Follow
André Grégio
André Grégio
Assistant Professor at UFPR
Verified email at inf.ufpr.br - Homepage
Title
Cited by
Cited by
Year
Controlchain: Blockchain as a central enabler for access control authorizations in the iot
OJA Pinno, ARA Gregio, LCE De Bona
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
2172017
Identifying Android malware using dynamically obtained features
VM Afonso, MF de Amorim, ARA Grégio, GB Junquera, PL de Geus
Journal of Computer Virology and Hacking Techniques 11, 9-17, 2015
1822015
Toward a taxonomy of malware behaviors
ARA Grégio, VM Afonso, DSF Filho, PL Geus, M Jino
The Computer Journal 58 (10), 2758-2777, 2015
522015
The need for speed: An analysis of brazilian malware classifiers
F Ceschin, F Pinage, M Castilho, D Menotti, LS Oliveira, A Gregio
IEEE Security & Privacy 16 (6), 31-41, 2018
442018
Shallow security: On the creation of adversarial variants to evade machine learning-based malware detectors
F Ceschin, M Botacin, HM Gomes, LS Oliveira, A Grégio
Proceedings of the 3rd Reversing and Offensive-oriented Trends Symposium, 1-9, 2019
372019
Ontology for malware behavior: A core model proposal
A Grégio, R Bonacin, O Nabuco, VM Afonso, PL De Geus, M Jino
2014 IEEE 23rd International WETICE Conference, 453-458, 2014
362014
ControlChain: A new stage on the IoT access control authorization
OJA Pinno, ARA Grégio, LCE De Bona
Concurrency and Computation: Practice and Experience 32 (12), e5238, 2020
302020
The other guys: automated analysis of marginalized malware
MF Botacin, PL de Geus, ARA Grégio
Journal of Computer Virology and Hacking Techniques 14, 87-98, 2018
302018
We need to talk about antiviruses: challenges & pitfalls of av evaluations
M Botacin, F Ceschin, P De Geus, A Grégio
Computers & Security 95, 101859, 2020
292020
Behavioral analysis of malicious code through network traffic and system call monitoring
ARA Grégio, DS Fernandes Filho, VM Afonso, RDC Santos, M Jino, ...
Evolutionary and Bio-Inspired Computation: Theory and Applications V 8059 …, 2011
292011
Leveraging ontologies and machine-learning techniques for malware analysis into android permissions ecosystems
LC Navarro, AKW Navarro, A Grégio, A Rocha, R Dahab
Computers & Security 78, 429-453, 2018
272018
Challenges and pitfalls in malware research
M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio
Computers & Security 106, 102287, 2021
222021
Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging
M Botacin, PLD Geus, A Grégio
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018
222018
Predicting misinformation and engagement in COVID-19 Twitter discourse in the first months of the outbreak
M Silva, F Ceschin, P Shrestha, C Brant, J Fernandes, CS Silva, A Grégio, ...
arXiv preprint arXiv:2012.02164, 2020
182020
Who watches the watchmen: a security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms
M Botacin, PLD Geus, A Grégio
ACM Computing Surveys (CSUR) 51 (4), 1-34, 2018
182018
Tracking memory writes for malware classification and code reuse identification
ARA Grégio, PL De Geus, C Kruegel, G Vigna
Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013
182013
An ontology of suspicious software behavior
A Grégio, R Bonacin, AC de Marchi, OF Nabuco, PL de Geus
Applied Ontology 11 (1), 29-49, 2016
172016
Visualization techniques for malware behavior analysis
ARA Grégio, RDC Santos
Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2011
172011
Evaluation of data mining techniques for suspicious network activity classification using honeypots data
A Grégio, R Santos, A Montes
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2007
162007
L (a) ying in (Test) Bed: How Biased Datasets Produce Impractical Results for Actual Malware Families’ Classification
T Beppler, M Botacin, FJO Ceschin, LES Oliveira, A Grégio
Information Security: 22nd International Conference, ISC 2019, New York City …, 2019
142019
The system can't perform the operation now. Try again later.
Articles 1–20