Bruno de Azevedo Mendonca’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Figura 1. HistóricoHist´Histórico de críticas por assunto
Casa de ferreiro, o espeto não é de pau: evoluindo uma plataforma segura para competições de segurança
  • Conference Paper
  • Full-text available

October 2021

·

53 Reads

·

Bruno de Azevedo Mendonca

·

·

Capture-The-Flag (CTF) are information security competitions. Even though they are organized by experts in the field, the platforms used to run the events are subject to vulnerabilities, just like any other software. Although literature has proposed the NIZKCTF (Non-Interactive Zero-Knowledge Capture the Flag) protocol, in which participants submit a zero-knowledge proof that they have the answers to competition challenges, the implementation of this protocol lacks usability requirements which have only been realized with its use over the years. This paper discusses lessons learned and the adaptations to NIZKCTF made by the organizers of the Pwn2Win CTF from 2017 to 2021.

Download

Citations (1)


... The proposed system contains Auditability, Immutability, Decentralization, and Analysis Support But they can use a Proof-of-concept consensus algorithm which is mostly employed for testing or feasibility analysis of any software, so it is not applicable for security purposes [35]. Mendon et al. [36] proposed an Audit chain to assure log integrity using proof of existence (POE). On the other way, The Proof of existence can be obtained by taking the hash of a file or document, which can then be stored in the blockchain using a timestamp just like the off-chain [22] concept, while the actual data of every document or file is available in either a local database or a cloud-based system [37]. ...

Reference:

Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring Systems
Auditchain: a mechanism for ensuring logs integrity based on proof of existence in a public blockchain