Dr Rolando Trujillo Rasua

STAFF PROFILE

Position

Lecturer in Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Qualifications

Doctor of Philosophy in Electrical and Computer Engineering, The Public Uni. of Tarragona, 2012

Biography summary

Dr Trujillo is a Lecturer in Cyber Security at Deakin University and a multiple medalist in Mathematical Olympiads. He completed a Masters and PhD in Computer Engineering from Rovira i Virgili University, supported by a FPI Fellowship Grant. Prior joining Deakin, he was a Postdoctoral researcher at the University of Luxembourg and the Centre of Reliability and Trust.

Dr. Trujillo's research work appears in the most important publication venues in computer security, such as ACM CCS and IEEE S&P, and have been used to identify vulnerabilities in the contactless payment protocols of MasterCard and NXP semiconductors. He received the Teaching and Learning Award and Research Impact Award from the School of IT at Deakin in 2018 and 2019, respectively.

Career highlights

  • 2019: Research Impact Award from the School of IT at Deakin
  • 2019: Paper published at The 26th ACM Conference on Computer and Communications Security (CCS'19) titled "Post-Collusion Security and Distance Bounding"
  • 2018: Teaching and Learning Award from the School of IT at Deakin
  • 2018: Paper published at 39th IEEE Symposium on Security and Privacy 2018 (S&P) titled "Distance-Bounding Protocols: Verification without Time and Location"
  • 2017: Paper published at ACM Computing Survey titled "Distance bounding: a survey"
  • 2016: Paper published at Euro S&P titled "A class of precomputation-based distance-bounding
    protocols"
  • 2015: Junior-Core grant proposal accepted by the Fonds National de la Recherche, Reference No. C15_IS_10428112, Luxembourg
  • 2008: FPI Predoctoral Grant-holder at University Rovira i Virgili
  • 1999-2000: Bronze medals at the International Mathematical Olympiads (Republic of Korea and Romania)

Knowledge areas

Computer security, privacy-preserving technologies, security protocols, formal methods, graph theory

Projects

  • Chief Investigator of the project Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems (DBMP), funded by Automotive Engineering Graduate Program for $494,900 (AUD), 2019.
  • Distance bounding: a graph theoretical and formal approach (DIST), funded by the Fonds National de la Recherche, Reference No. C15_IS_10428112, Luxembourg, 2015
  • TREsPASS (Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security) project, funded by the European Commission's Seventh Framework Programme under Grant Agreement No. 318003.

Publications

Filter by

2020

Attribute evaluation on attack trees with incomplete information

A Buldas, O Gadyatskaya, A Lenin, S Mauw, R Trujillo Rasua

(2020), Vol. 88, pp. 1-17, Computers & security, Amsterdam, The Netherlands, C1

journal article

Secure attribute-based search in RFID-based inventory control systems

R Doss, R Trujillo Rasua, S Piramuthu

(2020), Vol. 132, pp. 1-10, Decision support systems, Amsterdam, The Netherlands, C1

journal article
2019

Conditional adjacency anonymity in social graphs under active attacks

S Mauw, Y Ramrez-Cruz, R Trujillo Rasua

(2019), Vol. 61, pp. 485-511, Knowledge and information systems, New York, N.Y., C1

journal article

Security of distance-bounding: a survey

G Avoine, M Bingl, I Boureanu, S ?apkun, G Hancke, S Karda?, C Kim, C Lauradoux, B Martin, J Munilla, A Peinado, K Rasmussen, D Singele, A Tchamkerten, R Trujillo Rasua, S Vaudenay

(2019), Vol. 51, ACM computing surveys, New York, N.Y., C1

journal article

Robust active attacks on social graphs

S Mauw, Y Ramrez-Cruz, R Trujillo Rasua

(2019), Vol. 33, pp. 1357-1392, Data mining and knowledge discovery, New York, N.Y., C1

journal article

Distance-based vertex identification in graphs: the outer multiset dimension

R Gil-Pons, Y Ramrez-Cruz, R Trujillo Rasua, I Yero

(2019), Vol. 363, pp. 1-12, Applied mathematics and computation, Amsterdam, The Netherlands, C1

journal article

Applications of distributed ledger technologies to the internet of things: a survey

