• Home
  • Daniel Ricardo dos Santos
Daniel Ricardo dos Santos

Daniel Ricardo dos Santos
Forescout Technologies · Research

PhD

About

49
Publications
113,075
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
471
Citations
Citations since 2017
23 Research Items
347 Citations
2017201820192020202120222023020406080
2017201820192020202120222023020406080
2017201820192020202120222023020406080
2017201820192020202120222023020406080
Additional affiliations
September 2018 - present
SecurityMatters
Position
  • Senior Researcher
April 2017 - August 2018
Eindhoven University of Technology
Position
  • Researcher
September 2013 - March 2017
Fondazione Bruno Kessler
Position
  • Researcher
Education
November 2013 - March 2017
Università degli Studi di Trento
Field of study
  • Computer Science
October 2011 - August 2013
Federal University of Santa Catarina
Field of study
  • Computer Science
March 2007 - July 2011
Federal University of Santa Catarina
Field of study
  • Computer Science

Publications

Publications (49)
Chapter
Full-text available
Applying Cyber Threat Intelligence for active cyber defence, while potentially very beneficial, is currently limited to predominantly manual use. In this paper, we propose an automated approach for using Cyber Threat Intelligence during incident response by gathering Tactics, Techniques and Procedures available on intelligence reports, mapping them...
Article
Full-text available
In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsystems are all integrated within a single system commonly referred to as smart building (SB). To support the growing complexity of building oper...
Conference Paper
In the past few years, there's been a rise in critical vulnerabilities affecting embedded TCP/IP stacks which had remained undiscovered for over a decade. The direct, unauthenticated and sometimes cross-perimeter network exposure of these stacks, the often privileged portions of the system they run in and their position at the top of opaque supply...
Chapter
Healthcare Delivery Organizations (HDOs) are complex institutions where a broad range of devices are interconnected. This inter-connectivity brings security concerns and we are observing an increase in the number and sophistication of cyberattacks on hospitals. In this paper, we explore the current status of network security in HDOs and identify se...
Conference Paper
Full-text available
Smart grids are a promising upgrade to legacy power grids due to enhanced cooperation of involved parties, such as consumers and utility providers. These newer grids improve the efficiency of electricity generation and distribution by leveraging communication networks to exchange information between those different parties. However, the increased c...
Preprint
Full-text available
In recent years, the buildings where we spend most part of our life are rapidly evolving. They are becoming fully automated environments where energy consumption, access control, heating and many other subsystems are all integrated within a single system commonly referred to as smart building (SB). To support the growing complexity of building oper...
Chapter
In smart buildings, cyber-physical components (e.g., controllers, sensors, and actuators) communicate with each other using network protocols such as BACnet. Many of these devices are now connected to the Internet, enabling attackers to exploit vulnerabilities on protocols and devices to attack buildings. Situational awareness and intrusion detecti...
Article
Full-text available
Web applications are the target of many well known exploits and also a fertile ground for the discovery of security vulnerabilities. Yet, the success of an exploit depends both on the vulnerability in the application source code and the environment in which the application is deployed and run. As execution environments are complex (application serv...
Conference Paper
Full-text available
In smart buildings, physical components (e.g., controllers, sensors, and actuators) are interconnected and communicate with each other using network protocols such as BACnet. Many smart building networks are now connected to the Internet, enabling attackers to exploit vulnerabilities in critical buildings. Network monitoring is crucial to detect su...
Conference Paper
Full-text available
Security-sensitive workflows impose constraints on the control-flow and authorization policies that may lead to unsatisfiable instances. In these cases, it is still possible to find "least bad" executions where costs associated to authorization violations are minimized, solving the so-called Multi-Objective Workflow Sat-isfiability Problem (MO-WSP)...
Presentation
Full-text available
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the ”the guardian” reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT a...
Presentation
Full-text available
Serviços de cloud estão sempre “ligados,” e são acessíveis globalmente, assim as “coisas” podem ser localizadas em qualquer lugar, podem ser móveis, podem transmitir dados diferentes em momentos diferentes. Serviços de cloud tem escalabilidade, o que é bom em IoT já que muitas “coisas” podem se comunicar com velocidades diferentes em momentos difer...
Conference Paper
Full-text available
Industrial control systems have stringent safety and security demands. High safety assurance can be obtained by specifying the system with possible faults and monitoring it to ensure these faults are properly addressed. Addressing security requires considering unpredictable attacker behavior. Anomaly detection, with its data driven approach, can de...
Presentation
Full-text available
Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva...
Conference Paper
