André Grégio
André Grégio
Assistant Professor at UFPR
Verified email at - Homepage
Cited by
Cited by
Identifying Android malware using dynamically obtained features
VM Afonso, MF de Amorim, ARA Grégio, GB Junquera, PL de Geus
Journal of Computer Virology and Hacking Techniques 11 (1), 9-17, 2015
Controlchain: Blockchain as a central enabler for access control authorizations in the iot
OJA Pinno, ARA Gregio, LCE De Bona
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-6, 2017
Toward a taxonomy of malware behaviors
ARA Grégio, VM Afonso, DSF Filho, PL Geus, M Jino
The Computer Journal 58 (10), 2758-2777, 2015
Behavioral analysis of malicious code through network traffic and system call monitoring
ARA Grégio, DS Fernandes Filho, VM Afonso, RDC Santos, M Jino, ...
Evolutionary and Bio-Inspired Computation: Theory and Applications V 8059 …, 2011
Faster unbalanced private set intersection
ACD Resende, DF Aranha
FC 2018, 2018
Ontology for malware behavior: A core model proposal
A Grégio, R Bonacin, O Nabuco, VM Afonso, PL De Geus, M Jino
2014 IEEE 23rd International WETICE Conference, 453-458, 2014
Evaluation of data mining techniques for suspicious network activity classification using honeypots data
A Grégio, R Santos, A Montes
Data Mining, Intrusion Detection, Information Assurance, and Data Networks …, 2007
The other guys: automated analysis of marginalized malware
MF Botacin, PL de Geus, ARA Grégio
Journal of Computer Virology and Hacking Techniques 14 (1), 87-98, 2018
An ontology of suspicious software behavior
A Grégio, R Bonacin, AC de Marchi, OF Nabuco, PL de Geus
Applied Ontology 11 (1), 29-49, 2016
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
LC Navarro, AKW Navarro, A Grégio, A Rocha, R Dahab
Computers & Security 78, 429-453, 2018
Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging
M Botacin, PLD Geus, A Grégio
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018
An empirical analysis of malicious internet banking software behavior
ARA Grégio, DS Fernandes, VM Afonso, PL de Geus, VF Martins, M Jino
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1830-1835, 2013
Visualization techniques for malware behavior analysis
ARA Grégio, RDC Santos
Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2011
Tracking memory writes for malware classification and code reuse identification
ARA Grégio, PL De Geus, C Kruegel, G Vigna
International Conference on Detection of Intrusions and Malware, and …, 2012
15 Análise Comportamental de Código Malicioso Através da Monitoraçao de Chamadas de Sistema e Tráfego de Rede
DS Fernandes Filho, PL de Geus
Anais do VI Workshop de Teses, Dissertações e Trabalhos de Iniciação …, 2010
Malware distributed collection and pre-classification system using honeypot technology
ARA Grégio, IL Oliveira, RDC Santos, AM Cansian, PL de Geus
Data Mining, Intrusion Detection, Information Security and Assurance, and …, 2009
Taxonomías de vulnerabilidades: situación actual
AR Abed Gregio, LGC Barbato, LO Duarte, A Montes, C Hoepers, ...
Disponible online: http://www. lbd. dcc. ufmg. br/colecoes/sbseg/2005/009 …, 2007
Interactive, visual-aided tools to analyze malware behavior
ARA Grégio, AOC Baruque, VM Afonso, DS Fernandes Filho, PL de Geus, ...
International Conference on Computational Science and Its Applications, 302-313, 2012
A malware detection system inspired on the human immune system
IL De Oliveira, ARA Grégio, AM Cansian
International Conference on Computational Science and Its Applications, 286-301, 2012
ControlChain: A new stage on the IoT access control authorization
OJA Pinno, ARA Grégio, LCE De Bona
Concurrency and Computation: Practice and Experience 32 (12), e5238, 2020
The system can't perform the operation now. Try again later.
Articles 1–20