Q Zhu, S Loke, R Trujillo Rasua, F Jiang, Y Xiang

(2019), Vol. 52, pp. 1-34, ACM computing surveys, New York, N.Y., C1

journal article

Chunked lectures: a new model or conducting online lectures within information technology higher education

Nicholas Patterson, R Trujillo Rasua, M Hobbs, G Wood-Bradley, J Currey, E Lanham

(2019), pp. 20-30, EAISR 2019 : European Academic Institute for Scientific Research Conferences Proceedings, Berlin, Germany, E1

conference

Post-collusion security and distance bounding

S Mauw, J Toro-Pozo, Z Smith, R Trujillo Rasua

(2019), pp. 941-958, CCS'19 : Proceedings of the ACM Conference on Computer and Communications Security, London, Eng., E1

conference

Hybrid routing for man-in-the-middle (MITM) attack detection in IoT networks

J Kang, K Fahd, S Venkatraman, R Trujillo Rasua, P Haskell-Dowland

(2019), pp. 1-8, ITNAC 2019 : Proceedings of the 2019 29th International Telecommunication Networks and Applications Conference, Auckland, N.Z., E1

conference
2018

Anonymising social graphs in the presence of active attackers

S Mauw, Y Ramrez-Cruz, R Trujillo Rasua

(2018), Vol. 11, pp. 169-198, Transactions on Data Privacy, Catalonia, Spain, C1

journal article

New directions in attack tree research: catching up with industrial needs

O Gadyatskaya, R Trujillo Rasua

(2018), Vol. 10744, pp. 115-126, GraMSec 2017 : Proceedings of the 4th International Workshop on Graphical Models for Security, Santa Barbara, Calif., E1-1

conference

Distance-bounding protocols: verification without time and location

S Mauw, Z Smith, J Toro-Pozo, R Trujillo Rasua

(2018), pp. 549-566, SP 2018 : Proceedings of the 2018 IEEE 39th Symoposium on Security and Privacy, San Francisco, Calif., E1-1

conference

Automated identification of desynchronisation attacks on shared secrets

S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua

(2018), Vol. 11098, pp. 406-426, ESORICS 2018 : Proceedings of 23rd European Symposium on Research in Computer Security, Barcelona, Spain, E1

conference
2017

Similarities and differences between the vertex cover number and the weakly connected domination number of a graph

M Lemaska, J Rodrguez-Velzquez, R Trujillo Rasua

(2017), Vol. 152, pp. 273-287, Fundamenta informaticae, Amsterdam, The Netherlands, C1-1

journal article

Refinement-aware generation of attack trees

O Gadyatskaya, R Jhawar, S Mauw, R Trujillo-Rasua, T Willemse

(2017), pp. 164-179, STM 2017 : Security and trust management : 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, Oslo, Norway, E1-1

conference

Man-in-the-middle attacks evolved... but our security models didn't

H Jonker, S Mauw, R Trujillo-Rasua

(2017), Vol. 10368, pp. 19-25, Security protocols XXIV : Proceedings of the 24th International Workshop, Brno, Czech Republic, E1-1

conference

Optimality results on the security of lookup-based protocols

S Mauw, J Toro-Pozo, R Trujillo-Rasua

(2017), pp. 137-150, Radio frequency identification and IoT security : 12th International Workshop, RFIDsec 2016, Hong Kong, China, November 30 - December 2, 2016, revised selected papers, Hong Kong, China, E1-1

conference
2016

k-Metric antidimension: a privacy measure for social graphs

R Trujillo Rasua, I Yero

(2016), Vol. 328, pp. 403-417, Information sciences, Amsterdam, The Netherlands, C1-1

journal article

Characterizing 1-metric antidimensional trees and unicyclic graphs

R Trujillo Rasua, I Yero

(2016), Vol. 59, pp. 1264-1273, Computer journal, Oxford, Eng., C1-1

journal article

Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0

O Gadyatskaya, R Jhawar, P Kordy, K Lounis, S Mauw, R Trujillo-Rasua

(2016), pp. 159-162, QEST 2016 : Quantitative evaluation of systems : 13th International Conference, QEST 2016, Quebec City, QC, Canada, August 23-25, 2016, Proceedings, Que?bec City, Que?bec, E1-1

