School of Computing

Publications by Prof Julio Hernandez-Castro

Also view these in the Kent Academic Repository

Articles
Bhattacherjee, S., Hernandez-Castro, J. C. and Moyler, J. (2025) 'A Greedy Global Framework for Lattice Reduction Using Deep Insertions', IACR Communications in Cryptology. International Association for Cryptologic Research, pp. 1-46. doi: 10.62056/aevuommol.
Yilmaz, Y., Cetin, O., Grigore, C., Arief, B. and Hernandez-Castro, J. (2023) 'Personality Types and Ransomware Victimisation', Digital Threats: Research and Practice. ACM, pp. 1-25. doi: 10.1145/3568994.
Patsakis, C., Politou, E., Alepis, E. and Hernandez-Castro, J. C. (2023) 'Cashing out crypto: state of practice in ransom payments', International Journal of Information Security. Springer Berlin Heidelberg, pp. 699-712. doi: 10.1007/s10207-023-00766-z.
Almaraz Luengo, E., Alaña Olivares, B., García Villalba, L. J., Hernandez-Castro, J. C. and Hurley-Smith, D. (2023) 'StringENT test suite: ENT battery revisited for efficient P value computation', Journal of Cryptographic Engineering. Springer, pp. 235-249. doi: 10.1007/s13389-023-00313-5.
Filiz, B., Arief, B., Cetin, O. and Hernandez-Castro, J. C. (2021) 'On the Effectiveness of Ransomware Decryption Tools', Computers & Security. Elsevier. doi: 10.1016/j.cose.2021.102469.
Yilmaz, Y., Cetin, O., Arief, B. and Hernandez-Castro, J. C. (2021) 'Investigating the Impact of Ransomware Splash Screens', Journal of Information Security and Applications. Elsevier. doi: 10.1016/j.jisa.2021.102934.
Hurley-Smith, D., Patsakis, C. and Hernandez-Castro, J. C. (2020) 'On the unbearable lightness of FIPS 140-2 randomness tests', IEEE Transactions on Information Forensics and Security. IEEE, pp. 1-1. doi: 10.1109/TIFS.2020.2988505.
Hernandez-Castro, J., Cartwright, A. and Cartwright, E. (2020) 'An economic analysis of ransomware and its welfare consequences', Royal Society Open Science. Royal Society, p. 190023. doi: 10.1098/rsos.190023.
Hurley-Smith, D. and Hernandez-Castro, J. (2020) 'Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators', ACM Transactions on Privacy and Security, pp. 1-25. doi: 10.1145/3398726.
Martin, A., Hernandez-Castro, J. C. and Camacho, D. (2018) 'An in-Depth Study of the Jisut Family of Android Ransomware', IEEE Access. IEEE, pp. 57205-57218. doi: 10.1109/ACCESS.2018.2873583.
González Fernández, E., Sandoval Orozco, A., García Villalba, L. and Hernandez-Castro, J. C. (2018) 'Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts', Sensors (Basel, Switzerland). MDPI. doi: 10.3390/s18092804.
Sloan, T. and Hernandez-Castro, J. (2018) 'Dismantling OpenPuff PDF steganography', Digital Investigation. Elsevier, pp. 90-96. doi: 10.1016/j.diin.2018.03.003.
Cervantes, A., Sloan, T., Hernandez-Castro, J. C. and Isasi, P. (2018) 'System steganalysis with automatic fingerprint extraction', PLOS ONE. Public Library of Science. doi: 10.1371/journal.pone.0195737.
Hurley-Smith, D. and Hernandez-Castro, J. (2018) 'Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG', IEEE Transactions on Information Forensics and Security. Institute Electrical Electronics Engineers, pp. 1031-1041. doi: 10.1109/TIFS.2017.2777342.
Armas Vega, E., Sandoval Orozco, A., García Villalba, L. and Hernandez-Castro, J. C. (2018) 'Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns', Sensors. MDPI. doi: 10.3390/s18103372.
Osadchy, M., Hernandez-Castro, J. C., Gibson, S. J., Dunkelman, O. and Perez-Cabo, D. (2017) 'No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation', IEEE Transactions on Information Forensics and Security. Institute of Electrical and Electronics Engineers, pp. 2640-2653. doi: 10.1109/TIFS.2017.2718479.
