Minicursos do XIV Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais

Autores

Jeroen van de Graaf (ed.)
UFMG
José Marcos Nogueira (ed.)
UFMG
Leonardo Barbosa Oliveira (ed.)
UFMG

Sinopse

O Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg) é um evento científico promovido anualmente pela Sociedade Brasileira de Computação (SBC). Nesta edição do SBSeg 2014, de um total de 10 submissões de propostas de minicursos foram selecionados quatro minicursos, representando assim uma taxa de aceitação de 40%.

Este livro reúne então 4 capítulos produzidos pelos autores das propostas de minicursos aceitas. O Capítulo 1 mostra o estado da arte em sistemas de armazenamento nas nuvens que sejam tolerantes a faltas e intrusões; O Capítulo 2, discute as técnicas de device fingerprint que são aquelas empregadas para identificar (ou re-identificar) um usuário ou um dispositivo através de um conjunto de atributos (tamanho da tela do dispositivo, versões de softwares instalados, entre muitos outros) e outras características observáveis durante processo de comunicação; O Capítulo 3 apresenta métodos e ferramentas de detecção de botnets; Por fim, o Capítulo 4 analisa os desafios de segurança e as principais contramedidas descritas em trabalhos acadêmicos sobre as inovações das redes veiculares.

Capítulos:

1. Tolerância a Faltas e Intrusões para Sistemas de Armazenamento de Dados em Nuvens Computacionais
Hylson Vescovi Netto, Lau Cheuk Lung, Rick Lopes de Souza
2. Device Fingerprinting: Conceitos e Técnicas, Exemplos e Contramedidas
Adriana Rodrigues Saraiva, Pablo Augusto da Paz Elleres, Guilherme de Brito Carneiro, Eduardo Luzeiro Feitosa
3. Botnets: Características e Métodos de Detecção Através do Tráfego de Rede
Kaio R. S. Barbosa, Gilbert B. Martins, Eduardo Souto, Eduardo Feitosa
4. Segurança em Redes Veiculares: Inovações e Direções Futuras
Michelle S. Wangham, Michele Nogueira, Cláudio P. Fernandes, Osmarildo Paviani, Benevid F. da Silva

Downloads

Não há dados estatísticos.

Referências

Abu Rajab, M., Zarfoss, J., Monrose, F., and Terzis, A. (2006). A multifaceted approach to understanding the botnet phenomenon. In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC ’06, pages 41–52, New York, NY, USA. ACM.

Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., and Diaz, C. (2014). The web never forgets: Persistent tracking mechanisms in the wild. In 21st ACM Conference on Computer and Communications Security, ACM CCS 2014.

Acar, G., Juarez, M., Nikiforakis, N., Diaz, C., Gürses, S., Piessens, F., and Preneel, B. (2013). Fpdetective: Dusting the web for fingerprinters. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13, pages 1129–1140, New York, NY, USA. ACM.

Adblock Plus (2014). Adblock plus surf the web without annoying ads. https://adblockplus.org/. [Online, Acessado 25/09/2014].

Adi Shamir. How to share a secret. Communic. of the ACM, 22(11):612–613, 1979.

Adi Shamir. Identity-based cryptosystems and signature schemes. In Advances in cryptology, pages 47–53. Springer, 1985.

Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D., e Ohlman, B. (2012). A survey of information-centric networking. IEEE Communications Magazine, 50(7):26–36.

Aijaz, A., Bochow, B., Dötzer, F., Festag, A., Gerlach, M., Kroh, R., e Leinmüller, T. (2006). Attacks on Inter Vehicle Communication Systems - an Analysis. In WIT, pages 189–194.

Al Falasi, H. e Barka, E. (2011). Revocation in VANETs: A survey. In International Conference on Innovations in Information Technology (IIT), pages 214–219.

Al-kahtani, M. (2012). Survey on security attacks in vehicular ad hoc networks (VANETs). In International Conference on Signal Processing and Communication Systems (ICSPCS), pages 1–9.

Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., e Zedan, H. (2014). A comprehensive survey on vehicular ad hoc network. Journal of network and computer applications, 37:380–392.

Alata, E., Nicomette, V., Kaâniche, M., Dacier, M., and Herrb, M. (2007). Lessons learned from the deployment of a high-interaction honeypot. CoRR, abs/0704.0858.

Alcock, S., Lorier, P., and Nelson, R. (2012). Libtrace: a packet capture and analysis library. SIGCOMM Comput. Commun. Rev., 42(2):42–48.

Algirdas Avizienis and John PJ Kelly. Fault tolerance by design diversity: Concepts and experiments. Computer, 17(8):67–80, 1984.

Alves, V. d. M. (2011). Protocolo de comprometimento de bit eficiente com segurança sequencial baseado no modelo de memória limitada.

Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, and Paulo Sousa. Depsky: Dependable and secure storage in a cloud-of-clouds. Transactions on Storage, 9(4):12:1–12:33, November 2013.

Alysson Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Neves, Miguel Correia, Marcelo Pasin, and Paulo Verissimo. Scfs: a shared cloud-backed file system. In Proc. of the USENIX ATC, 2014.

Alysson Neves Bessani, Eduardo Pelison Alchieri, Miguel Correia, and Joni Silva Fraga. Depspace: a byzantine fault-tolerant coordination service. In ACM SIGOPS Operating Systems Review, volume 42, pages 163–176. ACM, 2008.

Amro, B., Saygin, Y., e Levi, A. (2013). Enhancing privacy in collaborative trafficmonitoring systems using autonomous location update. Intelligent Transport Systems, IET, 7(4):388–395.

Andrew Tanenbaum and Maarten Van Steen. Distributed systems. Pearson Prentice Hall, 2007.

Antonakakis, M., Perdisci, R., Dagon, D., Lee,W., and Feamster, N. (2010). Building a dynamic reputation system for dns. In Proceedings of the 19th USENIX conference on Security, USENIX Security’10, pages 18–18, Berkeley, CA, USA. USENIX Association.

Aslam, B. e Zou, C. (2009). Distributed certificate and application architecture for VANETs. In IEEE Military Communications Conference (MILCOM), pages 1–7.

Avelar, E., Marques, L., dos Passos, D., Macedo, R., Dias, K., e Nogueira, M. (2014). Interoperability issues on heterogeneous wireless communication for smart cities. Computer Communications.

Barbosa, K. R. S. and Souto, E. (2009). Análise passiva do tráfego dns da internet brasileira. In IX Simpósio Brasileiro em Segurança da Informação e Sistemas Computacionais (SBSeg 2009), pages 203–216, Campinas.

Barr, D. (1996). RFC 1912: Common DNS operational and configuration errors. http://www.ietf.org/rfc/rfc1912.txt.

Barth, A. (2011). HTTP State Management Mechanism. RFC 6265 (Proposed Standard). http://www.ietf.org/rfc/rfc6265.txt.