conference

A class of precomputation-based distance-bounding protocols

S Mauw, J Toro-Pozo, R Trujillo-Rasua

(2016), pp. 97-111, EuroS&P 2016 : 2016 IEEE European Symposium on Security and Privacy : proceedings : 21-24 March 2016, Saarbruecken, Germany, Saarbru?cken, Germany, E1-1

conference

Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study

M Fraile, M Ford, O Gadyatskaya, R Kumar, M Stoelinga, R Trujillo-Rasua

(2016), pp. 326-334, PoEM 2016 : The practice of enterprise modeling : 9th IFIP WG 8.1. Working Conference, PoEM 2016, Sko?vde, Sweden, November 8-10, 2016, Proceedings, Skovde, Sweden, E1-1

conference

Counteracting active attacks in social network graphs

S Mauw, R Trujillo-Rasua, B Xuan

(2016), pp. 233-248, DBSec 2016 : Data and applications security and privacy XXX : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings, Trento, Italy, E1-1

conference

The frchet/manhattan distance and the trajectory anonymisation problem

C Torres, R Trujillo-Rasua

(2016), pp. 19-34, DBSec 2016 : Data and applications security and privacy XXX : 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2015. Proceedings, Trento, Italy, E1-1

conference
2015

Comparing distance bounding protocols: a critical mission supported by decision theory

G Avoine, S Mauw, R Trujillo Rasua

(2015), Vol. 67, pp. 92-102, Computer communications, Amsterdam, The Netherlands, C1-1

journal article

Attack trees with sequential conjunction

R Jhawar, B Kordy, S Mauw, S Radomirovi?, R Trujillo-Rasua

(2015), pp. 339-353, ICT systems security and privacy protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, Hamburg, Germany, E1-1

conference
2014

Distance bounding facing both mafia and distance frauds

R Trujillo Rasua, B Martin, G Avoine

(2014), Vol. 13, pp. 5690-5698, IEEE transactions on wireless communications, Piscataway, N.J., C1-1

journal article

Complexity of distance fraud attacks in graph-based distance bounding

R Trujillo Rasua

(2014), Vol. 131, pp. 289-302, MobiQuitous 2013 : Proceedings of the 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Tokyo, Japan, E1-1

conference
2013

On the privacy offered by (k, ?)-anonymity

R Trujillo-Rasua, J Domingo-Ferrer

(2013), Vol. 38, pp. 491-494, Information systems, Amsterdam, The Netherlands, C1-1

journal article
2012

Microaggregation- and permutation-based anonymization of movement data

J Domingo-Ferrer, R Trujillo Rasua

(2012), Vol. 208, pp. 55-80, Information sciences, Amsterdam, The Netherlands, C1-1

journal article

Predictive protocol for the scalable identification of RFID tags through collaborative readers

R Trujillo Rasua, A Solanas, P Prez-Martnez, J Domingo-Ferrer

(2012), Vol. 63, pp. 557-573, Computers in industry, Amsterdam, The Netherlands, C1-1

journal article

A scalable RFID authentication protocol supporting ownership transfer and controlled delegation

A Fernndez-Mir, R Trujillo-Rasua, J Castell-Roca, J Domingo-Ferrer

(2012), Vol. 7055 LNCS, pp. 147-162, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1-1

conference
2011

Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers

R Trujillo Rasua, A Solanas

(2011), Vol. 55, pp. 3211-3223, Computer networks, Amsterdam, The Netherlands, C1-1

journal article

Funded Projects at Deakin

Other Public Sector Funding

Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.

Prof Robin Ram Mohan Doss, Prof Seng Loke, Dr Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang

  • 2019: $296,940

Other Funding Sources

Improving security and national authentication systems using blockchain technology.

Dr Rolando Trujillo Rasua

  • 2019: $15,000

Smarter Adaptable Real-World Security: A Tool for Designing and Deploying Run-Time Adaptable Security Mechanisms for loT / CPS Systems

Prof Seng Loke, Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua

  • 2020: $52,000

Supervisions

No completed student supervisions to report