Roger Piqueras Jover         Updated January 19th, 2017
Wireless Engineer and Security Research Scientist (Dipl-.Ing., MSc, MPhil)

Copyright © 2016, Roger Piqueras Jover. All rights reserved.


 Main          Profile          Research          Blog            Links        LTE stuff        Code        @me


Currently at:

Bloomberg L.P. – CTO Security Architecture Team

 

Formerly at:

AT&T Security Research Center


Email: roger.piqueras at ieee dot org
Mailing address: 731 Lexington Ave, 06W-080, New York, NY 10022

Radio Technician: KD2MDK

 

US Permanent Resident

 

Personal research on security of mobile (LTE RAN and EPC) and wireless short range networks (Bluetooth, WLAN, ZigBee, etc). Research and development of new security systems and architectures to enhance the security of next-gen biometrics and two-factor authentication devices. Actively involved in projects on data mining of large data sets for anomaly detection. Side projects on new mobile network architectures for 5G to address the problems of control plane signaling overloads, using Bitcoin for cool stuff to make 5G mobile networks more secure and scalable and PHY layer security of LTE mobile networks. Implementation and test of advanced LTE protocol exploits and LTE rogue base station prototypes.

 

More details about my background, skills, interests and experience here. Q&A with Bloomberg here and here. Security work highlighted by Sanjole here.


Education:

December’10: M.Phil. in Electrical Engineering (M.S. + PhD everything but dissertation), Columbia University in the City of New York (GPA: 4.0)

June’08: M.S. in Electrical and Computer Engineering, University of California, Irvine (GPA: 4.0)

March’06: Dipl.-Ing. in Telecommunications Engineering, Polytechnic University of Catalunya (Barcelona) (Top 10%)


Bio:

Roger Piqueras Jover was born in Barcelona. He graduated from the Escola Tècnica Superior d'Enginyeria de Telecomunicacions de Barcelona (ETSETB) of the Universitat Politècnica de Catalunya (UPC) in 2006 and obtained a Dipl.-Ing. in Telecommunications Engineering with a specialization in communications. During his graduation project, as a member of the Radio Communication Research Group of the Department of Signal Theory and Communications, he analyzed Radio Resource Management Strategies for Heterogeneous Mobile Networks GSM/EDGE+UMTS.

In 2006 he was awarded a Balsells Fellowship to pursue graduate studies in Electrical Engineering at the University of California, Irvine. There he joined the Wireless Circuits and Systems Lab where he worked on the design and implementation of a wireless channel emulator for MIMO/OFDM 802.11n systems. He graduated with a MSc in Electrical and Computer Engineering in June 2008. Then he moved to New York City to work in a research project on interference mitigation in Femtocell Networks in the Department of Electrical Engineering at Columbia University in the City of New York, where he graduated in 2010 with a MPhil in Electrical Engineering.

From December 2010 to September 2015 he was a member of the AT&T’s Security Research Center, where he held the roles of Member of Technical Staff, Senior Member of Technical Staff and Principal Member of Technical Staff and was awarded the CSO Award, the CTO Award and the Key Contributor Award. At AT&T, he led the projects on LTE mobile network security, investigating PHY layer threats and LTE protocol exploits, as well as control plane signaling scalability issues. He is now a Security Research Scientist at the CTO Security Architecture team of Bloomberg LP. At his current role, he is involved in wireless security analysis and design, two-factor authentication systems as well as other security areas, such as machine learning applied to anomaly detection and system security research. Roger holds over a dozen issued and published patent applications, with another dozen pending to be published. He has co-authored manuscripts in numerous top communications and security conferences and is the TPC Co-Chair for the ongoing IEEE 5G Summit series. He is also the author of a book chapter on the security and impact of the IoT on LTE mobile networks.

His research interests are in the area of mobile and wireless communications, resource allocation, new network architectures and technologies for 5G and security for wireless networks. In his spare time, he actively works in identifying, implementing on software-radio and proposing solutions to PHY layer threats, rogue base stations and protocol exploits against LTE cellular networks.

