School of Computing

Publications by Prof Julio Hernandez-Castro

Also view these in the Kent Academic Repository

Articles
Yilmaz, Y., Cetin, O., Grigore, C., Arief, B. and Hernandez-Castro, J. (2023) 'Personality Types and Ransomware Victimisation', Digital Threats: Research and Practice. ACM, pp. 1-25. doi: 10.1145/3568994.
Patsakis, C., Politou, E., Alepis, E. and Hernandez-Castro, J. C. (2023) 'Cashing out crypto: state of practice in ransom payments', International Journal of Information Security. Springer Berlin Heidelberg, pp. 699-712. doi: 10.1007/s10207-023-00766-z.
Almaraz Luengo, E., Alaña Olivares, B., García Villalba, L. J., Hernandez-Castro, J. C. and Hurley-Smith, D. (2023) 'StringENT test suite: ENT battery revisited for efficient P value computation', Journal of Cryptographic Engineering. Springer, pp. 235-249. doi: 10.1007/s13389-023-00313-5.
Filiz, B., Arief, B., Cetin, O. and Hernandez-Castro, J. C. (2021) 'On the Effectiveness of Ransomware Decryption Tools', Computers & Security. Elsevier. doi: 10.1016/j.cose.2021.102469.
Yilmaz, Y., Cetin, O., Arief, B. and Hernandez-Castro, J. C. (2021) 'Investigating the Impact of Ransomware Splash Screens', Journal of Information Security and Applications. Elsevier. doi: 10.1016/j.jisa.2021.102934.
Hurley-Smith, D., Patsakis, C. and Hernandez-Castro, J. C. (2020) 'On the unbearable lightness of FIPS 140-2 randomness tests', IEEE Transactions on Information Forensics and Security. IEEE, pp. 1-1. doi: 10.1109/TIFS.2020.2988505.
Hernandez-Castro, J., Cartwright, A. and Cartwright, E. (2020) 'An economic analysis of ransomware and its welfare consequences', Royal Society Open Science. Royal Society, p. 190023. doi: 10.1098/rsos.190023.
Hurley-Smith, D. and Hernandez-Castro, J. (2020) 'Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators', ACM Transactions on Privacy and Security, pp. 1-25. doi: 10.1145/3398726.
Martin, A., Hernandez-Castro, J. C. and Camacho, D. (2018) 'An in-Depth Study of the Jisut Family of Android Ransomware', IEEE Access. IEEE, pp. 57205-57218. doi: 10.1109/ACCESS.2018.2873583.
González Fernández, E., Sandoval Orozco, A., García Villalba, L. and Hernandez-Castro, J. C. (2018) 'Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts', Sensors (Basel, Switzerland). MDPI. doi: 10.3390/s18092804.
Sloan, T. and Hernandez-Castro, J. (2018) 'Dismantling OpenPuff PDF steganography', Digital Investigation. Elsevier, pp. 90-96. doi: 10.1016/j.diin.2018.03.003.
Cervantes, A., Sloan, T., Hernandez-Castro, J. C. and Isasi, P. (2018) 'System steganalysis with automatic fingerprint extraction', PLOS ONE. Public Library of Science. doi: 10.1371/journal.pone.0195737.
Hurley-Smith, D. and Hernandez-Castro, J. (2018) 'Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG', IEEE Transactions on Information Forensics and Security. Institute Electrical Electronics Engineers, pp. 1031-1041. doi: 10.1109/TIFS.2017.2777342.
Armas Vega, E., Sandoval Orozco, A., García Villalba, L. and Hernandez-Castro, J. C. (2018) 'Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns', Sensors. MDPI. doi: 10.3390/s18103372.
Osadchy, M., Hernandez-Castro, J. C., Gibson, S. J., Dunkelman, O. and Perez-Cabo, D. (2017) 'No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation', IEEE Transactions on Information Forensics and Security. Institute of Electrical and Electronics Engineers, pp. 2640-2653. doi: 10.1109/TIFS.2017.2718479.
