Biography summary
Dr Trujillo is a Lecturer in Cyber Security at Deakin University and a multiple medalist in Mathematical Olympiads. He completed a Masters and PhD in Computer Engineering from Rovira i Virgili University, supported by a FPI Fellowship Grant. Prior joining Deakin, he was a Postdoctoral researcher at the University of Luxembourg and the Centre of Reliability and Trust.
Dr. Trujillo's research work appears in the most important publication venues in computer security, such as ACM CCS and IEEE S&P, and have been used to identify vulnerabilities in the contactless payment protocols of MasterCard and NXP semiconductors. He received the Teaching and Learning Award and Research Impact Award from the School of IT at Deakin in 2018 and 2019, respectively.
Career highlights
- 2019: Research Impact Award from the School of IT at Deakin
- 2019: Paper published at The 26th ACM Conference on Computer and Communications Security (CCS'19) titled "Post-Collusion Security and Distance Bounding"
- 2018: Teaching and Learning Award from the School of IT at Deakin
- 2018: Paper published at 39th IEEE Symposium on Security and Privacy 2018 (S&P) titled "Distance-Bounding Protocols: Verification without Time and Location"
- 2017: Paper published at ACM Computing Survey titled "Distance bounding: a survey"
-
2016: Paper published at Euro S&P titled "A class of precomputation-based distance-bounding
protocols" - 2015: Junior-Core grant proposal accepted by the Fonds National de la Recherche, Reference No. C15_IS_10428112, Luxembourg
- 2008: FPI Predoctoral Grant-holder at University Rovira i Virgili
- 1999-2000: Bronze medals at the International Mathematical Olympiads (Republic of Korea and Romania)
Knowledge areas
Computer security, privacy-preserving technologies, security protocols, formal methods, graph theory
Projects
- Chief Investigator of the project Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems (DBMP), funded by Automotive Engineering Graduate Program for $494,900 (AUD), 2019.
- Distance bounding: a graph theoretical and formal approach (DIST), funded by the Fonds National de la Recherche, Reference No. C15_IS_10428112, Luxembourg, 2015
- TREsPASS (Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security) project, funded by the European Commission's Seventh Framework Programme under Grant Agreement No. 318003.
Publications
Analysis of centrality measures under differential privacy models
Jesse Laeuchli, Yunior Ramírez-Cruz, Rolando Trujillo Rasua
(2022), Vol. 412, pp. 1-11, Applied Mathematics and Computation, Amsterdam, The Netherlands, C1
Traceability in Supply Chains: A Cyber Security Analysis
Naeem Syed, Syed Shah, Rolando Trujillo Rasua, Robin Doss
(2022), Vol. 112, Computers and Security, C1
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation
S Mauw, Y Ramírez-Cruz, Ronaldo Trujillo-Rasua
(2022), Vol. 64, pp. 1077-1100, Knowledge and Information Systems, Berlin, Germany, C1
APT attacks on industrial control systems: A tale of three incidents
R Kumar, R Kela, S Singh, R Trujillo-Rasua
(2022), Vol. 37, International Journal of Critical Infrastructure Protection, C1
Secure memory erasure in the presence of man-in-the-middle attackers
R Trujillo-Rasua
(2021), Vol. 57, Journal of Information Security and Applications, C1
Attribute evaluation on attack trees with incomplete information
A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo-Rasua
(2020), Vol. 88, Computers and Security, C1
Secure attribute-based search in RFID-based inventory control systems
R Doss, R Trujillo-Rasua, S Piramuthu
(2020), Vol. 132, Decision Support Systems, C1
Conditional adjacency anonymity in social graphs under active attacks
S Mauw, Y Ramírez-Cruz, R Trujillo-Rasua
(2019), Vol. 61, pp. 485-511, Knowledge and Information Systems, C1
Security of distance-bounding: A survey
G Avoine, M Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, C Kim, C Lauradoux, B Martin, J Munilla, A Peinado, K Rasmussen, D Singelée, A Tchamkerten, R Trujillo-Rasua, S Vaudenay
