-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathindex.html
More file actions
executable file
·219 lines (175 loc) · 6.51 KB
/
index.html
File metadata and controls
executable file
·219 lines (175 loc) · 6.51 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
<html>
<head>
<title>Daniel R. dos Santos, PhD</title>
</head>
<body>
<h1>Daniel R. dos Santos, PhD</h1>
<a href="https://www.linkedin.com/in/danielricardosantos">LinkedIn</a>
<h3>Publications</h3>
<ol>
<li>
<a href="files/publications/cps4cip2025_paper.pdf">
A Comparative Study of ICS Honeypot Deployments
</a> [CPS4CIP 2025 (co-located with ESORICS)]
</li>
<li>
<a href="files/publications/ccs2024_poster.pdf">
Poster: A Multi-step Approach for Classification of Malware Samples
</a> [CCS 2024]
</li>
<li>
<a href="files/publications/wsdf2024_paper.pdf">
Using DNS Patterns for Automated Cyber Threat Attribution
</a> [WSDF 2024 (co-located with ARES)]
</li>
<li>
<a href="files/publications/cyberhunt2023_paper.pdf">
Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents
</a> [CyberHunt 2023]
</li>
<li>
<a href="https://link.springer.com/article/10.1007/s11416-023-00479-w">
Demonstration of New Attacks on Three Healthcare Network Protocols in a Lab Environment
</a> [JICV 2023]
</li>
<li>
<a href="https://arxiv.org/abs/2303.12340">
Insecure by Design in the Backbone of Critical Infrastructure
</a> [SafeThings 2023]
</li>
<li>
<a href="files/publications/nordsec2022_paper.pdf">
Actionable Cyber Threat Intelligence for Automated Incident Response</a> [NordSec 2022]
</li>
<li>
<a href="files/publications/coins2021_paper.pdf">
Similarity-based Clustering for IoT Device Classification</a> [IEEE COINS 2021]
</li>
<li>
<a href="https://www.nowpublishers.com/article/BookDetails/9781680838220">
Attacking and Defending Healthcare Networks</a> [Book Chapter - "Cyber-Physical Threat Intelligence for Critical Infrastructures Security"]
</li>
<li>
<a href="files/publications/ifipsec2020_paper.pdf">
A Matter of Life and Death: Analyzing the Security of Healthcare Networks</a> [IFIP SEC 2020]
</li>
<li>
<a href="files/publications/icissp2020_paper.pdf">
Security and Privacy in Smart Grids: Challenges, Solutions and Opportunities</a> [ICISSP 2020]
</li>
<li>
<a href="https://arxiv.org/abs/1912.02480">
Leveraging Operational Technology and the Internet of Things to Attack Smart Buildings</a> [JICV 2020]
</li>
<li>
<a href="files/publications/dimva2019_paper.pdf">
Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks</a> [DIMVA 2019]
</li>
<li>
<a href="files/publications/critis2018_paper.pdf">
Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems</a> [CRITIS 2018]
</li>
<li>
<a href="files/publications/sacmat2018_paper.pdf">
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques</a> [SACMAT 2018]
</li>
<li>
<a href="files/publications/cpsspc2017_paper.pdf">
From System Specification to Anomaly Detection (and back)</a> [CPS-SPC 2017 (co-located with CCS)]
</li>
<li>
<a href="https://arxiv.org/abs/1709.03084">
TestREx: a Framework for Repeatable Exploits</a> [STTT]
</li>
<li>
<a href="https://arxiv.org/abs/1706.07205">
A Survey on Workflow Satisfiability, Resiliency, and Related Problems</a> [arXiv]
</li>
<li>
<a href="files/publications/sefm2017_paper.pdf">
On Run-time Enforcement of Authorization Constraints in Security-Sensitive Business Processes</a> [SEFM 2017]
</li>
<li>
<a href="files/publications/jcs2017_paper.pdf">
Automatically Finding Execution Scenarios to Deploy Security-Sensitive Workflows</a> [JCS]
</li>
<li>
<a href="files/publications/codaspy2017_paper.pdf">
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications</a> [CODASPY 2017]
</li>
<li>
<a href="files/publications/jnca2016_paper.pdf">
A Framework and Risk Assessment Approaches for Risk-based Access Control in the Cloud</a> [JNCA]
</li>
<li>
<a href="files/publications/sacmat2016_paper.pdf">
Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem: Scalability and Reusability</a> [SACMAT 2016]
</li>
<li>
<a href="files/publications/tacas2016_paper.pdf">
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-sensitive Business Processes</a> [TACAS 2016]
</li>
<li>
<a href="files/publications/dbsec2015_paper.pdf">
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios</a> [DBSec 2015]
</li>
<li>
<a href="files/publications/asiaccs2015_paper.pdf">
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes</a> [ASIACCS 2015]
</li>
<li>
<a href="files/publications/cset2014_paper.pdf">
TestRex: a Testbed for Repeatable Exploits</a> [CSET 2014 (co-located with USENIX Security)]
</li>
<li>
<a href="files/publications/securware2014_paper.pdf">
Current Issues in Cloud Computing Security and Management</a> [SECURWARE 2014]
</li>
<li>
<a href="files/publications/noms2014_paper.pdf">
A dynamic risk-based access control architecture for cloud computing</a> [NOMS 2014]
</li>
<li>
<a href="files/publications/fsma2014_paper.pdf">
Operation, Management, Security and Sustainability for Cloud Computing</a> [FSMA]
</li>
<li>
<a href="files/publications/imcs2014_paper.pdf">
A Cyclical Evaluation Model of Information Security Maturity</a> [IMCS]
</li>
<li>
<a href="files/publications/icns2014_paper.pdf">
An Architecture for Risk Analysis in Cloud</a> [ICNS 2014]
</li>
<li>
<a href="files/publications/ijsn2014_paper.pdf">
Privacy-preserving identity federations in the cloud: a proof of concept</a> [IJSN]
</li>
<li>
<a href="files/publications/securware2013_paper.pdf">
Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation</a> [SECURWARE 2013]
</li>
<li>
<a href="files/publications/icwmc2013_paper.pdf">
Challenges of Operationalizing PACS on Cloud Over Wireless Networks</a> [ICWMC 2013]
</li>
<li>
<a href="files/publications/ijphim2013_paper.pdf">
A Review of PACS on Cloud for Archiving Secure Medical Images</a> [IJPHIM]
</li>
<li>
<a href="files/publications/icn2013_paper.pdf">
A Validation Model of Data Input for Web Services</a> [ICN 2013]
</li>
<li>
<a href="files/publications/icn2012_paper.pdf">
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth</a> [ICN 2012]
</li>
<li>
<a href="files/publications/sbseg2011_paper.pdf">
Uma aplicacao de privacidade no gerenciamento de identidades em nuvem com uApprove</a> [WTICG 2011 (co-located with SBSEG)]
</li>
</ol>
</tr>
</body>
</html>