Roberts, D. L. and Hernandez-Castro, J. (2017) 'Bycatch and illegal wildlife trade on the dark web', Oryx. Cambridge University Press, pp. 393-394. doi: 10.1017/S0030605317000679.
Bello, G., Hernandez-Castro, J. and Camacho, D. (2016) 'Detecting discussion communities on vaccination in twitter', Future Generation Computer Systems. Elsevier Science BV, pp. 125-136. doi: 10.1016/j.future.2016.06.032.
Harrison, J., Roberts, D. L. and Hernandez-Castro, J. (2016) 'Assessing the extent and nature of wildlife trade on the dark web', Conservation Biology, pp. 900-904. doi: 10.1111/cobi.12707.
Avoine, G., Beaujeant, A., Hernandez-Castro, J. C., Demay, L. and Teuwen, P. (2016) 'A Survey of Security and Privacy Issues in ePassport Protocols', ACM Computing Surveys. Association for Computing Machinery. doi: 10.1145/2825026.
Orozco, A. L. S., Corripio, J. R., González, D. M. A., Villalba, L. J. G. and Hernandez-Castro, J. C. (2016) 'Theia: a tool for the forensic analysis of mobile devices pictures', Computing. Springer, pp. 1251-1286. doi: 10.1007/s00607-015-0482-5.
Sandoval Orozco, A. L., Garcia Villalba, L. J., Arenas Gonzalez, D. M., Rosales Corripio, J., Hernandez-Castro, J. C. and Gibson, S. J. (2015) 'Smartphone image acquisition forensics using sensor fingerprint', Institute of Engineering and Technology, Computer Vision,. IET, pp. 723-731. doi: 10.1049/iet-cvi.2014.0243.
Hernandez-Castro, J. C. and Roberts, D. L. (2015) 'Automatic detection of potentially illegal online sales of elephant ivory via data mining', PeerJ Computer Science. PeerJ, pp. 1-11. doi: 10.7717/peerj-cs.10.
Sandoval Orozco, A. L., Corripio, J. R., García Villalba, L. J. and Hernandez-Castro, J. C. (2015) 'Image source acquisition identification of mobile devices based on the use of features', Multimedia Tools and Applications, pp. 7087-7111. doi: 10.1007/s11042-015-2633-2.
Barnes, D. J. and Hernandez-Castro, J. C. (2015) 'On the limits of engine analysis for cheating detection in chess', Computers and Security. Elsevier, pp. 58-73. doi: doi:10.1016/j.cose.2014.10.002.
Bowles, S. and Hernandez-Castro, J. C. (2015) 'The first 10 years of the Trojan Horse defence', Computer Fraud & Security. Elsevier, pp. 5-13. doi: 10.1016/S1361-3723(15)70005-9.
Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J. C. and Bagheri, N. (2014) 'Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol', Journal of Computational and Applied Mathematics. Elsevier Science, pp. 571-577. doi: 10.1016/j.cam.2013.09.073.
Hernandez-Castro, J. C. and Boiten, E. A. (2014) 'Cybercrime prevalence and impact in the UK', Computer Fraud & Security. Elsevier, pp. 5-8. doi: 10.1016/S1361-3723(14)70461-0.
Barrero, D., Hernandez-Castro, J. C., Peris-Lopez, P. and Camacho, D. (2014) 'A genetic tango attack against the David–Prasad RFID ultra?lightweight authentication protocol', Expert Systems. Blackwell, pp. 9-19. doi: 10.1111/j.1468-0394.2012.00652.x.
Sandoval Orozco, A., Arenas Gonzalez, D. M., Garcia Villalba, L. and Hernandez-Castro, J. C. (2014) 'Analysis of errors in exif metadata on mobile devices', Multimedia Tools and Applications. Kluwer Academic Publishers, pp. 4735-4763. doi: 10.1007/s11042-013-1837-6.