(2019), Vol. 51, ACM Computing Surveys, C1
Robust active attacks on social graphs
S Mauw, Y Ramírez-Cruz, R Trujillo-Rasua
(2019), Vol. 33, pp. 1357-1392, Data Mining and Knowledge Discovery, Wurzburg, GERMANY, C1
Distance-based vertex identification in graphs: The outer multiset dimension
R Gil-Pons, Y Ramírez-Cruz, R Trujillo-Rasua, I Yero
(2019), Vol. 363, Applied Mathematics and Computation, C1
Applications of distributed ledger technologies to the internet of things: a survey
Q Zhu, S Loke, R Trujillo Rasua, F Jiang, Y Xiang
(2019), Vol. 52, pp. 1-34, ACM computing surveys, New York, N.Y., C1
Nicholas Patterson, R Trujillo Rasua, M Hobbs, G Wood-Bradley, J Currey, E Lanham
(2019), pp. 20-30, EAISR 2019 : European Academic Institute for Scientific Research Conferences Proceedings, Berlin, Germany, E1
Post-collusion security and distance bounding
S Mauw, J Toro-Pozo, Z Smith, R Trujillo Rasua
(2019), pp. 941-958, CCS'19 : Proceedings of the ACM Conference on Computer and Communications Security, London, Eng., E1
Hybrid routing for man-in-the-middle (MITM) attack detection in IoT networks
J Kang, K Fahd, S Venkatraman, R Trujillo Rasua, P Haskell-Dowland
(2019), pp. 1-8, ITNAC 2019 : Proceedings of the 2019 29th International Telecommunication Networks and Applications Conference, Auckland, N.Z., E1
Anonymising social graphs in the presence of active attackers
S Mauw, Y Ramírez-Cruz, R Trujillo-Rasua
(2018), Vol. 11, pp. 169-198, Transactions on Data Privacy, C1
New directions in attack tree research: catching up with industrial needs
O Gadyatskaya, R Trujillo Rasua
(2018), Vol. 10744, pp. 115-126, GraMSec 2017 : Proceedings of the 4th International Workshop on Graphical Models for Security, Santa Barbara, Calif., E1-1
Distance-bounding protocols: verification without time and location
S Mauw, Z Smith, J Toro-Pozo, R Trujillo Rasua
(2018), pp. 549-566, SP 2018 : Proceedings of the 2018 IEEE 39th Symoposium on Security and Privacy, San Francisco, Calif., E1-1
Automated identification of desynchronisation attacks on shared secrets
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
(2018), Vol. 11098, pp. 406-426, ESORICS 2018 : Proceedings of 23rd European Symposium on Research in Computer Security, Barcelona, Spain, E1
M Lemaska, J Rodríguez-Velázquez, R Trujillo-Rasua
(2017), Vol. 152, pp. 273-287, Fundamenta Informaticae, C1-1
Refinement-aware generation of attack trees
O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, T Willemse
(2017), pp. 164-179, STM 2017 : Security and trust management : 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, Oslo, Norway, E1-1
Man-in-the-middle attacks evolved... but our security models didn't
H Jonker, S Mauw, R Trujillo-Rasua
(2017), Vol. 10368, pp. 19-25, Security protocols XXIV : Proceedings of the 24th International Workshop, Brno, Czech Republic, E1-1
Optimality results on the security of lookup-based protocols
S Mauw, J Toro-Pozo, R Trujillo-Rasua
(2017), pp. 137-150, Radio frequency identification and IoT security : 12th International Workshop, RFIDsec 2016, Hong Kong, China, November 30 - December 2, 2016, revised selected papers, Hong Kong, China, E1-1
k-Metric antidimension: a privacy measure for social graphs
R Trujillo Rasua, I Yero
(2016), Vol. 328, pp. 403-417, Information sciences, Amsterdam, The Netherlands, C1-1
Characterizing 1-metric antidimensional trees and unicyclic graphs
R Trujillo Rasua, I Yero
(2016), Vol. 59, pp. 1264-1273, Computer journal, Oxford, Eng., C1-1
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0
O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua
(2016), pp. 159-162, QEST 2016 : Quantitative evaluation of systems : 13th International Conference, QEST 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings, Québec City, Québec, E1-1
A class of precomputation-based distance-bounding protocols
S Mauw, J Toro-Pozo, R Trujillo-Rasua