Bazrafshan, Z., Hashemi, H., Fard, S., and Hamzeh, A. (2013). A survey on heuristic malware detection techniques. In Information and Knowledge Technology (IKT), 2013 5th Conference on, pages 113–120.

Berghel, H. (2001). The code red worm. Commun. ACM, 44(12):15–19.

Bhaiji, Y. (2009). Understanding, preventing, and defending against layer 2 attacks.

Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., and Wang, L. (2010). On the analysis of the zeus botnet crimeware toolkit. In Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on, pages 31–38.

Biondi, P. (2010). Welcome to scapy´s documentation! Acessado em 12/09/2013.

Biswas, S., Misic, J., e Misic, V. (2011). ID-based safety message authentication for security and trust in vehicular networks. In 31st International Conference on Distributed Computing Systems Workshops (ICDCSW), pages 323–331.

BITAG (2012). Snmp reflected amplification ddos attack mitigation. Technical report, Broadband Internet Technical Advisory Group.

Boneh, D., Boyen, X., e Shacham, H. (2004). Short group signatures. In Franklin, M., editor, Advances in Cryptology – CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41–55. Springer Berlin Heidelberg.

Bononi, L., Conti, M., e Gregori, E. (2004). Runtime optimization of IEEE 802.11 wireless LANs performance. IEEE Transactions on Parallel and Distributed Systems, 15(1):66–80.

Bos, B., Celik, T., Hickson, I., and Lie, H. W. (2011). Cascading style sheets level 2 revision 1 (css 2.1) specification. W3c recommendation, W3C. http://www.w3.org/TR/CCS2.

Boshmaf, Y., Muslukhov, I., Beznosov, K., and Ripeanu, M. (2011). The socialbot network: When bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC ’11, pages 93–102, New York, NY, USA. ACM.

Cai, T. and Zou, F. (2012). Detecting http botnet with clustering network traffic. In Wireless Communications, Networking and Mobile Computing (Wi-COM), 2012 8th International Conference on, pages 1–7.

Callegati, F., Cerroni, W., and Ramilli, M. (2009). Man-in-themiddle attack to the https protocol. Security Privacy, IEEE, 7(1):78–81.

Calvet, J., Davis, C. R., Fernandez, J. M., Marion, J.-Y., St-Onge, P.-L., Guizani, W., Bureau, P.-M., and Somayaji, A. (2010). The case for in-the-lab botnet experimentation: Creating and taking down a 3000-node botnet. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC ’10, pages 141–150, New York, NY, USA. ACM.

Canavan, J. (2005). The evolution of malicious irc bots.

Carpine, F., Mazzariello, C., and Sansone, C. (2013). Online irc botnet detection using a soinn classifier. In Communications Workshops (ICC), 2013 IEEE International Conference on, pages 1351–1356.

CCEE (2012). Cross-Browser Performance. http://ccee.org.br/ccee/documentos/CCEE_056670. [Online, Acessado 15/08/2014].

Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., and Shenker, S. (2003). Making gnutella-like p2p systems scalable. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM ’03, pages 407–418, New York, NY, USA. ACM.

Chen, L., Ng, S.-L., eWang, G. (2011). Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications, 29(3):605–615.

Chhanda Ray et al. Distributed Database Systems. Pearson Education India, 2009.

Choi, H. and Lee, H. (2012). Identifying botnets by capturing group activities in dns traffic. Computer Networks, 56(1):20–33.

Choi, H., Lee, H., and Kim, H. (2009). Botgad: Detecting botnets by capturing group activities in network traffic. In Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE, COMSWARE ’09, pages 2:1–2:8, New York, NY, USA. ACM.

Chuang, M.-C. e Lee, J.-F. (2011). TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks. In International Conference on Consumer Electronics, Communications and Networks (CECNet), pages 1758–1761.

CISCO (2013). Cisco annual security report. Technical report.

CISCO (2014). Cisco annual security report. Technical report.

Cisco (2014). Layer 2 lan port configuration. Acesssado em 10/09/2014.

Claise, B. (2004). RFC 3954 - Cisco Systems NetFlow Services Export Version 9.

Cohen, F. (1987). Computer viruses: Theory and experiments. Computers & Security, 6(1):22 – 35.

Colajanni, M., Gozzi, D., and Marchetti, M. (2008). Collaborative architecture for malware detection and analysis. In Jajodia, S., Samarati, P., and Cimato, S., editors, Proceedings of The Ifip Tc 11 23rd International Information Security Conference, volume 278 of IFIP - The International Federation for Information Processing, pages 79–93. Springer US.

Contextis (2011). WebGL - More WebGL Security Flaws. http://www.contextis.com/resources/blog/webgl-more-webgl-security-flaws/. [Online, Acessado 15/09/2014].

Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., Morris, J., Hansen, M., and Smith, R. (2013). Privacy Considerations for Internet Protocols. RFC 6973 (Informational). http://www.ietf.org/rfc/rfc6973.txt.

Crockford, D. (2008). JavaScript - the good parts: unearthing the excellence in JavaScript. O’Reilly.

Daeinabi, A. e Rahbar, A. G. (2013). Detection of malicious vehicles (DMV) through monitoring in vehicular ad-hoc networks. Multimedia tools and applications, 66(2):325–338.

Dagon, D., Gu, G., Lee, C., and Lee, W. (2007). A taxonomy of botnet structures. In Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, pages 325 –339.

Dahlia Malkhi and Michael Reiter. Byzantine quorum systems. Distributed Computing, 11(4):203–213, 1998.

Dai, W., Moser, L., Melliar-Smith, P., Lombera, I. M., e team:, Y. (2013). The itrust local reputation system for mobile ad-hoc networks. In International Conference on Wireless Networks.

Dan Boneh and Matt Franklin. Identity-based encryption from the weil pairing. In CRYPTO, pages 213–229. Springer, 2001.

Daswani, N. and Stoppelman, M. (2007). The anatomy of clickbot.a. In Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, HotBots’07, pages 11–11, Berkeley, CA, USA. USENIX Association.

David A. Patterson, Garth Gibson, and Randy H. Katz. A case for redundant arrays of inexpensive disks (raid). In Proc. of the Int. Conf. on Management of Data, SIGMOD, pages 109–116, NY, USA, 1988. ACM.

Davis, C., Fernandez, J., Neville, S., and McHugh, J. (2008). Sybil attacks as a mitigation strategy against the storm botnet. In Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on, pages 32–40.

de Paula, W., de Oliveira, S., e Oliveira, J. M. (2010). Um mecanismo de reputação para redes veiculares tolerantes a atrasos e desconexões. In Simpósio Brasileiro de Redes de Computadores (SBRC 2010), page 599.

Dietrich, C., Rossow, C., Freiling, F., Bos, H., van Steen, M., and Pohlmann, N. (2011). On botnets that use dns for command and control. In Computer Network Defense (EC2ND), 2011 Seventh European Conference on, pages 9 –16.

