Daniela Oliveira

Orcid: 0000-0003-3488-0053

Affiliations:
  • University of Florida, Department of Electrical and Computer Engineering, Gainesville, FL, USA
  • University of California, Davis, Department of Computer Science, CA, USA (PhD 2010)


According to our database1, Daniela Oliveira authored at least 54 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Are Fact-Checking Tools Reliable? An Evaluation of Google Fact Check.
CoRR, 2024

2023
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking.
ACM Comput. Surv., 2023

People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

2022
Learning Fast and Slow: Propedeutica for Real-Time Malware Detection.
IEEE Trans. Neural Networks Learn. Syst., 2022

FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor.
IEEE Trans. Inf. Forensics Secur., 2022

A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation.
IEEE Trans. Dependable Secur. Comput., 2022

Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Lumen: A machine learning framework to expose influence cues in texts.
Frontiers Comput. Sci., 2022

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection.
Expert Syst. Appl., 2022

2021
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware.
ACM Trans. Priv. Secur., 2021

Lumen: A Machine Learning Framework to Expose Influence Cues in Text.
CoRR, 2021

Leveraging Team Dynamics to Predict Open-source Software Projects' Susceptibility to Social Engineering Attacks.
CoRR, 2021

Computer Users Have Unique Yet Temporally Inconsistent Computer Usage Profiles.
CoRR, 2021

Brazilian Favela Women: How Your Standard Solutions for Technology Abuse Might Actually Harm Them.
CoRR, 2021

Challenges and pitfalls in malware research.
Comput. Secur., 2021

Predicting Different Types of Subtle Toxicity in Unhealthy Online Conversations.
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021

2020
Balancing resistance and resilience.
Netw. Secur., 2020

Facebook Ad Engagement in the Russian Active Measures Campaign of 2016.
CoRR, 2020

Predicting Misinformation and Engagement in COVID-19 Twitter Discourse in the First Months of the Outbreak.
CoRR, 2020

MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

A Novel Criterion of Reconstruction-based Anomaly Detection for Sparse-binary Data.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content.
ACM Trans. Comput. Hum. Interact., 2019

Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302).
Dagstuhl Reports, 2019

A Dual-Task Interference Game-Based Experimental Framework for Comparing the Usability of Authentication Methods.
Proceedings of the 12th International Conference on Human System Interaction, 2019

Identifying Unintended Harms of Cybersecurity Countermeasures.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

2018
Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction].
IEEE Secur. Priv., 2018

Leveraging Uncertainty for Effective Malware Mitigation.
CoRR, 2018

API Blindspots: Why Experienced Developers Write Vulnerable Code.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Lumus: Dynamically Uncovering Evasive Android Applications.
Proceedings of the Information Security - 21st International Conference, 2018

FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
The dose makes the poison - Leveraging uncertainty for effective malware detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

2015
The Case for Unpredictability and Deception as OS Features.
login Usenix Mag., 2015

Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

The Case for Less Predictable Operating System Behavior.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Ianus: secure and holistic coexistence with kernel extensions - a immune system-inspired approach.
Proceedings of the Symposium on Applied Computing, 2014

Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

Cooperation and security isolation of library OSes for multi-process applications.
Proceedings of the Ninth Eurosys Conference 2014, 2014

It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

Technical Foundations of Information Systems Security.
Proceedings of the Computing Handbook, 2014

2012
Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries.
Proceedings of the New Security Paradigms Workshop, 2012

2011
A Socially-Aware Operating System for Trustworthy Computing.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

Understanding Cancer-Based Networks in Twitter Using Social Network Analysis.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

Trustworthy opportunistic sensing: A Social Computing Paradigm.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

2009
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Trans. Comput. Sci., 2009

Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
Proceedings of the Information Security, 11th International Conference, 2008

2006
ExecRecorder: VM-based full-system replay for attack analysis and system recovery.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

Temporal search: detecting hidden malware timebombs with virtual machines.
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006


  Loading...