Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Paulo Licio de Geus"'
Autor:
Daniela Oliveira, Hojjat Aghakhani, Paulo Licio de Geus, Christopher Kruegel, André Grégio, Giovanni Vigna, Marcus Botacin, Stefano Ortolani
Publikováno v:
ACM Transactions on Privacy and Security. 24:1-31
Malware analysis is an essential task to understand infection campaigns, the behavior of malicious codes, and possible ways to mitigate threats. Malware analysis also allows better assessment of attackers’ capabilities, techniques, and processes. A
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 15:233-247
Malware are persistent threats to any networked systems. Recent years increase in multi-core, distributed systems created new opportunities for malware authors to exploit such capabilities. In particular, the distributed execution of a malware in mul
Autor:
Marcus Botacin, Christopher Kruegel, Paulo Licio de Geus, André Grégio, Giovanni Vigna, Giovanni Bertão
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783030526825
DIMVA
DIMVA
The security of application installers is often overlooked, but the security risks associated to these pieces of code are not negligible. Online public repositories have been one of the most popular ways for end users to obtain software, but there is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f3eb33094366a090ba1d42ec7abb561e
https://doi.org/10.1007/978-3-030-52683-2_10
https://doi.org/10.1007/978-3-030-52683-2_10
Autor:
Fabrício Ceschin, Marco A. Z. Alves, Marcus Botacin, Paulo Licio de Geus, Felipe Duarte Domingues, André Grégio, Raphael Machnicki
Publikováno v:
Computers & Security. 112:102500
AntiViruses (AVs) are the main defense line against attacks for most users and much research has been done about them, especially proposing new detection procedures that work in academic prototypes. However, as most current and commercial AVs are clo
Publikováno v:
Revista dos Trabalhos de Iniciação Científica da UNICAMP.
Linux applications are finding their role on important computer systems. At the same time these systems grow, they become target for malware. Therefore, understanding the security impacts of malware infections on them is essential to allow system har
Autor:
Paulo Licio de Geus, Giovanni Bertão
Publikováno v:
Revista dos Trabalhos de Iniciação Científica da UNICAMP.
Malware overview reports are valuable information to understand threats behavior and develop proper countermeasures. Currently, most of these studies are focused on either fine-grained, individual sample analysis or coarse-grained landscapes. On the
Publikováno v:
Computers & Security. 95:101859
Security evaluation is an essential task to identify the level of protection accomplished in running systems or to aid in choosing better solutions for each specific scenario. Although antiviruses (AVs) are one of the main defensive solutions for mos
Autor:
Matheus F. Amorim, Glauco Barroso Junquera, Paulo Licio de Geus, André Grégio, Vitor Monte Afonso
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 11:9-17
The constant evolution of mobile devices’ resources and features turned ordinary phones into powerful and portable computers, leading their users to perform payments, store sensitive information and even to access other accounts on remote machines.
Autor:
Antonio Bianchi, Adam Doupé, Mario Polino, Yanick Fratantonio, Vitor Monte Afonso, Christopher Kruegel, Paulo Licio de Geus, Giovanni Vigna
Publikováno v:
NDSS
Current static analysis techniques for Android applications operate at the Java level—that is, they analyze either the Java source code or the Dalvik bytecode. However, Android allows developers to write code in C or C++ that is cross-compiled to m
Publikováno v:
Ambient Networks ISBN: 9783540293880
DSOM
DSOM
The security mechanisms employed in today's networked environments are increasingly complex and their configuration management has an important role for the protection of these environments. Especially in large scale networks, security administrators
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::12135324e66b33a06362394564b10d8c
https://doi.org/10.1007/11568285_4
https://doi.org/10.1007/11568285_4