Douceur, J. (2002). The sybil attack. In Druschel, P., Kaashoek, F., and Rowstron, A., editors, Peer-to-Peer Systems, volume 2429 of Lecture Notes in Computer Science, pages 251–260. Springer Berlin Heidelberg.

Dunham, K. (2009). Mobile Malware Attacks and Defense. Syngress Publishing.

Eckersley, P. (2010). How unique is your web browser? In Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS’10, pages 1–18, Berlin, Heidelberg. Springer-Verlag.

ECMA International (2011). Standard ECMA-262 - ECMAScript Language Specification. 5.1 edition. [link].

Eddy, W. (2007). TCP SYN Flooding Attacks and Common Mitigations. RFC 4987 (Informational).

Egele, M., Scholte, T., Kirda, E., and Kruegel, C. (2008). A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv., 44(2):6:1–6:42.

Eletronic Frontier Foundation (2014). Do not track. https://www.eff.org/issues/do-not-track.

Engoulou, R. G., Bellaïche, M., Pierre, S., e Quintero, A. (2014). VANET security surveys. Computer Communications, 44(0):1 – 13.

Eric Brewer. Cap twelve years later: How the "rules" have changed. Computer, 45(2):23–29, 2012.

Eslahi, M., Hashim, H., and Tahir, N. (2013). An efficient false alarm reduction approach in http-based botnet detection. In Computers Informatics (ISCI), 2013 IEEE Symposium on, pages 201–205.

Evidon (2014). Ghostery. http://www.ghostery.com/. [Online, Acessado 20/09/2014].

Faezipour, M., Nourani, M., Saeed, A., e Addepalli, S. (2012). Progress and challenges in intelligent vehicle area networks. Communications of the ACM, 55(2):90–100.

Feily, M., Shahrestani, A., and Ramadass, S. (2009). A survey of botnet and botnet detection. In Emerging Security Information, Systems and Technologies, 2009. SECURWARE ’09. Third International Conference on, pages 268 –273.

Fernandes, C., de Simas, I., e Wangham, M. S. (2013). In Simpósio Brasileiro de Segurança em Segurança da Informação e de Sistemas Computacioanais (SBSeg 2013), pages 157–169.

Ferrer, Z., Ferrer, M. C., and Researchers, C. I. S. (2010). In-depth analysis of hydraq. The face of cyberwar enemies unfolds. ca isbu-isi white paper, 37.

Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and Berners-Lee, T. (1999). Hypertext Transfer Protocol – HTTP/1.1. RFC 2616 (Draft Standard). http://www.ietf.org/rfc/rfc2616.txt.

FireGloves (2014). Firegloves - cross-browser fingerprinting test 2.0. http://fingerprint.pet-portal.eu/?menu=6. [Online, Acessado 21/09/2014].

Forshaw, J. (2011). WebGL - A New Dimension for Browser Exploitation. [link]. [Online, Acessado 15/09/2014].

Fossi, M., Egan, G., Haley, K., Turner, D., Johnson, E., Johnson, E., and Adams, T. (2011). Symantec global internet security threat report. trends for 2010. Technical Report 17, Symantec.

Fossi, M., Turner, D., Johnson, E., Johnson, E., and Adams, T. (2010). Symantec global internet security threat report. Technical Report 17, Symantec.

Fred B Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM CSUR, 22(4):299–319, 1990.

Freiling, F., Holz, T., and Wicherski, G. (2005). Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks. In Vimercati, S., Syverson, P., and Gollmann, D., editors, Computer Security - ESORICS 2005, volume 3679 of Lecture Notes in Computer Science, pages 319–335. Springer Berlin Heidelberg.

Freitas, C., Benevenuto, F., and Veloso, A. (2014). Socialbots: Implicações na segurança e na credibilidade de serviços baseados no twitter. Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos-SBRC 2014, pages 603–616.

Fulton, S. and Fulton, J. (2011). HTML5 Canvas - Native Interactivity and Animation for the Web. O’Reilly.

Furnell, S. and Ward, J. (2004). Malware evolution: Malware comes of age: The arrival of the true computer parasite. Netw. Secur., 2004(10):11–15.

Future of Privacy Forum, F. (2014). About do not track. http://allaboutdnt.com. [Online, Acessado 20/09/2014].

Ganan, C., Munoz, J., Esparza, O., Mata-Diaz, J., Alins, J., Silva-Cardenas, C., e Bartra-Gardini, G. (2012). RAR: Risk Aware Revocation Mechanism for Vehicular Networks. In IEEE Vehicular Technology Conference (VTC Spring), pages 1–5.

George F Coulouris, Jean Dollimore, Tim Kindberg, and Gordon Blair. Distributed systems: concepts and design. Pearson Education, 2012.

Gerla, M. (2012). Vehicular cloud computing. In The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), pages 152–155.

Gerla, M. e Kleinrock, L. (2011). Vehicular networks and the future of the mobile internet. Computer Network, 55(2):457–469.

Giura, P., Murynets, I., Piqueras Jover, R., and Vahlis, Y. (2014). Is it really you?: User identification via adaptive behavior fingerprinting. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, CODASPY ’14, pages 333–344, New York, NY, USA. ACM.

Glenn Greenwald and Ewen MacAskill. Nsa prism program taps in to user data of apple, google and others. The Guardian, 7(6):1–43, 2013.

Goodin, D. (2013). Stealthy technique fingerprints smartphones by measuring users movements. [link]. [Online, Acessado 19/09/2014].

Grassi, G., Pesavento, D., Pau, G., Vuyyuru, R., Wakikawa, R., e Zhang, L. (2014). VANET via named data networking. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 410–415.

Grizzard, J. B., Sharma, V., Nunnery, C., Kang, B. B., and Dagon, D. (2007). Peer-to-peer botnets: Overview and case study. In Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, HotBots’07, pages 1–1, Berkeley, CA, USA. USENIX Association.

Group, K. (2014). Webgl 2 specification. Khronos draft, Khronos Group. https://www.khronos.org/registry/webgl/specs/latest/2.0/.

Gu, G., Perdisci, R., Zhang, J., and Lee, W. (2008a). Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th Conference on Security Symposium, SS’08, pages 139–154, Berkeley, CA, USA. USENIX Association.

Gu, G., Zhang, J., and Lee, W. (2008b). Botsniffer: Detecting botnet command and control channels in network traffic. In Proceedings of the 15th Annual Network and Distributed System Security Symposium.

Guo, F., Chen, J., and cker Chiueh, T. (2006). Spoof detection for preventing dos attacks against dns servers. In Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on, pages 37–37.

Haas, J. J., Hu, Y.-C., e Laberteaux, K. P. (2011). Efficient certificate revocation list organization and distribution. IEEE Journal on Selected Areas in Communications, 29(3):595–604.

Hachem, N., Ben Mustapha, Y., Granadillo, G., and Debar, H. (2011). Botnets: Lifecycle and taxonomy. In Network and Information Systems Security (SAR-SSI), 2011 Conference on, pages 1–8.

