Search Results - "Grégio, André"
-
1
On the Challenges of Automated Testing of Web Vulnerabilities
Published in 2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) (01-09-2020)“…Pentesting is an important process to reduce the risks associated with attacks in Web applications. However, testers may find some difficulties while…”
Get full text
Conference Proceeding -
2
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection
Published in Expert systems with applications (01-09-2022)“…Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of OS events and on applying pattern matching procedures on binaries to…”
Get full text
Journal Article -
3
Challenges and pitfalls in malware research
Published in Computers & security (01-07-2021)“…As the malware research field became more established over the last two decades, new research questions arose, such as how to make malware research…”
Get full text
Journal Article -
4
Fast & Furious: On the modelling of malware detection as an evolving data stream
Published in Expert systems with applications (01-02-2023)“…Malware is a major threat to computer systems and imposes many challenges to cyber security. Targeted threats, such as ransomware, cause millions of dollars in…”
Get full text
Journal Article -
5
We need to talk about antiviruses: challenges & pitfalls of AV evaluations
Published in Computers & security (01-08-2020)“…Security evaluation is an essential task to identify the level of protection accomplished in running systems or to aid in choosing better solutions for each…”
Get full text
Journal Article -
6
The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support
Published in Journal of Computer Virology and Hacking Techniques (01-09-2020)“…Self modifying code (SMC) are code snippets that modify themselves at runtime. Malware use SMC to hide payloads and achieve persistence. Software-based SMC…”
Get full text
Journal Article -
7
ControlChain: A new stage on the IoT access control authorization
Published in Concurrency and computation (25-06-2020)“…Summary The IoT is changing the way we interact with the world. Very soon, almost all of our daily tasks will be made through self intelligent systems embedded…”
Get full text
Journal Article -
8
Identifying Android malware using dynamically obtained features
Published in Journal of computer virology and hacking techniques (01-02-2015)“…The constant evolution of mobile devices’ resources and features turned ordinary phones into powerful and portable computers, leading their users to perform…”
Get full text
Journal Article -
9
A [in]Seguran\c{c}a dos Sistemas Governamentais Brasileiros: Um Estudo de Caso em Sistemas Web e Redes Abertas
Published 13-09-2021“…Whereas the world relies on computer systems for providing public services, there is a lack of academic work that systematically assess the security of…”
Get full text
Journal Article -
10
Malware MultiVerse: From Automatic Logic Bomb Identification to Automatic Patching and Tracing
Published 13-09-2021“…Malware and other suspicious software often hide behaviors and components behind logic bombs and context-sensitive execution paths. Uncovering these is…”
Get full text
Journal Article -
11
AntiViruses under the microscope: A hands-on perspective
Published in Computers & security (01-01-2022)“…AntiViruses (AVs) are the main defense line against attacks for most users and much research has been done about them, especially proposing new detection…”
Get full text
Journal Article -
12
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
Published in Computers & security (01-09-2018)“…Smartphones form a complex application ecosystem with a myriad of components, properties, and interfaces that produce an intricate relationship network. Given…”
Get full text
Journal Article -
13
Toward a Taxonomy of Malware Behaviors
Published in Computer journal (01-10-2015)“…Malicious code attacks pose a serious threat to the security of information systems, as malware evolved from innocuous conceptual software to advanced and…”
Get full text
Journal Article -
14
Leveraging branch traces to understand kernel internals from within
Published in Journal of Computer Virology and Hacking Techniques (01-06-2020)“…Kernel monitoring is often a hard task, requiring external debuggers and/or modules to be successfully performed. These requirements make analysis procedures…”
Get full text
Journal Article -
15
-
16
“VANILLA” malware: vanishing antiviruses by interleaving layers and layers of attacks
Published in Journal of Computer Virology and Hacking Techniques (01-12-2019)“…Malware are persistent threats to any networked systems. Recent years increase in multi-core, distributed systems created new opportunities for malware authors…”
Get full text
Journal Article -
17
The other guys: automated analysis of marginalized malware
Published in Journal of Computer Virology and Hacking Techniques (01-02-2018)“…In order to thwart dynamic analysis and bypass protection mechanisms, malware have been using several file formats and evasive techniques. While publicly…”
Get full text
Journal Article -
18
ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT
Published in GLOBECOM 2017 - 2017 IEEE Global Communications Conference (01-12-2017)“…The IoT is pervading our daily activities and lives with devices scattered all over our cities, transport systems, buildings, homes and bodies. This invasion…”
Get full text
Conference Proceeding -
19
Machine Learning (In) Security: A Stream of Problems
Published 04-09-2023“…Digital Threats 2023 Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-the-art for solving many of the open issues in…”
Get full text
Journal Article -
20
Fast & Furious: Modelling Malware Detection as Evolving Data Streams
Published 16-08-2022“…Malware is a major threat to computer systems and imposes many challenges to cyber security. Targeted threats, such as ransomware, cause millions of dollars in…”
Get full text
Journal Article