Ewerton R. Andrade
University of São Paulo
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ewerton R. Andrade.
Journal of Cryptographic Engineering | 2014
Leonardo C. Almeida; Ewerton R. Andrade; Paulo S. L. M. Barreto; Marcos A. Simplicio
We present Lyra, a password-based key derivation scheme based on cryptographic sponges. Lyra was designed to be strictly sequential (i.e., not easily parallelizable), providing strong security even against attackers that use multiple processing cores (e.g., custom hardware or a powerful GPU). At the same time, it is very simple to implement in software and allows legitimate users to fine-tune its memory and processing costs according to the desired level of security against brute force password guessing. We compare Lyra with similar-purpose state-of-the-art solutions, showing how our proposal provides a higher security level and overcomes limitations of existing schemes. Specifically, we show that if we fix Lyra ’s total processing time
IEEE Transactions on Computers | 2016
Ewerton R. Andrade; Marcos A. Simplicio; Paulo S. L. M. Barreto; Paulo Cc Santos
Computers & Electrical Engineering | 2018
Daniel Migault; Marcos A. Simplício; Bruno M. Barros; Makan Pourzandi; Thiago R. M. Almeida; Ewerton R. Andrade; Tereza Cristina M. B. Carvalho
t
ieee european symposium on security and privacy | 2017
Giuseppe Ateniese; Bernardo Magri; Daniele Venturi; Ewerton R. Andrade
IACR Cryptology ePrint Archive | 2015
Marcos A. Simplício; Leonardo C. Almeida; Ewerton R. Andrade; Paulo Cc Santos; and Paulo S. L. M. Barreto
t in a legitimate platform, the cost of a memory-free attack against the algorithm is exponential, while the best-known result in the literature (namely, against the scrypt algorithm) is quadratic. In addition, for an identical same processing time, Lyra allows for a higher memory usage than its counterparts, further increasing the cost of brute force attacks.
international conference on distributed computing systems | 2017
Daniel Migault; Marcos A. Simplício; Bruno M. Barros; Makan Pourzandi; Thiago R. M. Almeida; Ewerton R. Andrade; Tereza Cristina M. B. Carvalho
We present Lyra2, a password hashing scheme (PHS) based on cryptographic sponges. Lyra2 was designed to be strictly sequential for a given number of cores (i.e., not easily parallelizable beyond that number), providing strong security even against attackers using custom hardware or GPUs. At the same time, it is very simple to implement in software and allows legitimate users to fine tune its memory and processing costs according to the desired level of security against brute force password-guessing. Lyra2 is an improvement of the recently proposed Lyra algorithm, providing an even higher security level against different attack venues and overcoming some limitations of this and other existing schemes.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2016
Routo Terada; Ewerton R. Andrade
Network virtualization technologies are creating a new era for information security, enabling the on demand creation and deployment of security appliances (generically called security service functions – SSF) for detecting and/or mitigating attacks. However, given the increasing size and complexity of contemporary attacks, it is usually hard for a single administrative domain to deal with several malicious flows by itself, which motivates the collaboration among SSFs from multiple domains. In this paper, we present a technical demonstration of a framework that leverages SDN (Software Defined Networking) and SFC (Service Function Chaining) to enhance the collaboration among different SSFs for mitigating large scale attacks. This framework allows SSFs from different domains to negotiate and dynamically control the amount of resources allocated for collaboration, in what we call a “best-effort” collaboration mode. The demonstration hereby presented consists in a video streaming service that is targeted by a volumetric denial-of-service attack, showing basically two situations: (1) after the attack reaches a certain volume, the SSF from the streaming services domain becomes unable to handle the attack on its own, so packets are dropped and the video quality decreases; and (2) when there is a collaboration among SSFs, the amount of traffic dropped is considerably reduced, so the video quality is preserved even during the attack.
symposium on cloud computing | 2018
Bruno Medeiros; Marcos A. Simplício; Ewerton R. Andrade
ieee conference on network softwarization | 2018
Thiago R. M. Almeida; Bruno M. Barros; Ewerton R. Andrade; Marcos A. Simplicio; Daniel Migault; Makan Pourzandi
IACR Cryptology ePrint Archive | 2016
Giuseppe Ateniese; Bernardo Magri; Daniele Venturi; Ewerton R. Andrade