Haddadi, F., Morgan, J., Filho, E., and Zincir-Heywood, A. (2014). Botnet behaviour analysis using ip flows: With http filters using classifiers. In Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on, pages 7–12.

Hagit Attiya, Amotz Bar-Noy, and Danny Dolev. Sharing memory robustly in message-passing systems. Journal of the ACM (JACM), 42(1):124–142, 1995.

Hartenstein, H. e Laberteaux, K. (2010). VANET: vehicular applications and inter-networking technologies. Wiley Online Library.

Hartenstein, H. e Laberteaux, K. P. (2008). A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine, 46(6):164–171.

He, W., Yan, G., e Xu, L. D. (2014). Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics, 10(2):1587–1595.

Hill, C. J. e Garrett, J. K. (2011). AASHTO connected vehicle infrastructure deployment analysis. Technical report.

Holz, T., Gorecki, C., Rieck, K., and Freiling, F. C. (2008a). Measuring and detecting fast-flux service networks. In NDSS.

Holz, T., Steiner, M., Dahl, F., Biersack, E., and Freiling, F. (2008b). Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, LEET’08, pages 9:1–9:9, Berkeley, CA, USA. USENIX Association.

Hors, A. L., Hégaret, P. L., and Stenback, J. (2003). Document object model (DOM) level 2 HTML specification. W3C recommendation, W3C. http://www.w3.org/TR/2003/REC-DOM-Level-2-HTML-20030109.

Hossain, E., Chow, G., Leung, V., McLeod, R. D., Mišic, J., Wong, V. W., e Yang, O. (2010). Vehicular telematics over heterogeneous wireless networks: A survey. Computer Communications, 33(7):775–793.

Hua, J. and Sakurai, K. (2013). Botnet command and control based on short message service and human mobility. Computer Networks, 57(2):579 – 597. Botnet Activity: Analysis, Detection and Shutdown.

Huang, S.-Y., Mao, C.-H., and Lee, H.-M. (2010). Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’10, pages 101–111, New York, NY, USA. ACM.

Huang, Z., Ruj, S., Cavenaghi, M. A., Stojmenovic, M., e Nayak, A. (2014). A social network approach to trust management in VANETs. Peer-to-Peer Networking and Applications, 7(3):229–242.

Hugo Krawczyk. Secret sharing made short. In Advances in Cryptology - CRYPTO’93, pages 136–146. Springer, 1993.

Husna, H., Phithakkitnukoon, S., and Dantu, R. (2008). Traffic shaping of spam botnets. In Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, pages 786–787.

Hussain, R., Son, J., Eun, H., Kim, S., e Oh, H. (2012). Rethinking vehicular communications: Merging vanet with cloud computing. International Conference on Cloud Computing Technology and Science, 0:606–609.

Idilio Drago, Marco Mellia, Maurizio M Munafo, Anna Sperotto, Ramin Sadre, and Aiko Pras. Inside dropbox: understanding personal cloud storage services. In Proc. of Conference on Internet Measurement, pages 481–494. ACM, 2012.

IEEE (2013). IEEE standard for wireless access in vehicular environments security services for applications and management messages. IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006), pages 1–289.

INRIA (2014). Stopfingerprinting - how trackable is your browser in a long term? https://stopfingerprinting.inria.fr. [Online, Acessado 25/09/2014].

Isaac, J., Zeadally, S., e Camara, J. (2010). Security attacks and solutions for vehicular ad hoc networks. IET Communications, 4(7):894–903.

Ishibashi, K., Toyono, T., Toyama, K., Ishino, M., Ohshima, H., and Mizukoshi, I. (2005). Detecting mass-mailing worm infected hosts by mining dns traffic data. In Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, MineNet ’05, pages 159–164, New York, NY, USA. ACM.

Jacobson, V., Leres, C., and McCanne, S. (2004). pcap - packet capture library. url http://www.tcpdump.org/pcap3_man.html (acessado em 01/08/2014).

Jakobsson, M. and Ramzan, Z. (2008). Crimeware: Understanding New Attacks and Defenses (Symantec Press). Addison-Wesley Professional, 1 edition.

JL Gonzalez, Jesus Carretero Perez, Victor Sosa-Sosa, Juan F Rodriguez Cardoso, and Ricardo Marcelin-Jimenez. An approach for constructing private storage services as a unified fault-tolerant system. Journal of Systems and Software, 86(7):1907–1922, 2013.

John, J. P., Moshchuk, A., Gribble, S. D., and Krishnamurthy, A. (2009). Studying spamming botnets using botlab. In Proceedings of the 6th USENIX symposium on Networked systems design and implementation, NSDI’09, pages 291–306, Berkeley, CA, USA. USENIX Association.

Joni Fraga and David Powell. A fault-and intrusion-tolerant file system. In Proc. of International Conference on Computer Security, volume 203, pages 203–218, 1985.

Juels, A. e Wattenberg, M. (1999). A fuzzy commitment scheme. In ACM conference on Computer and communications security, pages 28–36. ACM.

Kamienski, C., Souto, E., Rocha, J., Domingues, M., Callado, A., and Sadok, D. (2005). Colaboração na internet e a tecnologia peer-to-peer. In XXV Congresso da Sociedade Brasileira de Computação, pages 1407–1454.

Kamkar, S. (2010). Evercookie. http://samy.pl/evercookie/. [Online, Acessado 15/08/2014].

Kang, J. and Zhang, J.-Y. (2009). Application entropy theory to detect new peer-to-peer botnet with multi-chart cusum. In Electronic Commerce and Security, 2009. ISECS ’09. Second International Symposium on, volume 1, pages 470–474.

Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K., eWeil, T. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys and Tutorials, 13(4):584–616.

Kherani, A. e Rao, A. (2010). Performance of node-eviction schemes in vehicular networks. IEEE Transactions on Vehicular Technology, 59(2):550–558.

Kirk, J. (2014). Canvas fingerprinting online tracking is sneaky but easy to halt. [link]. [Online, Acessado 21/09/2014].

Kristol, D. and Montulli, L. (1997). HTTP State Management Mechanism. RFC 2109 (Proposed Standard). http://www.ietf.org/rfc/rfc2109.txt.

Kumar, P. A. R. and Selvakumar, S. (2011). Distributed denial of service attack detection using an ensemble of neural classifier. Computer Communications, 34(11):1328 – 1341.

Kwak, D., Moon, S., Wang, G., e Deng, R. H. (2006). A secure extension of the Kwak–Moon group signcryption scheme. Computers & Security, 25(6):435 – 444.

Laberteaux, K. P., Haas, J. J., e Hu, Y.-C. (2008). Security certificate revocation list distribution for VANET. In ACM international workshop on VehiculAr Inter-NETworking, pages 88–89. ACM.