Picazo Sanchez, P., Martin, L., Peris-Lopez, P. and Hernandez-Castro, J. C. (2013) 'Cryptanalysis of the RNTS system', The Journal of Supercomputing, pp. 949-960. doi: 10.1007/s11227-013-0873-3.
Khalil, O., Hernandez-Castro, J. C. and Asis, B. (2013) 'A study on the false positive rate of Stegdetect', Digital Investigation, pp. 235-245. doi: 10.1016/j.diin.2013.01.004.
Sandoval Orozco, A., Arenas, G., Rosales, C., Garcia Villalba, L. and Hernandez-Castro, J. C. (2013) 'Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections', Computing. Springer Link, pp. 829-841. doi: 10.1007/s00607-013-0313-5.
Tapiador, J. E., Hernandez-Castro, J. C. and Peris-Lopez, P. (2012) 'Online Randomization Strategies to Obfuscate User Behavioral Patterns', Journal of Network and Systems Management,. Springer, pp. 561-578. doi: 10.1007/s10922-012-9246-0.
Blasco Alis, J., Hernandez-Castro, J. C., Tapiador, J. E. and Ribagorda, A. (2012) 'Bypassing information leakage protection with trusted applications', Computers and Security. Elsevier, pp. 557-568. doi: 10.1016/j.cose.2012.01.008.
Peris-Lopez, P., Orfila, A., Palomar, E. and Hernandez-Castro, J. C. (2012) 'A secure distance-based RFID identification protocol with an off-line back-end database', Personal and Ubiquitous Computing, pp. 351-365. doi: 10.1007/s00779-011-0396-y.
Hernandez-Castro, J. C., Estévez-Tapiador, J. M., Peris-Lopez, P., Clark, J. A. and Talbi, E.-G. (2012) 'Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol', International Journal of Foundations of Computer Science, pp. 543-553. doi: 10.1142/S0129054112400278.
Blasco Alis, J., Hernandez-Castro, J. C., de Fuentes, J. M. and Ramos, B. (2012) 'A framework for avoiding steganography usage over HTTP', Journal of Network and Computer Applications. Academic Press Limited, pp. 491-501. doi: 10.1016/j.jnca.2011.10.003.
Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. E. and van der Lubbe, J. C. A. (2011) 'Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol', Engineering Applications of Artificial Intelligence, pp. 1061-1069. doi: 10.1016/j.engappai.2011.04.001.
Peris-Lopez, P., Orfila, A., Hernandez-Castro, J. C. and van der Lubbe, J. C. A. (2011) 'Flaws on RFID grouping-proofs. Guidelines for future sound protocols', Journal of Network and Computer Applications. Academic Press Limited, pp. 833-845. doi: 10.1016/j.jnca.2010.04.008.
Hernandez-Castro, J. C., Tapiador, J. E., Palomar, E. and Romero-Gonzalez, A. (2010) 'Blind Steganalysis of Mp3stego', Journal of Information Science and Engineering, pp. 1787-1799.
Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. E., Li, T. and Li, Y. (2010) 'Vulnerability analysis of RFID protocols for tag ownership transfer', Computer Networks. Elsevier Science, pp. 1502-1508. doi: 10.1016/j.comnet.2009.11.007.
Peris-Lopez, P., Li, T. and Hernandez-Castro, J. C. (2010) 'Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard', IEICE Transactions on information and systems, pp. 518-527. doi: 10.1587/transinf.E93.D.518.
Mitrokotsa, A., Dimitrakakis, C., Peris-Lopez, P. and Hernandez-Castro, J. C. (2010) 'Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels', IEEE Communications Letters. IEEE - Institute of Electrical Electronics Engineers Inc, pp. 121-123. doi: 10.1109/LCOMM.2010.02.091946.