He enjoys playing soccer, listening to music and going to concerts, cinema, traveling and making new friends from all around the world. He is a very passionate supporter of Futbol Club Barcelona, the greatest football team ever.

 

More detailed information can be found in my Resume and in the research section.


Honors:

AT&T Key Contributor Award. To recognize outstanding individual contributions toward objectives of the organization. Awarded March 2014.

IEEE Transactions on Mobile Computing 2012 Distinguished Reviewer. For reviewers contributing significant amounts of time to reviewing manuscripts and also in the quality of their reviews. Awarded March 2013.

AT&T Key Contributor Award. To recognize outstanding individual contributions toward objectives of the organization. Awarded March 2013.

AT&T Chief Technology Office Award. To recognize employees within the CTO organization that have demonstrated extraordinary and outstanding achievement. Awarded March 2013.

AT&T Chief Security Office Quarterly SVP Award (4th quarter of 2011). For extraordinary and outstanding achievement in support of CSO's goals.

Balsells Fellowship; September 2006 – September 2007. Full tuition and stipend. Awarded with a scholarship to pursue graduate studies at the School of Engineering in University of California Irvine.


Publications:

(More details and links at my Google Scholar profile)

LTE security, protocol exploits and location tracking experimentation with low-cost software radio.

Roger Piqueras Jover.

arXiv Technical Report (not peer reviewed). July 2016. [PDF]

 

dHSS - Distributed Peer-to-Peer implementation of the LTE HSS based on the Bitcoin/Namecoin architecture.

Roger Piqueras Jover, Joshua Lackey.

IEEE International Conference on Communications - Workshop on 5G Architecture (IEEE ICC – 5GArch’16). May 2016. [PDF] (§)

 

LTE/LTE-A Jamming, Spoofing and Sniffing: Threat Assessment and Mitigation.

Marc Lichtman, Roger Piqueras Jover, Mina Labib, Raghunandan Rao, Vuk Marojevic, Jeffrey H. Reed.

IEEE Communications Magazine. Special issue on Critical Communications and Public Safety Networks. April 2016. [IEEE Xplore][PDF] (§)

 

LTE Security and Protocol Exploits.

Roger Piqueras Jover.

ShmooCon 2016. January 2016. (Acceptance rate 15.77%) [Slides][Video]

 

Detecting malicious activity on smartphones using sensor measurements.

Roger Piqueras Jover, Ilona Murynets, Jeffrey Bickford.

9th International Conference on Network and System Security (NSS’15). To be presented, November 2015.

 

Connection-less communication of IoT devices over LTE mobile networks.

Roger Piqueras Jover, Ilona Murynets.

IEEE International Conference on Sensing, Communication and Networking (IEEE SECON'15). June 2015. [PDF]

 

Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks.

Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin.

IEEE WoWMoM 2015. June 2015. (Acceptance rate 20%) [PDF]

 

A scalable test bed for large-scale LTE security research.

Jill Jermyn, Roger Piqueras Jover, Ilona Murynets, Mikhail Istomin.

IEEE North Jersey Advanced Communications Symposium. Poster session. September 2014. [PDF]

 

Enhancing the security of LTE networks against jamming attacks.

Roger Piqueras Jover, Joshua Lackey, Arvind Raghavan.

EURASIP Journal on Information Security. April 2014. [PDF]

 

Firecycle: A scalable test bed for large-scale LTE security research.

IEEE International Conference on Communications – Communications and Information Systems Security Symposium (ICC’14 CISS). June 2014. [PDF]

 

Analysis and Detection of SIMbox Fraud in Mobility Networks.

Ilona Murynets, Michael Zabarankin, Roger Piqueras Jover, Adam Panagia.

IEEE Infocom, April 2014. (Acceptance rate 19.4%) [PDF]

 

Is It Really You? User Identification via Adaptive Behavior Fingerprinting.

Paul Giura, Ilona Murynets, Roger Piqueras Jover, Yevgeny Vahlis.

ACM Conference on Data and Application Security and Privacy (CODASPY’14), March 2014. (16% acceptance rate) [pdf]

 

Security Attacks Against the Availability of LTE Mobility Networks: Overview and Research Directions.