Laurendeau, C. e Barbeau, M. (2006). Threats to security in DSRC/WAVE. In Ad-Hoc, Mobile, and Wireless Networks, pages 266–279. Springer.

Lee, E., Lee, E.-K., Gerla, M., e Oh, S. (2014). Vehicular cloud networking: architecture and design principles. IEEE Communications Magazine, 52(2):148–155.

Lee, J.-S., Jeong, H., Park, J.-H., Kim, M., and Noh, B.-N. (2008). The activity analysis of malicious http-based botnets using degree of periodic repeatability. In Security Technology, 2008. SECTECH ’08. International Conference on, pages 83– 86.

Leslie Lamport. On interprocess communication. Distributed computing, 1(2):86– 101, 1986.

Leslie Lamport. The part-time parliament. ACM Transactions on Computer Systems (TOCS), 16(2):133–169, 1998.

Leslie Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558–565, 1978.

Levy, E. (2003). The making of a spam zombie army. dissecting the sobig worms. Security Privacy, IEEE, 1(4):58–59.

Li, C., Jiang,W., and Zou, X. (2009a). Botnet: Survey and case study. In Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on, pages 1184–1187.

Li, F. eWang, Y. (2007). Routing in vehicular ad hoc networks: A survey. IEEE Vehicular Technology Magazine, 2(2):12–22.

Li, Q., Malip, A., Martin, K. M., Ng, S.-L., e Zhang, J. (2012). A reputation-based announcement scheme for VANETs. IEEE Transactions on Vehicular Technology, 61(9):4095–4108.

Li, X., Liu, J., Li, X., e Sun, W. (2013). Rgte: A reputation-based global trust establishment in VANETs. In 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pages 210–214.

Li, Z., Liao, Q., and Striegel, A. (2009b). Botnet economics: Uncertainty matters. In Johnson, M., editor, Managing Information Risk and the Economics of Security, pages 245–267. Springer US.

Lima, A., Albano, W., Nogueira, M., e de Sousa, J. N. (2013). Influência de ataques jamming sobre protocolos de roteamento em redes veiculares. In Workshop de Trabalhos de Iniciação Científica e de Graduação (WTICG) - SBSeg.

Lin, H.-C., Chen, C.-M., and Tzeng, J.-Y. (2009). Flow based botnet detection. In Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on, pages 1538–1541.

Lin, X., Lu, R., Zhang, C., Zhu, H., Ho, P.-H., e Shen, X. (2008). Security in vehicular ad hoc networks. IEEE Communications Magazine, 46(4):88–95.

Lin, X., Sun, X., Ho, P.-H., e Shen, X. (2007). Gsis: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6):3442–3456.

Liu, J., Xiao, Y., Ghaboosi, K., Deng, H., and Zhang, J. (2009). Botnet: Classification, attacks, detection, tracing, and preventive measures. In Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control, ICICIC ’09, pages 1184–1187, Washington, DC, USA. IEEE Computer Society.

Livadas, C., Walsh, R., Lapsley, D., and Strayer, W. (2006). Using machine learning technliques to identify botnet traffic. In Local Computer Networks, Proceedings 2006 31st IEEE Conference on, pages 967–974.

Lo, N.-W. e Tsai, H.-C. (2009). A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP Journal on Wireless Communications and Networking, 2009:9.

Lu, R., Lin, X., Zhu, H., Ho, P.-H., e Shen, X. (2008). Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In IEEE Conference on Computer Communications (INFOCOM).

Lu, W. and Ghorbani, A. A. (2008). Botnets detection based on irc-community. In Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pages 2067–2071.

Ma, X., Guan, X., Tao, J., Zheng, Q., Guo, Y., Liu, L., and Zhao, S. (2010). A novel irc botnet detection method based on packet size sequence. In Communications (ICC), 2010 IEEE International Conference on, pages 1–5.

Macedo, R., Melo, R. G. d., Melnisk, L., Santos, A., e Nogueira, M. (2013). Uma avaliação experimental de desempenho do roteamento multicaminhos em redes veiculares. In Workshop de Gerência e Operações de Redes - SBRC.

Mangold, S., Choi, S., May, P., Klein, O., Hiertz, G., e Stibor, L. (2002). Ieee 802.11 e wireless lan for quality of service. In European Wireless, volume 2, pages 32–39.

Marcos K Aguilera, Arif Merchant, Mehul Shah, Alistair Veitch, and Christos Karamanolis. Sinfonia: a new paradigm for building scalable distributed systems. In ACM SIGOPS Operating Systems Review, volume 41, pages 159–174. ACM, 2007.

Mayer, J. R. (2009). "Any person... a pamphleteer": Internet Anonymity in the Age of Web 2.0. PhD thesis, Princeton University.

Mayer, J., Narayanan, A., and Stamm, S. (2011). Do not track: A universal third-party web tracking opt out. IETF Draft.

Mazzariello, C. (2008). Irc traffic analysis for botnet detection. In Information Assurance and Security, 2008. ISIAS ’08. Fourth International Conference on, pages 318–323.

McCanne, S. and Jacobson, V. (1993). The bsd packet filter: A new architecture for user-level packet capture. In Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings, USENIX’93, pages 2–2, Berkeley, CA, USA. USENIX Association.

McCarty, B. (2003a). Automated identity theft. Security Privacy, IEEE, 1(5):89–92.

McCarty, B. (2003b). Botnets: Big and bigger. IEEE Security and Privacy, 1(4):87–90. cited By (since 1996)41.

McDonald, A. M. and Cranor, L. F. (2011). A survey of the use of adobe flash local share objects to respawn http cookies. Journal of Information Policy, 7(3):639–687.

McFee (2003). Virus profile: W32/sdbot.worm. Acessado em 12/09/2014.

Mejri, M. N., Ben-Othman, J., e Hamdi, M. (2014). Survey on {VANET} security challenges and possible cryptographic solutions. Vehicular Communications, 1(2):53 – 66.

Mezghani, F., Dhaou, R., Nogueira, M., e Beylot, A.-L. (2014a). Content dissemination in vehicular social networks: Taxonomy and user satisfaction. IEEE Communications Magazine.

Mezghani, F., Dhaou, R., Nogueira, M., e Beylot, A.-L. (2014b). Utility-based forwarder selection for content dissemination in vehicular networks. In IEEE International Conference on Personal, Indoor and Mobile Radio Communications (PIMRC).

Michael O Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM, 36(2):335–348, 1989.

Microsoft (2014). Microsoft silverlight 5. http://www.microsoft.com/silverlight/. [Online, Acessado 21/09/2014].

Miguel Castro and Barbara Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398–461, 2002.

Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, volume 99, pages 173–186, 1999.

Mikki, M., Mansour, Y., e Yim, K. (2013). Privacy preserving secure communication protocol for vehicular ad hoc networks. In Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pages 188–195.

Mockapetris, P. (1987). RFC 1034: Domain names - concepts and facilities. http://www.ietf.org/rfc/rfc1034.txt.