Full-text available
In previous work, we showed how to use an SMT-based model checker to synthesize run-time enforcement mechanisms for business processes augmented with access control policies and authorization constraints, such as Separation of Duties. The synthesized enforcement mechanisms are able to guarantee both termination and compliance to security requiremen...
Technical Report
Full-text available
Workflows specify collections of tasks that must be executed under the responsibility or supervision of human users. Workflow management systems and workflow-driven applications need to enforce security policies in the form of access control, specifying which users can execute which tasks, and authorization constraints, such as Separation of Duty,...
Article
Full-text available
We introduce a new class of analysis problems, called Scenario Finding Problems (SFPs), for security-sensitive business processes that---besides execution constraints on tasks---define access control policies (constraining which users can execute which tasks) and authorization constraints (such as Separation of Duty). The solutions to SFPs are conc...
Presentation
Full-text available
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machine...
Conference Paper
Full-text available
Organizations often expose business processes and services as web applications. Improper enforcement of security policies in these applications leads to business logic vulnerabilities that are hard to find and may have dramatic security implications. Aegis is a tool to automatically synthesize run-time monitors to enforce control-flow and data-flow...
Thesis
Full-text available
Workflows specify a collection of tasks that must be executed under the responsibility or supervision of human users. Workflow management systems and workflow-driven applications need to enforce security policies in the form of access control, specifying which users can execute which tasks, and authorization constraints, such as Separation/Binding...
Presentation
Full-text available
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
Article
Full-text available
Cloud computing is advantageous for customers and service providers. However, it has specific security requirements that are not captured by traditional access control models, e.g., secure information sharing in dynamic and collaborative environments. Risk-based access control models try to overcome these limitations, but while there are well-known...
Conference Paper
Full-text available
Modularity is an important concept in the design and enactment of workflows. However, supporting the specification and enforcement of authorization in this setting is not straightforward. In this paper, we introduce a notion of component and a combination mechanism for security-sensitive workflows. These are business processes in which execution co...
Conference Paper
Full-text available
Cerberus is a tool to automatically synthesize run-time enforcement mechanisms for security-sensitive Business Processes (BPs). The tool is capable of guaranteeing that the execution constraints \(EC \) on the tasks together with the authorization policy \(AP \) and the authorization constraints \(AC \) are satisfied while ensuring that the process...
Presentation
Full-text available
T2. Clouds and Security: A Scrutinized Marriage Presenters: Prof. Dr. Carlos Becker Westphall, Federal University of Santa Catarina, Brazil Prof. Dr. Carla Merkle Westphall, Federal University of Santa Catarina, Brazil Introduction Motivation Cloud security challenges and problems Basic concepts Cloud computing Security Cloud Security Concerns Iden...
Technical Report
Full-text available
An established trend in software engineering insists on using components (sometimes also called services or packages) to encapsulate a set of related functionalities or data. By defining interfaces specifying what functionalities they provide or use, components can be combined with others to form more complex components. In this way, IT systems can...
Conference Paper
Full-text available
To support the re-use of business process models, an emerging trend in Business Process Management, it is crucial to assist customers during deployment. We study how to do this for an important class of business processes, called security-sensitive workflows, in which execution constraints on the tasks are complemented with authorization constraint...
Conference Paper
Full-text available
Run-time monitors are crucial to the development of security-aware workflow management systems, which need to mediate access to their resources by enforcing authorization policies and constraints, such as Separation of Duty. In this paper, we introduce a precise technique to synthesize run-time monitors capable of ensuring the successful terminatio...
Presentation
Full-text available
Cloud computing is becoming increasingly more popular and telecommunications companies perceive the cloud as an alternative to their service deployment models, one that brings them new possibilities. But to ensure the successful use of this new model there are security and management challenges that still need to be faced. There are numerous threat...
Presentation
Full-text available
Cloud computing is a distributed computing model that still faces problems. New ideas emerge to take advantage of its features and among the research challenges found in the cloud, we can highlight security concerns. This tutorial discusses the use of risk-based dynamic access control for cloud computing, presenting an access control model based on...
Conference Paper
Full-text available
