Photo of Hector Marco Gisbert

Hector Marco Gisbert

Dr

20132019
If you made any changes in Pure these will be visible here soon.

Research Output 2013 2019

2019
1 Downloads (Pure)

Assessing blockchain consensus and security mechanisms against the 51% attack

Sayeed, S. & Marco-Gisbert, H., 29 Apr 2019, In : Applied Sciences. 9, 9, 17 p., 1788.

Research output: Contribution to journalArticle

Open Access
File
Electronic money
Costs

On the effectiveness of control-flow integrity against modern attack techniques

Sayeed, S. & Marco-Gisbert, H., 5 Jun 2019, ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings. Dhillon, G., Karlsson, F., Hedstrom, K. & Zúquete, A. (eds.). Springer International Publishing AG, p. 331-344 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Flow control
Data storage equipment
Gain control
Industry

SSPFA: effective stack smashing protection for Android OS

Marco-Gisbert, H. & Ripoll-Ripoll, I., 22 Jan 2019, In : International Journal of Information Security. p. 1-14 14 p.

Research output: Contribution to journalArticle

Open Access
2018

Deteccioń de copiones con "pinganillos magnéticos" y experimentos sobre magnetismo

Ripoll Ripoll, I., Marco Gisbert, H., Martínez Fernández, V. & Gil, P., 26 Sep 2018, IN-RED 2018: IV Congreso Nacional de Innovación Educativa y Docencia en Red. València: La Editorial de la Universitat Politècnica de València, p. 35-49 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
electromagnetism
rings
detectors
electronics
1 Downloads (Pure)

How kernel randomization is canceling memory deduplication in cloud computing systems

Vañó García, F. & Marco-Gisbert, H., 1 Nov 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications: Cambridge, MA, USA – November 1-3, 2018. IEEE, 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Cloud computing
Computer systems
Data storage equipment
Costs
Experiments

On the effectiveness of blockchain against cryptocurrency attacks

Sayeed, S. & Marco Gisbert, H., 18 Nov 2018, The Twelfth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies: UBICOMM 2018 November 18, 2018 to November 22, 2018 - Athens, Greece. Monteiro, C. D. C., Chatzikokolakis, K. & Tolentino, C. H. C. (eds.). International Academy, Research, and Industry Association, p. 9-14 6 p. (UBICOMM International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies; vol. 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Electronic money
Denial-of-service attack

return-to-csu: a new method to bypass 64-bit Linux ASLR

Marco-Gisbert, H. & Ripoll, I., 20 Mar 2018. 24 p.

Research output: Contribution to conferencePaper

Data storage equipment
Demonstrations
Linux
Acoustic waves

Slicedup: a tenant-aware memory deduplication for cloud computing

Vañó-García, F. & Marco-Gisbert, H., 18 Nov 2018, UBICOMM 2018: The Twelfth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies. Monteiro, C. D. C., Chatzikokolakis, K. & Tolentino, C. H. C. (eds.). International Academy, Research, and Industry Association, p. 15-20 6 p. (UBICOMM International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies; vol. 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
Cloud computing
Data storage equipment
Profitability
Side channel attack
2016

Exploiting Linux and PaX ASLR’s weaknesses on 32-bit and 64-bit systems

Marco Gisbert, H. & Ripoll, I., 29 Mar 2016.

Research output: Contribution to conferencePaper

Entropy
Linux
2014

CVE-2013-6825 - DCMTK 3.6.1 - root privilege escalation

Marco, H. & Ripoll, I., 25 Mar 2014, http://hmarco.org.

Research output: Other contribution

CVE-2013-6876 - s3dvt root shell

Marco Gisbert, H. & Ripoll, I., 25 Mar 2014, http://hmarco.org.

Research output: Other contribution

CVE-2014-1226 - s3dvt - root shell

Marco Gisbert, H. & Ripoll, I., 25 Mar 2014, http://hmarco.org.

Research output: Other contribution

CVE-2014-5439 - root shell on sniffit

Ripoll, I. & Marco, H., 2014, http://hmarco.org.

Research output: Other contribution

Monitoring

On the Effectiveness of Full-ASLR on 64-bit Linux

Marco Gisbert, H. & Ripoli, I., 20 Nov 2014. 9 p.

Research output: Contribution to conferencePaper

Hinges
Linux

On the effectiveness of NX, SSP, RenewSSP, and ASLR against stack buffer overflows

Marco Gisbert, H. & Ripoll, I., 16 Oct 2014, 2014 IEEE 13th International Symposium on Network Computing and Applications: NCA 2014. IEEE, p. 145-152 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Entropy
Computer operating systems
Servers
Linux
2013

CVE-2013-4788 - Eglibc PTR MANGLE vulnerability

Marco, H. & Ripoll, I., Mar 2013, http://hmarco.org.

Research output: Other contribution

Preventing brute force attacks against stack canary protection on networking servers

Marco-Gisbert, H. & Ripoll, I., Aug 2013, 2013 IEEE 12th International Symposium on Network Computing and Applications. IEEE, p. 243-250 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Servers

Preventing memory errors in networked vehicle services through diversification

Marco, H., Ruiz, J. C., de Andrés, D. & Ripoll, I., 2013, Computer Safety, Reliability, and Security: 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 14-27, 2013, Proceedings. Bitsch, F., Guiochet, J. & Kaâniche, M. (eds.). Springer-Verlag Berlin Heidelberg GmbH, Vol. 8153. p. 1-6 6 p. (Programming and Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data storage equipment
Railroad cars
Communication
Hardware

Security through emulation-based processor diversification

Marco, H., Ripoll, I., de Andrés, D. & Ruiz, J. C., 25 Nov 2013, Emerging Trends in ICT Security. Akhgar, B. & Arabnia, H. (eds.). 1st ed. Elsevier B.V., p. 335-357 23 p. Chapter 21. (Emerging Trends in Computer Science and Applied Computing).

Research output: Chapter in Book/Report/Conference proceedingChapter

Data storage equipment
Servers
Hardware