Secure computer science

Research

TODO: add text

All

2024

Efficient isochronous fixed-weight sampling with applications to NTRU
Efficient isochronous fixed-weight sampling with applications to NTRU
Décio Filho, Tomás Silva, Julio López
IACR Communications in Cryptology  ·  08 Jul 2024  ·  doi:10.62056/a6n59qgxq
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs
Décio Filho, Guilherme Brandão, Julio López
IACR Communications in Cryptology  ·  09 Apr 2024  ·  doi:10.62056/a3txommol
Verifiable FHE via Lattice-based SNARKs
Verifiable FHE via Lattice-based SNARKs
Shahla Atapoor, Karim Baghery, Hilder Pereira, Jannik Spiessens
IACR Communications in Cryptology  ·  09 Apr 2024  ·  doi:10.62056/a6ksdkp10
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space
Pierrick Méaux, Jeongeun Park, Hilder Pereira
IACR Communications in Cryptology  ·  09 Apr 2024  ·  doi:10.62056/anxrxrxqi
NTRU-Based FHE for Larger Key and Message Space
NTRU-Based FHE for Larger Key and Message Space
Robin Jadoul, Axel Mertens, Jeongeun Park, Hilder V. L. Pereira
Information Security and Privacy  ·  01 Jan 2024  ·  doi:10.1007/978-981-97-5025-2_8

2023

Detecting Cryptography Misuses With Machine Learning: Graph Embeddings, Transfer Learning and Data Augmentation in Source Code Related Tasks
Detecting Cryptography Misuses With Machine Learning: Graph Embeddings, Transfer Learning and Data Augmentation in Source Code Related Tasks
Gustavo Eloi de Paula Rodrigues, Alexandre M. Braga, Ricardo Dahab
IEEE Transactions on Reliability  ·  01 Dec 2023  ·  doi:10.1109/TR.2023.3237849
Enhancing Malware Family Classification in the Microsoft Challenge Dataset via Transfer Learning
Enhancing Malware Family Classification in the Microsoft Challenge Dataset via Transfer Learning
Marcelo Invert Palma Salas, Paulo De Geus, Marcus Botacin
12th Latin-American Symposium on Dependable and Secure Computing  ·  16 Oct 2023  ·  doi:10.1145/3615366.3615374
Real-Time Ego-Lane Detection in a Low-Cost Embedded Platform using CUDA-Based Implementation
Real-Time Ego-Lane Detection in a Low-Cost Embedded Platform using CUDA-Based Implementation
Guilherme Brandão Da Silva, Daniel Strufaldi Batista, Décio Luiz Gazzoni Filho, Marcelo Carvalho Tosin, Leonimer Flávio Melo
Semina: Ciências Exatas e Tecnológicas  ·  11 Sep 2023  ·  doi:10.5433/1679-0375.2023.v44.48268
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, …, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
IACR Transactions on Cryptographic Hardware and Embedded Systems  ·  31 Aug 2023  ·  doi:10.46586/tches.v2023.i4.32-57
Amortized Bootstrapping Revisited: Simpler, Asymptotically-Faster, Implemented
Amortized Bootstrapping Revisited: Simpler, Asymptotically-Faster, Implemented
Antonio Guimarães, Hilder V. L. Pereira, Barry van Leeuwen
Advances in Cryptology – ASIACRYPT 2023  ·  01 Jan 2023  ·  doi:10.1007/978-981-99-8736-8_1

