Controlchain: Blockchain as a central enabler for access control authorizations in the iot OJA Pinno, ARA Gregio, LCE De Bona GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017 | 235 | 2017 |
Identifying Android malware using dynamically obtained features VM Afonso, MF de Amorim, ARA Grégio, GB Junquera, PL de Geus Journal of Computer Virology and Hacking Techniques 11, 9-17, 2015 | 194 | 2015 |
Toward a taxonomy of malware behaviors ARA Grégio, VM Afonso, DSF Filho, PL Geus, M Jino The Computer Journal 58 (10), 2758-2777, 2015 | 55 | 2015 |
Shallow security: On the creation of adversarial variants to evade machine learning-based malware detectors F Ceschin, M Botacin, HM Gomes, LS Oliveira, A Grégio Proceedings of the 3rd Reversing and Offensive-oriented Trends Symposium, 1-9, 2019 | 47 | 2019 |
The need for speed: An analysis of brazilian malware classifiers F Ceschin, F Pinage, M Castilho, D Menotti, LS Oliveira, A Gregio IEEE Security & Privacy 16 (6), 31-41, 2018 | 45 | 2018 |
Ontology for malware behavior: A core model proposal A Grégio, R Bonacin, O Nabuco, VM Afonso, PL De Geus, M Jino 2014 IEEE 23rd International WETICE Conference, 453-458, 2014 | 37 | 2014 |
We need to talk about antiviruses: challenges & pitfalls of av evaluations M Botacin, F Ceschin, P De Geus, A Grégio Computers & Security 95, 101859, 2020 | 34 | 2020 |
ControlChain: A new stage on the IoT access control authorization OJA Pinno, ARA Grégio, LCE De Bona Concurrency and Computation: Practice and Experience 32 (12), e5238, 2020 | 34 | 2020 |
The other guys: automated analysis of marginalized malware MF Botacin, PL de Geus, ARA Grégio Journal of Computer Virology and Hacking Techniques 14, 87-98, 2018 | 31 | 2018 |
Challenges and pitfalls in malware research M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio Computers & Security 106, 102287, 2021 | 30 | 2021 |
Leveraging ontologies and machine-learning techniques for malware analysis into android permissions ecosystems LC Navarro, AKW Navarro, A Grégio, A Rocha, R Dahab Computers & Security 78, 429-453, 2018 | 30 | 2018 |
Behavioral analysis of malicious code through network traffic and system call monitoring ARA Grégio, DS Fernandes Filho, VM Afonso, RDC Santos, M Jino, ... Evolutionary and Bio-Inspired Computation: Theory and Applications V 8059 …, 2011 | 29 | 2011 |
Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging M Botacin, PLD Geus, A Grégio ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018 | 22 | 2018 |
Antiviruses under the microscope: A hands-on perspective M Botacin, FD Domingues, F Ceschin, R Machnicki, MAZ Alves, ... Computers & Security 112, 102500, 2022 | 20 | 2022 |
Predicting misinformation and engagement in covid-19 twitter discourse in the first months of the outbreak M Silva, F Ceschin, P Shrestha, C Brant, J Fernandes, CS Silva, A Grégio, ... arXiv preprint arXiv:2012.02164, 2020 | 20 | 2020 |
Who watches the watchmen: a security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms M Botacin, PLD Geus, A Grégio ACM Computing Surveys (CSUR) 51 (4), 1-34, 2018 | 20 | 2018 |
An ontology of suspicious software behavior A Grégio, R Bonacin, AC de Marchi, OF Nabuco, PL de Geus Applied Ontology 11 (1), 29-49, 2016 | 20 | 2016 |
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection M Botacin, MZ Alves, D Oliveira, A Grégio Expert Systems with Applications 201, 117083, 2022 | 19 | 2022 |
Tracking memory writes for malware classification and code reuse identification ARA Grégio, PL De Geus, C Kruegel, G Vigna Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013 | 19 | 2013 |
Learning fast and slow: Propedeutica for real-time malware detection R Sun, X Yuan, P He, Q Zhu, A Chen, A Gregio, D Oliveira, X Li IEEE Transactions on Neural Networks and Learning Systems 33 (6), 2518-2529, 2021 | 18 | 2021 |