2018


M. F. Botacin, P. L. de Geus, and A. R. A. Grégio
Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools and methods for systems and binary analysis on modern platforms
Computing Surveys, 51(4), 1-34, 2018
binary analysis malware security hvm smm introspection

URL DOI PDF BibTex
A. C. D. Resende and D. F. Aranha
Faster Unbalanced Private Set Intersection
Financial Cryptography and Data Security, 2018

BibTex
A. Faz-Hernandez, J. López, E. Ochoa-Jiménez, and F. Rodríguez-Henríquez
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
IEEE Transactions on Computers, 67(11), 1622-1636, 2018
sidh protocol montgomery ladder post-quantum cryptography montgomery reduction

Code URL DOI BibTex
L. Galante, M. Botacin, A. Grégio, and P. L. de Geus
Malicious Linux Binaries: A Landscape
WTICG, SBSeg'18, XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBC, 2018
malware analysis linux malware elf

URL PDF BibTex
G. Bertão, M. Botacin, A. Grégio, and P. L. de Geus
Large Scale Studies: Malware Needles in a Haystack
WTICG, SBSeg'18, XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBC, 2018
malware analysis large scale fine-grained coarse-grained

URL PDF BibTex
M. Botacin, P. L. de Geus, and A. Grégio
Hardware-Assisted Application Misbehavior Detection
SBSeg'18, XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBC, 2018
malware analysis application misbehavior hardware-assisted control flow

URL PDF BibTex
V. Afonso, A. Kalysch, T. Müller, D. Oliveira, A. Grégio, and P. L. de Geus
Lumus: Dynamically Uncovering Evasive Android Applications
Information Security Conference, 1-20, 2018
android malware dynamic analysis evasive malware

URL PDF BibTex
A. Faz-Hernandez, J. López, and A. K. D. S. de Oliveira
SoK: A Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures
APKC '18 Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, ACM New York, 2018, ISBN 978-1-4503-5756-2

Code URL DOI ISBN PDF BibTex
E. Rezende, G. Ruppert, T. Carvalho, A. Theophilo, F. Ramos, and P. de Geus
Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features
ITNG - 15th International Conference on Information Technology, Springer, 2018, ISBN 978-3-319-77027-7
malicious software classification machine learning deep learning transfer learning

URL DOI ISBN PDF BibTex
M. F. Botacin, P. L. de Geus, and A. R. A. Grégio
The other guys: automated analysis of marginalized malware
Journal of Computer Virology and Hacking Techniques, 14(1), 87-98, 2018
malware analysis systems evasive malware os security 64-bit systems cpl malware .net malware

URL DOI PDF BibTex
P. G. M. R. Alves and D. F. Aranha
A framework for searching encrypted databases
Journal of Internet Services and Applications, 9(1), 1-18, 2018

URL DOI BibTex
M. F. Botacin, P. L. de Geus, and A. R. A. Grégio
Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging
ACM Trans. on Privacy and Security, 21(1), 1-30, 2018

URL DOI PDF BibTex


Creative Commons License
Django Lab by Marcelo I. P. Salas
is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.