Roger Piqueras Jover         Updated January 10th, 2024
Staff Software Engineer and Security Researcher


 Main                        LinkedIn Profile                                  Blog                                  @me


Currently at:

Google – Android Platform Security Team

 

Email: roger.piqueras at ieee dot org
Mailing address: 111 8th Ave, New York, NY 10011

Radio Technician: KD2MDK

@rgoestotheshows

 

US Permanent Resident

 

(For a formal Resume/profile, check my LinkedIn profile)

 

Subject matter expert in mobile/wireless/radio security, network intrusion detection and machine learning applied to anomaly detection. Corporate strategy and technology leadership in mobile security, network and infrastructure security, hardware security and forensics. Applied research in ML applied to network intrusion detection. Security leadership and architecture of corporate, customer and consumer mobile application tools. Research and development of new security systems and architectures to enhance the security of next-gen biometrics and two-factor authentication devices. Offensive and defensive security research in network intrusion, embedded device security and wireless security (Bluetooth, WiFi, cellular, etc).

 

Renowned security researcher and subject matter expert in LTE and 5G network security and wireless network security (Bluetooth, 802.11, ZigBee, LoRa). Technology leadership and expert advice to academia, industry and government agencies. Chairman of the advisory board of a 25M+ effort in 5G security.

 

 


Education:

December’10: M.Phil. in Electrical Engineering (M.S. + PhD everything but dissertation), Columbia University in the City of NY (GPA: 4.0)

June’08: M.S. in Electrical and Computer Engineering, University of California, Irvine (GPA: 4.0)

March’06: Dipl.-Ing. in Telecommunications Engineering, Polytechnic University of Catalunya (Barcelona) (Top 10%)


Bio:

Roger Piqueras Jover, a native of Barcelona, graduated from the Escola Tθcnica Superior d'Enginyeria de Telecomunicacions de Barcelona (ETSETB) of the Universitat Politθcnica de Catalunya (UPC) in 2006, earning a Dipl.-Ing. in Telecommunications Engineering with a specialization in communications. During his tenure, he conducted his graduation project within the Radio Communication Research Group of the Department of Signal Theory and Communications, focusing on the analysis of Radio Resource Management Strategies for Heterogeneous Mobile Networks GSM/EDGE+UMTS.

In 2006 he was awarded a Balsells Fellowship to pursue graduate studies in Electrical Engineering at the University of California, Irvine. There he joined the Wireless Circuits and Systems Lab where he contributed to the design and implementation of a wireless channel emulator for MIMO/OFDM 802.11n systems. He successfully completed his studies, obtaining a MSc in Electrical and Computer Engineering in June 2008. Subsequently, he relocated to New York City to engage in a research project on interference mitigation in Femtocell Networks at the Department of Electrical Engineering at Columbia University in the City of New York, graduating in 2010 with a MPhil in Electrical Engineering.

From December 2010 to September 2015, Roger served as a member of AT&T’s Security Research Center. Throughout his tenure, he ascended through various roles, from Member of Technical Staff to Principal Member of Technical Staff, earning esteemed recognitions such as the CSO Award, the CTO Award, and the Key Contributor Award multiple times. At AT&T, he spearheaded projects and research endeavors on LTE mobile network security, delving into PHY layer threats, LTE protocol exploits, and control plane signaling scalability issues..

In September 2015, Roger transitioned to the CTO Security Architecture team of Bloomberg LP as a senior security architect. In this capacity, he played a pivotal role as a technical leader in ProdSec, AppSec, network and infrastructure security, and embedded device security. Notably, he acted as a subject matter expert and internal consulting resource on wireless and mobile security, network intrusion detection, machine learning applied to intrusion detection, hardware forensics, and embedded device security. Additionally, he facilitated technology evaluations of vendors engaging with Bloomberg, while also evaluating new technologies and providing strategic direction for technology innovation across the organization.

Since May 2021, Roger has been a member of the Android Platform Security team at Google, serving as the Tech Lead/Manager of the Cellular and Baseband Security team. In this capacity, he leads a team of software engineers focused on fortifying Android against false base station threats and enhancing baremetal connectivity firmware.