2022

Evaluation of modular multiplication techniques for Supersingular Isogeny Schemes on ARMv8 cores
Evaluation of modular multiplication techniques for Supersingular Isogeny Schemes on ARMv8 cores
Vitor Satoru Machi Matsumine, Félix Carvalho Rodrigues, Décio Gazzoni Filho, Caio Teixeira, Julio López, Ricardo Dahab
Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2022)  ·  12 Sep 2022  ·  doi:10.5753/sbseg.2022.224951
Evaluation of CRYSTALS-Kyber and Saber on the ARMv8 architecture
Evaluation of CRYSTALS-Kyber and Saber on the ARMv8 architecture
Jheyne N. Ortiz, Félix Carvalho Rodrigues, Décio Gazzoni Filho, Caio Teixeira, Julio López, Ricardo Dahab
Anais do XXII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2022)  ·  12 Sep 2022  ·  doi:10.5753/sbseg.2022.224450
AntiViruses under the microscope: A hands-on perspective
AntiViruses under the microscope: A hands-on perspective
Marcus Botacin, Felipe Duarte Domingues, Fabrício Ceschin, Raphael Machnicki, Marco Antonio Zanata Alves, Paulo Lício de Geus, André Grégio
Computers & Security  ·  01 Jan 2022  ·  doi:10.1016/J.COSE.2021.102500
FINAL: Faster FHE Instantiated with NTRU and LWE
FINAL: Faster FHE Instantiated with NTRU and LWE
Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart
Advances in Cryptology – ASIACRYPT 2022  ·  01 Jan 2022  ·  doi:10.1007/978-3-031-22966-4_7

2021

The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings
The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings
Jheyne N. Ortiz, Robson R. de Araujo, Diego F. Aranha, Sueli I. R. Costa, Ricardo Dahab
Entropy  ·  26 Aug 2021  ·  doi:10.3390/e23091108
One Size Does Not Fit All
One Size Does Not Fit All
Marcus Botacin, Hojjat Aghakhani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna, Daniela Oliveira, Paulo Lício De Geus, André Grégio
ACM Transactions on Privacy and Security  ·  21 Jan 2021  ·  doi:10.1145/3429741
Tutte’s 3-flow Conjecture for almost even graphs
Tutte’s 3-flow Conjecture for almost even graphs
Léo Vieira Peres, Ricardo Dahab
Procedia Computer Science  ·  01 Jan 2021  ·  doi:10.1016/J.PROCS.2021.11.035
Bootstrapping Fully Homomorphic Encryption over the Integers in Less than One Second
Bootstrapping Fully Homomorphic Encryption over the Integers in Less than One Second
Hilder Vitor Lima Pereira
Public-Key Cryptography – PKC 2021  ·  01 Jan 2021  ·  doi:10.1007/978-3-030-75245-3_13

2020

Using Graph Embeddings and Machine Learning to Detect Cryptography Misuse in Source Code
Using Graph Embeddings and Machine Learning to Detect Cryptography Misuse in Source Code
Gustavo Eloi de P. Rodrigues, Alexandre M. Braga, Ricardo Dahab
2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA)  ·  01 Dec 2020  ·  doi:10.1109/ICMLA51294.2020.00171
We need to talk about antiviruses: challenges & pitfalls of AV evaluations
We need to talk about antiviruses: challenges & pitfalls of AV evaluations
Marcus Botacin, Fabricio Ceschin, Paulo de Geus, André Grégio
Computers & Security  ·  01 Aug 2020  ·  doi:10.1016/j.cose.2020.101859
Applied cryptography and network security. Part 1
Applied cryptography and network security. Part 1
Springer  ·  01 Jan 2020  ·  isbn:978-3-030-57808-4

