Antonio Muñoz


Edificio de Investigación Ada Byron
C/ Arquitecto Francisco Peñalosa, nº 18
Ampliación Campus de Teatinos. Universidad de Málaga
29071 Málaga (Spain)
Phone: (+34) 951 952 914    Fax: (+34) 951 952 749
E-mail: amunoz@lcc.uma.es

 

AWeb of Science ResearcherID H-3758-2011

Orcid https://orcid.org/0000-0002-6751-0625

Domain of interest and research

  • Secure Elements and Trusted Computing system design
  • Security Engineering (Security Patterns)
  • Monitoring of Security properties in Clouds

Education

  • Ph.D. in Computer Science (with European Doctorate mention), University of Malaga, in 2010.
  • M.Sc. in Computer Science 2005 from the University of Malaga, Spain, in 2005.
  • Master in Education from the University of Malaga, Spain, in 2018.

Relevant Publications

  • A survey on the (in)security of Trusted Execution Environments, Computers & Security, Elsevier, pp. 103-180, 2023. DOI (I.F.: 4.438)
  • Secure Mobile Agents on Embedded Boards: a TPM based solution. ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security. August 2022 Article No.: 104Pages 1–7. DOI
  • A Test Environment for Wireless Hacking in Domestic IoT Scenarios. Mobile Networks and Applications Springer. 14 Oct. 2022. DOI
  • A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi. In The 4th International Workshop on Security Engineering for Cloud Computing (IWSECC 2021) (pp. 1-10). DOI
  • P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements. Information 2021, 12(9), 357; DOI
  • TPM, a pattern for an architecture for trusted computing. In Proceedings of the European Conference on Pattern Languages of Programs 2020 (EuroPLoP '20). ACM New York, NY, USA, Article 14, 1–8. DOI
  • ICITPM: Integrity validation of software in iterative Continuous Integration through the use of Trusted Platform Module (TPM).  1st Workshop on Dependability and Safety Emerging Cloud and Fog Systems (DeSECSyS) - Colocated with ESORICS, Guildford (United Kingdom). September 2020.
  • A Security Pattern for Cloud service certification. In proc. SugarLoaf PLoP 2018, Valparaiso (Chile).
  • Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications. International Conference on Availability, Reliability and Security ARES 2018, ACM Publisher. Hamburg (Germany).
  • Software and Hardware Certification Techniques in a Combined Certification Model. International Conference on Security and Cryptography (SECRYPT), Vienna, AUSTRIA, pp. 405-410, 08-2014.
  • A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications.  Computer Journal, vol. 55, issue: 8   pp. 979-994,   08-2012.
  • TPM-based protection for mobile agents. Security and Communication Networks, vol.  4, issue 1 (SI), pp. 45-60, 01-2011.
  • Security-enhanced ambient assisted living supporting school activities during hospitalization. Journal of Ambient Intelligence and Humanized Computing, vol. 3, issue 3, pp. 177-192, 09/2012.
  • Policy Based Management for Security in Cloud Computing .Int Workshop on Convergence Security in Pervasive Environments/Int Workshop on Security on Security and Trust for Applications in Virtualized Environments Ubicación: Loutraki, Greece, Jun  28-30, 2011. Secure and Trust Computing, Data Management, and Applications. Communications in Computer and Information Science. vol. 187. 2011.
  • AVISPA in the validation of Ambient Intelligence Scenarios. 4th International Conference on Availability, Reliability and Security Ubicación: Fukuoka Inst Technol, Fukuoka, JAPAN Fecha: MAR 16-19, 2009 International Conference on Availability, Reliability, and Security (ARES), vol 1-2   pp: 420-426, 2009.

  • Representation of Security and Dependability Solutions. Security and Dependability for Ambient Intelligence. Advances in Information Security   Volumen: 45   Páginas: 69-95   Fecha de publicación: 2009.

  • Trusted code execution in JavaCard. Trust, privacy and security in digital business.  LNCS vol. 4657, pp. 269, 2007.
  • Towards secure agent computing for ubiquitous computing and ambient intelligence. 4th International Conference on Ubiquitous Intelligence and Computing. LNCS, vol 4611 pp. 1201. 07/ 2007.
  • A secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios”. 3rd International Conference on Ubiquitous Intelligence and Computing, LNCS vol, 4159, pp. 977-987, 2006.

Attended courses and seminars

  • European Intensive Programme on Information & Communication Systems Security (IPICS), August 2003.
  • Smart University, Sophia-Antipolis (France), September 2005.
  • Trainning Annual Computer Security Applications Conference (ACSAC) in Orlando (USA), December 2012.

