Below, you can find a complete list of my research interests or the areas in which I am willing to conduct researches:

  • Mobile Security
  • System Security
  • Malware Analysis
  • Reverse Engineering
  • Security in Resource-Constrained Computer Systems
  • Security of Autonomous Vehicles
  • Cloud Security


1. University College London (UCL)
Hosted by Dr. Gianluca Stringhini
London, UK
August 2017 - November 2017


4. CYNAMON: Cybersecurity, Network Analysis And Monitoring for the next generation Internet.
Ref: P2018/TCS-4566 (2018-2022)
Funded by: European Union; Community of Madrid

Cyberspace plays nowadays a key role in modern societies and economies, and its protection is a pivotal challenge in national security strategies. Over the last decade, various technological developments have contributed to make our dependency on cyberspace even greater, including the generation and processing of massive amounts of data, the influence of social networks over all activities of our daily lives, or the trend to connect to Internet virtually every real­world device. The scientific program proposed in this project aims at contributing to a more secure cyberspace in our current and future technological context. Our approach identifies three paradigms, each with a varying degree of maturity, that will reshape cybersecurity in the coming years. These are: the processing of massive amounts of information (big data), including those generated by citizens and devices; the embedding of computers in essentially all real­life objects (cyberphysical systems) and their connection to the Internet (IoT, Internet of Things); and the challenges and opportunities associated with the rise of quantum computing...

3. SMOG-DEV: Security Mechanisms for Fog Computing - Advanced Security for Devices.
Ref: TIN2016-79095-C2-2-R (2017-2019)
Funded by: Spanish Ministry of Economy and Competitiveness

At present, there are several interesting applications and use cases, such as outsourcing of mobile services, augmented reality systems, and several object interconnection systems (e.g., vehicular networks, cyber-physical systems) which require very specific attributes that are not provided by traditional centralized cloud services: low latency, access to local context information, and high scalability, among others. For this reason, a novel paradigm known as fog computing has emerged very recently. Fog computing is mainly based on the deployment of virtualization services on the network periphery: from Internet routers and 5G infrastructures to local servers. This allows the creation of an infrastructure that complements both the cloud infrastructure and the existing local infrastructures...

2. CIBERDINE: Cybersecurity, Big Data, and Risks.
Ref: S2013/ICE-3095 (2014-2018)
Funded by: European Union; Community of Madrid

Cyberspace plays a key role in modern societies and economies. Over the last decade Internet has changed the way we interact with Public Administrations, has given rise to new business and entertainment models and influenced the way we communicate. However, as acknowledged by the National Security Strategy, cyberspace is nowadays an open and uncontrolled space. The complexity and globalization of cyberattacks has increased very significantly in the last years, causing an important breach between the capabilities of attackers and defenders. This project aims at strengthening our capabilities to prevent, detect, and respond to cyberattacks by developing techniques that improve situational awareness and cater for a dynamic threat management...

1. SPINY: Security and Privacy in the Internet-Of-You.
Ref: TIN2013-46469-R (2014-2016)
Funded by: Spanish Ministry of Economy and Competitiveness

In the last few years, various intersecting technological advances have made it possible to develop reasonably powerful computers and sensors small enough to be embedded almost everywhere. This has translated into a proliferation of smart devices that can be carried in, on, and around the human body. In SPINY, we present a research program to address some of these challenges with four general goals. Firstly, we plan to explore security models, design principles, and architectures for the IoY that minimize risk exposure against realistic adversaries. Secondly, we will develop mechanisms to maintain the integrity of the network and the confidentiality of the information that travels about. Thirdly, we will investigate novel solutions to increase trustworthiness in apps and services for the IoY and to thwart attacks based on malicious code. Finally, we will develop smart models and tools that take a holistic approach to the security and privacy governance issues of the IoY, with particular emphasis on the definition and enforcement of usable, flexible, user-dependent and context-specific policies...


5. Best 2019 National PhD Thesis Award,
From Spanish Network of Excellence on Cybersecurity Research
For my PhD thesis, “Techniques for Advanced Android Malware Triage”
Spain (June 2020)

4. Best Previously Published Paper Award,
From 4th Spanish National Cybersecurity Research Conference
For the paper, “TriFlow: Triaging Android Applications using Speculative Information Flows”
Donostia-San Sebastian, Spain (June 2018)

3. Third Place Award,
From CSAW-Europe Best Applied Security Research Competition
For the paper, “TriFlow: Triaging Android Applications using Speculative Information Flows”
Valence, France (November 2017)

2. Best Paper Award,
From IEEE International Congress on Technology, Communication and Knowledge
For the paper, “Vertex Coloring Based on Artificial Bee Colony Algorithm”
Mashhad, Iran (November 2015)

1. Special Paper Award,
From Young Researchers and Elite Club
For the paper, “A New Image Encryption Method: Parallel Sub-Image Encryption with Hyper Chaos”
Mashhad, Iran (January 2013)


1. Student Travel Grant,
From Springer
For the 21st International Symposium on Research in Attacks, Intrusions and Defenses
Heraklion, Greece (September 2018)