Roger Piqueras Jover.

IEEE Global Wireless Summit - Wireless Personal Multimedia Communications Symposium (GWS - WPMC), June 2013. [pdf]

 

Analysis of SMS Spam in Mobility Networks.

Ilona Murynets, Roger Piqueras Jover.

International Journal of Advanced Computer Science (IJACSci), Vol. 3 num. 7, July 2013. [pdf]

 

How Vulnerabilities in Wireless Networks Can Enable Advanced Persistent Threats.

Roger Piqueras Jover, Paul Giura.

International Journal on Information Technology (IREIT), Vol. 1 num. 2. March 2013. [pdf]

 

Anomaly detection in cellular Machine-to-Machine communications.

Ilona Murynets, Roger Piqueras Jover.

IEEE International Conference on Communications (ICC’13). June 2013. [pdf]

 

Crime Scene Investigation: SMS Spam Data Analysis.

Ilona Murynets, Roger Piqueras Jover.

ACM Internet Measurement Conference 2012 (IMC’12). November 2012, Boston MA. (24% acceptance rate) [ACM Library] [pdf]

 

How an SMS-based Malware Infection Will Get Throttled by the Wireless Link.

Ilona Murynets, Roger Piqueras Jover.

IEEE International Conference on Communications (ICC’12 CISS). June 2012. [IEEE Xplore] [PDF]

 

Uplink Interference Mitigation for OFDMA Femtocell Networks.

Yanzan Sun, Roger Piqueras Jover, Xiaodong Wang.

IEEE Transactions on Wireless Communications, vol.11, no.2, pp.614-625, February 2012. [IEEE Xplore] [PDF] (§)

 

Dynamic Pricing for Decentralised RAT Selection in Heterogeneous Scenarios

Roger Piqueras Jover, Jordi Perez-Romero, Oriol Sallent, Ramon Agusti.

2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, Helsinki, September 2006 [IEEE Xplore] (§)

 

Analysis and Design of New Initial RAT Selection Strategies Based on Pricing and Path Loss for Heterogeneous Wireless Networks GSM/EDGE/UMTS (Thesis)

Roger Piqueras Jover

Final research project for the degree of Telecommunications Engineering BSc, Universitat Politècnica de Catalunya, March 2006. (In Catalan) [pdf]

 

Translation to English of my undergraduate thesis (work in progress) available here: Analysis and Design of New Initial RAT Selection Strategies Based on Pricing and Path Loss for Heterogeneous Wireless Networks GSM/EDGE/UMTS

(Note: Automatically generated with Google Translate. Don’t expect Shakespeare’s English. Read abstract for details on the translation)

Variable Rigidity PDMS Structures.

Roger Piqueras Jover, Teresa Fazio, Shalom Wind.

Presented at The Gordon Research Conference on Nanostructure Fabrication, July 2010, Tilton, NH (link)

 

Biocompatible Surfaces witch Locally variable Rigidity

Roger Piqueras Jover, Teresa Fazio, Shalom Wind.

Presented at The 54th International Conference on Electron, Ion and Photon Beam Technology and Nanofabrication, EIPBN June 2010, Anchorage, AK. [pdf]

 

(§) PDF of the accepted version of the paper (pre-print) shared here as per the new IEEE Policy Regarding Authors Rights to Post Accepted Versions of Their Papers.

 

© 2006-2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.


Books:

(Book chapter) Security and impact of the IoT on LTE mobile networks. [Pre-print PDF version]*

Security and Privacy in Internet of Things (IoT): Models, Algorithms, and Implementations.

Taylor & Francis LLC, CRC Press. Publication late 2015.

*Posted here based on the contributor agreement with the publisher.


Patents:

(More details and links at my Google Scholar profile)

·       METHOD AND APPARATUS FOR AUTHENTICATION AND IDENTITY MANAGEMENT OF COMMUNICATING DEVICES. US Patent Application US20160366587 A1, filed June 2015. Patent pending.

 

·       SIGNAL FNGERPRINTING FOR AUTHENTICATION OF COMMUNICATING DEVICES. US Patent Application US20160366586 A1, filed June 2015. Patent pending.

