Author image not provided
 André Ricardo Abed Grégio

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article0.40
Citation Count2
Publication count5
Publication years2012-2013
Available for download1
Average downloads per article361.00
Downloads (cumulative)361
Downloads (12 Months)73
Downloads (6 Weeks)32
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


6 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 6 of 6
Sort by:

1 published by ACM
January 2018 ACM Transactions on Privacy and Security (TOPS): Volume 21 Issue 1, January 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 21,   Downloads (12 Months): 21,   Downloads (Overall): 21

Full text available: PDFPDF
Malware and code-reuse attacks are the most significant threats to current systems operation. Solutions developed to countermeasure them have their weaknesses exploited by attackers through sandbox evasion and antidebug crafting. To address such weaknesses, we propose a framework that relies on the modern processors’ branch monitor feature to allow us ...
Keywords: Malware, ROP, branch monitor, debug

2 published by ACM
March 2013 SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied Computing
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 11,   Downloads (12 Months): 52,   Downloads (Overall): 340

Full text available: PDFPDF
"Bankers" are special types of malware whose targets are Internet banking users, mainly to obtain their credentials. Banker infections cause losses of billions of dollars worldwide. Thus, better understanding and detection of bankers is required. Due to their interactive nature, obtaining bankers' behaviors can be a difficult task for current ...
Keywords: internet banking security, malicious software

3
July 2012 DIMVA'12: Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Malicious code (malware) is used to steal sensitive data, to attack corporate networks, and to deliver spam. To silently compromise systems and maintain their access, malware developers usually apply obfuscation techniques that result in a massive amount of malware variants and that can render static analysis approaches ineffective. To address ...

4
June 2012 ICCSA'12: Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Malicious software attacks can disrupt information systems, violating security principles of availability, confidentiality and integrity. Attackers use malware to gain control, steal data, keep access and cover traces left on the compromised systems. The dynamic analysis of malware is useful to obtain an execution trace that can be used to ...
Keywords: malware analysis, security data visualization

5
June 2012 ICCSA'12: Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be adapted to detect malware attacks. In this paper we propose a system to perform ...
Keywords: data mining, human immune system, malicious code

6
June 2012 ICCSA'12: Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part IV
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Malicious programs pose a major threat to Internet-connected systems, increasing the importance of studying their behavior in order to fight against them. In this paper, we propose definitions to the different types of behavior that a program can present during its execution. Based on those definitions, we define suspicious behavior ...
Keywords: behavioral traces, malware analysis, computer security



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us