André Grégio
André Grégio
Assistant Professor at UFPR
Verified email at - Homepage
Cited by
Cited by
Controlchain: Blockchain as a central enabler for access control authorizations in the iot
OJA Pinno, ARA Gregio, LCE De Bona
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
Identifying Android malware using dynamically obtained features
VM Afonso, MF de Amorim, ARA Grégio, GB Junquera, PL de Geus
Journal of Computer Virology and Hacking Techniques 11 (1), 9-17, 2015
Toward a taxonomy of malware behaviors
ARA Grégio, VM Afonso, DSF Filho, PL Geus, M Jino
The Computer Journal 58 (10), 2758-2777, 2015
The need for speed: An analysis of brazilian malware classifiers
F Ceschin, F Pinage, M Castilho, D Menotti, LS Oliveira, A Gregio
IEEE Security & Privacy 16 (6), 31-41, 2018
Ontology for malware behavior: A core model proposal
A Grégio, R Bonacin, O Nabuco, VM Afonso, PL De Geus, M Jino
2014 IEEE 23rd International WETICE Conference, 453-458, 2014
Behavioral analysis of malicious code through network traffic and system call monitoring
ARA Grégio, DS Fernandes Filho, VM Afonso, RDC Santos, M Jino, ...
Evolutionary and Bio-Inspired Computation: Theory and Applications V 8059 …, 2011
The other guys: automated analysis of marginalized malware
MF Botacin, PL de Geus, ARA Grégio
Journal of Computer Virology and Hacking Techniques 14 (1), 87-98, 2018
ControlChain: A new stage on the IoT access control authorization
OJA Pinno, ARA Grégio, LCE De Bona
Concurrency and Computation: Practice and Experience 32 (12), e5238, 2020
Shallow security: On the creation of adversarial variants to evade machine learning-based malware detectors
F Ceschin, M Botacin, HM Gomes, LS Oliveira, A Grégio
Proceedings of the 3rd Reversing and Offensive-oriented Trends Symposium, 1-9, 2019
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
LC Navarro, AKW Navarro, A Grégio, A Rocha, R Dahab
Computers & Security 78, 429-453, 2018
Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging
M Botacin, PLD Geus, A Grégio
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018
Evaluation of data mining techniques for suspicious network activity classification using honeypots data
A Grégio, R Santos, A Montes
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2007
We need to talk about antiviruses: challenges & pitfalls of av evaluations
M Botacin, F Ceschin, P de Geus, A Grégio
Computers & Security 95, 101859, 2020
Visualization techniques for malware behavior analysis
ARA Grégio, RDC Santos
Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2011
Who watches the watchmen: a security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms
M Botacin, PLD Geus, A Grégio
ACM Computing Surveys (CSUR) 51 (4), 1-34, 2018
An ontology of suspicious software behavior
A Grégio, R Bonacin, AC de Marchi, OF Nabuco, PL de Geus
Applied Ontology 11 (1), 29-49, 2016
Tracking memory writes for malware classification and code reuse identification
ARA Grégio, PL Geus, C Kruegel, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2012
GLOBECOM 2017—2017 IEEE Global Communications Conference
OJA Pinno, A Grégio, LCE Bona
IEEE, 2017
Predicting misinformation and engagement in covid-19 twitter discourse in the first months of the outbreak
M Silva, F Ceschin, P Shrestha, C Brant, J Fernandes, CS Silva, A Grégio, ...
arXiv preprint arXiv:2012.02164, 2020
An empirical analysis of malicious internet banking software behavior
ARA Grégio, DS Fernandes, VM Afonso, PL de Geus, VF Martins, M Jino
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1830-1835, 2013
The system can't perform the operation now. Try again later.
Articles 1–20