School of Computing

Publications by Prof Julio Hernandez-Castro

Also view these in the Kent Academic Repository

Article
Sloan, T. and Hernandez-Castro, J. (2018). Dismantling OpenPuff PDF steganography. Digital Investigation [Online] 25:90-96. Available at: https://doi.org/10.1016/j.diin.2018.03.003.
Cervantes, A. et al. (2018). System steganalysis with automatic fingerprint extraction. PLOS ONE [Online] 13:e0195737. Available at: https://doi.org/10.1371/journal.pone.0195737.
Osadchy, M. et al. (2017). No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation. IEEE Transactions on Information Forensics and Security [Online]. Available at: http://dx.doi.org/10.1109/TIFS.2017.2718479.
Roberts, D. and Hernandez-Castro, J. (2017). Bycatch and illegal wildlife trade on the dark web. Oryx [Online] 51:393-394. Available at: https://doi.org/10.1017/S0030605317000679.
Avoine, G. et al. (2016). A Survey of Security and Privacy Issues in ePassport Protocols. ACM Computing Surveys [Online] 48:1-37. Available at: https://doi.org/10.1145/2825026.
Orozco, A. et al. (2016). Theia: a tool for the forensic analysis of mobile devices pictures. Computing [Online] 98:1251-1286. Available at: https://doi.org/10.1007/s00607-015-0482-5.
Bello, G., Hernandez-Castro, J. and Camacho, D. (2016). Detecting discussion communities on vaccination in twitter. Future Generation Computer Systems [Online] 66:125-136. Available at: http://dx.doi.org/10.1016/j.future.2016.06.032.
Harrison, J., Roberts, D. and Hernandez-Castro, J. (2016). Assessing the extent and nature of wildlife trade on the dark web. Conservation Biology [Online] 30:900-904. Available at: http://dx.doi.org/10.1111/cobi.12707.
Bowles, S. and Hernandez-Castro, J. (2015). The first 10 years of the Trojan Horse defence. Computer Fraud & Security [Online] 2015:5-13. Available at: http://dx.doi.org/10.1016/S1361-3723(15)70005-9.
Sandoval Orozco, A. et al. (2015). Smartphone image acquisition forensics using sensor fingerprint. Institute of Engineering and Technology, Computer Vision, [Online] 9:723-731. Available at: http://dx.doi.org/10.1049/iet-cvi.2014.0243.
Sandoval Orozco, A. et al. (2015). Image source acquisition identification of mobile devices based on the use of features. Multimedia Tools and Applications [Online] 75:7087-7111. Available at: https://doi.org/10.1007/s11042-015-2633-2.
Barnes, D. and Hernandez-Castro, J. (2015). On the limits of engine analysis for cheating detection in chess. Computers and Security [Online] 48:58-73. Available at: http://dx.doi.org/10.1016/j.cose.2014.10.002.
Hernandez-Castro, J. and Roberts, D. (2015). Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science [Online] 1:e10:1-11. Available at: http://dx.doi.org/10.7717/peerj-cs.10.
Sandoval Orozco, A. et al. (2014). Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications [Online] 74:4735-4763. Available at: http://dx.doi.org/10.1007/s11042-013-1837-6.
Hernandez-Castro, J. and Boiten, E. (2014). Cybercrime prevalence and impact in the UK. Computer Fraud & Security [Online] 2014:5-8. Available at: http://dx.doi.org/10.1016/S1361-3723(14)70461-0.
Barrero, D. et al. (2014). A genetic tango attack against the David–Prasad RFID ultra‐lightweight authentication protocol. Expert Systems [Online] 31:9-19. Available at: http://dx.doi.org/10.1111/j.1468-0394.2012.00652.x.
Safkhani, M. et al. (2014). Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. Journal of Computational and Applied Mathematics [Online] 259:571-577. Available at: http://dx.doi.org/10.1016/j.cam.2013.09.073.
Khalil, O., Hernandez-Castro, J. and Asis, B. (2013). A study on the false positive rate of Stegdetect. Digital Investigation [Online] 9:235-245. Available at: http://dx.doi.org/10.1016/j.diin.2013.01.004.
Sandoval Orozco, A. et al. (2013). Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing [Online] 96:829-841. Available at: http://dx.doi.org/10.1007/s00607-013-0313-5.
Picazo Sanchez, P. et al. (2013). Cryptanalysis of the RNTS system. The Journal of Supercomputing [Online] 65:949-960. Available at: http://dx.doi.org/10.1007/s11227-013-0873-3.
Blasco Alis, J. et al. (2012). A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications [Online] 35:491-501. Available at: http://dx.doi.org/10.1016/j.jnca.2011.10.003.
Peris-Lopez, P. et al. (2012). A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing [Online] 16:351-365. Available at: http://dx.doi.org/10.1007/s00779-011-0396-y.
Blasco Alis, J. et al. (2012). Bypassing information leakage protection with trusted applications. Computers and Security [Online] 31:557-568. Available at: http://dx.doi.org/10.1016/j.cose.2012.01.008.
Tapiador, J., Hernandez-Castro, J. and Peris-Lopez, P. (2012). Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management, [Online] 20:561-578. Available at: http://dx.doi.org/10.1007/s10922-012-9246-0.
Hernandez-Castro, J. et al. (2012). Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science [Online] 23:543-553. Available at: http://dx.doi.org/10.1142/S0129054112400278.