Roger also served a two-year term as the chairman of the Commonwealth Cyber Initiative, a pioneering effort in 5G security encompassing a state-of-the-art 5G security lab, academic research, industry partnerships, collaboration with standards groups, startup engagement and funding in 5G security, among other areas. Moreover, for several years, he provided expert advice and consulting services in mobile and wireless security across academia, industry, and government sectors.

Outside of his professional pursuits, Roger’s second full-time job is his family. He also enjoys playing soccer, listening to music, and attending rock/punk-rock/metal concerts. He proudly supports Futbol Club Barcelona, declaring it the greatest football team ever.

 

More detailed information can be found in my Resume and LinkedIn profile.


Certifications:

GIAC Assessing and Auditing Wireless Networks (GAWN). May 2021.

GIAC Mobile Device Security Analyst (GMOB). November 2020.

GIAC Certified UNIX Security Administrator (GCUX). February 2020.

GIAC Reverse Engineering Malware (GREM). October 2019.

GIAC Certified Incident Handler (GCIH). March 2019.

Data Mining with WEKA certification. December 2018.

HA Radio Certification. December 2016.


Publications and standards:

(More details and links at my Google Scholar profile)

The Android Platform Security Model.

Michael A. Specter Renι Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Dianne Hackborn, Bram Bonnι, Gόliz Seray Tuncay, Roger Piqueras Jover.

arXiv Technical Report. May 2019. December 2023. [PDF]

 

UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework.

Evangelos Bitsikas, Syed Khandker, Ahmad Salous, Aanjhan Ranganathan, Roger Piqueras Jover, Christina Pφpper.

Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. May 2023. [PDF]

 

Study on 5G security enhancements against False Base Stations (FBS): Certificate based solution for Protecting System Information Messages with Digital Signature in an NPN.

Roger Piqueras Jover (Under SoftHandover Consulting affiliation).

3GPP 33.809. October 2020. [online]

 

Security Analysis of SMS as a Second Factor of Authentication.

Roger Piqueras Jover.

Communications of the ACM. September 2020. [online]

 

Security Analysis of SMS as a Second Factor of Authentication.

Roger Piqueras Jover.

ACM Queue. September 2020. [PDF]

 

Biometric Identity Based on Intra-Body Communication Channel Characteristics and Machine Learning.

Ahmed Khorshid, Ibrahim Alquaydheb, Fadi Kurdahi, Roger Piqueras Jover, Ahmed Eltawil.

MDPI Sensors. March 2020. [PDF]

 

5G protocol vulnerabilities and exploits.

Roger Piqueras Jover.

ShmooCon 2020. January 2020. [Slides]

 

Dynamic 5G Network Slicing for First Responders.

Ken Carlsberg, Eric Burger, Roger Piqueras Jover.

Principles, Systems and Applications of IP Telecommunications (IPTCom 2019). October 2019.

 

CSAI: Open-Source Cellular Radio Access Network Security Analysis Instrument.

Thomas Byrd, Vuk Marojevic, Roger Piqueras Jover.

arXiv Technical Report. May 2019. [PDF] [Source code]

IEEE 91st Vehicular Technology Conference: VTC2020-Spring. May 2020.

 

The current state of affairs in 5G security and the main remaining security challenges.

Roger Piqueras Jover.

arXiv Technical Report (not peer reviewed). April 2019. [PDF]

 

Security and Protocol Exploit Analysis of the 5G Specifications.

Roger Piqueras Jover, Vuk Marojevic.

IEEE Access 7 (2019): 24956-24963. September 2018 (pre-print) and February 2019. [PDF]

 

5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation.

Marc Lichtman, Raghunandan M Rao, Vuk Marojevic, Jeffrey Reed, Roger Piqueras Jover.

IEEE International Conference on Communications - Workshop on 5G Security 2018 (ICC – 5GSec’18). May 2018. [PDF]

 

Some key challenges in securing 5G wireless networks.