Modernizr (2014). Modernizr: the feature detection library for html5/css3. http://modernizr.com. [Online, Acessado 24/09/2014].

Mohr, A. (2007). A survey of zero-knowledge proofs with applications to cryptography. Southern Illinois University, Carbondale, pages 1–12.

Moore, D., Shannon, C., and claffy, k. (2002). Code-red: A case study on the spread and victims of an internet worm. In Proceedings of the 2Nd ACM SIGCOMM Workshop on Internet Measurment, IMW ’02, pages 273–284, New York, NY, USA. ACM.

Morales, J., Al-Bataineh, A., Xu, S., and Sandhu, R. (2009). Analyzing dns activities of bot processes. In Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, pages 98–103.

Mowery, K. and Shacham, H. (2012). Pixel perfect: Fingerprinting canvas in HTML5. In Fredrikson, M., editor, Proceedings of W2SP 2012. IEEE Computer Society.

Mowery, K., Bogenreif, D., Yilek, S., and Shacham, H. (2011). Fingerprinting information in JavaScript implementations. In Proceedings of Web 2.0 Security and Privacy 2011 (W2SP), San Franciso.

Mozilla (2014). Lightbeam shine a light on whos watching you. https://www.mozilla.org/en-US/lightbeam/. [Online, Acessado 15/08/2014].

Mulazzani, M., Huber, M., Leithner, M., and Schrittwieser, S. (2013). Fast and reliable browser identification with javascript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy, (W2SP).

Mulliner, C. and Seifert, J.-P. (2010). Rise of the ibots: Owning a telco network. In Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, pages 71–80.

Musashi, Y., Kumagai, M., Kubota, S., and Sugitani, K. (2011). Detection of kaminsky dns cache poisoning attack. In Intelligent Networks and Intelligent Systems (ICINIS), 2011 4th International Conference on, pages 121–124.

Nagaraja, S., Mittal, P., Hong, C.-Y., Caesar, M., and Borisov, N. (2010). Botgrep: finding p2p bots with structured graph analysis. In Proceedings of the 19th USENIX conference on Security, USENIX Security’10, pages 7–7, Berkeley, CA, USA. USENIX Association.

Nappa, A., Fattori, A., Balduzzi, M., DellAmico, M., and Cavallaro, L. (2010). Take a deep breath: A stealthy, resilient and cost-effective botnet using skype. In Kreibich, C. and Jahnke, M., editors, Detection of Intrusions and Malware, and Vulnerability Assessment, volume 6201 of Lecture Notes in Computer Science, pages 81–100. Springer Berlin Heidelberg.

Navin Budhiraja, Keith Marzullo, Fred B. Schneider, and Sam Toueg. Distributed systems (2nd ed.). chapter The Primary-backup Approach, pages 199–216. ACM Press/Addison-Wesley Pub., NY, USA, 1993.

Nazario, J. and Holz, T. (2008). As the net churns: Fast-flux botnet observations. In Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on, pages 24–31.

Nikiforakis, N., Acar, G., and Saelinger, D. (2014). Browse at your own risk. Spectrum, IEEE, 51(8):30–35.

Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., and Vigna, G. (2013). Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP ’13, pages 541–555, Washington, DC, USA. IEEE Computer Society.

Nogueira, M., dos Santos, A., e Pujolle, G. (2009). A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 11(1):66–77.

Nowatkowski, M. E. (2010). Certificate Revocation List Distribution in Vehicular Ad Hoc Networks. PhD thesis, Atlanta, GA, USA. AAI3414506.

Oikarinen, J. and Reed, D. (1993). Internet relay chat protocol.

Ostermaier, B., Dotzer, F., e Strassberger, M. (2007). Enhancing the security of local dangerwarnings in VANETs-a simulative analysis of voting schemes. In International Conference on Availability, Reliability and Security (ARES), pages 422–431.

Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., e Hubaux, J.-P. (2008). Secure vehicular communication systems: design and architecture. IEEE Communications Magazine, 46(11):100–109.

Papadimitratos, P., La Fortelle, A., Evenssen, K., Brignolo, R., e Cosenza, S. (2009). Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation. IEEE Communications Magazine, 47(11):84–95.

Paruchuri, V. e Durresi, A. (2010). Paave: Protocol for anonymous authentication in vehicular networks using smart cards. In IEEE Global Telecommunications Conference (GLOBECOM 2010), pages 1–5.

Passerini, E., Paleari, R., Martignoni, L., and Bruschi, D. (2008). Fluxor: Detecting and monitoring fast-flux service networks. In Zamboni, D., editor, Detection of Intrusions and Malware, and Vulnerability Assessment, volume 5137 of Lecture Notes in Computer Science, pages 186–206. Springer Berlin Heidelberg.

Pathre, A., Agrawal, C., e Jain, A. (2013). Identification of malicious vehicle in vanet environment from ddos attack. Journal of Global Research in Computer Science, 4(6):1–5.

Paul T Jaeger, Jimmy Lin, Justin M Grimes, and Shannon N Simmons. Where is the cloud? geography, economics, environment, and jurisdiction in cloud computing. First Monday, 14(5), 2009.

Pemberton, S. (2002). Xhtml 1.0: The extensible hypertext markup language (second edition). World Wide Web Consortium, Recommendation RECxhtml1- 20020801.

Peng, T., Leckie, C., and Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the dos and ddos problems. ACM Comput. Surv., 39(1).

Perdisci, R., Corona, I., Dagon, D., and Lee, W. (2009). Detecting malicious flux service networks through passive analysis of recursive dns traces. Computer Security Applications Conference, Annual, 0:311–320.

Perdisci, R., Lee, W., and Feamster, N. (2010). Behavioral clustering of http-based malware and signature generation using malicious network traces. In Proceedings of the 7th USENIX conference on Networked systems design and implementation, NSDI’10, pages 26–26, Berkeley, CA, USA. USENIX Association.

Perry, M., Clark, E., and Murdoch, S. (2013). The design and implementation of the tor browser [draft]. https://www.torproject.org/projects/torbrowser/design/. [Online, Acessado 15/09/2014].

Pinto, A. C. B. (2013). Protocolos criptográficos de computação distribuída com segurança universalmente composta.

Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Mike Dahlin, and Michael Walfish. Depot: Cloud storage with minimal trust. ACM TOCS, 29(4):12:1–12:38, 2011.

ProofPoint (2014). Proofpoint uncovers internet of things (iot) cyberattack. Acessado: 10/04/2014.

Qin, Z., Meng, Z., Zhang, X., Xiang, B., e Zhang, L. (2014). Performance evaluation of 802.11p wave system on embedded board. In International Conference on Information Networking (ICOIN), pages 356–360.

Rawat, A., Sharma, S., e Sushil, R. (2012). Vanet:security attacks and its possible solutions. Journal of Information and Operations Management, 3:301–304.

