805 Columbus Avenue
634 ISEC Complex
Boston, MA 02121
Prior to this, I was an assistant professor in Universidad Carlos III de Madrid. Also, I spent around 4 years at COmputer SECurity lab (COSEC) as a PhD student and could finally receive my PhD degree in Computer Science from the same university. My thesis was mainly focused on Android malware analysis and triage.
Generally speaking, I am working and conducting research in computer and cyber security. However, I am particularly interested in mobile security, malware analysis, reverse engineering and applied machine learning in security. In addition, I am eager to tackle security issues from a multi-objective perspective, i.e. trying to deal with such problems by consuming the least possible amount of in hand resources.
Previously and as an undergraduate student, I have worked in a wide range of areas, from advanced software engineering to Artificial Intelligence (AI). Also, I have developed several intelligent systems and have passed different AI-related courses, including machine learning, pattern mining, fuzzy systems, evolutionary computation and optimization, neural networks and image processing.
|Sep 2, 2019||I will give a talk, entitled “Identifying Malicious Android Applications in the Presence of Adversaries: A Cat-and-Mouse Game”, at Boston Application Security Conference (BASC) organized by OWASP.|
|Jun 4, 2019||I will join Engin Kirda and his research group at Northeastern University as a Postdoctoral Research Associate.|
|Apr 10, 2019||Our paper, “AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families”, has been accepted in ASIACCS’19.|
|Feb 6, 2019||I have passed my PhD viva with an Excellent qualification score.|
|Nov 21, 2018||A new version of TriFlow is available with great performance improvements.|
|ASIACCS'19||AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families. [PDF]|
|FGCS||AndrODet: An Adaptive Android Obfuscation Detector. [PDF]|
|ASIACCS'17||TriFlow: Triaging Android Applications using Speculative Information Flows. [PDF]|
|NODY||A New Image Encryption Method: Parallel Sub-Image Encryption with Hyper Chaos. [PDF]|