Roger Piqueras Jover.

Response to FCC NOI DA 16-1282 (not peer reviewed). January 2017. [PDF][FCC][PDF2]

 

LTE security, protocol exploits and location tracking experimentation with low-cost software radio.

Roger Piqueras Jover.

arXiv Technical Report (not peer reviewed). July 2016. [PDF]

 

dHSS - Distributed Peer-to-Peer implementation of the LTE HSS based on the Bitcoin/Namecoin architecture.

Roger Piqueras Jover, Joshua Lackey.

IEEE International Conference on Communications - Workshop on 5G Architecture (IEEE ICC – 5GArch’16). May 2016. [PDF] (§)

 

LTE/LTE-A Jamming, Spoofing and Sniffing: Threat Assessment and Mitigation.

Marc Lichtman, Roger Piqueras Jover, Mina Labib, Raghunandan Rao, Vuk Marojevic, Jeffrey H. Reed.

IEEE Communications Magazine. Special issue on Critical Communications and Public Safety Networks. April 2016. [IEEE Xplore][PDF] (§)

 

LTE Security and Protocol Exploits.

Roger Piqueras Jover.

ShmooCon 2016. January 2016. (Acceptance rate 15.77%) [Slides][Video]

 

Detecting malicious activity on smartphones using sensor measurements.

Roger Piqueras Jover, Ilona Murynets, Jeffrey Bickford.

9th International Conference on Network and System Security (NSS’15). To be presented, November 2015.

 

Connection-less communication of IoT devices over LTE mobile networks.

Roger Piqueras Jover, Ilona Murynets.

IEEE International Conference on Sensing, Communication and Networking (IEEE SECON'15). June 2015. [PDF]

 

Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks.

Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin.

IEEE WoWMoM 2015. June 2015. (Acceptance rate 20%) [PDF]

 

A scalable test bed for large-scale LTE security research.

Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin.

IEEE North Jersey Advanced Communications Symposium. Poster session. September 2014. [PDF]

 

Enhancing the security of LTE networks against jamming attacks.

Roger Piqueras Jover, Joshua Lackey, Arvind Raghavan.

EURASIP Journal on Information Security. April 2014. [PDF]

 

Firecycle: A scalable test bed for large-scale LTE security research.

IEEE International Conference on Communications – Communications and Information Systems Security Symposium (ICC’14 CISS). June 2014. [PDF]

 

Analysis and Detection of SIMbox Fraud in Mobility Networks.

Ilona Murynets, Michael Zabarankin, Roger Piqueras Jover, Adam Panagia.

IEEE Infocom, April 2014. (Acceptance rate 19.4%) [PDF]

 

Is It Really You? User Identification via Adaptive Behavior Fingerprinting.

Paul Giura, Ilona Murynets, Roger Piqueras Jover, Yevgeny Vahlis.

ACM Conference on Data and Application Security and Privacy (CODASPY’14), March 2014. (16% acceptance rate) [pdf]

 

Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions.

Roger Piqueras Jover.

IEEE Global Wireless Summit - Wireless Personal Multimedia Communications Symposium (GWS - WPMC), June 2013. [pdf]

 

Analysis of SMS Spam in Mobility Networks.

Ilona Murynets, Roger Piqueras Jover.

International Journal of Advanced Computer Science (IJACSci), Vol. 3 num. 7, July 2013. [pdf]

 

How Vulnerabilities in Wireless Networks Can Enable Advanced Persistent Threats.

Roger Piqueras Jover, Paul Giura.

International Journal on Information Technology (IREIT), Vol. 1 num. 2. March 2013. [pdf]

 

Anomaly detection in cellular Machine-to-Machine communications.

Ilona Murynets, Roger Piqueras Jover.

IEEE International Conference on Communications (ICC’13). June 2013. [pdf]

 

Crime Scene Investigation: SMS Spam Data Analysis.

Ilona Murynets, Roger Piqueras Jover.

