Seguir
Hector Marco
Hector Marco
Assistant Professor in Cybersecurity, Universidad Politécnica de Valencia
Dirección de correo verificada de disca.upv.es - Página principal
Título
Citado por
Citado por
Año
Assessing blockchain consensus and security mechanisms against the 51% attack
S Sayeed, H Marco-Gisbert
Applied sciences 9 (9), 1788, 2019
3742019
Smart contract: Attacks and protections
S Sayeed, H Marco-Gisbert, T Caira
Ieee Access 8, 24416-24427, 2020
2632020
DNS-IdM: A blockchain identity management system to secure personal data sharing in a network
J Alsayed Kassem, S Sayeed, H Marco-Gisbert, Z Pervez, K Dahal
Applied Sciences 9 (15), 2953, 2019
922019
Preventing brute force attacks against stack canary protection on networking servers
H Marco-Gisbert, I Ripoll
2013 IEEE 12th International Symposium on Network Computing and Applications …, 2013
592013
On the effectiveness of nx, ssp, renewssp, and aslr against stack buffer overflows
HM Gisbert, I Ripoll
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
512014
Address space layout randomization next generation
H Marco-Gisbert, I Ripoll Ripoll
Applied Sciences 9 (14), 2928, 2019
472019
On the Effectiveness of Full-ASLR on 64-bit Linux
H Marco-Gisbert, I Ripoll
Proceedings of the In-Depth Security Conference, 2014
462014
Mitigating webshell attacks through machine learning techniques
Y Guo, H Marco-Gisbert, P Keir
Future Internet 12 (1), 12, 2020
292020
Proof of adjourn (poaj): A novel approach to mitigate blockchain attacks
S Sayeed, H Marco-Gisbert
Applied Sciences 10 (18), 6607, 2020
282020
Control-flow integrity: Attacks and protections
S Sayeed, H Marco-Gisbert, I Ripoll, M Birch
Applied Sciences 9 (20), 4229, 2019
192019
Exploiting Linux and PaX ASLR’s weaknesses on 32-and 64-bit systems
H Marco-Gisbert, I Ripoll-Ripoll
BlackHat Asia, 2016
172016
KASLR-MT: Kernel address space layout randomization for multi-tenant cloud systems
F Vano-Garcia, H Marco-Gisbert
Journal of Parallel and Distributed Computing 137, 77-90, 2020
162020
On the effectiveness of blockchain against cryptocurrency attacks
S Sayeed, H Marco-Gisbert
Proceedings of the UBICOMM, 2018
162018
Key requirements for the detection and sharing of behavioral indicators of compromise
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert
Electronics 11 (3), 416, 2022
152022
Method for Preventing Information Leaks on the Stack Smashing Protector Technique
JI Ripoll, H Marco
US Patent App. 14/341,118, 2016
102016
SOC critical path: A defensive kill chain model
A Villalón-Huerta, HM Gisbert, I Ripoll-Ripoll
Ieee Access 10, 13570-13581, 2022
92022
Return-to-csu: A new method to bypass 64-bit Linux ASLR
H Marco-Gisbert, I Ripoll
Black Hat Asia 2018, 2018
92018
How kernel randomization is canceling memory deduplication in cloud computing systems
F Vano-Garcia, H Marco-Gisbert
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
72018
A taxonomy for threat actors’ delivery techniques
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert
Applied Sciences 12 (8), 3929, 2022
62022
CNA tactics and techniques: a structure proposal
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert
Journal of Sensor and Actuator Networks 10 (1), 14, 2021
62021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20