Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

First Blog Post

less than 1 minute read

Published:

Hey, my personal site is alive! Better late than never!

portfolio

publications

Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms

Published in ACM Computing Surveys (CSUR), 2018

My paper about the state-of-the-art on hardware support for security applications.

Recommended citation: Botacin et al, Marcus. (2018). "Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms." ACM CSUR. 1(1). http://doi.acm.org/10.1145/3199673

The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms Based on a Brazilian Case Study

Published in International Conference on Availability, Reliability and Security (ARES), 2019

My paper about the nature of Mobile Banking Apps in Brazil.

Recommended citation: Botacin et al, Marcus. (2019). "The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms Based on a Brazilian Case Study." ACM ARES. 1(1). https://dl.acm.org/doi/10.1145/3339252.3340103

Shallow Security: On the Creation of Adversarial Variants to Evade Machine Learning-Based Malware Detectors

Published in ACM Reversing and Offensive-Oriented Trends Symposium (ROOTS), 2019

Our second paper about how we won a malware evasion challenge using adversarial malware samples.

Recommended citation: Ceschin et al, Fabricio. (2019). "Shallow Security: On the Creation of Adversarial Variants to Evade Machine Learning-Based Malware Detectors." ACM ROOTS. 1(1). https://dl.acm.org/doi/10.1145/3375894.3375898

No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-Based Adversarial Samples

Published in ACM Reversing and Offensive-Oriented Trends Symposium (ROOTS), 2020

Our second paper about how we won a malware evasion challenge using adversarial malware samples.

Recommended citation: Ceschin et al, Fabricio. (2020). "No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-Based Adversarial Samples." ACM ROOTS. 1(1). https://dl.acm.org/doi/10.1145/3433667.3433669

Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios

Published in Elsevier Digital Investigation, 2021

My paper about clustering malware using similarity hashing functions.

Recommended citation: Botacin et al, Marcus. (2021). "Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios." Elsevier Digital Investigation. 1(1). https://www.sciencedirect.com/science/article/pii/S2666281721001281

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection

Published in Elsevier Expert Systems With Applications (ESWA), 2022

My paper proposing using branch patterns as inspection triggers for malware detection.

Recommended citation: Botacin et al, Marcus. (2022). " HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection." Elsevier ESWA. 1(1). https://www.sciencedirect.com/science/article/abs/pii/S0957417422004882

talks

teaching

Reverse Engineering

Workshop, UNICAMP, UFPR, SBSEG, 2018

This is a short-course to introduce reverse engineering and malware analysis concepts to new students. I presented this short course at University of Campinas (UNICAMP), Federal University of Paraná (UFPR), and at the Brazilian Symposium on Information and Systems Security (SBSEG). Course Material Here

Machine Learning-Based CyberDefenses

Topics, TAMU, 2023

In this course, we will navigate through the applications of ML in the security field: the pros, the cons, and the future yet to come.