ACM Internet Measurement Conference 2012 (IMC’12). November 2012, Boston MA. (24% acceptance rate) [ACM Library] [pdf]

 

How an SMS-based Malware Infection Will Get Throttled by the Wireless Link.

Ilona Murynets, Roger Piqueras Jover.

IEEE International Conference on Communications (ICC’12 CISS). June 2012. [IEEE Xplore] [PDF]

 

Uplink Interference Mitigation for OFDMA Femtocell Networks.

Yanzan Sun, Roger Piqueras Jover, Xiaodong Wang.

IEEE Transactions on Wireless Communications, vol.11, no.2, pp.614-625, February 2012. [IEEE Xplore] [PDF] (§)

 

Dynamic Pricing for Decentralised RAT Selection in Heterogeneous Scenarios

Roger Piqueras Jover, Jordi Perez-Romero, Oriol Sallent, Ramon Agusti.

2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, September 2006 [IEEE Xplore] (§)

 

Analysis and Design of New Initial RAT Selection Strategies Based on Pricing and Path Loss for Heterogeneous Wireless Networks GSM/EDGE/UMTS (Thesis)

Roger Piqueras Jover

Final research project for the degree of Telecommunications Engineering BSc, Universitat Politθcnica de Catalunya, March 2006. (In Catalan) [pdf]

 

Translation to English of my undergraduate thesis (work in progress) available here: Analysis and Design of New Initial RAT Selection Strategies Based on Pricing and Path Loss for Heterogeneous Wireless Networks GSM/EDGE/UMTS

(Note: Automatically generated with Google Translate. Don’t expect Shakespeare’s English. Read abstract for details on the translation)

Variable Rigidity PDMS Structures.

Roger Piqueras Jover, Teresa Fazio, Shalom Wind.

Presented at The Gordon Research Conference on Nanostructure Fabrication, July 2010, Tilton, NH (link)

 

Biocompatible Surfaces witch Locally variable Rigidity

Roger Piqueras Jover, Teresa Fazio, Shalom Wind.

Presented at The 54th International Conference on Electron, Ion and Photon Beam Technology and Nanofabrication, EIPBN June 2010, Anchorage, AK. [pdf]

 

(§) PDF of the accepted version of the paper (pre-print) shared here as per the new IEEE Policy Regarding Authors Rights to Post Accepted Versions of Their Papers.

 

© 2006-2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.


Other publications and articles:

·       Hardening cellular basebands in Android. Google Security Blog. December 2023.

·       SMS Security & Privacy Gaps Make It Clear Users Need a Messaging Upgrade. Google Security Blog. September 2023.

·       Android 14 introduces first-of-its-kind cellular connectivity security features. Google Security Blog. August 2023.

·       Hardening Firmware Across the Android Ecosystem. Google Security Blog. February 2023.

·       Leveraging digital certificates to protect commercial 5G mobile networks. March 2021.

·       A reflection on the history of cellular security research and the security outlook of 5G. June 2019.

·       Are we there yet? The long path to securing 5G mobile communication networks. May 2018.

·       The impact of open source on mobile security research. May 2016.

 


Books:

(Book chapter) Applying low-cost software radio for experimental analysis of LTE security, protocol exploits and location leaks.

Intrusion Detection and Prevention for Mobile Ecosystems.

Taylor & Francis LLC, CRC Press. Publication Summer 2017.

(Book chapter) Security and impact of the IoT on LTE mobile networks. [Pre-print PDF version]*

Security and Privacy in Internet of Things (IoT): Models, Algorithms, and Implementations.

Taylor & Francis LLC, CRC Press. Publication late 2015.

*Posted here based on the contributor agreement with the publisher.


Patents:

(More details and links at my Google Scholar profile)

·       BIOMETRIC IDENTIFICATION THROUGH INTRA-BODY COMMUNICATION. US Patent Application US20220197987A1, filed May 15th 2020. Patent pending.

 

·       CRYPTOGRAPHICALLY SIGNING AN ACCESS POINT DEVICE BROADCAST MESSAGE. US Patent US9860067B2, filed October 2015.

