- Advanced Malware Detection Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Integrated Circuits and Semiconductor Failure Analysis
- Security and Verification in Computing
- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Power Quality and Harmonics
- Software Engineering Research
- Anomaly Detection Techniques and Applications
- Cloud Data Security Solutions
- Non-Destructive Testing Techniques
- Evolutionary Algorithms and Applications
- Fire Detection and Safety Systems
- Power Line Communications and Noise
- Neuroscience and Neural Engineering
- Blockchain Technology Applications and Security
- Geophysics and Sensor Technology
- Nuclear Physics and Applications
- Adversarial Robustness in Machine Learning
- Face recognition and analysis
- RFID technology advancements
- Fault Detection and Control Systems
- Advanced X-ray and CT Imaging
- Fuzzy Logic and Control Systems
- Advanced Memory and Neural Computing
Instituto Nacional de Metrologia, Qualidade e Tecnologia
2013-2024
Institutos Lactec
2018
Amherst College
2016
University of Massachusetts Amherst
2016
Physically unclonable functions (PUFs) are emerging as hardware primitives for key-generation and light-weight authentication. Strong PUFs represent a variant of which respond to user challenge with response determined by its unique manufacturing process variations. Unfortunately many the have been shown be vulnerable model building attacks when an attacker has access pairs. In mounting attack, typically machine learning is used build software forge PUF. Researchers long interested in...
As the number of installed Battery Energy Storage Systems (BESSs) increases, concerns related to possible cyber-attacks these systems rise accordingly. The most BESS owners knows their may be vulnerable, but they often consider only denial service attacks in risk assessment. Unfortunately, other, subtler and more dangerous exist. In this paper we show that a stealth attack BESSs can performed by applying Man-in-the-Middle (MitM) approach. aim is stealthily manage physical system hiding...
A implementação da Inteligência Artificial (IA) na auditoria pública é crucial para modernizar os processos administrativos, especialmente no combate à corrupção. IA permite analisar eficientemente grandes conjuntos de dados, identificando padrões e anomalias que frequentemente escapam detecção humana. pesquisa aborda a eficiência benefícios das ferramentas IA, como Operação Serenata Amor (OSA), Análise Licitações, Editais (ALICE), Querido Diário, Ferramenta Argus, Guided Risk Assessment per...
Physically Unclonable Functions (PUFs) are hardware-based security primitives that promise to provide an advantage in terms of area and power compared hardware implementations standard cryptography algorithms. PUFs harness manufacturing process variations realize binary keys (Weak PUFs) or functions (SStrong PUFs). An ideal Strong PUF realizes a function maps m-bit input challenge random n-bit output response offers exponential number such unique challenge-response pairs (CRPs). Hence, it is...
Abstract Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation resources. Even in private settings, cloud platforms enable agile self-service management, which means that physical resources are shared more efficiently. Nevertheless, using infrastructures also creates opportunities for attacks data breaches. In this paper, we describe SecureCloud approach. The project aims to confidentiality integrity running...
According to the World Commission on Environment and Development, sustainable development allows population meet needs of present while preserving environment for future generations their own needs. The integration renewable, low-polluting, distributed energy resources in power grid is an important step toward development. In this article, we propose two architectures, clustered distributed, labeling source provided smart grid. A label contains amount its sustainability index. Labels from...
Abstract:Smart meters are devices equipped with embedded software that capable of processing complex digital data. These now a reality in most areas metrology. They enable number new applications, but they also introduce challenges regards to their validation. This paper describes initiatives developed by Inmetro, the national metrology institute Brazil, and Eletrobras, Brazilian power utility company, designed support validation smart electricity meters.
Currently, the use of algorithms and computer vision systems for metrological purposes has increased in different areas knowledge to reduce human error process deviations, consequently increasing reliability reducing measurement uncertainties. This study presents a model estimating uncertainty Feret's diameter (DF ) measurements scanning electron microscopy (SEM) images from regular irregular gunshot residue (GSR) particles at magnifications. The data were extracted using automatic algorithm...
Nowadays, the automatic processing for 3D facial animation has been studied intensively and a variety of techniques proposed so far. For instance, some softwares are based on audio capture [5] others motion [7, 6]. Independently approach used, it is fundamental that solution assure lip movements synchronization with audio. Surely, this issue represents state-of-art many efforts have made to solve it. Lip most complex process in production an and, commonly, takes long time.
Software validation is a critical issue in several applications. For medical instruments, an ineffective may result human injuries and death. We consider the problem of analyzing software embedded these correlating with other instruments Legal Metrology Conformity Assessment, such as smart meters or employee payroll recorders. In cases, effective way to guarantee appropriate behavior instrument conduct complete its hardware — including source-code topology details. present work, we describe...
Combinatorial coverage measures have been defined and applied to a wide range of problems. These methods developed using that depend on the inclusion or absence t-tuples values in inputs test cases. We extend these include frequency occurrence combinations, an approach we refer as combination differencing (CFD). This method is particularly suited artificial intelligence machine learning (AI/ML) applications, where training data sets used systems are dependent prevalence various attributes...
Text classification has been mostly performed through implicit semantic correlation techniques, such as latent analysis. This approach however, proved insufficient for situations where there are short texts to be classified into one or more from many classes. That is the case of statements purpose Brazilian companies, according around thousand and eight hundred categories government administration detailment National Classification Economical Activities (CNAE), CNAE-Subclasses. The impact...
Cloud computing considerably reduces the costs of deploying applications through on-demand, automated, and fine-granular allocation resources. Even in private settings, cloud platforms enable agile self-service management, which means that physical resources are shared more efficiently. Nevertheless, using infrastructures also creates opportunities for attacks data breaches. In this paper, we describe SecureCloud approach. The project aims to confidentiality integrity running potentially...
Smart Grids are power grids that use Information and Communication Technologies to improve the generation, transmission distribution. The main characteristic on is ability process transmit a huge data information in real-time. However, rise new security challenge confidentiality integrity, due can be part of hostile environments. For example, using cloud computing realize billing load balance process. Thus, ensure integrity environments, this paper proposes an application for protection...
Program matching refers to the mapping between equivalent codes written in different languages — including high-level and low-level languages. This equivalence is useful for some software engineering scenarios such as determining whether rewritten code correct, which version of a program being used, malware present program. In work, we propose novel approach solve executable traceability by using analysis artificial neural networks. From obtained execution behavior properties codes, from...
In this work we propose a strategy using Intel SGX processors to guarantee the use of audited applications in insecure environments. A cloud-based toolchain allows auditors assess if user's application meets specifications and standards, generate final binaries, cryptographically sign them. It also generates manifesto containing information verify authenticity software binaries. SGX-based binary loader (inserted by during building process) writes down auditing data that is encrypted sealed...
Abstract Breathalyzers used at sobriety checkpoints undergo strict quality control by metrological institutes or police departments to ensure the accuracy of results, thus avoiding measurement inaccuracies. This paper presents a new approach instrument evaluation using machine learning algorithms that are capable preemptively detecting failures. Our objective was predict failures before they occur. These faults may be errors standard deviations exceed allowable limits defined technical...
Most advances in increasing the security of PUFs come from alterations to topology mechanism or measurement used generate their output. This paper focuses on a different form improving security: Selecting subset challenges and responses conceal patterns inherent PUF well enough prevent an attacker successfully replicating PUF's responses. Our results show that it is possible select large set CRPs can be exposed resulting modeling accuracy as low 74%, while without our selection process increases 93%.