Charles B. Prado

ORCID: 0000-0003-3119-9772
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Integrated Circuits and Semiconductor Failure Analysis
  • Security and Verification in Computing
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Power Quality and Harmonics
  • Software Engineering Research
  • Anomaly Detection Techniques and Applications
  • Cloud Data Security Solutions
  • Non-Destructive Testing Techniques
  • Evolutionary Algorithms and Applications
  • Fire Detection and Safety Systems
  • Power Line Communications and Noise
  • Neuroscience and Neural Engineering
  • Blockchain Technology Applications and Security
  • Geophysics and Sensor Technology
  • Nuclear Physics and Applications
  • Adversarial Robustness in Machine Learning
  • Face recognition and analysis
  • RFID technology advancements
  • Fault Detection and Control Systems
  • Advanced X-ray and CT Imaging
  • Fuzzy Logic and Control Systems
  • Advanced Memory and Neural Computing

Instituto Nacional de Metrologia, Qualidade e Tecnologia
2013-2024

Institutos Lactec
2018

Amherst College
2016

University of Massachusetts Amherst
2016

Physically unclonable functions (PUFs) are emerging as hardware primitives for key-generation and light-weight authentication. Strong PUFs represent a variant of which respond to user challenge with response determined by its unique manufacturing process variations. Unfortunately many the have been shown be vulnerable model building attacks when an attacker has access pairs. In mounting attack, typically machine learning is used build software forge PUF. Researchers long interested in...

10.1109/hst.2016.7495550 article EN 2016-05-01

As the number of installed Battery Energy Storage Systems (BESSs) increases, concerns related to possible cyber-attacks these systems rise accordingly. The most BESS owners knows their may be vulnerable, but they often consider only denial service attacks in risk assessment. Unfortunately, other, subtler and more dangerous exist. In this paper we show that a stealth attack BESSs can performed by applying Man-in-the-Middle (MitM) approach. aim is stealthily manage physical system hiding...

10.1109/tsg.2021.3102833 article EN IEEE Transactions on Smart Grid 2021-08-05

A implementação da Inteligência Artificial (IA) na auditoria pública é crucial para modernizar os processos administrativos, especialmente no combate à corrupção. IA permite analisar eficientemente grandes conjuntos de dados, identificando padrões e anomalias que frequentemente escapam detecção humana. pesquisa aborda a eficiência benefícios das ferramentas IA, como Operação Serenata Amor (OSA), Análise Licitações, Editais (ALICE), Querido Diário, Ferramenta Argus, Guided Risk Assessment per...

10.5433/1984-7939.2025.v10.49741 article PT cc-by-nc Educação em Análise 2025-02-03

Physically Unclonable Functions (PUFs) are hardware-based security primitives that promise to provide an advantage in terms of area and power compared hardware implementations standard cryptography algorithms. PUFs harness manufacturing process variations realize binary keys (Weak PUFs) or functions (SStrong PUFs). An ideal Strong PUF realizes a function maps m-bit input challenge random n-bit output response offers exponential number such unique challenge-response pairs (CRPs). Hence, it is...

10.1109/dft.2017.8244433 article EN 2017-10-01

Abstract Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation resources. Even in private settings, cloud platforms enable agile self-service management, which means that physical resources are shared more efficiently. Nevertheless, using infrastructures also creates opportunities for attacks data breaches. In this paper, we describe SecureCloud approach. The project aims to confidentiality integrity running...

10.1186/s13677-019-0141-z article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2019-12-01

According to the World Commission on Environment and Development, sustainable development allows population meet needs of present while preserving environment for future generations their own needs. The integration renewable, low-polluting, distributed energy resources in power grid is an important step toward development. In this article, we propose two architectures, clustered distributed, labeling source provided smart grid. A label contains amount its sustainability index. Labels from...

10.1109/mcom.2013.6400438 article EN IEEE Communications Magazine 2013-01-01

Abstract:Smart meters are devices equipped with embedded software that capable of processing complex digital data. These now a reality in most areas metrology. They enable number new applications, but they also introduce challenges regards to their validation. This paper describes initiatives developed by Inmetro, the national metrology institute Brazil, and Eletrobras, Brazilian power utility company, designed support validation smart electricity meters.

10.1080/19315775.2014.11721691 article EN NCSLI Measure 2014-09-01

Currently, the use of algorithms and computer vision systems for metrological purposes has increased in different areas knowledge to reduce human error process deviations, consequently increasing reliability reducing measurement uncertainties. This study presents a model estimating uncertainty Feret's diameter (DF ) measurements scanning electron microscopy (SEM) images from regular irregular gunshot residue (GSR) particles at magnifications. The data were extracted using automatic algorithm...