 

·       METHOD AND APPARATUS FOR COMMUNICATING NETWORK MANAGEMENT TRAFFIC OVER A NETWORK. US Patent US9729197 B2, filed October 2015.

 

·       METHOD AND APPARATUS FOR ENCRYPTION OF COMMUNICATIONS OVER A NETWORK. US Patent US9769128 B2, filed September 2015.

 

·       METHOD AND APPARATUS FOR ENCRYPTION OF COMMUNICATIONS OVER A POWER LINE NETWORK. US Patent Application PCT/US2016/050039, filed September 2016. Patent pending.

 

·       METHODS AND APPARATUS TO TRANSMIT DATA IN A CONNECTIONLESS MODE. US Patent US9832790B2, filed September 2015.

 

·       METHOD AND APPARATUS FOR DISTRIBUTING SOFTWARE UPDATES. US Patent US9904535B2, filed September 2015.

 

·       METHOD AND APPARATUS FOR COMMUNICATIONS MANAGEMENT IN A NEIGHBORHOOD NETWORK. US Patent US9735833 B2, filed July 2015.

 

·       METHOD AND APPARATUS FOR AUTHENTICATION AND IDENTITY MANAGEMENT OF COMMUNICATING DEVICES. US Patent US9820146 B2, filed July 2015.

 

·       SIGNAL FNGERPRINTING FOR AUTHENTICATION OF COMMUNICATING DEVICES. US Patent US9913139B2, filed June 2015.

 

·       METHOD AND APPARATUS FOR PROVIDING SECURITY USING NETWORK TRAFFIC ADJUSTMENTS. US Patent US9667317 B2, filed June 2015.

 

·       DECENTRALIZED AND DISTRIBUTED SECURE HOME SUBSCRIBER SERVER DEVICE. US Patent US9667600 B2, filed April 2015.

 

·       SECURITY ENHANCEMENTS FOR A SOFTWARE-DEFINED NETWORK WITH NETWORK FUNCTIONS VIRTUALIZATION. US Patent US9742807 B2, filed November 2014.

 

·       BASE STATION ANTENNA BEAM FORMING BASED JAMMING DETECTION AND MITIGATION. US Patent Application 20150138992 A1, filed November 2013. Patent pending.

 

·       ENDPOINT DEVICE ANTENNA BEAM FORMING BASED JAMMING DETECTION AND MITIGATION. United States Patent US9288007 B2, filed November 2013. [UPSTO link]

 

·       METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY. United States Patent US9119064 B2, filed November 2013.

 

·       MALWARE AND ANOMALY DETECTION VIA ACTIVITY RECOGNITION BASED ON SENSOR DATA. United States Patent US 9319423 B2, filed November 2013.

 

·       DETECTION AND MITIGATION OF DENIAL-OF-SERVICE ATTACKS IN WIRELESS COMMUNICATION NETWORKS. United States Patent US9295028 B2, filed October 2013.

 

·       SYNCHRONIZING MOBILE DEVICES AND DISPLAYS. United States Patent US8915441 B2, filed October 2012.

 

·       SHORT MESSAGE SERVICE SPAM DATA ANALYSIS AND DETECTION. United States Patent US9445245, filed July 2012.

 

·       METHOD AND APPARATUS FOR RANKING APPS IN THE WIDE-OPEN INTERNET. United States Patent Application 20140006418 A1, filed July 2012. Patent pending.

 

·       METHOD AND APPARATUS FOR DERIVING AND USING TRUSTFUL APPLICATION METADATA. United States Patent US9449104 B2, filed July 2012.

 

·       METHOD AND APPARATUS FOR SEARCHING FOR SOFTWARE APPLICATIONS. United States Patent Application 20140006440 A1, filed July 2012. Patent pending.

 

·       METHOD AND APPARATUS FOR ROBUST MOBILE APPLICATION FINGERPRINTING. United States Patent Application 20140006375 A1, filed July 2012. Patent pending.

 

·       11 more patent applications filed pending to be published.