Peris-Lopez, P., Li, T., Hernandez-Castro, J. C. and Tapiador, J. E. (2009) 'Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard', Computer Communications. Elsevier Science, pp. 1185-1193. doi: 10.1016/j.comcom.2009.03.010.
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez Tapiador, J. and Ribagorda, A. (2009) 'Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard', Computer Standards and Interfaces. Elsevier Science Bv, pp. 372-380. doi: 10.1016/j.csi.2008.05.012.
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez Tapiador, J. and Ribagorda, A. (2009) 'LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification', Computer Standards and Interfaces. Elsevier Science Bv, pp. 88-97. doi: 10.1016/j.csi.2007.11.013.
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez Tapiador, J. and Ribagorda, A. (2009) 'An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification', Journal of Information Science and Engineering, pp. 33-57.
Alcaide, A., Estevez Tapiador, J., Hernandez-Castro, J. C. and Ribagorda, A. (2008) 'Cryptanalysis of Syverson's Rational Exchange Protocol', International Journal of Network Security. ACEEE, pp. 151-156.
Hernandez-Castro, J. C., Estevez Tapiador, J., Peris-Lopez, P. and Ribagorda, A. (2008) 'Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions', Journal of Information Science and Engineering, pp. 1485-1504.
Estevez Tapiador, J., Hernandez-Castro, J. C., Alcaide, A. and Ribagorda, A. (2008) 'On the Distinguishability of Distance-Bounded Permutations in Ordered Channels', IEEE Transactions on Information Forensics and Security. Institute Electrical Electronics Engineers, pp. 166-172. doi: 10.1109/TIFS.2008.920724.
Palomar, E., Estevez Tapiador, J., Hernandez-Castro, J. C. and Ribagorda, A. (2008) 'Secure content access and replication in pure P2P networks', Computer Communications. Elsevier Science, pp. 266-279. doi: 10.1016/j.comcom.2007.08.015.
Polimon, J., Hernandez-Castro, J. C., Estevez Tapiador, J. and Ribagorda, A. (2008) 'Automated design of a lightweight block cipher with Genetic Programming', International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, pp. 3-14. doi: 10.3233/kes-2008-12102.
Alcaide, A., Estevez Tapiador, J., Hernandez-Castro, J. C. and Ribagorda, A. (2008) 'Bayesian rational exchange', International Journal of Information Security, pp. 85-100. doi: 10.1007/s10207-007-0039-5.
Book sections
McBride, J., Hernandez-Castro, J. and Arief, B. (2018) 'Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override', in 2017 International Workshop on Secure Internet of Things (SIoT). International Workshop on Secure Internet of Things 2017 (SIoT 2017), IEEE. doi: 10.1109/SIoT.2017.00009.
McBride, J., Arief, B. and Hernandez-Castro, J. C. (2018) 'Security Analysis of Contiki IoT Operating System', in EWSN '18 Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks. International Conference on Embedded Wireless Systems and Networks (EWSN) 2018, Canada: Junction Publishing, pp. 278-283.
Conference or workshop items
Ozturk, O. S., Ekmekcioglu, E., Cetin, O., Arief, B. and Hernandez-Castro, J. C. (2023) 'New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?', in. European Interdisciplinary Cybersecurity Conference (EICC 2023), ACM, pp. 13-18. doi: 10.1145/3590777.3590780.
Wang, Y., Arief, B. and Hernandez-Castro, J. C. (2023) 'Dark ending: what happens when a dark web market closes down', in. 9th International Conference on Information Systems Security and Privacy (ICISSP 2023). doi: 10.5220/0011681600003405.
Kocaogullar, Y., Cetin, O., Arief, B., Brierley, C., Pont, J. and Hernandez-Castro, J. C. (2022) 'Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots', in. 12th International Workshop on Socio-Technical Aspects in Security (STAST 2022), pp. 15-31.