2019

Analysis, comparison and assessment of the behavior of malware and goodware
Analysis, comparison and assessment of the behavior of malware and goodware
Giovanni Bertão, Paulo de Geus
Resumos do...  ·  20 Dec 2019  ·  doi:10.20396/revpibic2720192100
Characterizing lattices for cryptography
Characterizing lattices for cryptography
Tomas Rodrigues e Silva, Ricardo Dahab
Resumos do...  ·  20 Dec 2019  ·  doi:10.20396/revpibic2720192087
Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software
Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software
Alexandre Braga, Ricardo Dahab, Nuno Antunes, Nuno Laranjeiro, Marco Vieira
IEEE Transactions on Reliability  ·  01 Dec 2019  ·  doi:10.1109/tr.2019.2937214
Linux Malware Behavior Description
Linux Malware Behavior Description
Lucas Galante, Paulo de Geus, Marcus Botacin
Resumos do...  ·  30 Nov 2019  ·  doi:10.20396/revpibic2720192426
Choosing parameters for trellis-based encryption systems
Choosing parameters for trellis-based encryption systems
Caio Teixeira, Ricardo Dahab
Resumos do...  ·  30 Nov 2019  ·  doi:10.20396/revpibic2720191576
High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions
High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions
Armando Faz-Hernández, Julio López, Ricardo Dahab
ACM Transactions on Mathematical Software  ·  30 Jul 2019  ·  doi:10.1145/3309759
The AV says: Your Hardware Definitions Were Updated!
The AV says: Your Hardware Definitions Were Updated!
Marcus Botacin, Lucas Galante, Fabricio Ceschin, Paulo C. Santos, Luigi Carro, Paulo de Geus, Andre Gregio, Marco A. Z. Alves
2019 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)  ·  01 Jul 2019  ·  doi:10.1109/RECOSOC48741.2019.9034972
“VANILLA” malware: vanishing antiviruses by interleaving layers and layers of attacks
“VANILLA” malware: vanishing antiviruses by interleaving layers and layers of attacks
Marcus Botacin, Paulo Lício de Geus, André Grégio
Journal of Computer Virology and Hacking Techniques  ·  11 Jun 2019  ·  doi:10.1007/s11416-019-00333-y
On Fair Cost Facility Location Games with Non-singleton Players
On Fair Cost Facility Location Games with Non-singleton Players
Félix Carvalho Rodrigues, Eduardo C. Xavier, Guido Schäfer
Electronic Notes in Theoretical Computer Science  ·  01 Apr 2019  ·  doi:10.1016/j.entcs.2019.04.003
Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture
Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture
Félix Carvalho Rodrigues, Hayato Fujii, Ana Clara Zoppi Serpa, Giuliano Sider, Ricardo Dahab, Julio López
Progress in Cryptology – LATINCRYPT 2019  ·  01 Jan 2019  ·  doi:10.1007/978-3-030-30530-7_17
Isogeny formulas for Jacobi intersection and twisted hessian curves
Isogeny formulas for Jacobi intersection and twisted hessian curves
João Paulo da Silva, Julio López, Ricardo Dahab
Advances in Mathematics of Communications  ·  01 Jan 2019  ·  doi:10.3934/AMC.2020048

2018

Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
Luiz C. Navarro, Alexandre K.W. Navarro, André Grégio, Anderson Rocha, Ricardo Dahab
Computers & Security  ·  01 Sep 2018  ·  doi:10.1016/j.cose.2018.07.013
Who Watches the Watchmen
Who Watches the Watchmen
Marcus Botacin, Paulo Lício De Geus, André grégio
ACM Computing Surveys  ·  13 Jul 2018  ·  doi:10.1145/3199673
Connecting the dots: Toward accountable machine-learning printer attribution methods
Connecting the dots: Toward accountable machine-learning printer attribution methods
Luiz C. Navarro, Alexandre K.W. Navarro, Anderson Rocha, Ricardo Dahab
Journal of Visual Communication and Image Representation  ·  01 May 2018  ·  doi:10.1016/j.jvcir.2018.04.002
Enhancing Branch Monitoring for Security Purposes
Enhancing Branch Monitoring for Security Purposes
Marcus Botacin, Paulo Lício De Geus, André Grégio
ACM Transactions on Privacy and Security  ·  02 Jan 2018  ·  doi:10.1145/3152162
Malicious Software Classification Using VGG16 Deep Neural Network’s Bottleneck Features
Malicious Software Classification Using VGG16 Deep Neural Network’s Bottleneck Features
Edmar Rezende, Guilherme Ruppert, Tiago Carvalho, Antonio Theophilo, Fabio Ramos, Paulo de Geus
Advances in Intelligent Systems and Computing  ·  01 Jan 2018  ·  doi:10.1007/978-3-319-77028-4_9
Lumus: Dynamically Uncovering Evasive Android Applications
Lumus: Dynamically Uncovering Evasive Android Applications
Vitor Afonso, Anatoli Kalysch, Tilo Müller, Daniela Oliveira, André Grégio, Paulo Lício de Geus
Developments in Language Theory  ·  01 Jan 2018  ·  doi:10.1007/978-3-319-99136-8_3