Roberts, D. L. and Hernandez-Castro, J. (2017) 'Bycatch and illegal wildlife trade on the dark web', Oryx. Cambridge University Press, pp. 393-394. doi: 10.1017/S0030605317000679.
Bello, G., Hernandez-Castro, J. and Camacho, D. (2016) 'Detecting discussion communities on vaccination in twitter', Future Generation Computer Systems. Elsevier Science BV, pp. 125-136. doi: 10.1016/j.future.2016.06.032.
Harrison, J., Roberts, D. L. and Hernandez-Castro, J. (2016) 'Assessing the extent and nature of wildlife trade on the dark web', Conservation Biology, pp. 900-904. doi: 10.1111/cobi.12707.
Avoine, G., Beaujeant, A., Hernandez-Castro, J. C., Demay, L. and Teuwen, P. (2016) 'A Survey of Security and Privacy Issues in ePassport Protocols', ACM Computing Surveys. Association for Computing Machinery. doi: 10.1145/2825026.
Orozco, A. L. S., Corripio, J. R., González, D. M. A., Villalba, L. J. G. and Hernandez-Castro, J. C. (2016) 'Theia: a tool for the forensic analysis of mobile devices pictures', Computing. Springer, pp. 1251-1286. doi: 10.1007/s00607-015-0482-5.
Sandoval Orozco, A. L., Garcia Villalba, L. J., Arenas Gonzalez, D. M., Rosales Corripio, J., Hernandez-Castro, J. C. and Gibson, S. J. (2015) 'Smartphone image acquisition forensics using sensor fingerprint', Institute of Engineering and Technology, Computer Vision,. IET, pp. 723-731. doi: 10.1049/iet-cvi.2014.0243.
Hernandez-Castro, J. C. and Roberts, D. L. (2015) 'Automatic detection of potentially illegal online sales of elephant ivory via data mining', PeerJ Computer Science. PeerJ, pp. 1-11. doi: 10.7717/peerj-cs.10.
Sandoval Orozco, A. L., Corripio, J. R., García Villalba, L. J. and Hernandez-Castro, J. C. (2015) 'Image source acquisition identification of mobile devices based on the use of features', Multimedia Tools and Applications, pp. 7087-7111. doi: 10.1007/s11042-015-2633-2.
Barnes, D. J. and Hernandez-Castro, J. C. (2015) 'On the limits of engine analysis for cheating detection in chess', Computers and Security. Elsevier, pp. 58-73. doi: doi:10.1016/j.cose.2014.10.002.
Bowles, S. and Hernandez-Castro, J. C. (2015) 'The first 10 years of the Trojan Horse defence', Computer Fraud & Security. Elsevier, pp. 5-13. doi: 10.1016/S1361-3723(15)70005-9.
Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J. C. and Bagheri, N. (2014) 'Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol', Journal of Computational and Applied Mathematics. Elsevier Science, pp. 571-577. doi: 10.1016/j.cam.2013.09.073.
Hernandez-Castro, J. C. and Boiten, E. A. (2014) 'Cybercrime prevalence and impact in the UK', Computer Fraud & Security. Elsevier, pp. 5-8. doi: 10.1016/S1361-3723(14)70461-0.
Barrero, D., Hernandez-Castro, J. C., Peris-Lopez, P. and Camacho, D. (2014) 'A genetic tango attack against the David–Prasad RFID ultra?lightweight authentication protocol', Expert Systems. Blackwell, pp. 9-19. doi: 10.1111/j.1468-0394.2012.00652.x.
Sandoval Orozco, A., Arenas Gonzalez, D. M., Garcia Villalba, L. and Hernandez-Castro, J. C. (2014) 'Analysis of errors in exif metadata on mobile devices', Multimedia Tools and Applications. Kluwer Academic Publishers, pp. 4735-4763. doi: 10.1007/s11042-013-1837-6.
