Rogério Winter - Academia.edu (original) (raw)

Papers by Rogério Winter

Research paper thumbnail of Spying Across Borders in the Age of Email - 2600 Magazine 33-4-2017

The era when communism and capitalism polarized the world was full of good times. For analysts an... more The era when communism and capitalism polarized the world was full of good times. For analysts and the general population, it was easy to identify each side of a dispute. Then came the 1990s and ever since everything in the world has ceased to be binary, whether in terms of males and females or op-posing sides in a particular country. Moreover, where we had previously de-clared war against a state, we now declared war on terror, leaving us so terri-fied that a private war is being conducted, not only against foreign citizens, but our own.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT

By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army We... more By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army
We present the proof of concept of a new cyber weapon that has the potential to paralyze an entire nation with irreversible damage, caused by nation state-sponsored attacks (Ministry of Justice of Georgia 2011) or terrorists. Apoc@lypse Technique removal of pages in the book ‘Apoc@lypse: The End of Antivirus’ (Ruiz, et al., 2015) clearly demonstrates the fragility of our defences. We were taught for more than 30 years that in the digital age, we should trust our antivirus system and always keep it updated. You can control the antivirus market and turn it against your opponent, since to do so protects your family photos, even those that protect our trade, finance and military strategies. Undetectable, fast and devastating for the computer data hit.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Aplicação do método Brasil de avaliação de antimalware e as repercussões para a defesa cibernética

Semelhante ao risco financeiro e a reputação, o risco à segurança cibernética afeta profundamente... more Semelhante ao risco financeiro e a reputação, o
risco à segurança cibernética afeta profundamente uma
empresa, órgão de governo e instituições militares. No contexto
das ameaças cibernéticas, os malware apresentam uma
tendência em expansão nos diversos setores produtivos. Escolher
uma solução de software anti-malware eficiente é crucial para a
organização.
O método Brasil de avaliação de anti-malware se
propõe a ser uma solução nacional para avaliar anti-malware
com a base realidade de ameaças cibernéticas brasileiras. O
trabalho visa responder aos seguintes questionamentos: deve-se
continuar a adquirir anti-malware com base em recomendações
de avaliadores independentes internacionais e o método Brasil é
uma solução concreta para avaliação de anti-malware. Após
experimentar o método Brasil com malwares coletados na
internet brasileira o trabalho aponta para a necessidade de se
aperfeiçoar o método em questão. Todavia, o método permitiu
visualizar um panorama bem diferente daquele propagado por
testadores independentes, pois apenas 50% da população dos
malware coletados na internet brasileira foram detectados pelos
anti-malware comercialmente disponíveis no Brasil.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Opening the “Private Browsing” Data – Acquiring Evidence of Browsing Activities

The growing concern of users about the confidentiality of data generated by web browsing activiti... more The growing concern of users about the confidentiality of data generated by web browsing activities made browser developers include options for safer and confidential browsing in their products.
For users those options, when functionally compliant with data security guidelines, guarantee online privacy. For law enforcement agents, this functionality introduces another obstacle for data acquisition towards evidence gathering.
No matter which case, it is important to assess and validate private browsing techniques.
The presented method shows that for some browsers it is possible to recover text and graphical data related to pages visited during private navigation, in clear violation of this tool basic functional requirement.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Spying Across Borders in the Age of Email - 2600 Magazine 33-4-2017

The era when communism and capitalism polarized the world was full of good times. For analysts an... more The era when communism and capitalism polarized the world was full of good times. For analysts and the general population, it was easy to identify each side of a dispute. Then came the 1990s and ever since everything in the world has ceased to be binary, whether in terms of males and females or op-posing sides in a particular country. Moreover, where we had previously de-clared war against a state, we now declared war on terror, leaving us so terri-fied that a private war is being conducted, not only against foreign citizens, but our own.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of APOC@LYPSE: THE END OF ANTIVIRUS. WHEN THE ANTIVIRUS IS THE THREAT

By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army We... more By Rodrigo Ruiz, researcher at CTI Renato Archer and Rogério Winter, Colonel at Brazilian Army
We present the proof of concept of a new cyber weapon that has the potential to paralyze an entire nation with irreversible damage, caused by nation state-sponsored attacks (Ministry of Justice of Georgia 2011) or terrorists. Apoc@lypse Technique removal of pages in the book ‘Apoc@lypse: The End of Antivirus’ (Ruiz, et al., 2015) clearly demonstrates the fragility of our defences. We were taught for more than 30 years that in the digital age, we should trust our antivirus system and always keep it updated. You can control the antivirus market and turn it against your opponent, since to do so protects your family photos, even those that protect our trade, finance and military strategies. Undetectable, fast and devastating for the computer data hit.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Aplicação do método Brasil de avaliação de antimalware e as repercussões para a defesa cibernética

Semelhante ao risco financeiro e a reputação, o risco à segurança cibernética afeta profundamente... more Semelhante ao risco financeiro e a reputação, o
risco à segurança cibernética afeta profundamente uma
empresa, órgão de governo e instituições militares. No contexto
das ameaças cibernéticas, os malware apresentam uma
tendência em expansão nos diversos setores produtivos. Escolher
uma solução de software anti-malware eficiente é crucial para a
organização.
O método Brasil de avaliação de anti-malware se
propõe a ser uma solução nacional para avaliar anti-malware
com a base realidade de ameaças cibernéticas brasileiras. O
trabalho visa responder aos seguintes questionamentos: deve-se
continuar a adquirir anti-malware com base em recomendações
de avaliadores independentes internacionais e o método Brasil é
uma solução concreta para avaliação de anti-malware. Após
experimentar o método Brasil com malwares coletados na
internet brasileira o trabalho aponta para a necessidade de se
aperfeiçoar o método em questão. Todavia, o método permitiu
visualizar um panorama bem diferente daquele propagado por
testadores independentes, pois apenas 50% da população dos
malware coletados na internet brasileira foram detectados pelos
anti-malware comercialmente disponíveis no Brasil.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Opening the “Private Browsing” Data – Acquiring Evidence of Browsing Activities

The growing concern of users about the confidentiality of data generated by web browsing activiti... more The growing concern of users about the confidentiality of data generated by web browsing activities made browser developers include options for safer and confidential browsing in their products.
For users those options, when functionally compliant with data security guidelines, guarantee online privacy. For law enforcement agents, this functionality introduces another obstacle for data acquisition towards evidence gathering.
No matter which case, it is important to assess and validate private browsing techniques.
The presented method shows that for some browsers it is possible to recover text and graphical data related to pages visited during private navigation, in clear violation of this tool basic functional requirement.

Bookmarks Related papers MentionsView impact