2017

Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network
Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network
Edmar Rezende, Guilherme Ruppert, Tiago Carvalho, Fabio Ramos, Paulo de Geus
2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)  ·  01 Dec 2017  ·  doi:10.1109/ICMLA.2017.00-19
Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study
Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study
Alexandre Braga, Ricardo Dahab, Nuno Antunes, Nuno Laranjeiro, Marco Vieira
2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE)  ·  01 Oct 2017  ·  doi:10.1109/ISSRE.2017.27
The other guys: automated analysis of marginalized malware
The other guys: automated analysis of marginalized malware
Marcus Felipe Botacin, Paulo Lício de Geus, André Ricardo Abed Grégio
Journal of Computer Virology and Hacking Techniques  ·  27 Feb 2017  ·  doi:10.1007/s11416-017-0292-8
Non-interactive Privacy-preserving k-NN Classifier
Non-interactive Privacy-preserving k-NN Classifier
Hilder V. L. Pereira, Diego F. Aranha
Proceedings of the 3rd International Conference on Information Systems Security and Privacy  ·  01 Jan 2017  ·  doi:10.5220/0006187703620371
Non-cooperative capacitated facility location games
Non-cooperative capacitated facility location games
Félix Carvalho Rodrigues, Eduardo Candido Xavier
Information Processing Letters  ·  01 Jan 2017  ·  doi:10.1016/j.ipl.2016.09.001

2016

Detecção de técnicas de anti-forense em programas maliciosos
Detecção de técnicas de anti-forense em programas maliciosos
VITOR FALCAO DA ROCHA, Paulo Licio De Geus, ANDRÉ GRÉGIO, MARCUS BOTACIN
Anais do Congresso de Iniciação Científica da Unicamp  ·  22 Oct 2016  ·  doi:10.19146/pibic-2016-51820
Mining Cryptography Misuse in Online Forums
Mining Cryptography Misuse in Online Forums
Alexandre Braga, Ricardo Dahab
2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)  ·  01 Aug 2016  ·  doi:10.1109/QRS-C.2016.23
Towards a Methodology for the Development of Secure Cryptographic Software
Towards a Methodology for the Development of Secure Cryptographic Software
Alexandre Melo Braga, Ricardo Dahab
2016 International Conference on Software Security and Assurance (ICSSA)  ·  01 Aug 2016  ·  doi:10.1109/ICSSA.2016.12
ACBuilder: A tool for hardware architecture security evaluation
ACBuilder: A tool for hardware architecture security evaluation
Henrique Kawakami, David Ott, Hao-Chi Wong, Ricardo Dahab, Roberto Gallo
2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  ·  01 May 2016  ·  doi:10.1109/HST.2016.7495564
An ontology of suspicious software behavior
An ontology of suspicious software behavior
André Grégio, Rodrigo Bonacin, Antonio Carlos de Marchi, Olga Fernanda Nabuco, Paulo Lício de Geus
Applied Ontology  ·  22 Mar 2016  ·  doi:10.3233/AO-160163
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy
Vitor Afonso, Antonio Bianchi, Yanick Fratantonio, Adam Doupe, Mario Polino, Paulo de Geus, Christopher Kruegel, Giovanni Vigna
Proceedings 2016 Network and Distributed System Security Symposium  ·  01 Jan 2016  ·  doi:10.14722/NDSS.2016.23384