Picazo Sanchez, P., Martin, L., Peris-Lopez, P. and Hernandez-Castro, J. C. (2013) 'Cryptanalysis of the RNTS system', The Journal of Supercomputing, pp. 949-960. doi: 10.1007/s11227-013-0873-3.
Khalil, O., Hernandez-Castro, J. C. and Asis, B. (2013) 'A study on the false positive rate of Stegdetect', Digital Investigation, pp. 235-245. doi: 10.1016/j.diin.2013.01.004.
Sandoval Orozco, A., Arenas, G., Rosales, C., Garcia Villalba, L. and Hernandez-Castro, J. C. (2013) 'Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections', Computing. Springer Link, pp. 829-841. doi: 10.1007/s00607-013-0313-5.
Tapiador, J. E., Hernandez-Castro, J. C. and Peris-Lopez, P. (2012) 'Online Randomization Strategies to Obfuscate User Behavioral Patterns', Journal of Network and Systems Management,. Springer, pp. 561-578. doi: 10.1007/s10922-012-9246-0.
Blasco Alis, J., Hernandez-Castro, J. C., Tapiador, J. E. and Ribagorda, A. (2012) 'Bypassing information leakage protection with trusted applications', Computers and Security. Elsevier, pp. 557-568. doi: 10.1016/j.cose.2012.01.008.
Peris-Lopez, P., Orfila, A., Palomar, E. and Hernandez-Castro, J. C. (2012) 'A secure distance-based RFID identification protocol with an off-line back-end database', Personal and Ubiquitous Computing, pp. 351-365. doi: 10.1007/s00779-011-0396-y.
Hernandez-Castro, J. C., Estévez-Tapiador, J. M., Peris-Lopez, P., Clark, J. A. and Talbi, E.-G. (2012) 'Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol', International Journal of Foundations of Computer Science, pp. 543-553. doi: 10.1142/S0129054112400278.
Blasco Alis, J., Hernandez-Castro, J. C., de Fuentes, J. M. and Ramos, B. (2012) 'A framework for avoiding steganography usage over HTTP', Journal of Network and Computer Applications. Academic Press Limited, pp. 491-501. doi: 10.1016/j.jnca.2011.10.003.
Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. E. and van der Lubbe, J. C. A. (2011) 'Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol', Engineering Applications of Artificial Intelligence, pp. 1061-1069. doi: 10.1016/j.engappai.2011.04.001.
Peris-Lopez, P., Orfila, A., Hernandez-Castro, J. C. and van der Lubbe, J. C. A. (2011) 'Flaws on RFID grouping-proofs. Guidelines for future sound protocols', Journal of Network and Computer Applications. Academic Press Limited, pp. 833-845. doi: 10.1016/j.jnca.2010.04.008.
Hernandez-Castro, J. C., Tapiador, J. E., Palomar, E. and Romero-Gonzalez, A. (2010) 'Blind Steganalysis of Mp3stego', Journal of Information Science and Engineering, pp. 1787-1799.
Peris-Lopez, P., Hernandez-Castro, J. C., Tapiador, J. E., Li, T. and Li, Y. (2010) 'Vulnerability analysis of RFID protocols for tag ownership transfer', Computer Networks. Elsevier Science, pp. 1502-1508. doi: 10.1016/j.comnet.2009.11.007.
Peris-Lopez, P., Li, T. and Hernandez-Castro, J. C. (2010) 'Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard', IEICE Transactions on information and systems, pp. 518-527. doi: 10.1587/transinf.E93.D.518.
Mitrokotsa, A., Dimitrakakis, C., Peris-Lopez, P. and Hernandez-Castro, J. C. (2010) 'Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels', IEEE Communications Letters. IEEE - Institute of Electrical Electronics Engineers Inc, pp. 121-123. doi: 10.1109/LCOMM.2010.02.091946.
Peris-Lopez, P., Li, T., Hernandez-Castro, J. C. and Tapiador, J. E. (2009) 'Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard', Computer Communications. Elsevier Science, pp. 1185-1193. doi: 10.1016/j.comcom.2009.03.010.
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez Tapiador, J. and Ribagorda, A. (2009) 'Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard', Computer Standards and Interfaces. Elsevier Science Bv, pp. 372-380. doi: 10.1016/j.csi.2008.05.012.