Peris-Lopez, P. et al. (2011). Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence [Online] 24:1061-1069. Available at: http://dx.doi.org/10.1016/j.engappai.2011.04.001.
Peris-Lopez, P. et al. (2011). Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications [Online] 34:833-845. Available at: http://dx.doi.org/10.1016/j.jnca.2010.04.008.
Mitrokotsa, A. et al. (2010). Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters [Online] 14:121-123. Available at: http://dx.doi.org/10.1109/LCOMM.2010.02.091946.
Peris-Lopez, P., Li, T. and Hernandez-Castro, J. (2010). Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems [Online] E93-D:518-527. Available at: http://dx.doi.org/10.1587/transinf.E93.D.518.
Hernandez-Castro, J. et al. (2010). Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering 26:1787-1799.
Peris-Lopez, P. et al. (2010). Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks [Online] 54:1502-1508. Available at: http://dx.doi.org/10.1016/j.comnet.2009.11.007.
Peris-Lopez, P. et al. (2009). An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering 25:33-57.
Peris-Lopez, P. et al. (2009). Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications [Online] 32:1185-1193. Available at: http://dx.doi.org/10.1016/j.comcom.2009.03.010.
Peris-Lopez, P. et al. (2009). LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces [Online] 31:88-97. Available at: http://dx.doi.org/10.1016/j.csi.2007.11.013.
Peris-Lopez, P. et al. (2009). Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces [Online] 31:372-380. Available at: http://dx.doi.org/10.1016/j.csi.2008.05.012.
Alcaide, A. et al. (2008). Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security 7:151-156.
Hernandez-Castro, J. et al. (2008). Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering 24:1485-1504.
Estevez Tapiador, J. et al. (2008). On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security [Online] 3:166-172. Available at: http://dx.doi.org/10.1109/TIFS.2008.920724.
Alcaide, A. et al. (2008). Bayesian rational exchange. International Journal of Information Security [Online] 7:85-100. Available at: http://dx.doi.org/10.1007/s10207-007-0039-5.
Polimon, J. et al. (2008). Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too 12:3-14.
Palomar, E. et al. (2008). Secure content access and replication in pure P2P networks. Computer Communications [Online] 31:266-279. Available at: http://dx.doi.org/10.1016/j.comcom.2007.08.015.
Conference or workshop item
McBride, J., Arief, B. and Hernandez-Castro, J. (2018). Security Analysis of Contiki IoT Operating System. in: International Conference on Embedded Wireless Systems and Networks (EWSN) 2018. pp. 278-283. Available at: https://ewsn2018.networks.imdea.org/detailed-program.html.
de Balthasar, T. and Hernandez-Castro, J. (2017). An Analysis of Bitcoin Laundry Services. in: NordSec2017 - Nordic Conference on Secure IT Systems. Springer-Verlag Berlin, pp. 297-312. Available at: https://doi.org/10.1007/978-3-319-70290-2_18.
Bello Orgaz, G., Hernandez-Castro, J. and Camacho, D. (2015). A Survey of Social Web Mining Applications for Disease Outbreak Detection. Available at: http://link.springer.com/chapter/10.1007/978-3-319-10422-5_36.
Corripio, J. et al. (2013). Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform. in: The 5th International Conference on Imaging for Crime Detection and Prevention.. Available at: http://www.icdp-conf.org/.
Internet publication
Hernandez-Castro, J. and Boiten, E. (2015). UK has little to be proud of as survey reveals sorry state of European cybersecurity [Internet only]. Available at: https://theconversation.com/uk-has-little-to-be-proud-of-as-survey-reveals-sorry-state-of-european-cybersecurity-37505.
Boiten, E. and Hernandez-Castro, J. (2014). Can you really be identified on Tor or is that just what the cops want you to believe? [Internet only]. Available at: https://theconversation.com/can-you-really-be-identified-on-tor-or-is-that-just-what-the-cops-want-you-to-believe-29430.
Boiten, E. and Hernandez-Castro, J. (2014). Targeted 'malvertising' reveals move towards more sophisticated hacks [Internet only]. Available at: https://theconversation.com/targeted-malvertising-reveals-move-towards-more-sophisticated-hacks-33294.
Hernandez-Castro, J., Boiten, E. and Barnoux, M. (2014). Second Kent Cyber Security Survey [Internet only]. Available at: http://www.kent.ac.uk/news/stories/Cybercrime_survey2/2014.
Hernandez-Castro, J. and Boiten, E. (2013). First Kent Cyber Security Survey [Internet only]. Available at: http://www.cyber.kent.ac.uk/Survey1.pdf.
Forthcoming
Hurley-Smith, D. and Hernandez-Castro, J. (2018). Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Transactions on Information Forensics and Security.
McBride, J., Hernandez-Castro, J. and Arief, B. (2017). Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override. in: International Workshop on Secure Internet of Things 2017 (SIoT 2017).
Total publications in KAR: 52 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 19/07/2018