Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vitor Monte Afonso is active.

Publication


Featured researches published by Vitor Monte Afonso.


Proceedings of SPIE | 2011

Behavioral analysis of malicious code through network traffic and system call monitoring

André Ricardo Abed Grégio; Dario Simões Fernandes Filho; Vitor Monte Afonso; Rafael D. C. Santos; Mario Jino; Paulo Lício de Geus

Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples that bypass current approaches and also fixes some issues with these approaches.


workshops on enabling technologies: infrastracture for collaborative enterprises | 2014

Ontology for Malware Behavior: A Core Model Proposal

Andre Grecio; Rodrigo Bonacin; Olga Nabuco; Vitor Monte Afonso; Paulo Lício de Geus; Mario Jino

The ubiquity of Internet-connected devices motivates attackers to create malicious programs (malware) to exploit users and their systems. Malware detection requires a deep understanding of their possible behaviors, one that is detailed enough to tell apart suspicious programs from benign, legitimate ones. A step to effectively address the malware problem leans toward the development of an ontology. Current efforts are based on an obsolete hierarchy of malware classes that defines a malware family by one single prevalent behavior (e.g., viruses infect other files, worms spread and exploit remote systems autonomously, Trojan horses disguise themselves as benign programs, and so on). In order to address the detection of modern, complex malware families whose infections involve sets of multiple exploit methods, we need an ontology broader enough to deal with these suspicious activities performed on the victims system. In this paper, we propose a core model for a novel malware ontology that is based on their exhibited behavior, filling a gap in the field.


international conference on communications | 2012

A hybrid framework to analyze web and OS malware

Vitor Monte Afonso; Dario Simões Fernandes Filho; André Ricardo Abed Grégio; Paulo Lício de Geus; Mario Jino

Malicious programs (malware) cause serious security issues to home users and even to highly secured enterprise systems. The main infection vector currently used by attackers is the Internet. To improve the detection rate and to develop protection mechanisms, it is very important to analyze and study these threats. To this end, several systems were developed to perform malware analysis, which support operating system (OS) programs or Web codes, but they all suffer from limitations. Also, the existing systems focus only on one type of malware, those that target the OS or that require a Web browser. In this article, we propose a framework that is able to analyze Web and OS-based malware, which provides better detection rates and a broader range of malware types analysis. We have also evaluated and compared our analysis results to the state-of-the-art systems, presenting the advantages of the developed framework over them when regarding Web and OS-based malware.


international conference on computational science and its applications | 2012

Pinpointing malicious activities through network and system-level malware execution behavior

André Ricardo Abed Grégio; Vitor Monte Afonso; Dario Simões Fernandes Filho; Paulo Lício de Geus; Mario Jino; Rafael D. C. Santos

Malicious programs pose a major threat to Internet-connected systems, increasing the importance of studying their behavior in order to fight against them. In this paper, we propose definitions to the different types of behavior that a program can present during its execution. Based on those definitions, we define suspicious behavior as the group of actions that change the state of a target system. We also propose a set of network and system-level dangerous activities that can be used to denote the malignity in suspicious behaviors, which were extracted from a large set of malware samples. In addition, we evaluate the malware samples according to their suspicious behavior. Moreover, we developed filters to translate from lower-level execution traces to the observed dangerous activities and evaluated them in the context of actual malware.


international conference on computational science and its applications | 2012

Interactive, visual-aided tools to analyze malware behavior

André Ricardo Abed Grégio; Alexandre Or Cansian Baruque; Vitor Monte Afonso; Dario Simões Fernandes Filho; Paulo Lício de Geus; Mario Jino; Rafael D. C. Santos

Malicious software attacks can disrupt information systems, violating security principles of availability, confidentiality and integrity. Attackers use malware to gain control, steal data, keep access and cover traces left on the compromised systems. The dynamic analysis of malware is useful to obtain an execution trace that can be used to assess the extent of an attack, to do incident response and to point to adequate counter-measures. An analysis of the captured malware can provide analysts with information about its behavior, allowing them to review the malicious actions performed during its execution on the target. The behavioral data gathered during the analysis consists of filesystem and network activity traces; a security analyst would have a hard time sieving through a maze of textual event data in search of relevant information. We present a behavioral event visualization framework that allows for an easier realization of the malicious chain of events and for quickly spotting interesting actions performed during a security compromise. Also, we analyzed more than 400 malware samples from different families and showed that they can be classified based on their visual signature. Finally, we distribute one of our tools to be freely used by the community.


international conference on information security | 2018

Lumus : Dynamically Uncovering Evasive Android Applications

Vitor Monte Afonso; Anatoli Kalysch; Tilo Müller; Daniela A. S. de Oliveira; André Grégio; Paulo Licio de Geus

Dynamic analysis of Android malware suffers from techniques that identify the analysis environment and prevent the malicious behavior from being observed. While there are many analysis solutions that can thwart evasive malware on Windows, the application of similar techniques for Android has not been studied in-depth. In this paper, we present Lumus, a novel technique to uncover evasive malware on Android. Lumus compares the execution traces of malware on bare metal and emulated environments. We used Lumus to analyze 1,470 Android malware samples and were able to uncover 192 evasive samples. Comparing our approach with other solutions yields better results in terms of accuracy and false positives. We discuss which information are typically used by evasive malware for detecting emulated environments, and conclude on how analysis sandboxes can be strengthened in the future.


Journal of Computer Virology and Hacking Techniques | 2015

Identifying Android malware using dynamically obtained features

Vitor Monte Afonso; Matheus Favero de Amorim; André Ricardo Abed Grégio; Glauco Barroso Junquera; Paulo Lício de Geus


network and distributed system security symposium | 2016

Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy

Vitor Monte Afonso; Paulo Lício de Geus; Antonio Bianchi; Yanick Fratantonio; Christopher Kruegel; Giovanni Vigna; Adam Doupé; Mario Polino


The Computer Journal | 2015

Toward a Taxonomy of Malware Behaviors

André Grégio; Vitor Monte Afonso; Dario Simões Fernandes Filho; Paulo Lício de Geus; Mario Jino


acm symposium on applied computing | 2013

An empirical analysis of malicious internet banking software behavior

André Ricardo Abed Grégio; Dario Simões Fernandes; Vitor Monte Afonso; Paulo Lício de Geus; Victor Furuse Martins; Mario Jino

Collaboration


Dive into the Vitor Monte Afonso's collaboration.

Top Co-Authors

Avatar

Paulo Lício de Geus

State University of Campinas

View shared research outputs
Top Co-Authors

Avatar

Mario Jino

State University of Campinas

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rafael D. C. Santos

National Institute for Space Research

View shared research outputs
Top Co-Authors

Avatar

André Grégio

Federal University of Paraná

View shared research outputs
Top Co-Authors

Avatar

Adam Doupé

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge