Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

First Blog Post

less than 1 minute read

Published:

Hey, my personal site is alive! Better late than never!

portfolio

publications

Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms

Published in ACM Computing Surveys (CSUR), 2018

My paper about the state-of-the-art on hardware support for security applications.

Recommended citation: Botacin et al, Marcus. (2018). "Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms." ACM CSUR. 1(1). http://doi.acm.org/10.1145/3199673

The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms Based on a Brazilian Case Study

Published in International Conference on Availability, Reliability and Security (ARES), 2019

My paper about the nature of Mobile Banking Apps in Brazil.

Recommended citation: Botacin et al, Marcus. (2019). "The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms Based on a Brazilian Case Study." ACM ARES. 1(1). https://dl.acm.org/doi/10.1145/3339252.3340103

Shallow Security: On the Creation of Adversarial Variants to Evade Machine Learning-Based Malware Detectors

Published in ACM Reversing and Offensive-Oriented Trends Symposium (ROOTS), 2019

Our second paper about how we won a malware evasion challenge using adversarial malware samples.

Recommended citation: Ceschin et al, Fabricio. (2019). "Shallow Security: On the Creation of Adversarial Variants to Evade Machine Learning-Based Malware Detectors." ACM ROOTS. 1(1). https://dl.acm.org/doi/10.1145/3375894.3375898

No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-Based Adversarial Samples

Published in ACM Reversing and Offensive-Oriented Trends Symposium (ROOTS), 2020

Our second paper about how we won a malware evasion challenge using adversarial malware samples.

Recommended citation: Ceschin et al, Fabricio. (2020). "No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-Based Adversarial Samples." ACM ROOTS. 1(1). https://dl.acm.org/doi/10.1145/3433667.3433669

Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios

Published in Elsevier Digital Investigation, 2021

My paper about clustering malware using similarity hashing functions.

Recommended citation: Botacin et al, Marcus. (2021). "Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios." Elsevier Digital Investigation. 1(1). https://www.sciencedirect.com/science/article/pii/S2666281721001281

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection

Published in Elsevier Expert Systems With Applications (ESWA), 2022

My paper proposing using branch patterns as inspection triggers for malware detection.

Recommended citation: Botacin et al, Marcus. (2022). " HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection." Elsevier ESWA. 1(1). https://www.sciencedirect.com/science/article/abs/pii/S0957417422004882

Enhancing Malware Family Classification in the Microsoft Challenge Dataset via Transfer Learning

Published in Latin-American Symposium on Dependable and Secure Computing (LADC), 2023

My co-authored paper presenting preliminary results on classifying the malware samples of the MS competition dataset into families via CNNs.

Recommended citation: Palma et al. (2023). "Enhancing Malware Family Classification in the Microsoft Challenge Dataset via Transfer Learning" ACM LADC. 1(1). https://dl.acm.org/doi/10.1145/3615366.3615374

The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries

Published in SECRYPT, 2024

My (co-authored) paper on classifying PUAs written in WebAssembly (WASM).

Recommended citation: Helpa et al. (2024). "The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries" SECRYPT. 1(1). https://www.insticc.org/node/TechnicalProgram/secrypt/2024/presentationDetails/127545

talks

Research @ Botacin’s Lab

Published:

My talk about the research developed in my lab (Botacin’s Lab) towards fully-automated, end-to-end malware analysis. Slides

teaching

Reverse Engineering

Workshop, UNICAMP, UFPR, SBSEG, 2018

This is a short-course to introduce reverse engineering and malware analysis concepts to new students. I presented this short course at University of Campinas (UNICAMP), Federal University of Paraná (UFPR), and at the Brazilian Symposium on Information and Systems Security (SBSEG). Course Material Here

CSCE 704: Data Analytics for Cybersecurity

Regular Grad Course, TAMU, 2024

I will teach my cybersecurity course under the data science umbrella this Fall. Please, enroll into CSCE 704-602. My approach will be similar to what I did in previous semesters. Take a look here