inproceedings {1699, title = {Modelo para la clasificaci{\'o}n y an{\'a}lisis de ataques Cross-Platform}, booktitle = {IV Jornadas Nacionales de Investigaci{\'o}n en Ciberseguridad (JNIC 2018)}, year = {2018}, month = {06/2018}, publisher = {Servicio Editorial de Mondragon Unibertsitatea}, organization = {Servicio Editorial de Mondragon Unibertsitatea}, address = {Donostia-San Sebasti{\'a}n (Espa{\~n}a)}, abstract = {

Los ataques cross-platform suponen un serio desaf{\'\i}o para los mecanismos de seguridad cuando los portadores de un ataque dirigido no son conscientes de su participacion en el mismo. Es por ello que, con dispositivos y tecnolog{\'\i}as cada vez mas entrelazadas, en constante comunicaci{\'o}n, numerosos ataques pasan desapercibidos hasta que alcanzan su objetivo final. Estos nuevos escenarios hacen posible una v{\'\i}a de transmision a tener en cuenta, y que se debe abordar cuanto antes, ya que sus consecuencias, especialmente en el panorama de telecomunicaciones actual, podr{\'\i}an ser desoladoras. La rapida transmisi{\'o}n de estos ataques, y la dificultad que supone su prevencion, detecci{\'o}n y mitigaci{\'o}n antes de que se hagan efectivos, hacen que el problema sea particularmente preocupante. En este art{\'\i}culo se presentar{\'a} una arquitectura para el analisis de los ataques cross-platform silenciosos, cuyo objetivo es ayudar a comprender mejor este tipo de amenazas y ofrecer soluciones que permitan mitigarlas y rastrearlas.

}, keywords = {architecture, attack, Cross-platform, security}, isbn = {978-84-09-02697-5}, url = {http://2018.jnic.es/assets/Actas_JNIC2018.pdf}, author = {Antonio Acien and Ana Nieto and Javier Lopez} } @inproceedings {1652, title = {A Methodology for Privacy-Aware IoT-Forensics}, booktitle = {16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2017)}, year = {2017}, month = {08/2017}, pages = {626-633}, publisher = {IEEE}, organization = {IEEE}, address = {Sydney (Australia)}, abstract = {

The Internet of Things (IoT) brings new challenges to digital forensics. Given the number and heterogeneity of devices in such scenarios, it bring extremely difficult to carry out investigations without the cooperation of individuals. Even if they are not directly involved in the offense, their devices can yield digital evidence that might provide useful clarification in an investigation. However, when providing such evidence they may leak sensitive personal information. This paper proposes PRoFIT; a new model for IoT-forensics that takes privacy into consideration by incorporating the requirements of ISO/IEC 29100:2011 throughout the investigation life cycle. PRoFIT is intended to lay the groundwork for the voluntary cooperation of individuals in cyber crime investigations.

}, keywords = {Adaptation models, Forensics, IEC Standards, Information management, ISO Standards, privacy, Software}, isbn = {978-1-5090-4906-6}, issn = {2324-9013}, doi = {10.1109/Trustcom/BigDataSE/ICESS.2017.293}, author = {Ana Nieto and Ruben Rios and Javier Lopez} } @inproceedings {1656, title = {Modeling Malware-driven Honeypots}, booktitle = {14th International Conference On Trust, Privacy \& Security In Digital Business (TrustBus 2017)}, volume = {10442}, year = {2017}, month = {08/2017}, pages = {130-144}, publisher = {Springer International Publishing}, organization = {Springer International Publishing}, address = {Lyon (France)}, abstract = {

In this paper we propose the Hogney architecture for the deployment of malware-driven honeypots. This new concept refers to honeypots that have been dynamically configured according to the environment expected by malware. The adaptation mechanism designed here is built on services that offer up-to-date and relevant intelligence information\ on current threats. Thus, the Hogney architecture takes advantage of recent Indicators Of Compromise\ (IOC) and information about suspicious activity currently being studied by analysts. The information gathered from these services is then used to adapt honeypots to fulfill malware requirements, inviting them to unleash their full strength.

}, keywords = {adaptive, dynamic, Honeypot, intelligence, IOC, malware}, isbn = {978-3-319-64482-0}, doi = {https://doi.org/10.1007/978-3-319-64483-7_9}, url = {https://link.springer.com/chapter/10.1007/978-3-319-64483-7_9}, author = {Gerardo Fernandez and Ana Nieto and Javier Lopez} } @article {nieto2013mone, title = {A Model for the Analysis of QoS and Security Tradeoff in Mobile Platforms}, journal = {Mobile Networks and Applications (MONET) Journal}, volume = {19}, year = {2014}, month = {02/2014}, pages = {64-78}, publisher = {Springer US}, abstract = {

Today, mobile platforms are multimedia devices that provide different types of traffic with the consequent particular performance demands and, besides, security concerns (e.g. privacy). However, Security and QoS requirements quite often conflict to a large degree; the mobility and heterogeneous paradigm of the Future Internet makes coexistence even more difficult, posing new challenges to overcome. Probably, one of the main challenges is to identify the specific reasons why Security and QoS mechanisms are so related to each other. In this paper, we present a Parametric Relationship Model (PRM) to identify the Security and QoS dependencies, and to elaborate on the Security and QoS tradeoff. In particular, we perform an analysis that focus on the mobile platform environment and, consequently, also considers subjective parameters such user{\textquoteright}s experience, that is crucial for increasing the usability of new solutions in the Future Internet. The final aim of our contribution is to facilitate the development of secure and efficient services for mobile platforms.

}, keywords = {Dependencies, Parameters, PRM, QoS, Relationships, security, Tradeoff}, issn = {1383-469X}, doi = {10.1007/s11036-013-0462-y}, url = {http://dx.doi.org/10.1007/s11036-013-0462-y}, author = {Ana Nieto and Javier Lopez} }