Carlo Marcelo Revoredo da Silva

Carlo Marcelo Revoredo da Silva
Universidade de Pernambuco | UPE · Escola Politécnica de Pernambuco - POLI

PhD in Computer Science

About

33
Publications
6,864
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
113
Citations
Additional affiliations
August 2018 - present
Universidade de Pernambuco
Position
  • Professor (Assistant)
February 2018 - present
Federal University of Pernambuco
Position
  • PhD Student
Education
February 2012 - February 2014
Federal University of Pernambuco
Field of study
  • Computer Science

Publications

Publications (33)
Article
Full-text available
Phishing is an attack characterized by attempted fraud against users. The attacker develops a malicious page that is a trusted environment, inducing its victims to submit sensitive data. There are several platforms, such as PhishTank and OpenPhish, that maintain databases on malicious pages to support anti-phishing solutions, such as, for example,...
Article
Phishing has been consolidating itself as a chronic problem due to its approach to exploiting the end-user, seen as the weakest factor. Through social engineering, the attacker seeks a carelessness of the human being to intercept sensitive data. Concomitantly, the richness in details makes it more difficult to mitigate the attack by most anti-phish...
Conference Paper
Full-text available
O avanço de ataques de phishing não se caracteriza apenas na propagação, mas também no rigor em detalhes, tornando a fraude cada vez mais convincente ao crivo do usuário final. Diante deste cenário, o presente estudo apresenta uma abordagem sobre os comportamentos homográficos comumente presentes em ataques de phishing associados a uma determinada...
Conference Paper
Phishing é um tipo de crime cibernético que visa o roubo de dados pessoais do usuário por meios de disfarces e enganação. Este artigo propõe o Xphide, um sistema especialista para a detecção de páginas maliciosas. A base da construção do sistema foi feita através de uma análise aprofundada a respeito de atributos relevantes para descrição de página...
Conference Paper
Full-text available
A utilização de firewalls baseados em nuvem como o CloudFlare demonstrou ser eficaz na contenção de ataques no protocolo HTTP direcionados ao domínio DNS. Contudo, ainda assim é possível obter o endereço real do servidor protegido e atacá-lo diretamente consultando de forma automatizada registros e históricos DNS. Diante essa lacuna, este artigo ap...
Conference Paper
Full-text available
Muitos servidores na web são protegidos somente por firewalls baseados em proxy e são vulneráveis à ataques direcionados à protocolos da camada de aplicação. Esse artigo aborda um modelo de firewall standalone que fica residente na camada de aplicação exigindo o mínimo de alterações possível na implementação. Resultados mostraram que a tecnologia c...
Conference Paper
Phishing websites são páginas falsas que enganam as vítimas, passando-se por sites legítimos de bancos ou empresas para obterem informações pessoais sem o consentimento delas. Embora algoritmos de aprendizagem tenham sido largamente utilizados para a detecção de phishing, não existe um consenso sobre que atributos são relevantes para uma melhor des...
Article
Context: In the fight against phishing attacks, phishing prediction heuristics are important in devel- oping solutions. However, phishing attacks continue to grow today, reflecting on the need for higher precision solutions. Objective: This article focuses on phishing prediction based on a set of features. The purpose of this proposal is to evaluat...
Conference Paper
Full-text available
No combate aos incidentes de segurança relacionados a ataques de phishing, inúmeras são as soluções propostas no intuito de minimizar a incidência desses ataques. Contudo, esses continuam crescendo nos dias de hoje, fazendo refletir sobre a precisão dessas soluções. Este artigo enfoca a exploração de phishing baseada em conjunto de características q...
Conference Paper
O objetivo deste artigo é apresentar uma modelagem de risco para o desenvolvimento de serviços no ecossistema Web. A proposta visa estimar um fator de risco e impacto aos ativos considerando a violação de dados, os aspectos humanos e a conformidade do serviço. Além de considerar os comportamentos de seus atores, dispositivos e recursos. Adicionalme...
Conference Paper
This article addresses some of the bottlenecks in major phishing reporting platforms. The purpose of the proposal is to evaluate behaviors present in the repositories of these platforms that may justify obstacles such as the plataform incident response and blacklist maintenance. As a result, in addition to the quantitative data, the study also perf...
Conference Paper
Phishing websites are fake addresses that cheat the victims, passing by legitimate sites from banks or companies to obtain personal information without their consent. Looking to solve this problematic, several ways of defense were put into practice, among them the Machine Learning (ML). This article presents an study about ML utilization on malicio...
Conference Paper
Full-text available
Navegadores Web são ferramentas de extrema importância no que diz respeito ao consumo de dados na internet, pois possibilitam a interação e consumo de informações providas por diversos serviços disponíveis na Web. Diversas empresas cotidianas adequaram seus serviços para serem utilizados na Web no intuito de obter vantagens competitivas entre seus...
Article
Full-text available
The aim of this paper is to present a taxonomy for security threats on the Web ecosystem. We proposes a classification model based on 21 vectors divided into 8 distinct security threats, making use of levels of abstraction and criteria for discrimination which consider propagation and similarity in vulnerabilities. We also propose to estimate the r...