Raya, M. e Hubaux, J.-P. (2007). Securing vehicular ad hoc networks. Journal Computer Security, 15(1):39–68.

Raya, M., Papadimitratos, P., e Hubaux, J.-P. (2006a). Securing vehicular communications. IEEE Wireless Communications, 13(5):8–15.

Raya, M., Papadimitratos, P., e Hubaux, J.-P. (2006b). Securing vehicular communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, 13(LCA-ARTICLE-2006-015):8–15.

Rebane, J. C. (2011). The Stuxnet ComputerWorm and Industrial Control System Security. Nova Science Publishers, Inc., Commack, NY, USA.

Ren, D., Du, S., e Zhu, H. (2011). A novel attack tree based risk assessment approach for location privacy preservation in the VANETs. In IEEE International Conference on Communications (ICC), pages 1–5.

Ribeiro, V., Campello, R., e Weber, R. F. (2004). Mecanismos de conhecimento zero empregados por esquemas de chave publica. In Solar, M., Fernandez-Baca, D., e Cuadros-Vargas, E., editors, 30ma Conferencia Latinoamericana de Informatica (CLEI2004), pages 644–650. Sociedad Peruana de Computacion. ISBN 9972-9876-2-0.

Ricardo Padilha and Fernando Pedone. Augustus: scalable and robust storage for cloud applications. In Proc. of the 8th European Conference on Computer Systems, pages 99–112. ACM, 2013.

Ricardo Padilha and Fernando Pedone. Belisarius: Bft storage with confidentiality. In 10th International Network Computing and Applications (NCA) Symposium on, pages 9–16. IEEE, 2011.

Rick Lopes de Souza, H.V. Netto, L. C. Lung, and R. F. Custodio. Cloudsec - um middleware para compartilhamento de informações sigilosas em nuvens computacionais. In XIV Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais - SBSEG, Belo Horizonte, MG, 2014.

Rida A Bazzi and Yin Ding. Non-skipping timestamps for byzantine data storage systems. In Distributed Computing, pages 405–419. Springer, 2004.

Rodionov, E. and Matrosov, A. (2011). The evolution of tdl: Conquering x64. ESET, June.

Rodríguez-Gómez, R. A., Maciá-Fernández, G., and García-Teodoro, P. (2013). Survey and taxonomy of botnet research through life-cycle. ACM Comput. Surv., 45(4):45:1–45:33.

Royal, P. (2008). Analysis of the kraken botnet. Damballa, 9.

Safi, S., Movaghar, A., e Mohammadizadeh, M. (2009). A novel approach for avoiding wormhole attacks in vanet. In Second International Workshop on Computer Science and Engineering, volume 2, pages 160–165.

Salusky, W. and Danford, R. (2008). Know your enemy: Fast-flux service networks. an ever changing enemy. The Honeynet Project.

Samara, G., Al-Salihy, W., e Sures, R. (2010). Security issues and challenges of vehicular ad hoc networks (VANET). In International Conference on New Trends in Information Science and Service Science (NISS), pages 393–398.

Schiller, C. and Binkley, J. (2007). Botnets: The Killer Web Applications. Syngress Publishing.

Schleiffer, C., Wolf, M., Weimerskirch, A., e Wolleschensky, L. (2013). Secure key management-a key feature for modern vehicle electronics. Technical report, SAE Technical Paper.

Schütze, T. (2011). Automotive security: Cryptography for car2x communication. In Embedded World Conference.

Shankland, S. (2011). Microsoft declares webgl ’harmful’ to security. http://www.cnet.com/news/microsoft-declares-webgl-harmful-to-security/. [Online, Acessado 24/09/2014].

Shen, A.-N., Guo, S., Zeng, D., e Guizani, M. (2012). A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications. In IEEE on Wireless Communications and Networking Conference (WCNC), pages 2543–2548.

Shen, F. and Hasegawa, O. (2010). Self-organizing incremental neural network and its application. In Proceedings of the 20th International Conference on Artificial Neural Networks: Part III, ICANN’10, pages 535–540, Berlin, Heidelberg. Springer-Verlag.

Shin, S. and Gu, G. (2010). Conficker and beyond: A large-scale empirical study. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC ’10, pages 151–160, New York, NY, USA. ACM.

Shin, S., Lin, R., and Gu, G. (2011). Cross-analysis of botnet victims: New insights and implications. In Sommer, R., Balzarotti, D., and Maier, G., editors, Recent Advances in Intrusion Detection, volume 6961 of Lecture Notes in Computer Science, pages 242–261. Springer Berlin Heidelberg.

Shoch, J. F. and Hupp, J. A. (1982). The “worm” programs—early experience with a distributed computation. Commun. ACM, 25(3):172–180.

Sichitiu, M. e Kihl, M. (2008a). Inter-vehicle communication systems: a survey. IEEE Communications Surveys and Tutorials, 10(2):88–105.

Sichitiu, M. L. e Kihl, M. (2008b). Inter-vehicle communication systems: a survey. IEEE Communications Surveys and Tutorials, 10(2):88–105.

Silva, C., Cerqueira, E., e Nogueira, M. (2014a). Connectivity management to support reliable communication on cognitive vehicular networks (to appear). In Wireless Days.

Silva, C., Cerqueira, E., e Nogueira, M. (2014b). Mecanismo distribuído para seleção de canais em redes veiculares cognitivas. In Workshop de Redes de Acesso em Banda Larga - SBRC.

Silva, E., Dos Santos, A., Albini, L., e Lima, M. (2008). Identity-based key management in mobile ad hoc networks: techniques and applications. Wireless Communications, IEEE, 15(5):46–52.

Sinha, P., Boukhtouta, A., Belarde, V., and Debbabi, M. (2010). Insights from the analysis of the mariposa botnet. In Risks and Security of Internet and Systems (CRiSIS), 2010 Fifth International Conference on, pages 1–9.

Slivinski, A. R. (2011). Desenvolvimento de uma metodologia para avaliação de desempenho gráfico 3d de plataformas com suporte ao webgl. Technical report, Unioeste - Universidade Estadual do Oeste do Paraná.

Soltani, A., Canty, S., Mayo, Q., Thomas, L., and Hoofnagle, C. J. (2010). Flash cookies and privacy. In AAAI Spring Symposium: Intelligent Information Privacy Management. AAAI.

Souza, A., Barbosa, K. R. S., and Feitosa, E. (2013). Identificando spam no twitter atrav´es da anáise empírica dos trending topics brasil. In SBSeg 2013 - WTICG (2013), pages 394–403.

StatCounter (2014). Statcounter globalstats. http://gs.statcounter.com. [Online, Acessado 15/09/2014].

Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., and Balakrishnan, H. (2001). Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM ’01, pages 149–160, New York, NY, USA. ACM.

Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., and Vigna, G. (2009). Your botnet is my botnet: Analysis of a botnet takeover. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ’09, pages 635–647, New York, NY, USA. ACM.

