M. F. Botacin, P. L. de Geus, and A. R. A. Grégio. Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools and methods for systems and binary analysis on modern platforms. Computing Surveys, ACM, volume 51, issue 4, pages 1-34, 2018. A. C. D. Resende and D. F. Aranha. Faster Unbalanced Private Set Intersection. Financial Cryptography and Data Security, 2018. A. Faz-Hernandez, J. López, E. Ochoa-Jiménez, and F. Rodríguez-Henríquez. A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol. IEEE Transactions on Computers, IEEE, volume 67, issue 11, pages 1622-1636, November 2018. L. Galante, M. Botacin, A. Grégio, and P. L. de Geus. Malicious Linux Binaries: A Landscape. WTICG, SBSeg'18, XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBC, pages 213-222, October 2018. G. Bertão, M. Botacin, A. Grégio, and P. L. de Geus. Large Scale Studies: Malware Needles in a Haystack. WTICG, SBSeg'18, XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBC, pages 203-212, October 2018. M. Botacin, P. L. de Geus, and A. Grégio. Hardware-Assisted Application Misbehavior Detection. SBSeg'18, XVIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBC, pages 253-266, October 2018. V. Afonso, A. Kalysch, T. Müller, D. Oliveira, A. Grégio, and P. L. de Geus. Lumus: Dynamically Uncovering Evasive Android Applications. Information Security Conference, Springer, University of Surrey, pages 1-20, September 2018. A. Faz-Hernandez, J. López, and A. K. D. S. de Oliveira. SoK: A Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures. APKC '18 Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, ACM New York, pages 9-18, June 2018. E. Rezende, G. Ruppert, T. Carvalho, A. Theophilo, F. Ramos, and P. de Geus. Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features. ITNG - 15th International Conference on Information Technology, Springer, volume 738, pages 51-59, April 2018. M. F. Botacin, P. L. de Geus, and A. R. A. Grégio. The other guys: automated analysis of marginalized malware. Journal of Computer Virology and Hacking Techniques, volume 14, issue 1, pages 87-98, February 2018. P. G. M. R. Alves and D. F. Aranha. A framework for searching encrypted databases. Journal of Internet Services and Applications, volume 9, issue 1, pages 1-18, January 2018. M. F. Botacin, P. L. de Geus, and A. R. A. Grégio. Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging. ACM Trans. on Privacy and Security, ACM, volume 21, issue 1, pages 1-30, January 2018.