Marcus Botacin

Orcid: 0000-0001-6870-1178

According to our database1, Marcus Botacin authored at least 36 papers between 2018 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
On the uniqueness of AntiVirus labels: How many labels do we need to fingerprint an AV?
J. Comput. Virol. Hacking Tech., December, 2025

Towards more realistic evaluations: The impact of label delays in malware detection pipelines.
Comput. Secur., 2025

2024
Machine Learning (In) Security: A Stream of Problems.
DTRAP, 2024

SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice.
Proceedings of the 33rd USENIX Security Symposium, 2024

The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Cross-Regional Malware Detection via Model Distilling and Federated Learning.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developments.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

2023
Fast & Furious: On the modelling of malware detection as an evolving data stream.
Expert Syst. Appl., 2023

Introduction to the Special Issue on Memory-Based Malware and Other Unconventional Threats.
DTRAP, 2023

GPThreats-3: Is Automatic Malware Generation a Threat?
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Enhancing Malware Family Classification in the Microsoft Challenge Dataset via Transfer Learning.
Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, 2023

A Game-Based Framework to Compare Program Classifiers and Evaders.
Proceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization, 2023

2022
Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints.
ACM Trans. Priv. Secur., 2022

A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
IEEE Trans. Dependable Secur. Comput., 2022

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection.
Expert Syst. Appl., 2022

Fast & Furious: Modelling Malware Detection as Evolving Data Streams.
CoRR, 2022

AntiViruses under the microscope: A hands-on perspective.
Comput. Secur., 2022

Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security.
Proceedings of the Information Security - 25th International Conference, 2022

Dissecting Applications Uninstallers and Removers: Are They Effective?
Proceedings of the Information Security - 25th International Conference, 2022

2021
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware.
ACM Trans. Priv. Secur., 2021

Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios.
Digit. Investig., 2021

Malware MultiVerse: From Automatic Logic Bomb Identification to Automatic Patching and Tracing.
CoRR, 2021

A [in]Segurança dos Sistemas Governamentais Brasileiros: Um Estudo de Caso em Sistemas Web e Redes Abertas.
CoRR, 2021

Challenges and pitfalls in malware research.
Comput. Secur., 2021

2020
Leveraging branch traces to understand kernel internals from within.
J. Comput. Virol. Hacking Tech., 2020

The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support.
J. Comput. Virol. Hacking Tech., 2020

We need to talk about antiviruses: challenges & pitfalls of AV evaluations.
Comput. Secur., 2020

Near-Memory & In-Memory Detection of Fileless Malware.
Proceedings of the MEMSYS 2020: The International Symposium on Memory Systems, 2020

On the Security of Application Installers and Online Software Repositories.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
"VANILLA" malware: vanishing antiviruses by interleaving layers and layers of attacks.
J. Comput. Virol. Hacking Tech., 2019

The AV says: Your Hardware Definitions Were Updated!
Proceedings of the 14th International Symposium on Reconfigurable Communication-centric Systems-on-Chip, 2019

L(a)ying in (Test)Bed - How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification.
Proceedings of the Information Security - 22nd International Conference, 2019

The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
The other guys: automated analysis of marginalized malware.
J. Comput. Virol. Hacking Tech., 2018

Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging.
ACM Trans. Priv. Secur., 2018

Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms.
ACM Comput. Surv., 2018


  Loading...