Strayer, W., Lapsely, D., Walsh, R., and Livadas, C. (2008). Botnet detection based on network behavior. In Lee, W., Wang, C., and Dagon, D., editors, Botnet Detection, volume 36 of Advances in Information Security, pages 1–24. Springer US.

Studer, R. (2011). Economic and technical analysis of botnets and denialof- service attacks. Communication systems IV, page 19.

Sukuvaara, T., Ylitalo, R., e Katz, M. (2013). Ieee 802.11p based vehicular networking operational pilot field measurement. IEEE Journal on Selected Areas in Communications, 31(9):409– 417.

Swamynathan, G., Zhao, B. Y., Almeroth, K. C., e Zheng, H. (2007). Globally decoupled reputations for large distributed networks. Adv. MultiMedia, 2007(1):12–12.

Tangade, S. e Manvi, S. (2013). A survey on attacks, security and trust management solutions in VANETs. In International Conference on Computing, Communications and Networking Technologies (ICCCNT), pages 1–6.

Tanner, A. (2013). The web cookie is dying. here’s the creepier technology that comes next. [link]. [Online, Acessado 20/09/2014].

Tenebro, G. (2008). W32.waledac - threat analysis. Technical report, Symantec.

Thonnard, O. and Dacier, M. (2011). A strategic analysis of spam botnets operations. In Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS ’11, pages 162–171, New York, NY, USA. ACM.

Tiirmaa-Klaar, H., Gassen, J., Gerhards-Padilla, E., and Martini, P. (2013). Botnets: How to fight the ever-growing threat on a technical level. In Botnets, SpringerBriefs in Cybersecurity, pages 41–97. Springer London.

Toor, Y., Muhlethaler, P., e Laouiti, A. (2008). Vehicle ad hoc networks: Applications and related technical issues. IEEE Communications Surveys and Tutorials, 10(3):74–88.

Tor Project (2014). The design and implementation of the tor browser. https://www.torproject.org/projects/torbrowser/design/.

Turner, D., Entwisle, S., Denesiuk, M., Fossi, M., Blackbird, J., and McKinney, D. (2007). Internet security threat report. 2007 trends. Technical Report 17, Symantec.

Tyagi, A. K. and G.Aghila (2011). A wide scale survey on botnet. International Journal of Computer Applications, 34(9):10–23. Published by Foundation of Computer Science, New York, USA.

Unger, T., Mulazzani, M., Fruhwirt, D., Huber, M., Schrittwieser, S., and Weippl, E. (2013). Shpf: Enhancing http(s) session security with browser fingerprinting. In Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, pages 255–261.

Uzcategui, R. e Acosta-Marum, G. (2009). Wave: a tutorial. IEEE Communications Magazine, 47(5):126–133.

Virvilis, N., Gritzalis, D., and Apostolopoulos, T. (2013). Trusted computing vs. advanced persistent threats: Can a defender win this game? In Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pages 396–403.

W3C (2014). Fingerprinting guidance for web specification authors. http://w3c.github.io/fingerprinting-guidance/.

W3C (2014). Html5: a vocabulary and associated apis for html and xhtml. http://www.w3.org/TR/html5/.

W3C (2014). Tracking preference expression (dnt). W3c working draft, W3C. http://www.w3.org/TR/tracking-dnt/.

Wang, L., Wakikawa, R., Kuntz, R., Vuyyuru, R., e Zhang, L. (2012). Data naming in vehicle-to-vehicle communications. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 328–333.

Wang, P., Wu, L., Aslam, B., and Zou, C. (2009). A systematic study on peer-to-peer botnets. In Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference on, pages 1–8.

Wang, Z. e Chigan, C. (2007). Countermeasure uncooperative behaviors with dynamic trust-token in VANETs. In IEEE International Conference on Communications (ICC), pages 3959–3964. IEEE.

Wasef, A. e Shen, X. (2009). Edr: Efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 58(9):5214–5224.

Wasef, A., Lu, R., Lin, X., e Shen, X. (2010). Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]. IEEE Wireless Communications, 17(5):22–28.

Weerasinghe, H., Fu, H., e Leng, S. (2010). Anonymous service access for vehicular ad hoc networks. In Sixth International Conference on Information Assurance and Security (IAS), pages 173–178.

Weinberger, A. (2011). The impact of cookie deletion on site-server and ad-server metrics in australia. [link].

Werner Vogels. Eventually consistent. Communications of the ACM, 52(1):40–44, 2009.

Wolf, M. e Gendrullis, T. (2012). Design, implementation, and evaluation of a vehicular hardware security module. In Information Security and Cryptology (ICISC), pages 302–318. Springer.

Xiang, C., Binxing, F., Lihua, Y., Xiaoyi, L., and Tianning, Z. (2011). Andbot: towards advanced mobile botnets. In Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, LEET’11, pages 11–11, Berkeley, CA, USA. USENIX Association.

Xiong, H., Zhu, G., Chen, Z., e Li, F. (2013). Efficient communication scheme with confidentiality and privacy for vehicular networks. Computers and Electrical Engineering, 39(6):1717 – 1725.

Xu, W., Ma, K., Trappe, W., e Zhang, Y. (2006). Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41–47.

Yadav, S., Reddy, A. K. K., Reddy, A. L. N., and Ranjan, S. (2012). Detecting algorithmically generated domain-flux attacks with dns traffic analysis. IEEE/ ACM Trans. Netw., 20(5):1663–1677.

Yen, T.-F. and Reiter, M. (2010). Are your hosts trading or plotting? telling p2p file-sharing and bots apart. In Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on, pages 241–252.

Yves Deswarte, Laurent Blain, and J-C Fabre. Intrusion tolerance in distributed computing systems. In Proc. of Symposium on Security and Privacy, pages 110–121. IEEE, 1991.

Zeidanloo, H. R. and Manaf, A. B. A. (2010). Botnet detection by monitoring similar communication patterns. In International Journal of Computer Science and Information Security (IJCSIS), volume Vol. 7.

Zhang, J. (2011). A survey on trust management for VANETs. In IEEE International Conference on Advanced Information Networking and Applications (AINA), pages 105–112.

Zhao, D., Traore, I., Sayed, B., Lu,W., Saad, S., Ghorbani, A., and Garant, D. (2013). Botnet detection based on traffic behavior analysis and flow intervals. Computers & Security, 39, Part A(0):2 – 16. 27th {IFIP} International Information Security Conference.

Zhe Wu, Michael Butkiewicz, Dorian Perkins, Ethan Katz-Bassett, and Harsha V Madhyastha. Spanstore: Cost-effective geo-replicated storage spanning multiple cloud services. In Proc. of SOSP, pages 292–308. ACM, 2013.

Capa para Minicursos do XIV Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais
Data de publicação
03/11/2014

Detalhes sobre o formato disponível para publicação: Volume Completo

Volume Completo
ISBN-13 (15)
978-65-87003-99-3