 

·       METHOD AND APPARATUS FOR PROVIDING SECURITY USING NETWORK TRAFFIC ADJUSTMENTS. US Patent Application US20160365897 A1, filed June 2015. Patent pending.

 

·       DECENTRALIZED AND DISTRIBUTED SECURE HOME SUBSCRIBER SERVER DEVICE. US Patent Application US20160294783 A1, filed April 2015. Patent pending.

 

·       SECURITY ENHANCEMENTS FOR A SOFTWARE-DEFINED NETWORK WITH NETWORK FUNCTIONS VIRTUALIZATION. US Patent Application US20160142427 A1, filed November 2014. Patent pending.

 

·       BASE STATION ANTENNA BEAM FORMING BASED JAMMING DETECTION AND MITIGATION. US Patent Application 20150138992 A1, filed November 2013. Patent pending.

 

·       ENDPOINT DEVICE ANTENNA BEAM FORMING BASED JAMMING DETECTION AND MITIGATION. United States Patent US9288007 B2, filed November 2013. [UPSTO link]

 

·       METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY. United States Patent US 9,119,064 B2, filed November 2013. [UPSTO link]

 

·       MALWARE AND ANOMALY DETECTION VIA ACTIVITY RECOGNITION BASED ON SENSOR DATA. United States Patent US 9,319,423 B2, filed November 2013. [UPSTO link]

 

·       DETECTION AND MITIGATION OF DENIAL-OF-SERVICE ATTACKS IN WIRELESS COMMUNICATION NETWORKS. United States Patent US 9,295,028 B2, filed October 2013.

 

·       SYNCHRONIZING MOBILE DEVICES AND DISPLAYS. United States Patent US 8,915,441 B2, filed October 2012. [USPTO link]

 

·       SHORT MESSAGE SERVICE SPAM DATA ANALYSIS AND DETECTION. United States Patent US 13/539,675, filed July 2012. [UPSTO link]

 

·       METHOD AND APPARATUS FOR RANKING APPS IN THE WIDE-OPEN INTERNET. United States Patent Application 20140006418 A1, filed July 2012. Patent pending.

 

·       METHOD AND APPARATUS FOR DERIVING AND USING TRUSTFUL APPLICATION METADATA. United States Patent US9449104 B2, filed July 2012. [UPSTO link]

 

·       METHOD AND APPARATUS FOR SEARCHING FOR SOFTWARE APPLICATIONS. United States Patent Application 20140006440 A1, filed July 2012. Patent pending.

 

·       METHOD AND APPARATUS FOR ROBUST MOBILE APPLICATION FINGERPRINTING. United States Patent Application 20140006375 A1, filed July 2012. Patent pending.

 

·       11 more patent applications filed pending to be published.


Service and affiliations:

Tutorials and panels:

 

·       LTE Mobility Security and Virtualization – 2016 IEEE International Conference on Communications (IEEE ICC) [Slides]

·       Invited panelist: Physical-layer security for future emerging networks: challenges and limitations - 2016 IEEE International Conference on Communications (IEEE ICC) – Workshop on Wireless Physical Layer Security

Program Committee:

 

·       IEEE Seattle 5G Summit – TPC Co-Chair - 2016

·       IEEE Aalborg 5G Summit – TPC Co-Chair - 2016

·       IEEE Sarnoff Symposium – Demo/Exhibit Chair

·       IEEE Silicon Valley 5G Summit – TPC Co-Chair – 2015

·       IEEE Toronto 5G Summit – TPC Co-Chair - 2015

·       IEEE Workshop on Software Defined 5G Networks (Soft5G) – TPC member - 2016

·       The 36th IEEE Sarnoff Symposium – TPC member - 2015

·       IEEE International 5G Summit – Program co-chair - 2015

·       International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE) – TPC member - 2015

·       IEEE Workshop on Data Analysis for Social and Secure Smartphone Applications – TPC member - 2014

·       Global Wireless Summit – Wireless Vitae – TPC member 2014

·       All Things Cellular Sigcomm workshop (previously CellNet) – TPC member – 2014

·       International Conference on Internet Monitoring and Protection (ICIMP) – TPC member – 2013, 2014, 2015

·       IEEE GWS - Wireless Personal Multimedia Communications Symposium (WPMC'13) – Session chair

Service and Editorial:

 

·       Member of the IEEE Communications Society Industry Relation task force.