2015

MALICIOUS SOFTWARE IDENTIFICATION THROUGH OPERATING SYSTEM MONITORING
MALICIOUS SOFTWARE IDENTIFICATION THROUGH OPERATING SYSTEM MONITORING
Paulo Licio De Geus, Marcus Felipe Botacin
Anais do Congresso de Iniciação Científica da Unicamp  ·  20 Nov 2015  ·  doi:10.19146/pibic-2015-37604
Return on security investment for cloud computing
Return on security investment for cloud computing
Carlos Alberto da Silva, Paulo Licio de Geus
Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems  ·  25 Oct 2015  ·  doi:10.1145/2857218.2857254
Hardware Security Evaluation Using Assurance Case Models
Hardware Security Evaluation Using Assurance Case Models
Henrique Kawakami, Roberto Gallo, Ricardo Dahab, Erick Nascimento
2015 10th International Conference on Availability, Reliability and Security  ·  01 Aug 2015  ·  doi:10.1109/ARES.2015.60
Toward a Taxonomy of Malware Behaviors
Toward a Taxonomy of Malware Behaviors
André Ricardo Abed Grégio, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus, Mario Jino
The Computer Journal  ·  13 Jul 2015  ·  doi:10.1093/comjnl/bxv047
Security and system architecture: comparison of Android customizations
Security and system architecture: comparison of Android customizations
Roberto Gallo, Patricia Hongo, Ricardo Dahab, Luiz C. Navarro, Henrique Kawakami, Kaio Galvão, Glauber Junqueira, Luander Ribeiro
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks  ·  22 Jun 2015  ·  doi:10.1145/2766498.2766519
Security Testing Methodology for Evaluation of Web Services Robustness - Case: XML Injection
Security Testing Methodology for Evaluation of Web Services Robustness - Case: XML Injection
Marcelo Invert Palma Salas, Paulo Licio De Geus, Eliane Martins
2015 IEEE World Congress on Services  ·  01 Jun 2015  ·  doi:10.1109/SERVICES.2015.53
Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers
Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers
Erick Nascimento, Julio López, Ricardo Dahab
Security, Privacy, and Applied Cryptography Engineering  ·  01 Jan 2015  ·  doi:10.1007/978-3-319-24126-5_17
Assurance Cases as a Didactic Tool for Information Security
Assurance Cases as a Didactic Tool for Information Security
Roberto Gallo, Ricardo Dahab
Information Security Education Across the Curriculum  ·  01 Jan 2015  ·  doi:10.1007/978-3-319-18500-2_2
Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes
Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes
Ricardo Dahab, Steven Galbraith, Eduardo Morais
Lecture Notes in Computer Science  ·  01 Jan 2015  ·  doi:10.1007/978-3-319-17470-9_17

2014

An approach to security-SLA in cloud computing environment
An approach to security-SLA in cloud computing environment
Carlos Alberto da Silva, Paulo Licio de Geus
2014 IEEE Latin-America Conference on Communications (LATINCOM)  ·  01 Nov 2014  ·  doi:10.1109/LATINCOM.2014.7041843
Identifying Android malware using dynamically obtained features
Identifying Android malware using dynamically obtained features
Vitor Monte Afonso, Matheus Favero de Amorim, André Ricardo Abed Grégio, Glauco Barroso Junquera, Paulo Lício de Geus
Journal of Computer Virology and Hacking Techniques  ·  17 Oct 2014  ·  doi:10.1007/s11416-014-0226-7
Ontology for malware behavior: A core model proposal
Ontology for malware behavior: A core model proposal
Andre Gregio, Rodrigo Bonacin, Olga Nabuco, Vitor Monte Afonso, Paulo Licio De Geus, Mario Jino
2014 IEEE 23rd International WETICE Conference  ·  01 Jun 2014  ·  doi:10.1109/WETICE.2014.72

