Conferences

  Technical Program Committee

  • 34th USENIX Security Symposium
    Seattle, WA, USA, August 2025

  • 31th ACM Conference on Computer and Communications Security (CCS)
    Salt Lake City, UT, USA, October 2024

  • 40th Annual Computer Security Applications Conference (ACSAC)
    Honolulu, HI, USA, December 2024

  • 30th ACM Conference on Computer and Communications Security (CCS)
    Copenhagen, Denmark, November 2023

  • 32nd USENIX Security Symposium
    Anaheim, CA, USA, August 2023

  • 13th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C)
    Boston, MA, USA, November 2022

  • 31st International World Wide Web Conference (TheWebConf)
    Lyon, France, April 2022

  • 12th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C)
    Singapore, Singapore, December 2021

  • 11th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C)
    Boston, MA, USA, October 2020

  Reviewer

  • 29th USENIX Security Symposium
    Online, August 2020

  • 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
    Niagara Falls, Canada, October 2017

  • 14th International Conference on Security and Cryptography (SECRYPT)
    Madrid, Spain, July 2017


Talks

  • Catch Me If You Can: 2024 Trends in Email Threats and Evasion Techniques
    Invited talk at the SecLab
    Northeastern University, Boston, MA, October 2024

  • Applied Machine Learning in Malware Analysis
    Invited talk at the Center For Cybersecurity And Trusted Foundations
    Arizona State University, Tempe, AZ, November 2022 [slides]

  • SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning
    Paper presented at DIMVA’21
    Online, July 2021 [slides]

  • Identifying Malicious Android Applications in the Presence of Adversaries: A Cat-and-Mouse Game
    Invited talk at 9th OWASP Boston Application Security Conference
    Microsoft Sales & Technology Center, Burlington, MA, USA, October 2019 [slides]

  • A Summary of TriFlow: Triaging Android Applications using Speculative Information Flows
    Paper presented at 4th National Cybersecurity Research Conference
    Donostia-San Sebastián, Spain, June 2018 [slides]

  • TriFlow: Triaging Android Applications using Speculative Information Flows
    Poster presented at CSAW-Europe Best Applied Security Research Competition
    Grenoble INP-ESISAR, Valence, France, November 2017 [poster]

  • TriFlow: Triaging Android Applications using Speculative Information Flows
    Paper presented at ASIACCS’17
    New York University, Abu Dhabi, UAE, April 2017 [slides]

  • Risk Assessment and Optimal Countermeasure Selection in Smartphones
    Presented at Jornadas Doctorales as part of the PhD program
    Universidad Carlos III de Madrid, Madrid, Spain, October 2016

  • A Novel Learning Algorithm Based on a Multi-Agent Structure for Solving Multi-Mode Resource-Constrained Project Scheduling Problem
    Paper presented at CSA’12
    Jeju Island, South Korea, November 2012 [slides]

  • Offline Signature Recognition using Modular Neural Networks with Fuzzy Response Integration
    Paper presented at ICNEE’11
    Singapore, Singapore, September 2011 [slides]