Brierley, C., Arief, B., Barnes, D. J. and Hernandez-Castro, J. C. (2021) 'Industrialising Blackmail: Privacy Invasion Based IoT Ransomware', in Tuveri, N., Michalas, A., and Brumley, B. (eds). The 26th Nordic Conference on Secure IT Systems (NordSec 2021), Springer, pp. 79-92. doi: 10.1007/978-3-030-91625-1_5.
Brierley, C., Pont, J., Arief, B., Barnes, D. J. and Hernandez-Castro, J. C. (2021) 'Persistence in Linux-Based IoT Malware', in. 25th Nordic Conference on Secure IT Systems (Nordsec), Springer, pp. 3-19. doi: 10.1007/978-3-030-70852-8_1.
Wang, Y., Arief, B. and Hernandez-Castro, J. C. (2021) 'Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets', in. 2021 APWG Symposium on Electronic Crime Research (eCrime), IEEE, pp. 1-13. doi: 10.1109/eCrime54498.2021.9738745.
Pont, J., Arief, B. and Hernandez-Castro, J. C. (2020) 'Why Current Statistical Approaches to Ransomware Detection Fail', in. 23rd Information Security Conference, Springer. doi: 10.1007/978-3-030-62974-8_12.
Arief, B., Periam, A., Cetin, O. and Hernandez-Castro, J. C. (2020) 'Using Eyetracker to Find Ways to Mitigate Ransomware', in. 6th International Conference on Information Systems Security and Privacy (ICISSP), Scitepress, pp. 448-456. doi: 10.5220/0008956004480456.
Pont, J., Abu Oun, O., Brierley, C., Arief, B. and Hernandez-Castro, J. C. (2019) 'A Roadmap for Improving the Impact of Anti-Ransomware Research', in Askarov, A., Hansen, R. R., and Rafnsson, W. (eds). NordSec 2019: The 24th Nordic Conference on Secure IT Systems, Springer. doi: 10.1007/978-3-030-35055-0_9.
de Balthasar, T. and Hernandez-Castro, J. C. (2017) 'An Analysis of Bitcoin Laundry Services', in. NordSec2017 - Nordic Conference on Secure IT Systems, Springer-Verlag Berlin, pp. 297-312. doi: 10.1007/978-3-319-70290-2_18.
Bello Orgaz, G., Hernandez-Castro, J. C. and Camacho, D. (2015) 'A Survey of Social Web Mining Applications for Disease Outbreak Detection', in. doi: 10.1007/978-3-319-10422-5_36.
Corripio, J., Sandoval Orozco, A., Garcia Villalba, L., Hernandez-Castro, J. C. and Gibson, S. J. (2013) 'Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform', in. The 5th International Conference on Imaging for Crime Detection and Prevention. Available at: http://www.icdp-conf.org/.
Internet publications
Hernandez-Castro, J. C. and Boiten, E. A. (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. The Conversation. Available at: https://theconversation.com/uk-has-little-to-be-proud-of-as-survey-reveals-sorry-state-of-european-cybersecurity-37505.
Boiten, E. A. and Hernandez-Castro, J. C. (2014) Targeted 'malvertising' reveals move towards more sophisticated hacks. The Conversation UK. Available at: https://theconversation.com/targeted-malvertising-reveals-move-towards-more-sophisticated-hacks-33294.
Boiten, E. A. and Hernandez-Castro, J. C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe?. The Conversation UK. Available at: https://theconversation.com/can-you-really-be-identified-on-tor-or-is-that-just-what-the-cops-want-you-to-believe-29430.
Hernandez-Castro, J. C., Boiten, E. A. and Barnoux, M. F. (2014) Second Kent Cyber Security Survey. Available at: http://www.kent.ac.uk/news/stories/Cybercrime_survey2/2014.
Hernandez-Castro, J. C. and Boiten, E. A. (2013) First Kent Cyber Security Survey. Available at: http://www.cyber.kent.ac.uk/Survey1.pdf.
Total publications in KAR: 72 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 23/04/2024