Controlchain: Blockchain as a central enabler for access control authorizations in the iot OJA Pinno, ARA Gregio, LCE De Bona GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017 | 237 | 2017 |
Identifying Android malware using dynamically obtained features VM Afonso, MF de Amorim, ARA Grégio, GB Junquera, PL de Geus Journal of Computer Virology and Hacking Techniques 11, 9-17, 2015 | 199 | 2015 |
Toward a taxonomy of malware behaviors ARA Grégio, VM Afonso, DSF Filho, PL Geus, M Jino The Computer Journal 58 (10), 2758-2777, 2015 | 55 | 2015 |
Shallow security: On the creation of adversarial variants to evade machine learning-based malware detectors F Ceschin, M Botacin, HM Gomes, LS Oliveira, A Grégio Proceedings of the 3rd Reversing and Offensive-oriented Trends Symposium, 1-9, 2019 | 47 | 2019 |
The need for speed: An analysis of brazilian malware classifiers F Ceschin, F Pinage, M Castilho, D Menotti, LS Oliveira, A Gregio IEEE Security & Privacy 16 (6), 31-41, 2018 | 45 | 2018 |
Ontology for malware behavior: A core model proposal A Grégio, R Bonacin, O Nabuco, VM Afonso, PL De Geus, M Jino 2014 IEEE 23rd International WETICE Conference, 453-458, 2014 | 37 | 2014 |
We need to talk about antiviruses: challenges & pitfalls of av evaluations M Botacin, F Ceschin, P De Geus, A Grégio Computers & Security 95, 101859, 2020 | 34 | 2020 |
ControlChain: A new stage on the IoT access control authorization OJA Pinno, ARA Grégio, LCE De Bona Concurrency and Computation: Practice and Experience 32 (12), e5238, 2020 | 34 | 2020 |
Leveraging ontologies and machine-learning techniques for malware analysis into android permissions ecosystems LC Navarro, AKW Navarro, A Grégio, A Rocha, R Dahab Computers & Security 78, 429-453, 2018 | 31 | 2018 |
The other guys: automated analysis of marginalized malware MF Botacin, PL de Geus, ARA Grégio Journal of Computer Virology and Hacking Techniques 14, 87-98, 2018 | 31 | 2018 |
Challenges and pitfalls in malware research M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio Computers & Security 106, 102287, 2021 | 30 | 2021 |
Behavioral analysis of malicious code through network traffic and system call monitoring ARA Grégio, DS Fernandes Filho, VM Afonso, RDC Santos, M Jino, ... Evolutionary and Bio-Inspired Computation: Theory and Applications V 8059 …, 2011 | 29 | 2011 |
Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging M Botacin, PLD Geus, A Grégio ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018 | 22 | 2018 |
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection M Botacin, MZ Alves, D Oliveira, A Grégio Expert Systems with Applications 201, 117083, 2022 | 21 | 2022 |
Predicting misinformation and engagement in covid-19 twitter discourse in the first months of the outbreak M Silva, F Ceschin, P Shrestha, C Brant, J Fernandes, CS Silva, A Grégio, ... arXiv preprint arXiv:2012.02164, 2020 | 21 | 2020 |
Antiviruses under the microscope: A hands-on perspective M Botacin, FD Domingues, F Ceschin, R Machnicki, MAZ Alves, ... Computers & Security 112, 102500, 2022 | 20 | 2022 |
Who watches the watchmen: a security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms M Botacin, PLD Geus, A Grégio ACM Computing Surveys (CSUR) 51 (4), 1-34, 2018 | 20 | 2018 |
An ontology of suspicious software behavior A Grégio, R Bonacin, AC de Marchi, OF Nabuco, PL de Geus Applied Ontology 11 (1), 29-49, 2016 | 20 | 2016 |
Fast & Furious: On the modelling of malware detection as an evolving data stream F Ceschin, M Botacin, HM Gomes, F Pinagé, LS Oliveira, A Grégio Expert Systems with Applications 212, 118590, 2023 | 19 | 2023 |
Lumus: Dynamically Uncovering Evasive Android Applications V Afonso, A Kalysch, T Müller, D Oliveira, A Grégio, PL de Geus Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018 | 19 | 2018 |