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez Tapiador, J. and Ribagorda, A. (2009) 'LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification', Computer Standards and Interfaces. Elsevier Science Bv, pp. 88-97. doi: 10.1016/j.csi.2007.11.013.
Peris-Lopez, P., Hernandez-Castro, J. C., Estevez Tapiador, J. and Ribagorda, A. (2009) 'An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification', Journal of Information Science and Engineering, pp. 33-57.
Alcaide, A., Estevez Tapiador, J., Hernandez-Castro, J. C. and Ribagorda, A. (2008) 'Cryptanalysis of Syverson's Rational Exchange Protocol', International Journal of Network Security. ACEEE, pp. 151-156.
Hernandez-Castro, J. C., Estevez Tapiador, J., Peris-Lopez, P. and Ribagorda, A. (2008) 'Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions', Journal of Information Science and Engineering, pp. 1485-1504.
Estevez Tapiador, J., Hernandez-Castro, J. C., Alcaide, A. and Ribagorda, A. (2008) 'On the Distinguishability of Distance-Bounded Permutations in Ordered Channels', IEEE Transactions on Information Forensics and Security. Institute Electrical Electronics Engineers, pp. 166-172. doi: 10.1109/TIFS.2008.920724.
Palomar, E., Estevez Tapiador, J., Hernandez-Castro, J. C. and Ribagorda, A. (2008) 'Secure content access and replication in pure P2P networks', Computer Communications. Elsevier Science, pp. 266-279. doi: 10.1016/j.comcom.2007.08.015.
Polimon, J., Hernandez-Castro, J. C., Estevez Tapiador, J. and Ribagorda, A. (2008) 'Automated design of a lightweight block cipher with Genetic Programming', International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, pp. 3-14. doi: 10.3233/kes-2008-12102.
Alcaide, A., Estevez Tapiador, J., Hernandez-Castro, J. C. and Ribagorda, A. (2008) 'Bayesian rational exchange', International Journal of Information Security, pp. 85-100. doi: 10.1007/s10207-007-0039-5.
Conference or workshop items
Kocaogullar, Y., Cetin, O., Arief, B., Brierley, C., Pont, J. and Hernandez-Castro, J. C. (2025) 'Hunting High or Low: Evaluating the Effectiveness of High-Interaction and Low-Interaction Honeypots', in. 12th International Workshop on Socio-Technical Aspects in Security (STAST 2022), Springer. doi: 10.1007/978-3-031-83072-3_2.
Bhudia, A., Cartwright, A., Cartwright, E., Hurley-Smith, D. and Hernandez-Castro, J. C. (2023) 'Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators', in. ARES '23: 18th International Conference on Availability, Reliability & Security, ACM. doi: 10.1145/3600160.3604985.
Ozturk, O. S., Ekmekcioglu, E., Cetin, O., Arief, B. and Hernandez-Castro, J. C. (2023) 'New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?', in. European Interdisciplinary Cybersecurity Conference (EICC 2023), ACM, pp. 13-18. doi: 10.1145/3590777.3590780.
Wang, Y., Arief, B. and Hernandez-Castro, J. C. (2023) 'Dark ending: what happens when a dark web market closes down', in. 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), ScitePress. doi: 10.5220/0011681600003405.
Brierley, C., Arief, B., Barnes, D. J. and Hernandez-Castro, J. C. (2021) 'Industrialising Blackmail: Privacy Invasion Based IoT Ransomware', in Tuveri, N., Michalas, A., and Brumley, B. (eds). The 26th Nordic Conference on Secure IT Systems (NordSec 2021), Springer, pp. 79-92. doi: 10.1007/978-3-030-91625-1_5.
Brierley, C., Pont, J., Arief, B., Barnes, D. J. and Hernandez-Castro, J. C. (2021) 'Persistence in Linux-Based IoT Malware', in. 25th Nordic Conference on Secure IT Systems (Nordsec), Springer, pp. 3-19. doi: 10.1007/978-3-030-70852-8_1.