10.1111/jmi.13232 article EN Journal of Microscopy 2023-09-27

Nowadays, the automatic processing for 3D facial animation has been studied intensively and a variety of techniques proposed so far. For instance, some softwares are based on audio capture [5] others motion [7, 6]. Independently approach used, it is fundamental that solution assure lip movements synchronization with audio. Surely, this issue represents state-of-art many efforts have made to solve it. Lip most complex process in production an and, commonly, takes long time.

10.1145/1282280.1282300 article EN 2007-07-09

Software validation is a critical issue in several applications. For medical instruments, an ineffective may result human injuries and death. We consider the problem of analyzing software embedded these correlating with other instruments Legal Metrology Conformity Assessment, such as smart meters or employee payroll recorders. In cases, effective way to guarantee appropriate behavior instrument conduct complete its hardware — including source-code topology details. present work, we describe...

10.1109/memea.2014.6860090 article EN 2022 IEEE International Symposium on Medical Measurements and Applications (MeMeA) 2014-06-01

Combinatorial coverage measures have been defined and applied to a wide range of problems. These methods developed using that depend on the inclusion or absence t-tuples values in inputs test cases. We extend these include frequency occurrence combinations, an approach we refer as combination differencing (CFD). This method is particularly suited artificial intelligence machine learning (AI/ML) applications, where training data sets used systems are dependent prevalence various attributes...

10.1109/icstw55395.2022.00032 article EN 2022-04-01

Text classification has been mostly performed through implicit semantic correlation techniques, such as latent analysis. This approach however, proved insufficient for situations where there are short texts to be classified into one or more from many classes. That is the case of statements purpose Brazilian companies, according around thousand and eight hundred categories government administration detailment National Classification Economical Activities (CNAE), CNAE-Subclasses. The impact...

10.1109/isda.2008.299 article EN 2008-11-01

Cloud computing considerably reduces the costs of deploying applications through on-demand, automated, and fine-granular allocation resources. Even in private settings, cloud platforms enable agile self-service management, which means that physical resources are shared more efficiently. Nevertheless, using infrastructures also creates opportunities for attacks data breaches. In this paper, we describe SecureCloud approach. The project aims to confidentiality integrity running potentially...

10.1109/ucc-companion.2018.00031 article EN 2018-12-01

Smart Grids are power grids that use Information and Communication Technologies to improve the generation, transmission distribution. The main characteristic on is ability process transmit a huge data information in real-time. However, rise new security challenge confidentiality integrity, due can be part of hostile environments. For example, using cloud computing realize billing load balance process. Thus, ensure integrity environments, this paper proposes an application for protection...

10.5753/sbseg.2018.4274 article EN 2018-10-25

Program matching refers to the mapping between equivalent codes written in different languages — including high-level and low-level languages. This equivalence is useful for some software engineering scenarios such as determining whether rewritten code correct, which version of a program being used, malware present program. In work, we propose novel approach solve executable traceability by using analysis artificial neural networks. From obtained execution behavior properties codes, from...

10.1142/s0218194012400049 article EN International Journal of Software Engineering and Knowledge Engineering 2012-03-01

In this work we propose a strategy using Intel SGX processors to guarantee the use of audited applications in insecure environments. A cloud-based toolchain allows auditors assess if user's application meets specifications and standards, generate final binaries, cryptographically sign them. It also generates manifesto containing information verify authenticity software binaries. SGX-based binary loader (inserted by during building process) writes down auditing data that is encrypted sealed...

10.1109/cloudcom2018.2018.00054 article EN 2018-12-01

Abstract Breathalyzers used at sobriety checkpoints undergo strict quality control by metrological institutes or police departments to ensure the accuracy of results, thus avoiding measurement inaccuracies. This paper presents a new approach instrument evaluation using machine learning algorithms that are capable preemptively detecting failures. Our objective was predict failures before they occur. These faults may be errors standard deviations exceed allowable limits defined technical...

10.1088/1361-6501/ad1d2c article EN cc-by Measurement Science and Technology 2024-01-10

Most advances in increasing the security of PUFs come from alterations to topology mechanism or measurement used generate their output. This paper focuses on a different form improving security: Selecting subset challenges and responses conceal patterns inherent PUF well enough prevent an attacker successfully replicating PUF's responses. Our results show that it is possible select large set CRPs can be exposed resulting modeling accuracy as low 74%, while without our selection process increases 93%.

10.1109/asianhost.2018.8607165 article EN 2018-12-01
Coming Soon ...