Skip to main content

Showing 1–8 of 8 results for author: Grégio, A

Searching in archive cs. Search in all archives.
.
  1. Fast & Furious: Modelling Malware Detection as Evolving Data Streams

    Authors: Fabrício Ceschin, Marcus Botacin, Heitor Murilo Gomes, Felipe Pinagé, Luiz S. Oliveira, André Grégio

    Abstract: Malware is a major threat to computer systems and imposes many challenges to cyber security. Targeted threats, such as ransomware, cause millions of dollars in losses every year. The constant increase of malware infections has been motivating popular antiviruses (AVs) to develop dedicated detection strategies, which include meticulously crafted machine learning (ML) pipelines. However, malware dev… ▽ More

    Submitted 15 August, 2022; v1 submitted 24 May, 2022; originally announced May 2022.

  2. arXiv:2109.06127  [pdf, ps, other

    cs.CR

    Malware MultiVerse: From Automatic Logic Bomb Identification to Automatic Patching and Tracing

    Authors: Marcus Botacin, André Grégio

    Abstract: Malware and other suspicious software often hide behaviors and components behind logic bombs and context-sensitive execution paths. Uncovering these is essential to react against modern threats, but current solutions are not ready to detect these paths in a completely automated manner. To bridge this gap, we propose the Malware Multiverse (MalVerse), a solution able to inspect multiple execution p… ▽ More

    Submitted 13 September, 2021; originally announced September 2021.

  3. arXiv:2109.06068  [pdf, other

    cs.CR

    A [in]Segurança dos Sistemas Governamentais Brasileiros: Um Estudo de Caso em Sistemas Web e Redes Abertas

    Authors: Marcus Botacin, André Grégio

    Abstract: Whereas the world relies on computer systems for providing public services, there is a lack of academic work that systematically assess the security of government systems. To partially fill this gap, we conducted a security evaluation of publicly available systems from public institutions. We revisited OWASP top-10 and identified multiple vulnerabilities in deployed services by scanning public gov… ▽ More

    Submitted 13 September, 2021; originally announced September 2021.

    Comments: in Portuguese

  4. arXiv:2105.09900  [pdf, other

    cs.LG

    Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles

    Authors: Luiz Giovanini, Fabrício Ceschin, Mirela Silva, Aokun Chen, Ramchandra Kulkarni, Sanjay Banda, Madison Lysaght, Heng Qiao, Nikolaos Sapountzis, Ruimin Sun, Brandon Matthews, Dapeng Oliver Wu, André Grégio, Daniela Oliveira

    Abstract: This paper investigates whether computer usage profiles comprised of process-, network-, mouse-, and keystroke-related events are unique and consistent over time in a naturalistic setting, discussing challenges and opportunities of using such profiles in applications of continuous authentication. We collected ecologically-valid computer usage profiles from 31 MS Windows 10 computer users over 8 we… ▽ More

    Submitted 2 September, 2021; v1 submitted 20 May, 2021; originally announced May 2021.

  5. arXiv:2012.02164  [pdf, other

    cs.SI cs.CY cs.LG

    People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation--A Comparison Between COVID and General Narratives on Twitter

    Authors: Mirela Silva, Fabrício Ceschin, Prakash Shrestha, Christopher Brant, Shlok Gilda, Juliana Fernandes, Catia S. Silva, André Grégio, Daniela Oliveira, Luiz Giovanini

    Abstract: Misinformation entails the dissemination of falsehoods that leads to the slow fracturing of society via decreased trust in democratic processes, institutions, and science. The public has grown aware of the role of social media as a superspreader of untrustworthy information, where even pandemics have not been immune. In this paper, we focus on COVID-19 misinformation and examine a subset of 2.1M t… ▽ More

    Submitted 9 September, 2021; v1 submitted 3 December, 2020; originally announced December 2020.

    Comments: 22 pages

  6. arXiv:2010.16045  [pdf, other

    cs.CR cs.LG

    Machine Learning (In) Security: A Stream of Problems

    Authors: Fabrício Ceschin, Marcus Botacin, Albert Bifet, Bernhard Pfahringer, Luiz S. Oliveira, Heitor Murilo Gomes, André Grégio

    Abstract: Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-the-art for solving many of the open issues in that field. However, it is very difficult to evaluate how good the produced solutions are, since the challenges faced in security may not appear in other areas. One of these challenges is the concept drift, which increases the existing arms race between attackers… ▽ More

    Submitted 4 September, 2023; v1 submitted 29 October, 2020; originally announced October 2020.

    Journal ref: Digital Threats 2023

  7. arXiv:1802.02503  [pdf, other

    cs.CR

    A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation

    Authors: Ruimin Sun, Marcus Botacin, Nikolaos Sapountzis, Xiaoyong Yuan, Matt Bishop, Donald E Porter, Xiaolin Li, Andre Gregio, Daniela Oliveira

    Abstract: A promising avenue for improving the effectiveness of behavioral-based malware detectors would be to combine fast traditional machine learning detectors with high-accuracy, but time-consuming deep learning models. The main idea would be to place software receiving borderline classifications by traditional machine learning methods in an environment where uncertainty is added, while software is anal… ▽ More

    Submitted 12 June, 2020; v1 submitted 7 February, 2018; originally announced February 2018.

    Journal ref: IEEE Transaction of Dependability and Security 2020

  8. arXiv:1712.01145  [pdf, other

    cs.CR cs.LG stat.ML

    Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection

    Authors: Ruimin Sun, Xiaoyong Yuan, Pan He, Qile Zhu, Aokun Chen, Andre Gregio, Daniela Oliveira, Xiaolin Li

    Abstract: Existing malware detectors on safety-critical devices have difficulties in runtime detection due to the performance overhead. In this paper, we introduce PROPEDEUTICA, a framework for efficient and effective real-time malware detection, leveraging the best of conventional machine learning (ML) and deep learning (DL) techniques. In PROPEDEUTICA, all software start execution are considered as benign… ▽ More

    Submitted 17 October, 2021; v1 submitted 4 December, 2017; originally announced December 2017.

    Comments: 12 pages, 4 figures. This paper has been accepted to IEEE Transactions on Neural Networks and Learning Systems (TNNLS)