Selected talks:

·       The impact of open-source testbeds on cellular security research. IEEE Future Networks Testbed Requirements, Challenges and Opportunities workshop. February 2022. [Slides]

·       5G Protocol Vulnerabilities and Exploits. ShmooCon 2020. February 2020. [Slides] [Video]

·       Mobile Network Security and its Impact on Fraud and Privacy. iSMG New York Fraud Summit. March 2019. [Recording]

·       Exploring LTE security with open-source tools, testing protocols exploits and analyzing their potential impact on 5G mobile networks. Virginia Tech Hume Center. November 2018. [Slides]

·       Protocol-fuzzing LTE Mobile Networks with Open-Source Tools, Testing Protocol Exploits and Analyzing Their Potential Impact on 5G Mobile Networks. HushCon East. June 2018.

·       Seminar: Protocol-fuzzing mobile networks with open-source tools to enhance the security of LTE and 5G mobile networks. UC Irvine. May 2018.

·       Tutorial: LTE security analysis and experimentation with low-cost software radio. CTTC Research Center. March 2017.

·       LTE security, protocol exploits and location tracking experimentation with low-cost software radio. Hacker Halted. September 2016. [Slides]

·       LTE protocol exploits: IMSI catchers, blocking devices and location leaks. TakeDownCon. June 2016. [Slides]

·       LTE Security and Protocol Exploits. ShmooCon 2016. January 2016.

·       Security Threats and Challenges of the IoT Over Mobile Networks. International Wireless Industry Consortium workshop on IoT. November 2015.

·       Security Analysis and Design in LTE using Simulation Modeling. Riverbed/OPNET Modeler User Conference. February 2015.

·       Security Attacks Against the Availability of LTE Mobility Networks - Overview and Research Directions. Telefonica Research. Barcelona. June 2014.

·       Next-generation Mobility Security Architecture Research Testbed: 15th Annual AT&T Cyber Security Conference (September 2013)


Selected media appearances:

·       Android 14 could stop your one-time passwords from leaking. Android Police. August 2023.

·       Android 14 takes aim at insecure cryptography in cellular networks. XDA Developers. August 2023.

·       Google details how Android 14 protects against cellular attacks. 9to5 Google. August 2023.

·       Google Teams Up with Ecosystem Partners to Enhance Security of SoC Processors. The Hacker News. February 2023.

·       Google is making your Android phone safer with hardened firmware. Android Police. March 2023.

·       5G: Are We Ready? Security Risks with the New Technology. Trend Micro security blog. January 2021.

·       How cops can secretly track your phone. The Intercept. July 2020.

·       5G security is a mess. Could digital certificates help? CSO Online. February 2020.

·       One Small Fix Would Curb Stingray Surveillance. Wired. January 2020.

·       Sen. Wyden Pushes FCC on 5G Security. BankInfoSecurity. November 2019.

·       5G testbed in Virginia targets wireless security. Fierce Wireless. October 2019.

·       5G wireless test bed boosts security research in Virginia. TechRepublic. October 2019.

·       Test bed for 5G wireless security will accelerate cyber research in Virginia. Virginia Tech News. October 2019.

·       The History of Cellular Network Security Doesn’t Bode Well for 5G. Electronic Frontier Foundation (EFF) Deeplinks blog. June 2019.

·       Cellular Networks Present Security Challenges (discussion on SS7, GSM, LTE and 5G security). Interview with Data Breach Today, iSMG. April 2019.

·       Discussion on mobile (SS7, GSM, LTE, 5G) security [7:20]. iSMG Security Report podcast. March 2019.

·       AT&T Awarded Patent for Bitcoin-Powered Subscriber Server. CoinDesk. June 2017.

·       Radio interview on technology and mobile security (Live from NYC). RAC1 Radio Barcelona. November 2016. [Audio – In Catalan]

·       AT&T Adopting Blockchain. Financial Advisor. October 2016.

·       AT&T is Seeking a Patent for a Bitcoin-Powered Server. CoinDesk. October 2016.

