André Ricardo Abed Grégio

Orcid: 0000-0003-1766-5757

Affiliations:
  • Federal University of Paraná, PR, Brazil


According to our database1, André Ricardo Abed Grégio authored at least 59 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ANDROIDGYNY: Reviewing Clustering Techniques for Android Malware Family Classification.
DTRAP, 2024

Machine Learning (In) Security: A Stream of Problems.
DTRAP, 2024

2023
Fast & Furious: On the modelling of malware detection as an evolving data stream.
Expert Syst. Appl., 2023

People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

Efficient Prequential AUC-PR Computation.
Proceedings of the International Conference on Machine Learning and Applications, 2023

2022
Learning Fast and Slow: Propedeutica for Real-Time Malware Detection.
IEEE Trans. Neural Networks Learn. Syst., 2022

Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints.
ACM Trans. Priv. Secur., 2022

A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
IEEE Trans. Dependable Secur. Comput., 2022

Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles.
IEEE Trans. Biom. Behav. Identity Sci., 2022

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection.
Expert Syst. Appl., 2022

Fast & Furious: Modelling Malware Detection as Evolving Data Streams.
CoRR, 2022

AntiViruses under the microscope: A hands-on perspective.
Comput. Secur., 2022

Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security.
Proceedings of the Information Security - 25th International Conference, 2022

Dissecting Applications Uninstallers and Removers: Are They Effective?
Proceedings of the Information Security - 25th International Conference, 2022

On Metadata Privacy in Instant Messaging.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

2021
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware.
ACM Trans. Priv. Secur., 2021

Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios.
Digit. Investig., 2021

Malware MultiVerse: From Automatic Logic Bomb Identification to Automatic Patching and Tracing.
CoRR, 2021

A [in]Segurança dos Sistemas Governamentais Brasileiros: Um Estudo de Caso em Sistemas Web e Redes Abertas.
CoRR, 2021

Computer Users Have Unique Yet Temporally Inconsistent Computer Usage Profiles.
CoRR, 2021

Challenges and pitfalls in malware research.
Comput. Secur., 2021

Family Matters: On the Investigation of [Malicious] Mobile Apps Clustering.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021

2020
Leveraging branch traces to understand kernel internals from within.
J. Comput. Virol. Hacking Tech., 2020

The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support.
J. Comput. Virol. Hacking Tech., 2020

Predicting Misinformation and Engagement in COVID-19 Twitter Discourse in the First Months of the Outbreak.
CoRR, 2020

ControlChain: A new stage on the IoT access control authorization.
Concurr. Comput. Pract. Exp., 2020

We need to talk about antiviruses: challenges & pitfalls of AV evaluations.
Comput. Secur., 2020

On the Challenges of Automated Testing of Web Vulnerabilities.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Near-Memory & In-Memory Detection of Fileless Malware.
Proceedings of the MEMSYS 2020: The International Symposium on Memory Systems, 2020

A Systematic Literature Mapping of Artificial Intelligence Planning in Software Testing.
Proceedings of the 15th International Conference on Software Technologies, 2020

On the Security of Application Installers and Online Software Repositories.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
"VANILLA" malware: vanishing antiviruses by interleaving layers and layers of attacks.
J. Comput. Virol. Hacking Tech., 2019

The AV says: Your Hardware Definitions Were Updated!
Proceedings of the 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2019

WebMBO: Uma Ontologia para Comportamento de Malware Web(WebMBO: an Ontology of Web Malware Behavior).
Proceedings of the XII Seminar on Ontology Research in Brazil and III Doctoral and Masters Consortium on Ontologies, 2019

L(a)ying in (Test)Bed - How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification.
Proceedings of the Information Security - 22nd International Conference, 2019

The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
The other guys: automated analysis of marginalized malware.
J. Comput. Virol. Hacking Tech., 2018

Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging.
ACM Trans. Priv. Secur., 2018

The Need for Speed: An Analysis of Brazilian Malware Classifers.
IEEE Secur. Priv., 2018

Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms.
ACM Comput. Surv., 2018

Leveraging Uncertainty for Effective Malware Mitigation.
CoRR, 2018

Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems.
Comput. Secur., 2018

Lumus: Dynamically Uncovering Evasive Android Applications.
Proceedings of the Information Security - 21st International Conference, 2018

2017
Enhancing the Creation of Detection Rules for Malicious Software through Ontologies and Crowdsourcing.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

The dose makes the poison - Leveraging uncertainty for effective malware detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
An ontology of suspicious software behavior.
Appl. Ontology, 2016

2015
Identifying Android malware using dynamically obtained features.
J. Comput. Virol. Hacking Tech., 2015

Toward a Taxonomy of Malware Behaviors.
Comput. J., 2015

2014
Ontology for Malware Behavior: A Core Model Proposal.
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014

2013
An empirical analysis of malicious internet banking software behavior.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

2012
Comportamento de programas maliciosos.
PhD thesis, 2012

A Malware Detection System Inspired on the Human Immune System.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

Interactive, Visual-Aided Tools to Analyze Malware Behavior.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

Pinpointing Malicious Activities through Network and System-Level Malware Execution Behavior.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

A hybrid framework to analyze web and OS malware.
Proceedings of IEEE International Conference on Communications, 2012

Tracking Memory Writes for Malware Classification and Code Reuse Identification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

2009
Malware distributed collection and pre-classification system using honeypot technology.
Proceedings of the Data Mining, 2009

2007
Evaluation of data mining techniques for suspicious network activity classification using honeypots data.
Proceedings of the Data Mining, 2007


  Loading...