Cloud computing is becoming increasingly more pop-ular and telecommunications companies perceive the cloud as an alternative to their service deployment models, one that brings them new possibilities. But to ensure the successful use of this new model there are security and management challenges that still need to be faced. There are numerous threa...
Conference Paper
Full-text available
Web applications are the target of many known exploits and also a fertile ground for the discovery of security vul-nerabilities. Those applications may be exploitable not only because of the vulnerabilities in their source code, but also because of the environments on which they are deployed and run. Execution environments usually con-sist of appli...
Article
Full-text available
Purpose - The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity. Design/methodology/approach - This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluatio...
Article
Full-text available
This paper presents some scope, context, proposals and solutions related with the following topics: Decision- Theoretic Planning for Cloud Computing; An Architecture for Risk Analysis in Cloud; Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation; Challenges of Operationalizing PACS on Cloud Over Wireless Networks; Environment,...
Conference Paper
Full-text available
Cloud computing is a distributed computing model that still faces problems. New ideas emerge to take advantage of its features and among the research challenges found in the cloud, we can highlight Identity and Access Management. The main problems of the application of access control in the cloud are the necessary flexibility and scalability to sup...
Conference Paper
Full-text available
Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus, the consumer loses control over the security of their information and services. This factor has prevented the migration to cloud computing in many businesses. This paper propose...
Article
Full-text available
Because of the growth in the use of cloud computing and the migration of services to this paradigm, it becomes necessary to investigate security issues that might compromise its use. Identity and Access Management is among these issues and is related to the management of users and access to their data. Federated Identity Management is widely adopte...
Presentation
Full-text available
The services provided in clouds may represent an increase in the efficiency and effectiveness in the operations of the enterprise business, improving the cost-effectiveness related to services and resources consumption. However, there is concern about the privacy of data, since such data are outside the client’s domain. For these services to be eff...
Conference Paper
Full-text available
Cloud Computing is already a successful paradigm for distributed computing and is still growing in popularity. However, many problems still linger in the application of this model and some new ideas are emerging to help leverage its features even further. One of these ideas is the cloud federation, which is a way of aggregating different clouds to...
Thesis
Full-text available
Cloud computing is a distributed computing model that still faces problems. New ideas emerge to take advantage of its features and among the research challenges found in cloud computing, we can highlight Identity and Access Management. The main problems of the application of access control in the cloud are the necessary flexibility and scalability...
Conference Paper
Full-text available
Clinics and hospitals are acquiring more technological resources to help providing a faster and more precise diagnostic, with the goal of making it more dynamic and effective. This is pushing health institutions to search for more modern equipment, with greater technological features. Besides last generation equipment, another problem faced by thes...
Article
Full-text available
Clinics and Hospitals are acquiring increasingly technological resources that assist in a quicker and more accurate diagnosis, in order to make it more dynamic and effective. This is causing health entities seek more modern equipment and advanced technological resources. The exams come to doctors with information processed in many different softwar...
Conference Paper
Full-text available
Web services inherited many well-known security problems of Web applications and brought new ones. Major data breaches today are consequences of bad input validation at the application level. This paper presents a way to implement an input validation model for Web services which can be used to prevent cross-site scripting and SQL injection through...
Conference Paper
Full-text available
The services provided in clouds may represent an increase in the efficiency and effectiveness in the operations of the enterprise business, improving the cost-effectiveness related to services and resources consumption. However, there is concern about the privacy of data, since such data are outside the client's domain. For these services to be eff...
Conference Paper
Full-text available
Due to the continued growth in the use of cloud computing and the tendency to migrate services to this new paradigm, it becomes necessary to in-vestigate security issues that might compromise its use. Identity Managament is an area in information security that is concerned with the management of users and their data, involving authentication, autho...
Thesis
Full-text available
Due to the continued growth in the use of cloud computing and the tendency to migrate services to this new paradigm, it becomes necessary to investigate security issues that might compromise its use. Identity Managament is an area in information security that is concerned with the management of users and their data, involving authentication, author...