·       Journal of Cyber Security and Mobility: Special issue on Next generation mobility network security – Guest Editor [CFPs]

Reviewer:

 

·       IEEE Transactions on Wireless Communications

·       IEEE Transactions on Mobile Computing

·       IEEE Transactions on Vehicular Technology

·       IEEE Communications Letters

·       IEEE/ACM Transactions on Networking

·       IEEE Wireless Communications Magazine

·       IEEE IoT journal

·       Elseviver Ad-Hoc Networks Journal

·       Wiley International Journal of Communication Systems

·       Conferences: WiSec, Sigmetrics, ICC, ICASSP, WCNC, VizSec, Oakland (S&P), PIMRC, Mobicom, Sigcomm.

IEEE/ComSoc Member

IEEE Internet of Things Community member

IEEE Cybersecurity Technical Community member

ACM/Sigcomm/Sigmobile Member


Invited talks:

·       Tutorial: LTE security analysis and experimentation with low-cost software radio. CTTC Research Center. March 2017.

·       LTE security, protocol exploits and location tracking experimentation with low-cost software radio. University of California Irvine. February 2017. [Slides]

·       LTE security, protocol exploits and location tracking experimentation with low-cost software radio. Hacker Halted. September 2016. [Slides]

·       LTE protocol exploits: IMSI catchers, blocking devices and location leaks. TakeDownCon. June 2016. [Slides]

·       LTE Security and Protocol Exploits. ShmooCon 2016. January 2016.

·       LTE protocol exploits and control plane signaling scalability. Ericsson Research. November 2015.

·       Security Threats and Challenges of the IoT Over Mobile Networks. International Wireless Industry Consortium workshop on IoT. November 2015.

·       An overview of Wireless and Mobile Network Security. Intel Labs. June 2015.

·       Security Analysis and Design in LTE using Simulation Modeling. Riverbed/OPNET Modeler User Conference. February 2015.

·       Wireless and Mobile Networks. Guest lecture for CSCI690 Computer Networks. New York Institute of Technology (NYIT). October 2014.

·       Security Attacks Against the Availability of LTE Mobility Networks - Overview and Research Directions. IBM NY Thomas J. Watson Research Center. Summer 2014.

·       NYIT REU (Research Experience for Undergraduates) – Career panel. July 2014

·       Security Attacks Against the Availability of LTE Mobility Networks - Overview and Research Directions: Telefonica Research. Barcelona. June 2014.

·       Next-generation Mobility Security Architecture Research Testbed: 15th Annual AT&T Cyber Security Conference (September 2013)

·       NYIT REU (Research Experience for Undergraduates) – Career discovery panel (July 2013)

·       SMS spam data analysis and detection: 2nd Annual AT&T Mobility and Security Research Workshop (October 2012)

·       SMS spam data analysis: 14th Annual AT&T Cyber Security Conference (June 2012)

·       The Network as a Security Platform: AT&T Global Network Operations Center (December 2011)


Skills:

Hands on experience in wireless communications standards and technologies: LTE, GSM/EDGE, UMTS, 3G, CDMA, 802.11, OFDMA, WiMax, Mobile WiMax. Background and research exposure on new technologies and architectures proposed for 5G (SDN, NFV and virtualization, massive MIMO, MM-wave, small cells, etc).

Strong background in communication systems, wireless communications, RF and computer networking. Hands-on experience with digital system design (FPGA/VHDL), wireless systems simulation and radio resource management (RAT selection, handoff, vertical handoff, pricing for wireless networks).

Experience in networking and MAC for 802.11 networks, sensor networks, mesh networks and RFID. Hands on experience with MadWiFi and WireShark. Wireless networking (MAC protocols, IEEE 802.11, Bluetooth, IEEE 802.16, routing).

Advanced hands-on experience with Software Radio (USRP N210, gnuradio) and Arduino platforms.

Advanced Android development skills. Proficiency in C, Java, Matlab, Python, VHDL and FPGA programming.

Extensive experience in 3G wireless networks. Current exposure to 3.5G/4G cellular systems (LTE and Mobile WIMax). Femtocell/in-home base station technology. RF interference avoidance and cancellation.

Experience with oscilloscope, signal generator and spectrum analyzer (Tektronix RSA3408B and AWG5000B). Hands on with UE and NodeB/eNodeB emulators, cellular network probes, traffic sniffers: Sanjole WaveJudge/IntelliJudge LTE sniffers, Niksun LTE probe, BreakingPoint and Ixia UE+eNodeB emulators.

Advanced skills with OPNET network simulator. Experience with UMTS and LTE modules.

Hands on experience with Nano-Engineering tools: Scanning Electron Microscope, Electron-beam Lithography, thin film processing, nanofeature characterization using Agilent G200 Nanoindenter.

Advanced digital image processing.

Languages: English (fluent), German (fluent), Spanish (native), Catalan (native).


Media appearances:

·       Radio interview on technology and mobile security (Live from NYC). RAC1 Radio Barcelona. November 2016. [Audio – In Catalan]

·       AT&T is Seeking a Patent for a Bitcoin-Powered Server. CoinDesk. October 2016.

·       Watch Out! Security Experts Offer Warnings, Recommendations during UConn’s Cybercrime Prevention Conference. University of Connecticut Business School. July 2016.

·       How to Secure the Changing Face of Mobile. Bloomberg Technology Blog. June 2016.

·       Mobile Security: A Conversation with Roger Piqueras Jover. Bloomberg Technology Blog. December 2015.

·       Four short links: LTE Security, Startup Tools, Security Tips, and Data Fiction. O’Reilly Radar.

·       AT&T researchers publish landmark SMS spam study. The FrontLine V3.co.uk


Some Wireless/Mobility projects (from when I was in school)

Wireless Sensing Applied to Femtocell Networks (synchronization and interference management), Wireless Sensor Networks, Columbia University, Fall’10.

·       Project report

·       Presentation

Radio-Interference in Femtocell Cellular Networks: Survey and Simulation Study for WiMAX/OFDMA Networks, Wireless & Mobile Networking I, Columbia University, Fall’10

Link Budget and capacity analysis of LTE networks, LTE & WiMAX networks, Columbia University, Spring’10

Interference in Femtocell Networks, Wireless & Mobile Networking II, Columbia University, Spring’09

·       Presentation

MIMO/OFDM Wireless Channel Emulation for 802.11n Indoor Networks, Wireless Systems and Circuits Lab, University of California Irvine, 2007.

·       Presentation

Resilency of OFDM to Multipath Fading, Wireless Networks, University of California Irvine, Spring’07

·       Project report

Speech Processing projects (from when I was in school)

Automatic detection of individual words (specifically, numbers from 0 to 9), Universitat Politecnica de Catalunya, circa 2004.

·       Project report (in Spanish)

Advanced Digital Image Processing projects (from when I was in school)

Wavelet-based Fabric pattern detection, Rendering Techniques for Biomedical Imaging, University of California Irvine, Spring’07

·       Project report

·       Code

Pointilism Image Rendering, Advanced Digital Image Processing, University of California Irvine, Winter’07.

·       Project report

Nanofabrication projects (from when I was in school)

Variable rigidity surfaces for mechanobiology, Device Nanofabrication, Columbia University, Spring’10

·       Project report


Teaching experience:

·       Digital Communications I and II (University of California Irvine, Spring’07 and Winter’08).

·       VLSI Circuit Design (University of California Irvine, Fall’07)

·       Digital Communications (Columbia University, Fall’08)

·       Random Signals and Noise (Columbia University, Spring’09)

·       Information Theory (Columbia University, Spring’10)


Resume

Copyright © 2016, Roger Piqueras Jover. All rights reserved.

 

Description: Description: Visitor Tracking