Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

L(a)ying in (Test)Bed - How Biased Datasets Produce Impractical Results for Actual Malware Families' Classification., , , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 381-401. Springer, (2019)A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (1): 353-369 (2022)The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support., , and . J. Comput. Virol. Hacking Tech., 16 (3): 185-196 (2020)Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios., , , , and . Digit. Investig., (2021)A inSegurança dos Sistemas Governamentais Brasileiros: Um Estudo de Caso em Sistemas Web e Redes Abertas., and . CoRR, (2021)Fast & Furious: Modelling Malware Detection as Evolving Data Streams., , , , , and . CoRR, (2022)Dissecting Applications Uninstallers and Removers: Are They Effective?, and . ISC, volume 13640 of Lecture Notes in Computer Science, page 339-359. Springer, (2022)Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security., and . ISC, volume 13640 of Lecture Notes in Computer Science, page 381-389. Springer, (2022)Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints., , , , and . ACM Trans. Priv. Secur., 25 (2): 9:1-9:34 (2022)Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms., , and . ACM Comput. Surv., 51 (4): 69:1-69:34 (2018)