·       Watch Out! Security Experts Offer Warnings, Recommendations during UConn’s Cybercrime Prevention Conference. University of Connecticut Business School. July 2016.

·       How to Secure the Changing Face of Mobile. Bloomberg Technology Blog. June 2016.

·       Mobile Security: A Conversation with Roger Piqueras Jover. Bloomberg Technology Blog. December 2015.

·       AT&T researchers publish landmark SMS spam study. The FrontLine V3.co.uk


Service and affiliations:

Tutorials and panels:

 

·       LTE and 5G protocol security procedures and vulnerability analyses using software radio testbeds – 2018 IEEE Conference on Military Communications (IEEE MILCOM). [Slides]

·       LTE Mobility Security and Virtualization – 2016 IEEE International Conference on Communications (IEEE ICC) [Slides]

·       Invited panelist: Physical-layer security for future emerging networks: challenges and limitations - 2016 IEEE International Conference on Communications (IEEE ICC) – Workshop on Wireless Physical Layer Security

Program Committee:

 

·       ACM CCS – TPC member - 2024

·       ACM Conference on Security and Privacy in Wireless and Mobile Networks – TPC member – 2023, 2024

·       IEEE Conference on Communications and Network Security - TPC member – 2019.

·       IEEE Wireless Communications and Networking Conference - TPC member – 2019.

·       1st IEEE Workshop on 5G Wireless Security (5G-SECURITY) – TPC member – 2018.

·       International Symposium on Security and Privacy of the Internet of Things – TPC member – 2017, 2018, 2019.

·       IEEE Seattle 5G Summit – TPC Co-Chair - 2016

·       IEEE Aalborg 5G Summit – TPC Co-Chair - 2016

·       IEEE Sarnoff Symposium – Demo/Exhibit Chair

·       IEEE Silicon Valley 5G Summit – TPC Co-Chair – 2015

·       IEEE Toronto 5G Summit – TPC Co-Chair - 2015

·       IEEE Workshop on Software Defined 5G Networks (Soft5G) – TPC member - 2016

·       The 36th IEEE Sarnoff Symposium – TPC member - 2015

·       IEEE International 5G Summit – Program co-chair - 2015

·       International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE) – TPC member - 2015

·       IEEE Workshop on Data Analysis for Social and Secure Smartphone Applications – TPC member - 2014

·       Global Wireless Summit – Wireless Vitae – TPC member – 2014

·       All Things Cellular – Sigcomm workshop (previously CellNet) – TPC member – 2014

·      International Conference on Internet Monitoring and Protection (ICIMP) – TPC member – 2013, 2014, 2015

·       IEEE GWS - Wireless Personal Multimedia Communications Symposium (WPMC'13) – Session chair

Service and Editorial:

 

·       IEEE Wireless Communications magazine. Special issue: Challenges and Novel Solutions for 5G Network Security, Privacy and Trust – Co-guest editor.

·       ELSEVIVER Future Generation Computer Systems: Special issue on Advancements in 5G Network Security – Co-guest editor.

·       Member of the IEEE Communications Society Industry Relation task force.

·      Journal of Cyber Security and Mobility: Special issue on Next generation mobility network security – Guest Editor [CFPs]

Reviewer:

 

·       IEEE Transactions on Wireless Communications

·       IEEE Transactions on Mobile Computing

·       IEEE Transactions on Vehicular Technology

·       IEEE Communications Letters

·       IEEE/ACM Transactions on Networking

·       IEEE Wireless Communications Magazine

·       IEEE IoT journal

·       Elseviver Ad-Hoc Networks Journal

·       Wiley International Journal of Communication Systems

·       Conferences: CCS, WiSec, Sigmetrics, ICC, ICASSP, WCNC, VizSec, Oakland (S&P), PIMRC, Mobicom, Sigcomm, IEEE CNS.

IEEE/ComSoc Member

IEEE Internet of Things Community member

IEEE Cybersecurity Technical Community member

ACM/Sigcomm/Sigmobile Member


Resume

Copyright © 2024, Roger Piqueras Jover. All rights reserved.