2013

FORTUNA—A framework for the design and development of hardware-based secure systems
FORTUNA—A framework for the design and development of hardware-based secure systems
Roberto Gallo, Henrique Kawakami, Ricardo Dahab
Journal of Systems and Software  ·  01 Aug 2013  ·  doi:10.1016/j.jss.2013.03.059
E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation
E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation
Fabio Piva, Ricardo Dahab
Applicable Algebra in Engineering, Communication and Computing  ·  02 Jul 2013  ·  doi:10.1007/s00200-013-0197-9
Case Study: On the Security of Key Storage on PCs
Case Study: On the Security of Key Storage on PCs
Roberto Gallo, Henrique Kawakami, Ricardo Dahab
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  ·  01 Jul 2013  ·  doi:10.1109/TrustCom.2013.203
An empirical analysis of malicious internet banking software behavior
An empirical analysis of malicious internet banking software behavior
André Ricardo A. Grégio, Dario Simões Fernandes, Vitor Monte Afonso, Paulo Lício de Geus, Victor Furuse Martins, Mario Jino
Proceedings of the 28th Annual ACM Symposium on Applied Computing  ·  18 Mar 2013  ·  doi:10.1145/2480362.2480704
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine
Danilo Câmara, Conrado P. L. Gouvêa, Julio López, Ricardo Dahab
Security Engineering and Intelligence Informatics  ·  01 Jan 2013  ·  doi:10.1007/978-3-642-40588-4_10

2012

A methodology for management of cloud computing using security criteria
A methodology for management of cloud computing using security criteria
Carlos Alberto da Silva, Anderson Soares Ferreira, Paulo Licio de Geus
2012 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud)  ·  01 Nov 2012  ·  doi:10.1109/LatinCloud.2012.6508157
A hybrid framework to analyze web and OS malware
A hybrid framework to analyze web and OS malware
Vitor M. Afonso, Dario S. Fernandes Filho, Andre R. A. Gregio, Paulo L. de Geus, Mario Jino
2012 IEEE International Conference on Communications (ICC)  ·  01 Jun 2012  ·  doi:10.1109/ICC.2012.6364108
Pinpointing Malicious Activities through Network and System-Level Malware Execution Behavior
Pinpointing Malicious Activities through Network and System-Level Malware Execution Behavior
André Ricardo Abed Grégio, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus, Mario Jino, Rafael Duarte Coelh dos Santos
Computational Science and Its Applications – ICCSA 2012  ·  01 Jan 2012  ·  doi:10.1007/978-3-642-31128-4_20
Interactive, Visual-Aided Tools to Analyze Malware Behavior
Interactive, Visual-Aided Tools to Analyze Malware Behavior
André Ricardo Abed Grégio, Alexandre Or Cansian Baruque, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus, Mario Jino, Rafael Duarte Coelho dos Santos
Computational Science and Its Applications – ICCSA 2012  ·  01 Jan 2012  ·  doi:10.1007/978-3-642-31128-4_22
Interactive Analysis of Computer Scenarios through Parallel Coordinates Graphics
Interactive Analysis of Computer Scenarios through Parallel Coordinates Graphics
Gabriel D. Cavalcante, Sebastien Tricaud, Cleber P. Souza, Paulo Lício de Geus
Computational Science and Its Applications – ICCSA 2012  ·  01 Jan 2012  ·  doi:10.1007/978-3-642-31128-4_23

2011

LWE-based identification schemes
LWE-based identification schemes
Rosemberg Silva, Antonio C. de A. Campello, Ricardo Dahab
2011 IEEE Information Theory Workshop  ·  01 Oct 2011  ·  doi:10.1109/ITW.2011.6089439
FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems
FORTUNA - A probabilistic framework for early design stages of hardware-based secure systems
Roberto Gallo, Henrique Kawakami, Ricardo Dahab
2011 5th International Conference on Network and System Security  ·  01 Sep 2011  ·  doi:10.1109/ICNSS.2011.6059999
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Leonardo B. Oliveira, Diego F. Aranha, Conrado P.L. Gouvêa, Michael Scott, Danilo F. Câmara, Julio López, Ricardo Dahab
Computer Communications  ·  01 Mar 2011  ·  doi:10.1016/j.comcom.2010.05.013
On the Smoothed Price of Anarchy of the Traffic Assignment Problem
On the Smoothed Price of Anarchy of the Traffic Assignment Problem
Luciana Buriol, Marcus Ritt, Felix Rodrigues, Guido Schäfer
Schloss Dagstuhl – Leibniz-Zentrum für Informatik  ·  01 Jan 2011  ·  doi:10.4230/OASIcs.ATMOS.2011.122