(2016), pp. 97-111, EuroS&P 2016 : 2016 IEEE European Symposium on Security and Privacy : proceedings : 21-24 March 2016, Saarbruecken, Germany, Saarbrücken, Germany, E1-1
Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study
M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua
(2016), pp. 326-334, PoEM 2016 : The practice of enterprise modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Skövde, Sweden, November 8-10, 2016, Proceedings, Skovde, Sweden, E1-1
Counteracting active attacks in social network graphs
S Mauw, R Trujillo-Rasua, B Xuan
(2016), pp. 233-248, DBSec 2016 : Data and applications security and privacy XXX : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings, Trento, Italy, E1-1
The fréchet/manhattan distance and the trajectory anonymisation problem
C Torres, R Trujillo-Rasua
(2016), pp. 19-34, DBSec 2016 : Data and applications security and privacy XXX : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings, Trento, Italy, E1-1
Comparing distance bounding protocols: a critical mission supported by decision theory
G Avoine, S Mauw, R Trujillo Rasua
(2015), Vol. 67, pp. 92-102, Computer communications, Amsterdam, The Netherlands, C1-1
Attack trees with sequential conjunction
R Jhawar, B Kordy, S Mauw, S Radomirović, R Trujillo-Rasua
(2015), pp. 339-353, ICT systems security and privacy protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, Hamburg, Germany, E1-1
Distance bounding facing both mafia and distance frauds
R Trujillo Rasua, B Martin, G Avoine
(2014), Vol. 13, pp. 5690-5698, IEEE transactions on wireless communications, Piscataway, N.J., C1-1
Complexity of distance fraud attacks in graph-based distance bounding
R Trujillo Rasua
(2014), Vol. 131, pp. 289-302, MobiQuitous 2013 : Proceedings of the 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Tokyo, Japan, E1-1
On the privacy offered by (k, δ)-anonymity
R Trujillo-Rasua, J Domingo-Ferrer
(2013), Vol. 38, pp. 491-494, Information systems, Amsterdam, The Netherlands, C1-1
Microaggregation- and permutation-based anonymization of movement data
J Domingo-Ferrer, R Trujillo Rasua
(2012), Vol. 208, pp. 55-80, Information sciences, Amsterdam, The Netherlands, C1-1
Predictive protocol for the scalable identification of RFID tags through collaborative readers
R Trujillo Rasua, A Solanas, P Pérez-Martínez, J Domingo-Ferrer
(2012), Vol. 63, pp. 557-573, Computers in industry, Amsterdam, The Netherlands, C1-1
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
A Fernàndez-Mir, R Trujillo-Rasua, J Castellà-Roca, J Domingo-Ferrer
(2012), Vol. 7055 LNCS, pp. 147-162, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Amherst, MA, E1-1
R Trujillo Rasua, A Solanas
(2011), Vol. 55, pp. 3211-3223, Computer networks, Amsterdam, The Netherlands, C1-1
Funded Projects at Deakin
Other Public Sector Funding
Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.
Prof Robin Ram Mohan Doss, Prof Seng Loke, Dr Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang
Department of Industry, Innovation and Science
- 2022: $74,235
- 2021: $123,725
- 2019: $296,940
Other Funding Sources
Improving security and national authentication systems using blockchain technology.
Dr Rolando Trujillo Rasua
Cyber Security Research Centre Limited
- 2019: $15,000
Smarter Adaptable Real-World Security: A Tool for Designing and Deploying Run-Time Adaptable Security Mechanisms for loT / CPS Systems
Prof Seng Loke, Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua
Cyber Security Research Centre Limited
- 2020: $52,000
Traceability and Path Authentication in Dynamic Supply Chains.
Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua, Dr Lei Pan
Cyber Security Research Centre Limited
- 2023: $60,000
- 2022: $61,921
Cryptographic authentication for IoT - Cloud integrated platforms.
Dr Zubair Baig, Dr Rolando Trujillo Rasua
Cyber Security Research Centre Limited
- 2021: $10,700
Supervisions
No completed student supervisions to report