Guillermo Suarez-Tangil

According to our database1, Guillermo Suarez-Tangil authored at least 46 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



Eight Years of Rider Measurement in the Android Malware Ecosystem.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Improving Code Stylometry Analysis in Underground Forums.
Proc. Priv. Enhancing Technol., 2022

On how VoIP attacks foster the malicious call ecosystem.
Comput. Secur., 2022

Measuring Alexa Skill Privacy Practices across Three Years.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Leakage of Sensitive Information to Third-Party Voice Applications.
Proceedings of the CUI 2022: 4th Conference on Conversational User Interfaces, Glasgow, United Kingdom, July 26, 2022

Novel Tools for the Management, Representation, and Exploitation of Textual Information.
Sci. Program., 2021

An Analysis of Android Malware Classification Services.
Sensors, 2021

Smart Home Personal Assistants: A Security and Privacy Review.
ACM Comput. Surv., 2021

SkillVet: Automated Traceability Analysis of Amazon Alexa Skills.
CoRR, 2021

Memes, Radicalisation, and the Promotion of Violence on Chan Sites.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

Detecting Video-Game Injectors Exchanged in Game Cheating Communities.
Proceedings of the Computer Security - ESORICS 2021, 2021

Automatically Dismantling Online Dating Fraud.
IEEE Trans. Inf. Forensics Secur., 2020

Characterizing Linux-based malware: Findings and recent trends.
Future Gener. Comput. Syst., 2020

WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Multi-country Study of Third Party Trackers from Real Browser Histories.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Proc. ACM Hum. Comput. Interact., 2019

A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth.
Proceedings of the Internet Measurement Conference, 2019

BorderPatrol: Securing BYOD using Fine-Grained Contextual Information.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Anomaly-based exploratory analysis and detection of exploits in android mediaserver.
IET Inf. Secur., 2018

Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned.
CoRR, 2018

On the Origins of Memes by Means of Fringe Web Communities.
Proceedings of the Internet Measurement Conference 2018, 2018

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection.
Comput. Secur., 2017

Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

TriFlow: Triaging Android Applications using Speculative Information Flows.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Ex-Ray: Detection of History-Leaking Browser Extensions.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware.
IEEE Trans. Mob. Comput., 2016

DroidScribe: Classifying Android Malware Based on Runtime Behavior.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Security analysis and exploitation of arduino devices in the internet of things.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.
Pervasive Mob. Comput., 2015

Hindering data theft with encrypted data trees.
J. Syst. Softw., 2015

Providing SIEM systems with self-adaptation.
Inf. Fusion, 2015

Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach.
Proceedings of the Network and System Security - 9th International Conference, 2015

Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014

Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014

Evolution, Detection and Analysis of Malware for Smart Devices.
IEEE Commun. Surv. Tutorials, 2014

Thwarting Obfuscated Malware via Differential Fault Analysis.
Computer, 2014

Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
Proceedings of the Computer Security - ESORICS 2014, 2014

Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Information sharing models for cooperative cyber defence.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

Artificial Immunity-based Correlation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2011

Automatic Rule Generation Based on Genetic Programming for Event Correlation.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009