Photo of Hector Marco Gisbert

Accepting PhD Students

20132020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

A review of memory errors exploitation in x86-64

Pirry, C., Marco-Gisbert, H. & Begg, C., 8 Jun 2020, In : Computers. 9, 2, 21 p., 48.

Research output: Contribution to journalArticle

Open Access
File
10 Downloads (Pure)

E-BOOT: preventing boot-time entropy starvation in cloud systems

Vano-García, F. & Marco-Gisbert, H., 30 Mar 2020, In : IEEE Access. 8, p. 61872-61890 19 p., 9050782.

Research output: Contribution to journalArticle

Open Access
File
31 Downloads (Pure)

Mitigating webshell attacks through machine learning techniques

Guo, Y., Marco-Gisbert, H. & Keir, P., 14 Jan 2020, In : Future Internet. 12, 1, 16 p., 12.

Research output: Contribution to journalArticle

Open Access
File
35 Downloads (Pure)

Smart contract: attacks and protections

Sayeed, S., Marco-Gisbert, H. & Caira, T., 10 Feb 2020, In : IEEE Access. 8, p. 24416-24427 12 p.

Research output: Contribution to journalArticle

Open Access
File
20 Downloads (Pure)
2019

Address space layout randomization next generation

Marco Gisbert, H. & Ripoll, I., 22 Jul 2019, In : Applied Sciences. 9, 14, 25 p., 2928.

Research output: Contribution to journalSpecial issue

Open Access
File
125 Downloads (Pure)

Assessing blockchain consensus and security mechanisms against the 51% attack

Sayeed, S. & Marco-Gisbert, H., 29 Apr 2019, In : Applied Sciences. 9, 9, 17 p., 1788.

Research output: Contribution to journalArticle

Open Access
File
10 Citations (Scopus)
154 Downloads (Pure)

Control-flow integrity: attacks and protections

Sayeed, S., Marco-Gisbert, H., Ripoll, I. & Birch, M., 10 Oct 2019, In : Applied Sciences. 9, 20, 22 p., 4229.

Research output: Contribution to journalSpecial issue

Open Access
File
2 Citations (Scopus)
93 Downloads (Pure)

DNS-IdM: a blockchain identity management system to secure personal data sharing in a network

Kassem, J. A., Sayeed, S., Marco Gisbert, H., Pervez, Z. & Dahal, K., 24 Jul 2019, In : Applied Sciences. 9, 15, 19 p., 2953.

Research output: Contribution to journalSpecial issue

Open Access
File
4 Citations (Scopus)
162 Downloads (Pure)
1 Citation (Scopus)

On the effectiveness of control-flow integrity against modern attack techniques

Sayeed, S. & Marco-Gisbert, H., 5 Jun 2019, ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer International Publishing AG, p. 331-344 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
176 Downloads (Pure)

SSPFA: effective stack smashing protection for Android OS

Marco-Gisbert, H. & Ripoll-Ripoll, I., 31 Aug 2019, In : International Journal of Information Security. 18, 4, p. 519-532 14 p.

Research output: Contribution to journalArticle

Open Access
File
2 Citations (Scopus)
124 Downloads (Pure)
2018

Deteccioń de copiones con "pinganillos magnéticos" y experimentos sobre magnetismo

Translated title of the contribution: Detection of copings with "magnetic rings" and experiments on magnetismRipoll Ripoll, I., Marco Gisbert, H., Martínez Fernández, V. & Gil, P., 26 Sep 2018, IN-RED 2018: IV Congreso Nacional de Innovación Educativa y Docencia en Red. València: La Editorial de la Universitat Politècnica de València, p. 35-49 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

How kernel randomization is canceling memory deduplication in cloud computing systems

Vañó García, F. & Marco-Gisbert, H., 1 Nov 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications: Cambridge, MA, USA – November 1-3, 2018. IEEE, 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
1 Citation (Scopus)
149 Downloads (Pure)

