Cloud Forward Conference – Madrid, 18-20 October 2016: From Distributed to Complete Computing

The Cloud Forward 2016 Conference brought together researchers and specialists from academia and industry, European R&I projects, SMEs, startups and post-graduate students to present and discuss innovative technologies in the area of distributed computing as well as new technologies beyond CLOUDs, ranging from architectures over methodologies to new applications and services. The conference focused both […]

Continue reading


Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking

Named Data Networking (NDN) is an example of information-centric network architecture designed as a candidate replacement for the current IP-based Internet. It emphasizes efficient content distribution, achieved via in-network caching and collapsing of closely-spaced content requests. NDN should also offer strong security and the decoupling between content and the entities that distribute it. This network […]

Continue reading


Boten ELISA: A Novel Approach for Botnet C&C in Online Social Networks

The Command and Control (C&C) channel of modern botnets is migrating from traditional centralized solutions (such as the ones based on Internet Relay Chat and Hyper Text Transfer Protocol), towards new decentralized approaches. Recent C&C channels, for instance, use peer-to-peer networks or exploit popular Online Social Networks (OSNs) to hide their traffic and avoid blacklisting […]

Continue reading


No Place to Hide that Bytes won’t Reveal: Sniffing Location-Based Encrypted Traffic to Track a User’s Position

Intelligence agencies, which are able to monitor large networks or entire portions of the Internet backbone, have been considered the main adversaries for Location Based Services (LBSs) in the last years. A third party different from the traditional LBS provider, however, exists. Unauthorized third parties try to infer the location and monitor the movements of […]

Continue reading