Wang, Y., Arief, B. and Hernandez-Castro, J. C. (2021) 'Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets', in. 2021 APWG Symposium on Electronic Crime Research (eCrime), IEEE, pp. 1-13. doi: 10.1109/eCrime54498.2021.9738745.
Pont, J., Arief, B. and Hernandez-Castro, J. C. (2020) 'Why Current Statistical Approaches to Ransomware Detection Fail', in. 23rd Information Security Conference, Springer. doi: 10.1007/978-3-030-62974-8_12.
Brierley, C., Pont, J., Arief, B., Barnes, D. J. and Hernandez-Castro, J. C. (2020) 'PaperW8: An IoT Bricking Ransomware Proof of Concept', in. 4th International Workshop on Security and Forensics of IoT (IoT-SECFOR 2020), ACM, pp. 1-10. doi: 10.1145/3407023.3407044.
Arief, B., Periam, A., Cetin, O. and Hernandez-Castro, J. C. (2020) 'Using Eyetracker to Find Ways to Mitigate Ransomware', in. 6th International Conference on Information Systems Security and Privacy (ICISSP), Scitepress, pp. 448-456. doi: 10.5220/0008956004480456.
Pont, J., Abu Oun, O., Brierley, C., Arief, B. and Hernandez-Castro, J. C. (2019) 'A Roadmap for Improving the Impact of Anti-Ransomware Research', in Askarov, A., Hansen, R. R., and Rafnsson, W. (eds). NordSec 2019: The 24th Nordic Conference on Secure IT Systems, Springer. doi: 10.1007/978-3-030-35055-0_9.
McBride, J., Arief, B. and Hernandez-Castro, J. C. (2018) 'Security Analysis of Contiki IoT Operating System', in. International Conference on Embedded Wireless Systems and Networks (EWSN) 2018, Canada: Junction Publishing, pp. 278-283. Available at: https://dl.acm.org/doi/abs/10.5555/3234847.3234913.
de Balthasar, T. and Hernandez-Castro, J. C. (2017) 'An Analysis of Bitcoin Laundry Services', in. NordSec2017 - Nordic Conference on Secure IT Systems, Springer-Verlag Berlin, pp. 297-312. doi: 10.1007/978-3-319-70290-2_18.
McBride, J., Hernandez-Castro, J. and Arief, B. (2017) 'Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override', in. International Workshop on Secure Internet of Things 2017 (SIoT 2017), IEEE. doi: 10.1109/SIoT.2017.00009.
Bello Orgaz, G., Hernandez-Castro, J. C. and Camacho, D. (2015) 'A Survey of Social Web Mining Applications for Disease Outbreak Detection', in. doi: 10.1007/978-3-319-10422-5_36.
Corripio, J., Sandoval Orozco, A., Garcia Villalba, L., Hernandez-Castro, J. C. and Gibson, S. J. (2013) 'Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform', in. The 5th International Conference on Imaging for Crime Detection and Prevention. Available at: http://www.icdp-conf.org/.
Internet publications
Hernandez-Castro, J. C. and Boiten, E. A. (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. The Conversation. Available at: https://theconversation.com/uk-has-little-to-be-proud-of-as-survey-reveals-sorry-state-of-european-cybersecurity-37505.
Boiten, E. A. and Hernandez-Castro, J. C. (2014) Targeted 'malvertising' reveals move towards more sophisticated hacks. The Conversation UK. Available at: https://theconversation.com/targeted-malvertising-reveals-move-towards-more-sophisticated-hacks-33294.
Boiten, E. A. and Hernandez-Castro, J. C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe?. The Conversation UK. Available at: https://theconversation.com/can-you-really-be-identified-on-tor-or-is-that-just-what-the-cops-want-you-to-believe-29430.
Hernandez-Castro, J. C., Boiten, E. A. and Barnoux, M. F. (2014) Second Kent Cyber Security Survey. Available at: http://www.kent.ac.uk/news/stories/Cybercrime_survey2/2014.
Hernandez-Castro, J. C. and Boiten, E. A. (2013) First Kent Cyber Security Survey. Available at: http://www.cyber.kent.ac.uk/Survey1.pdf.
Total publications in KAR: 75 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 18/03/2026