Daniela Oliveira
Orcid: 0000-0003-3488-0053Affiliations:
- University of Florida, Department of Electrical and Computer Engineering, Gainesville, FL, USA
- University of California, Davis, Department of Computer Science, CA, USA (PhD 2010)
According to our database1,
Daniela Oliveira
authored at least 54 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
2023
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking.
ACM Comput. Surv., 2023
People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023
2022
IEEE Trans. Neural Networks Learn. Syst., 2022
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor.
IEEE Trans. Inf. Forensics Secur., 2022
A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
IEEE Trans. Dependable Secur. Comput., 2022
Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles.
IEEE Trans. Biom. Behav. Identity Sci., 2022
Frontiers Comput. Sci., 2022
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection.
Expert Syst. Appl., 2022
2021
ACM Trans. Priv. Secur., 2021
Leveraging Team Dynamics to Predict Open-source Software Projects' Susceptibility to Social Engineering Attacks.
CoRR, 2021
CoRR, 2021
Brazilian Favela Women: How Your Standard Solutions for Technology Abuse Might Actually Harm Them.
CoRR, 2021
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021
2020
Predicting Misinformation and Engagement in COVID-19 Twitter Discourse in the First Months of the Outbreak.
CoRR, 2020
MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content.
ACM Trans. Comput. Hum. Interact., 2019
Dagstuhl Reports, 2019
A Dual-Task Interference Game-Based Experimental Framework for Comparing the Usability of Authentication Methods.
Proceedings of the 12th International Conference on Human System Interaction, 2019
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019
2018
Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction].
IEEE Secur. Priv., 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Information Security - 21st International Conference, 2018
FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security.
Proceedings of the 2016 New Security Paradigms Workshop, 2016
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016
2015
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
2014
Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approach.
Proceedings of the Symposium on Applied Computing, 2014
Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014
Proceedings of the Ninth Eurosys Conference 2014, 2014
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Technical Foundations of Information Systems Security.
Proceedings of the Computing Handbook, 2014
2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries.
Proceedings of the New Security Paradigms Workshop, 2012
2011
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
2009
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Trans. Comput. Sci., 2009
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
Proceedings of the Information Security, 11th International Conference, 2008
2006
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006