Network

Cited By

Projects

Projects (3)
Archived project
Project
(Goals and some results): Goal 1: Cloud identity management: A survey on privacy strategies https://www.researchgate.net/publication/316116828_Cloud_identity_management_A_survey_on_privacy_strategies With the rise of cloud computing, thousands of users and multiple applications have sought to communicate with each other, exchanging sensitive data. Thus, for effectively managing applications and resources, the use of models and tools is essential for the secure management of identities and to avoid compromising data privacy. There are models and tools that address federated identity management, and it is important that they use privacy mechanisms to assist in compliance with current legislation. Therefore, this article aims to present a survey of privacy in cloud identity management, presenting and comparing main features and challenges described in the literature. At the end of this work there is a discussion of the use of privacy and future research directions. Goal 2: Improving cloud computing virtual machines balancing through hosts and virtual machines similarities https://www.researchgate.net/publication/318445528_Improving_cloud_computing_virtual_machines_balancing_through_hosts_and_virtual_machines_similarities Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance techniques; however, only a few used the similarity between VMs and physical hosts to map VMs migrations. In addition, most proposals do not consider the size, dynamism, and heterogeneity of the cloud when developing a management technique. We present a cloud computing VMs balancing algorithm that uses the similarity between VMs and physical hosts to create the map of migrations. Furthermore, the proposal takes into account the size, dynamism, and heterogeneity of the cloud when mapping VMs migrations; thus the proposal is developed in a distributed fashion, enabling the processing of each cluster at a time. To evaluate the proposal, we used the Google cluster data set. Experiments demonstrate that the proposed technique can improve the balance of allocated resources; thus helping reduce service degradation. Moreover, the runtime of the algorithm indicates that it is feasible to be used in a real cloud computing environment with hundreds of physical servers and virtual machines. Goal 3: Preserving Privacy with Fine-grained Authorization in an Identity Management System https://www.researchgate.net/publication/315816577_Preserving_Privacy_with_Fine-grained_Authorization_in_an_Identity_Management_System In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), could represent a privacy breach. This paper proposes an architecture that allows an individual to obtain services without the need of releasing all personal attributes. The architecture achieves that outcome evaluating the targeted policy in the domain of the identity provider, that is, policies are sent from service providers to identity providers to be evaluated, without the need of releasing some PIIs to the service provider side. We also present an implementation of a prototype using XACML 3.0 for fine-grained authorization and OpenID Connect for identity management. The prototype was evaluated through an use case representing an hypothetical scenario of a bookstore. The project demonstrated that for certain situations an user can restrict the release of PII data and still gain access to services. Goal 4: A Framework and Risk Assessment Approaches for Risk-based Access Control in the Cloud https://www.researchgate.net/publication/306107497_A_Framework_and_Risk_Assessment_Approaches_for_Risk-based_Access_Control_in_the_Cloud Cloud computing is advantageous for customers and service providers. However, it has specific security requirements that are not captured by traditional access control models, e.g., secure information sharing in dynamic and collaborative environments. Risk-based access control models try to overcome these limitations, but while there are well-known enforcement mechanisms for traditional access control, this is not the case for risk-based policies. In this paper, we motivate the use of risk-based access control in the cloud and present a framework for enforcing risk-based policies that is based on an extension of XACML. We also instantiate this framework using a new ontology-based risk assessment approach, as well as other models from