Software Engineer

code icon

Working with both Web and Mobile development, I've been active in the industry for 5+ years on Web development and 4+ years on Mobile development as a self-employment consultant.

Below are some of the technology I am familiar with:

web dev image
  • C#
  • Java
  • JavaScript
  • HTML/CSS/jQuery
  • ASP.NET MVC
  • Liferay
  • Ruby on Rails
git image
web-services image
sql image
android dev image
  • Java
  • Kotlin
  • React Extensions
  • Firebase
  • API/SDK Development
  • Program Analysis
  • Security

Researcher

research icon

I obtained my M.Sc. on Computer Science from CIn-UFPE. As a researcher, I was part of a joint-effort project between US and Brazil addressing security problems on the Internet of Things (IoT). For more information, please refer to the official web page of the project.

Below are some of the work I was involved with:

smart-home image

Targeting IoT applications, FlowFence is a framework built for development of secure IoT applications on the Android platform. Under supervision of Prof. Atul Prakash at the University of Michigan (UMICH), I've extended the FlowFence framework to support protection of sensitive UI data and network requests on Android apps*.

*Published paper can be seen here.

iot android image

As a visiting scholar on the University of Illinois at Urbana-Champaign (UIUC) and under supervision of Prof. Darko Marinov, we did a comprehensive analysis of mobile apps responsible for controlling the Top 100 best-selling IoT devices on Amazon to assess whether those apps contained potential vulnerabilities in terms of security and privacy. To our surprise, we found that most of these apps could be leveraged to create attacks and exploit the smart devices*.

*Published paper can be seen here.
A CoRR extended version can be found here.

IoT-Flows image

We proposed a security system that leverages a traditional autonomic computer architecture originally introduced by IBM (MAPE-K) to detect attacks on IoT infrastructures via Complex Event Processing (CEP) rules. The system acts on all TCP/IP network layers, promoting extensibility and a multilayer defense against both traditional and new attacks*.

*Published paper can be seen here.