G. Barbosa, G. M. Bezerra, Dianne S. de Medeiros, Martin Andreoni Lopez, Diogo M. F. Mattos
{"title":"Segurança em Redes 5G: Oportunidades e Desafios em Detecção de Anomalias e Predição de Tráfego Baseadas em Aprendizado de Máquina","authors":"G. Barbosa, G. M. Bezerra, Dianne S. de Medeiros, Martin Andreoni Lopez, Diogo M. F. Mattos","doi":"10.5753/sbc.7165.8.4","DOIUrl":"https://doi.org/10.5753/sbc.7165.8.4","url":null,"abstract":"","PeriodicalId":341466,"journal":{"name":"Minicursos do XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais","volume":"123-124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introdução à criptografia completamente homomórfica com implementação em Sage","authors":"Hilder V. L. Pereira, Eduardo Morais","doi":"10.5753/sbc.7165.8.1","DOIUrl":"https://doi.org/10.5753/sbc.7165.8.1","url":null,"abstract":"","PeriodicalId":341466,"journal":{"name":"Minicursos do XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais","volume":"68 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125934886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rocha, Célio Albuquerque, Eduardo Loivos, B. Gondim, Arthur Vianna, André Ferreira
{"title":"Segurança e Escalabilidade em Sharding Blockchain","authors":"A. Rocha, Célio Albuquerque, Eduardo Loivos, B. Gondim, Arthur Vianna, André Ferreira","doi":"10.5753/sbc.7165.8.2","DOIUrl":"https://doi.org/10.5753/sbc.7165.8.2","url":null,"abstract":"The circulation of the real money, on paper, is decreasing, migrating to the virtual. As a result, the need for a secure way to carry out transactions without relying on a trusted third-party increase. The cryptocurrencies that emerged in 2009 with the Nakamoto protocol represent an alternative to this demand, however the initial proposal has a scalability problem that makes it impossible to compete with the credit card network. The need to confirm transactions means that a cryptocurrency that uses the traditional blockchain like Ethereum only has 20 to 30 transactions per second, far away from VisaNet which has around 1700 transactions per second. To solve the scalability, the concept of sharding was created. This work proposes to present some sharding models highlighting their particularities and security solutions. proposta SharPer, temos separado por \"/\" os valores considerando Crash Only Nodes e Byzantine Nodes.","PeriodicalId":341466,"journal":{"name":"Minicursos do XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127120489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Falcão, Matteus V. S. Silva, Clenimar Souza, Andrey Brito
{"title":"Autenticando aplicações nativas da nuvem com identidades SPIFFE","authors":"E. Falcão, Matteus V. S. Silva, Clenimar Souza, Andrey Brito","doi":"10.5753/sbc.7165.8.3","DOIUrl":"https://doi.org/10.5753/sbc.7165.8.3","url":null,"abstract":"The purpose of this tutorial is to present how cloud-native applications are authenticated with the zero-trust model and the SPIFFE specification. A distributed application is used as study case and its microservices are attested to receive SPIFFE identities that allow mutual authentication according to the zero-trust principles. To illustrate the advantages of zero-trust model with SPIFFE identities in cloud-native computing environments, we leverage both attestation mechanisms based in Kubernetes as well as mechanisms based in Intel SGX (using the SCONE framework).","PeriodicalId":341466,"journal":{"name":"Minicursos do XXI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124883810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}