related work, and present experimental results of the implementation of our work. Goal 5: Order@Cloud: A VM Organisation Framework Based on Multi-Objectives Placement Ranking https://www.researchgate.net/publication/296695902_OrderCloud_A_VM_Organisation_Framework_Based_on_Multi-Objectives_Placement_Ranking This paper presents the implementation and tests of a flexible and extensible framework, named Order@Cloud, that improves the Virtual Machine placements of a Cloud. It receives new VMs on the Cloud and organises them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritised. Based on Evolutionary and Greedy Searches, Order@Cloud theoretically guarantees the adoption of a better set of Placements. More specifically, it seeks the non-dominated solutions (Pareto Set) and compares them considering the implementation cost of the scenario and its benefits. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritised elements. To understand the applicability and performance of our solution we conducted experiments using a real Cloud environment and discuss its performance, flexibility and optimality. Goal 6: A Distributed Autonomic Management Framework for Cloud Computing Orchestration https://www.researchgate.net/publication/305904642_A_Distributed_Autonomic_Management_Framework_for_Cloud_Computing_Orchestration Due to constant workload growth, the infrastructure used to support cloud computing (CC) environments increases in size and complexity. As a consequence of that, human administrators are not able to monitor, analyze, plan and execute actions upon the environment, seeking goals such as the environment optimization and service level agreements fulfillment. This proposal provides an autonomic framework to create virtual machines migrations and heuristics to select hosts to be activated or deactivated when needed. Moreover, the framework proposed in this paper works in a distributed way using multi-agent systems concepts. We provide an architecture to deal with the size, heterogeneity and dynamism of CC environments. Further, our proposal was added to the CloudStack platform as a plug-in for validation and experimentation. Keywords-Cloud computing orchestration; autonomic management framework. Goal 7: A Model for Managed Elements under Autonomic Cloud Computing Management https://www.researchgate.net/publication/308527496_A_Model_for_Managed_Elements_under_Autonomic_Cloud_Computing_Management Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This paper proposes an approach to model the load flow through abstract and concrete cloud components using double weighted Directed Acyclic Multigraphs. Such model enables the comparison, analysis and simulation of clouds, which assist the cloud management with the evaluation of modifications in the cloud structure and configuration. The existing solutions either do not have mathematical background, which hinders the comparison and production of structural variations in cloud models, or have the mathematical background, but are limited to a specific area (e.g. energy-efficiency), which does not provide support to the dynamic nature of clouds and to the different needs of the managers. For this reason, we present a formalisation and algorithms that support the load propagation and the states of services, systems, third-parties providers and resources, such as: computing, storage and networking. Our model has a formal mathematical background and is generic, in contrast with other proposals. To demonstrate the applicability of our solution, we have implemented a software framework for modelling Infrastructure as a Service, and conducted numerical experiments with hypothetical loads. Goal 8: RACLOUDS - Model for Clouds Risk Analysis in the Information Assets Context https://www.researchgate.net/publication/303720639_RACLOUDS_-_Model_for_Clouds_Risk_Analysis_in_the_Information_Assets_Context Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus the consumer loses control over the security of their information and services. This factor has prevented the migration to cloud computing in many businesses. This paper proposes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. The proposed model establishes the responsibilities of three actors: Consumer, Provider and Security Labs. The inclusion of actor Security Labs provides more credibility to risk analysis making the results more consistent for the consumer.