Article
Full-text available
This article presents an analysis on the attacks related to the sensitive data breach in the Web ecosystem. The study is based on an Meta-Analysis which identified the significance of 21 years of relevant contributions to the subject. Considering the results we elaborate two contributions: (i) we group attacks according to their behavior and (ii) w...
Conference Paper
Full-text available
Navegadores Web são ferramentas de extrema importância no que diz respeito ao consumo de dados na internet, pois possibilitam a interação e consumo de informações providas por diversos serviços disponíveis na Web. Em contrapartida, é nítida a dificuldade destas ferramentas em evitar que seus usuários sejam vítimas de vulnerabilidades, sejam localiz...
Conference Paper
Full-text available
O que é uma Startup? Que métodos, processos, técnicas ou ferramentas podem maximizar as chances de sucesso de uma Startup de Software em um cenário onde o acesso a computadores, smartphones, tablets e a produtos e serviços pela Internet parecem não parar de crescer? Este trabalho reúne uma série de conceitos tais como: Lean Startup, Business Model...
Conference Paper
Full-text available
O desenvolvimento tecnológico vivenciado nos últimos anos proporcionou o crescimento do universo digital de forma exponencial, parte desse universo digital encontra-se armazenado em sistemas de armazenamento em nuvem. A cada dia surgem mais destes sistemas, que oferecem o armazenamento de dados de forma distribuída com alta taxa de disponibilidade,...
Conference Paper
Full-text available
Based on its daily use and volume of its applications – both domestic and corporate environments – it cannot be denied that Web Browsers are very important tools. However, due to the increase of its use, the web environment presents itself as an increasingly hostile place where people perform malicious cybercrimes aiming to steal or to tamper sensi...
Conference Paper
Full-text available
The purpose of this article is to present a Privacy Maturity Model of services offered by Cloud Computing Providers in the context of Cloud Storage. This study aims to present an overview of the current barriers in these scenarios and present a model based on technical analysis of maturity in these environments. We present the goals to be achieved...
Conference Paper
Full-text available
This article describes the SafeMash project, a platform that provides an environment for the construction, safe consumption and standardized of Mashups. The platform proposal is to offer functionalities focused in security aspects regarding the integration between web applications, the users and third parties APIs. Which is based in one specificati...
Conference Paper
Full-text available
The recommendation systems aim to minimize information overload by helping user's in searching desired information. Faced with this scenario, we investigate the use of cloud factors able to have a positive influence on generating recommendations. Thus, we present a new, simple model based on cloud features which is associated with the content-based...
Conference Paper
Full-text available
This article describes security issues and lack about standardized aspects at Mashups ecosystem into web 2.0. In the course of our discussion, we intent present a platform model that offering functionalities focused in security aspects with regards to the integration between web applications, the users and third parties APIs, basing in an specifica...
Conference Paper
Full-text available
The massive growth in the data volume provided by the development of the computational capacity has exceeded the users' cognitive ability to analyze large data masses. This paper presents the research and development of a files recommendation engine in a cloud storage environment, using the content-based technique filtering added to cloud factors....
Conference Paper
Full-text available
This work displays metrics about publications available in the literature which deal with some of the seven security threats in Cloud Computing based in the guide entitled "Top Threats to Cloud Computing" from the Cloud Security Alliance (CSA). Through this research, it is identified the most explored threats, distributed the results between fiftee...
Conference Paper
Full-text available
Este artigo descreve o projeto SafeMash, uma plataforma como serviço que proporciona um ambiente para a construção segura e padronizada de Mashups. A plataforma oferece aos seus usuários recursos que promovem boas práticas, como tratamento das entradas, além de inspecionar a integridade das políticas de segurança estabelecidas pelas API de terceiro...
Article
Full-text available
Today, Cloud Computing is rising strongly, presenting itself to the market by its main service models, known as IaaS, PaaS and SaaS, that offer advantages in operational investments by means of on-demand costs, where consumers pay by resources used. In face of this growth, security threats also rise, compromising the Confidentiality, Integrity and...
Conference Paper
Full-text available
Studies on link prediction aims to understand mechanisms that trigger the changes and evolution in social networks, i.e., how they grow and change over time. The evolution of a social network to let larger and more complex. This complicates the prediction of relationships. Consider a network of co-authored among scientists, for example. There are m...
Conference Paper
Full-text available
Studies and experiments point to the overhead on the message exchange systems as a critical factor for the success of solutions using P2P (Peer-to-Peer) technology. This factor increases drastically the network use. More over the peers involved in these systems don't always have the same processing capacity, and this causes variation in the process...

Network

Cited By