Search Results - "Grégio, André"

Refine Results
  1. 1

    On the Challenges of Automated Testing of Web Vulnerabilities by de Lima, Luis F., Horstmann, Matheus C., Neto, David N., Gregio, Andre R. A., Silva, Fabiano, Peres, Leticia M.

    “…Pentesting is an important process to reduce the risks associated with attacks in Web applications. However, testers may find some difficulties while…”
    Get full text
    Conference Proceeding
  2. 2

    HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection by Botacin, Marcus, Alves, Marco Zanata, Oliveira, Daniela, Grégio, André

    Published in Expert systems with applications (01-09-2022)
    “…Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of OS events and on applying pattern matching procedures on binaries to…”
    Get full text
    Journal Article
  3. 3

    Challenges and pitfalls in malware research by Botacin, Marcus, Ceschin, Fabricio, Sun, Ruimin, Oliveira, Daniela, Grégio, André

    Published in Computers & security (01-07-2021)
    “…As the malware research field became more established over the last two decades, new research questions arose, such as how to make malware research…”
    Get full text
    Journal Article
  4. 4

    Fast & Furious: On the modelling of malware detection as an evolving data stream by Ceschin, Fabrício, Botacin, Marcus, Gomes, Heitor Murilo, Pinagé, Felipe, Oliveira, Luiz S., Grégio, André

    Published in Expert systems with applications (01-02-2023)
    “…Malware is a major threat to computer systems and imposes many challenges to cyber security. Targeted threats, such as ransomware, cause millions of dollars in…”
    Get full text
    Journal Article
  5. 5

    We need to talk about antiviruses: challenges & pitfalls of AV evaluations by Botacin, Marcus, Ceschin, Fabricio, de Geus, Paulo, Grégio, André

    Published in Computers & security (01-08-2020)
    “…Security evaluation is an essential task to identify the level of protection accomplished in running systems or to aid in choosing better solutions for each…”
    Get full text
    Journal Article
  6. 6

    The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support by Botacin, Marcus, Zanata, Marco, Grégio, André

    “…Self modifying code (SMC) are code snippets that modify themselves at runtime. Malware use SMC to hide payloads and achieve persistence. Software-based SMC…”
    Get full text
    Journal Article
  7. 7

    ControlChain: A new stage on the IoT access control authorization by Pinno, Otto Julio Ahlert, Grégio, André Ricardo Abed, De Bona, Luis C.E.

    Published in Concurrency and computation (25-06-2020)
    “…Summary The IoT is changing the way we interact with the world. Very soon, almost all of our daily tasks will be made through self intelligent systems embedded…”
    Get full text
    Journal Article
  8. 8

    Identifying Android malware using dynamically obtained features by Afonso, Vitor Monte, de Amorim, Matheus Favero, Grégio, André Ricardo Abed, Junquera, Glauco Barroso, de Geus, Paulo Lício

    “…The constant evolution of mobile devices’ resources and features turned ordinary phones into powerful and portable computers, leading their users to perform…”
    Get full text
    Journal Article
  9. 9

    A [in]Seguran\c{c}a dos Sistemas Governamentais Brasileiros: Um Estudo de Caso em Sistemas Web e Redes Abertas by Botacin, Marcus, Grégio, André

    Published 13-09-2021
    “…Whereas the world relies on computer systems for providing public services, there is a lack of academic work that systematically assess the security of…”
    Get full text
    Journal Article
  10. 10

    Malware MultiVerse: From Automatic Logic Bomb Identification to Automatic Patching and Tracing by Botacin, Marcus, Grégio, André

    Published 13-09-2021
    “…Malware and other suspicious software often hide behaviors and components behind logic bombs and context-sensitive execution paths. Uncovering these is…”
    Get full text
    Journal Article
  11. 11

    AntiViruses under the microscope: A hands-on perspective by Botacin, Marcus, Domingues, Felipe Duarte, Ceschin, Fabrício, Machnicki, Raphael, Zanata Alves, Marco Antonio, de Geus, Paulo Lício, Grégio, André

    Published in Computers & security (01-01-2022)
    “…AntiViruses (AVs) are the main defense line against attacks for most users and much research has been done about them, especially proposing new detection…”
    Get full text
    Journal Article
  12. 12

    Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems by Navarro, Luiz C., Navarro, Alexandre K.W., Grégio, André, Rocha, Anderson, Dahab, Ricardo

    Published in Computers & security (01-09-2018)
    “…Smartphones form a complex application ecosystem with a myriad of components, properties, and interfaces that produce an intricate relationship network. Given…”
    Get full text
    Journal Article
  13. 13

    Toward a Taxonomy of Malware Behaviors by Grégio, André Ricardo Abed, Afonso, Vitor Monte, Filho, Dario Simões Fernandes, Geus, Paulo Lício de, Jino, Mario

    Published in Computer journal (01-10-2015)
    “…Malicious code attacks pose a serious threat to the security of information systems, as malware evolved from innocuous conceptual software to advanced and…”
    Get full text
    Journal Article
  14. 14

    Leveraging branch traces to understand kernel internals from within by Botacin, Marcus, de Geus, Paulo Lício, Grégio, André

    “…Kernel monitoring is often a hard task, requiring external debuggers and/or modules to be successfully performed. These requirements make analysis procedures…”
    Get full text
    Journal Article
  15. 15
  16. 16

    “VANILLA” malware: vanishing antiviruses by interleaving layers and layers of attacks by Botacin, Marcus, de Geus, Paulo Lício, Grégio, André

    “…Malware are persistent threats to any networked systems. Recent years increase in multi-core, distributed systems created new opportunities for malware authors…”
    Get full text
    Journal Article
  17. 17

    The other guys: automated analysis of marginalized malware by Botacin, Marcus Felipe, de Geus, Paulo Lício, Grégio, André Ricardo Abed

    “…In order to thwart dynamic analysis and bypass protection mechanisms, malware have been using several file formats and evasive techniques. While publicly…”
    Get full text
    Journal Article
  18. 18

    ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT by Ahlert Pinno, Otto Julio, Abed Gregio, Andre Ricardo, De Bona, Luis C. E.

    “…The IoT is pervading our daily activities and lives with devices scattered all over our cities, transport systems, buildings, homes and bodies. This invasion…”
    Get full text
    Conference Proceeding
  19. 19

    Machine Learning (In) Security: A Stream of Problems by Ceschin, Fabrício, Botacin, Marcus, Bifet, Albert, Pfahringer, Bernhard, Oliveira, Luiz S, Gomes, Heitor Murilo, Grégio, André

    Published 04-09-2023
    “…Digital Threats 2023 Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-the-art for solving many of the open issues in…”
    Get full text
    Journal Article
  20. 20

    Fast & Furious: Modelling Malware Detection as Evolving Data Streams by Ceschin, Fabrício, Botacin, Marcus, Gomes, Heitor Murilo, Pinagé, Felipe, Oliveira, Luiz S, Grégio, André

    Published 16-08-2022
    “…Malware is a major threat to computer systems and imposes many challenges to cyber security. Targeted threats, such as ransomware, cause millions of dollars in…”
    Get full text
    Journal Article