Profile picture
Security Engineer

Publications

These are my accepted/published works, which can also be found on dblp and Google Scholar
  1. Inducing Authentication Failures to Bypass Credit Card PINs.
    David A. Basin, Patrick Schaller, and Jorge Toro-Pozo.
    32nd USENIX Security Symposium, 2023.
  2. Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions.
    David A. Basin, Ralf Sasse, and Jorge Toro-Pozo.
    30th USENIX Security Symposium, pp. 179–194, 2021.
  3. The EMV Standard: Break, Fix, Verify.
    David A. Basin, Ralf Sasse, and Jorge Toro-Pozo.
    42nd IEEE Symposium on Security and Privacy (S&P), pp. 1766–1781, 2021.
  4. Post-Collusion Security and Distance Bounding.
    Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and Rolando Trujillo-Rasua.
    26th ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 941–958, 2019.
  5. Computational and symbolic analysis of distance-bounding protocols.
    Jorge Luis Toro Pozo.
    PhD Thesis, 2019.
  6. Automated Identification of Desynchronisation Attacks on Shared Secrets.
    Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and Rolando Trujillo-Rasua.
    23rd European Symposium on Research in Computer Security (ESORICS), pp. 406–426, 2018.
  7. Distance-Bounding Protocols: Verification without Time and Location.
    Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and Rolando Trujillo-Rasua.
    39th IEEE Symposium on Security and Privacy (S&P), pp. 549–566, 2018.
  8. Multiobjective variable mesh optimization.
    Yamisleydi Salgueiro, Jorge L. Toro, Rafael Bello, and Rafael Falcon.
    Annals of Operations Research, 258(2):869–893, 2017.
  9. Optimality Results on the Security of Lookup-Based Protocols.
    Sjouke Mauw, Jorge Toro-Pozo, and Rolando Trujillo-Rasua.
    12th Radio Frequency Identification and IoT Security Workshop (RFIDSec), pp. 137–150, 2016.
  10. A Class of Precomputation-Based Distance-Bounding Protocols.
    Sjouke Mauw, Jorge Toro-Pozo, and Rolando Trujillo-Rasua.
    1st IEEE European Symposium on Security and Privacy (EuroS&P), pp. 97–111, 2016.
  11. Noise Detection and Learning Based on Current Information.
    Damaris Pascual González, Fernando D. Vázquez Mesa, and Jorge L. Toro Pozo.
    Computación y Sistemas, 18(1), 2014.