On the effectiveness of blockchain against cryptocurrency attacks

Sayeed, S. & Marco Gisbert, H., 18 Nov 2018, The Twelfth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies: UBICOMM 2018 November 18, 2018 to November 22, 2018 - Athens, Greece. Monteiro, C. D. C., Chatzikokolakis, K. & Tolentino, C. H. C. (eds.). International Academy, Research, and Industry Association, p. 9-14 6 p. (UBICOMM International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies; vol. 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
151 Downloads (Pure)

return-to-csu: a new method to bypass 64-bit Linux ASLR

Marco-Gisbert, H. & Ripoll, I., 20 Mar 2018. 24 p.

Research output: Contribution to conferencePaper

Slicedup: a tenant-aware memory deduplication for cloud computing

Vañó-García, F. & Marco-Gisbert, H., 18 Nov 2018, UBICOMM 2018: The Twelfth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies. Monteiro, C. D. C., Chatzikokolakis, K. & Tolentino, C. H. C. (eds.). International Academy, Research, and Industry Association, p. 15-20 6 p. (UBICOMM International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies; vol. 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
37 Downloads (Pure)

Exploiting Linux and PaX ASLR’s weaknesses on 32-bit and 64-bit systems

Marco Gisbert, H. & Ripoll, I., 29 Mar 2016.

Research output: Contribution to conferencePaper

2015

CVE-2015-1574 - Google Email 4.2.2, Denial of Service

Marco Gisbert, H. & Ripoll, I., 19 Jan 2015

Research output: Other contribution

Open Access
2014

CVE-2013-6825 - DCMTK 3.6.1 - root privilege escalation

Marco, H. & Ripoll, I., 25 Mar 2014, http://hmarco.org.

Research output: Other contribution

CVE-2013-6876 - s3dvt root shell

Marco Gisbert, H. & Ripoll, I., 25 Mar 2014, http://hmarco.org.

Research output: Other contribution

CVE-2014-1226 - s3dvt - root shell

Marco Gisbert, H. & Ripoll, I., 25 Mar 2014, http://hmarco.org.

Research output: Other contribution

CVE-2014-5439 - root shell on sniffit

Ripoll, I. & Marco, H., 2014, http://hmarco.org.

Research output: Other contribution

On the Effectiveness of Full-ASLR on 64-bit Linux

Marco Gisbert, H. & Ripoli, I., 20 Nov 2014. 9 p.

Research output: Contribution to conferencePaper

On the effectiveness of NX, SSP, RenewSSP, and ASLR against stack buffer overflows

Marco Gisbert, H. & Ripoll, I., 16 Oct 2014, 2014 IEEE 13th International Symposium on Network Computing and Applications: NCA 2014. IEEE, p. 145-152 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

13 Citations (Scopus)
2013

CVE-2013-4788 - Eglibc PTR MANGLE vulnerability

Marco, H. & Ripoll, I., Mar 2013, http://hmarco.org.

Research output: Other contribution

Preventing brute force attacks against stack canary protection on networking servers

Marco-Gisbert, H. & Ripoll, I., Aug 2013, 2013 IEEE 12th International Symposium on Network Computing and Applications. IEEE, p. 243-250 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

17 Citations (Scopus)

Preventing memory errors in networked vehicle services through diversification

Marco, H., Ruiz, J. C., de Andrés, D. & Ripoll, I., 2013, Computer Safety, Reliability, and Security: 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 14-27, 2013, Proceedings. Bitsch, F., Guiochet, J. & Kaâniche, M. (eds.). Springer-Verlag Berlin Heidelberg GmbH, Vol. 8153. p. 1-6 6 p. (Programming and Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingChapter

Security through emulation-based processor diversification

Marco, H., Ripoll, I., de Andrés, D. & Ruiz, J. C., 25 Nov 2013, Emerging Trends in ICT Security. Akhgar, B. & Arabnia, H. (eds.). 1st ed. Elsevier B.V., p. 335-357 23 p. Chapter 21. (Emerging Trends in Computer Science and Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)