Follow
André Grégio
André Grégio
Assistant Professor at UFPR
Verified email at inf.ufpr.br - Homepage
Title
Cited by
Cited by
Year
Controlchain: Blockchain as a central enabler for access control authorizations in the iot
OJA Pinno, ARA Gregio, LCE De Bona
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
2332017
Identifying Android malware using dynamically obtained features
VM Afonso, MF de Amorim, ARA Grégio, GB Junquera, PL de Geus
Journal of Computer Virology and Hacking Techniques 11, 9-17, 2015
1942015
Toward a taxonomy of malware behaviors
ARA Grégio, VM Afonso, DSF Filho, PL Geus, M Jino
The Computer Journal 58 (10), 2758-2777, 2015
542015
Shallow security: On the creation of adversarial variants to evade machine learning-based malware detectors
F Ceschin, M Botacin, HM Gomes, LS Oliveira, A Grégio
Proceedings of the 3rd Reversing and Offensive-oriented Trends Symposium, 1-9, 2019
462019
The need for speed: An analysis of brazilian malware classifiers
F Ceschin, F Pinage, M Castilho, D Menotti, LS Oliveira, A Gregio
IEEE Security & Privacy 16 (6), 31-41, 2018
442018
Ontology for malware behavior: A core model proposal
A Grégio, R Bonacin, O Nabuco, VM Afonso, PL De Geus, M Jino
2014 IEEE 23rd International WETICE Conference, 453-458, 2014
372014
We need to talk about antiviruses: challenges & pitfalls of av evaluations
M Botacin, F Ceschin, P De Geus, A Grégio
Computers & Security 95, 101859, 2020
342020
ControlChain: A new stage on the IoT access control authorization
OJA Pinno, ARA Grégio, LCE De Bona
Concurrency and Computation: Practice and Experience 32 (12), e5238, 2020
332020
The other guys: automated analysis of marginalized malware
MF Botacin, PL de Geus, ARA Grégio
Journal of Computer Virology and Hacking Techniques 14, 87-98, 2018
312018
Leveraging ontologies and machine-learning techniques for malware analysis into android permissions ecosystems
LC Navarro, AKW Navarro, A Grégio, A Rocha, R Dahab
Computers & Security 78, 429-453, 2018
302018
Behavioral analysis of malicious code through network traffic and system call monitoring
ARA Grégio, DS Fernandes Filho, VM Afonso, RDC Santos, M Jino, ...
Evolutionary and Bio-Inspired Computation: Theory and Applications V 8059 …, 2011
292011
Challenges and pitfalls in malware research
M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio
Computers & Security 106, 102287, 2021
282021
Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging
M Botacin, PLD Geus, A Grégio
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018
222018
Predicting misinformation and engagement in covid-19 twitter discourse in the first months of the outbreak
M Silva, F Ceschin, P Shrestha, C Brant, J Fernandes, CS Silva, A Grégio, ...
arXiv preprint arXiv:2012.02164, 2020
202020
Who watches the watchmen: a security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms
M Botacin, PLD Geus, A Grégio
ACM Computing Surveys (CSUR) 51 (4), 1-34, 2018
202018
An ontology of suspicious software behavior
A Grégio, R Bonacin, AC de Marchi, OF Nabuco, PL de Geus
Applied Ontology 11 (1), 29-49, 2016
202016
Tracking memory writes for malware classification and code reuse identification
ARA Grégio, PL De Geus, C Kruegel, G Vigna
Detection of Intrusions and Malware, and Vulnerability Assessment: 9th …, 2013
192013
Antiviruses under the microscope: A hands-on perspective
M Botacin, FD Domingues, F Ceschin, R Machnicki, MAZ Alves, ...
Computers & Security 112, 102500, 2022
182022
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection
M Botacin, MZ Alves, D Oliveira, A Grégio
Expert Systems with Applications 201, 117083, 2022
172022
Learning fast and slow: Propedeutica for real-time malware detection
R Sun, X Yuan, P He, Q Zhu, A Chen, A Gregio, D Oliveira, X Li
IEEE Transactions on Neural Networks and Learning Systems 33 (6), 2518-2529, 2021
172021
The system can't perform the operation now. Try again later.
Articles 1–20