HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection

M Botacin, MZ Alves, D Oliveira, A Grégio - Expert Systems with …, 2022 - Elsevier
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

Antiviruses under the microscope: A hands-on perspective

M Botacin, FD Domingues, F Ceschin, R Machnicki… - Computers & …, 2022 - Elsevier
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …

Shallow security: On the creation of adversarial variants to evade machine learning-based malware detectors

F Ceschin, M Botacin, HM Gomes, LS Oliveira… - Proceedings of the 3rd …, 2019 - dl.acm.org
The use of Machine Learning (ML) techniques for malware detection has been a trend in the
last two decades. More recently, researchers started to investigate adversarial approaches …

The need for speed: An analysis of brazilian malware classifiers

F Ceschin, F Pinage, M Castilho, D Menotti… - IEEE Security & …, 2018 - ieeexplore.ieee.org
Using a dataset containing about 50,000 samples from Brazilian cyberspace, we show that
relying solely on conventional machine-learning systems without taking into account the …

Parent process termination: an adversarial technique for persistent malware

M Daghmehchi Firoozjaei, S Samet… - Journal of Cyber …, 2024 - Taylor & Francis
Persistent malware use techniques, such as obfuscation, process injection, and system call
abuse to evade security mechanisms and avoid detection throughout their compromise …

One size does not fit all: A longitudinal analysis of brazilian financial malware

M Botacin, H Aghakhani, S Ortolani, C Kruegel… - ACM Transactions on …, 2021 - dl.acm.org
Malware analysis is an essential task to understand infection campaigns, the behavior of
malicious codes, and possible ways to mitigate threats. Malware analysis also allows better …

Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints

M Botacin, FB Moreira, POA Navaux, A Grégio… - ACM Transactions on …, 2022 - dl.acm.org
AntiViruses (AVs) are essential to face the myriad of malware threatening Internet users. AVs
operate in two modes: on-demand checks and real-time verification. Software-based real …

Enhancing branch monitoring for security purposes: From control flow integrity to malware analysis and debugging

M Botacin, PLD Geus, A Grégio - ACM Transactions on Privacy and …, 2018 - dl.acm.org
Malware and code-reuse attacks are the most significant threats to current systems
operation. Solutions developed to countermeasure them have their weaknesses exploited …

A praise for defensive programming: Leveraging uncertainty for effective malware mitigation

R Sun, M Botacin, N Sapountzis, X Yuan… - … on Dependable and …, 2020 - ieeexplore.ieee.org
A promising avenue for improving the effectiveness of behavioral-based malware detectors
is to leverage two-phase detection mechanisms. Existing problem in two-phase detection is …