Scientific Activities (Orcid, Publons)

  • International Advisory Board
    • International Journal of Grid and High Performance Computing  (IJGHPC)
  • Associate Editor:
    • International Journal of Information Security and Privacy (IJISP)
    • International Journal of Software Science and Computational Intelligence (IJSSCI)
    • International Journal of Network Security and Cryptography (BIJNSC)
  • Editorial Board:
    • The Open Bioinformatics Journal (TOBJ)
    • International Journal of Future Generation Communication and Networking (IJFGCN)
    • Journal of Computer Science Research (JCSR)
    • International Journal of Software Science and Computational Intelligence (IJSSCI)
    • International Journal of Computers in Clinical Practice (IJCCP)
    • International Journal of Systems and Software Security and Protection (IJSSSP)
    • International Journal of Risk and Contingency Management (IJRCM)
    • International Journal of Hyperconnectivity and the Internet of Things (IJHIoT)
  • Program (co)chair:
    • IWSECC 2018, 2019, 2021, 2022, 2023 - International Workshop on Security Engineering for Cloud Computing
    • IWOCS 2014 - International WOrkshop on Cloud Security
    • WOCOS 2013 - International WOrkshop on ClOud Security
    • APTC 2022 - Asia-Pacific Computer Technologies Conference
  • Organizing Committee
  • Local chair
    • AMI - First International Joint Conference on Ambient Intelligence 2010
  • Project Reviewer
    • FONCyT - Fondo para la Investigación Científica y Tecnológica
    • Qatar National Research Fund - Grants
  • Program Committee
    • MODELSWARD -  International Conference on Model-Driven Engineering and Software Development 2015
    • AMI - Ambient Intelligence 2017
    • AISCEN - International Workshop on Artificial Intelligence and Security Challenges in Emerging Networks 2019
    • CIC 2011 - International Symposium on Models and Modeling Methodologies in Science and Engineering: MMMse 2011
    • Depend 2009, 2010
    • ICCGI International Multi-Conference on Computing in the Global Information Technology 2013, 2014, 2015, 2016
    • ICMRS 2017
    • ICONS - International Conference on Systems 2013, 2014, 2015, 2016
    • ICSOFT – International Conference on Software Technologies 2017, 2018, 2019, 2020, 2021
    • Annual International Conference on ICT: Big Data, Cloud and Security 2018
    • International Conference on New Technologies, Mobility and Security 2012, 2014, 2015
    • SSCC - Security in Computing and Communications 2017, 2018, 2020
    • TPMC - International Conference Theory and Practice in Modern Computing 2012, 2013, 2014, 2018, 2019, 2020, 2021, 2022
    • IEEE ICWS - International Conference on Web Services  2019, 2020, 2021, 2022
    • ECCWS - European Conference on Cyber Warfare and Security  2018,2019, 2020, 2021, 2022, 2023
    • IEEE SCC - International Conference on Systems, Control and Communications 2020, 2021,2022
    • WCNA - International Conference on Wireless Communications, Networking and Applications 202, 2022
    • ACAI - International Conference on Algorithms, Computing and Artificial Intelligence 2021, 2022
    • BDET International Conference on Big Data Engineering and Technology 2022
    • ESSE - European Symposium on Software Engineering 2021, 2022
    • IWAPS - International Workshop on Advances on Privacy Preserving  Technologies and Solutions 2022
    • Pattern Recognition, Machine Vision and Intelligent Algorithms 2022
    • DMCIT- International Conference on Data Mining, Communications and Information Technology 2022
    • IMBDKM - International Conference on Intelligent Media, Big Data and Knowledge Mining 2022
    • ICSC-CITIES - Congreso Ibero-Americano de Ciudades Inteligentes 2022
    • ICSCC - International Conference on Systems, Control and Communications 2022
    • ICMSS - International Conference on Management Engineering, Software Engineering and Service Sciences 2023
    • MobiApps - International Workshop on Mobile Applications 2022
    • ISCIT - International Symposium on Communications and Information Technologies 2022
    • PATTERNS - International Conference on Pervasive Patterns and Applications PATTERNS 2022, 2023
    • CCNET - International Conference on Computer Networks & Communications  2023
    • AIMLR - Asia Conference on Artificial Intelligence, Machine Learning and Robotics  2023
    • CCPQT - Computing, Communication, Perception and Quantum Technology 2023
    • ICCCI - International Conference on Computer Communication and the Internet 2023
    • CTISC - International Conference on Advances in Computer Technology, Information Science and Communications 2023
    • NSS - International Conference on Network and System Security 2023
    • PRIS - 5th International Conference on Pattern Recognition and Intelligent Systems 2023
    • ARES - International Conference on Availability, Reliability and Security  2023
    • ARTMAN - Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks 2023 (ACM CCS  colocated)
    • SEAS - International Conference on Software Engineering and Applications 2023
  • Reviewer:
    • International Journal of Ambient Intelligence and Humanized Computing
    • Journal of system Architecture
    • Symmetry
    • Security & Communication Networks
    • Computers
    • International Journal of Agent Technologies and Systems (IJATS)
    • IEEE Intelligent Transportation Systems Transactions
    • SENSORS
    • International Journal of Secure Software Engineering (IJSSE)
    • IEEE Access
    • Information
    • International Journal of Digital Crime and Forensics (IJDCF)
    • International Journal of Secure Software Engineering (IJSSE)
    • ACM Transactions on Internet Technology
    • Applied Sciences
    • Future Internet
    • Electronics
    • Transactions on Emerging Telecommunications Technologies
    • IEEE Security & Privacy
    • Applied System Innovation
    • International Journal of Information Security
    • Telecommunication Systems