2010

T-DRE
T-DRE
Roberto Gallo, Henrique Kawakami, Ricardo Dahab, Rafael Azevedo, Saulo Lima, Guido Araujo
Proceedings of the 26th Annual Computer Security Applications Conference  ·  06 Dec 2010  ·  doi:10.1145/1920261.1920291
Scalable model‐based configuration management of security services in complex enterprise networks
Scalable model‐based configuration management of security services in complex enterprise networks
João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus, René Jeruschkat
Software: Practice and Experience  ·  19 Oct 2010  ·  doi:10.1002/spe.1014
Kolline
Kolline
Fernando Figueira Filho, Gary M. Olson, Paulo Lício de Geus
Proceedings of the 28th ACM International Conference on Design of Communication  ·  27 Sep 2010  ·  doi:10.1145/1878450.1878465
Efficient implementation of elliptic curve cryptography in wireless sensors
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego Aranha, Ricardo Dahab, Julio López, Leonardo Oliveira
Advances in Mathematics of Communications  ·  01 May 2010  ·  doi:10.3934/amc.2010.4.169
Formal validation of automated policy refinement in the management of network security systems
Formal validation of automated policy refinement in the management of network security systems
João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus
International Journal of Information Security  ·  20 Feb 2010  ·  doi:10.1007/s10207-010-0101-6
On Device Identity Establishment and Verification
On Device Identity Establishment and Verification
Roberto Gallo, Henrique Kawakami, Ricardo Dahab
Public Key Infrastructures, Services and Applications  ·  01 Jan 2010  ·  doi:10.1007/978-3-642-16441-5_9

2009

SB-RAWVec - A Semi-Blind Watermarking Method for Vector Maps
SB-RAWVec - A Semi-Blind Watermarking Method for Vector Maps
K. Magalhaes, R. Dahab
2009 IEEE International Conference on Communications  ·  01 Jun 2009  ·  doi:10.1109/ICC.2009.5199433

2008

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Leonardo B. Oliveira, Michael Scott, Julio Lopez, Ricardo Dahab
2008 5th International Conference on Networked Sensing Systems  ·  01 Jun 2008  ·  doi:10.1109/INSS.2008.4610921
Model-based management of security services in complex network environments
Model-based management of security services in complex network environments
Joao Porto de Albuquerque, Heiko Krumm, Paulo Licio de Geus
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium  ·  01 Jan 2008  ·  doi:10.1109/NOMS.2008.4575274

2007

SecLEACH—On the security of clustered sensor networks
SecLEACH—On the security of clustered sensor networks
Leonardo B. Oliveira, Adrian Ferreira, Marco A. Vilaça, Hao Chi Wong, Marshall Bern, Ricardo Dahab, Antonio A.F. Loureiro
Signal Processing  ·  01 Dec 2007  ·  doi:10.1016/j.sigpro.2007.05.016
TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes
TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes
Leonardo B. Oliveira, Diego F. Aranha, Eduardo Morais, Felipe Daguano, Julio Lopez, Ricardo Dahab
Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007)  ·  01 Jul 2007  ·  doi:10.1109/NCA.2007.48
A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over $$\mathbb{F}_{{2^{{163}} }} $$ using Gaussian Normal Bases
A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over $$\mathbb{F}_{{2^{{163}} }} $$ using Gaussian Normal Bases
Marcio Juliato, Guido Araujo, Julio López, Ricardo Dahab
The Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology  ·  27 Mar 2007  ·  doi:10.1007/s11265-006-0015-8
SOS: Secure Overlay Sensornets
SOS: Secure Overlay Sensornets
Leonardo B. Oliveira, A.A.F. Loureiro, Ricardo Dahab
Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)  ·  01 Mar 2007  ·  doi:10.1109/PERCOMW.2007.107
Identity-Based Encryption for Sensor Networks
Identity-Based Encryption for Sensor Networks
Leonardo B. Oliveira, Ricardo Dahab, Julio Lopez, Felipe Daguano, Antonio A.F. Loureiro
Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07)  ·  01 Mar 2007  ·  doi:10.1109/PERCOMW.2007.56
A Policy-Based Framework for Interoperable Digital Content Management
A Policy-Based Framework for Interoperable Digital Content Management
Fernando Marques Figueira Filho, Joao Porto de Albuquerque, Paulo Licio de Geus, Heiko Krumm
2007 4th IEEE Consumer Communications and Networking Conference  ·  01 Jan 2007  ·  doi:10.1109/CCNC.2007.191

2006

Software multiplication using Gaussian normal bases
Software multiplication using Gaussian normal bases
R. Dahab, D. Hankerson, F. Hu, M. Long, J. Lopez, A. Menezes
IEEE Transactions on Computers  ·  01 Aug 2006  ·  doi:10.1109/TC.2006.132

2005

Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen
Modellierung von Netzsicherheitsystemen umfangreicher vernetzter IT-Infrastrukturen
Heiko Krumm, Paulo Licio De Geus, Joao Porto De Albuquerque
Lecture Notes in Informatics (LNI) Proceedings;P-68  ·  01 Sep 2005  ·  doi:10.17877/de290r-15888

1197

Adenoids: a hybrid IDS based on the immune system
Adenoids: a hybrid IDS based on the immune system
F.S. Paula, M.A. Reis, D.A.M. Fernandes, P.L. Geus
Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02.  ·  [no date info]  ·  doi:10.1109/ICONIP.2002.1202866
Policy Modeling and Refinement for Network Security Systems
Policy Modeling and Refinement for Network Security Systems
J.P. de Albuquerque, H. Krumm, P.L. de Geus
Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05)  ·  [no date info]  ·  doi:10.1109/POLICY.2005.24
An improvement of the Guajardo-Paar method for multiplication on non-supersingular elliptic curves
An improvement of the Guajardo-Paar method for multiplication on non-supersingular elliptic curves
J. Lopez, R. Dahab
Proceedings SCCC'98. 18th International Conference of the Chilean Society of Computer Science (Cat. No.98EX212)  ·  [no date info]  ·  doi:10.1109/SCCC.1998.730787
A scheme for analyzing electronic payment systems
A scheme for analyzing electronic payment systems
L. de Carvalho Ferreira, R. Dahab
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)  ·  [no date info]  ·  doi:10.1109/CSAC.1998.738600
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:WOS:000086437300016
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:WOS:000088608600027
Two approaches for pay-per-use software construction
Two approaches for pay-per-use software construction
L.C. Ferreira, R. Dahab, M.P. Aragao, J.A.P. Magalhaes
Proceedings Second International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2000  ·  [no date info]  ·  doi:10.1109/WECWIS.2000.853874
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:WOS:000188940300033
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:WOS:000224550900024
A custom instruction approach for hardware and software implementations of finite field arithmetic over F//sub 2/sup163// using Gaussian normal bases
A custom instruction approach for hardware and software implementations of finite field arithmetic over F//sub 2/sup163// using Gaussian normal bases
M. Juliato, G. Araujo, J. Lopez, R. Dahab
Proceedings. 2005 IEEE International Conference on Field-Programmable Technology, 2005.  ·  [no date info]  ·  doi:10.1109/FPT.2005.1568517
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Hao C. Wong Leonardo B. Oliveira
Fifth IEEE International Symposium on Network Computing and Applications (NCA'06)  ·  [no date info]  ·  doi:10.1109/NCA.2006.48
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:WOS:000251784900006
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:WOS:000247908000010
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
Implementing Cryptographic Pairings over Barreto-Naehrig Curves
Augusto Jun Devegili, Michael Scott, Ricardo Dahab
Pairing-Based Cryptography – Pairing 2007  ·  [no date info]  ·  doi:10.1007/978-3-540-73489-5_10
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:WOS:000253413500019
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab
Lecture Notes in Computer Science  ·  [no date info]  ·  doi:10.1007/978-3-540-77690-1_19
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:WOS:000288935800009
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:WOS:000342217900040
Web of Science
Web of Science
[no publisher info]  ·  [no date info]  ·  wosuid:PPRN:18908939