Software Engineer

code icon

Active on both Web and Mobile development, I've worked at the industry for 4+ years as a Web developer and 3+ years on Mobile development as a self-employment consultant.

Below are some of the technologies I have experience with.

web dev image
  • C#
  • Java
  • JavaScript
  • HTML/CSS/jQuery
  • ASP.NET MVC
  • Liferay
  • Ruby on Rails
git image
web-services image
sql image
android dev image
  • Java
  • Kotlin
  • React Extensions
  • Firebase
  • API/SDK
  • Program Analysis
  • Security

Researcher

research icon

Graduated on Computer Science (C.S.), I'm currently finishing my Masters at CIn-UFPE on Software Engineering. As a Graduate Researcher, I'm part of a joint-effort project between US and Brazil addressing security problems on the Internet of Things (IoT). For more information, please refer to the official web page of the project.

Below are some of the work I'm involved with.

smart-home image

Targeting IoT applications, FlowFence is a framework built for development of secure IoT applications on the Android platform. Together with the University of Michigan (UMICH) and under supervision of Prof. Atul Prakash, I've extended the FlowFence framework to support protection of sensitive UI data and network requests on Android apps*.

*Published paper can be seen here.

iot android image

We did a comprehensive analysis of IoT apps responsible for controlling the Top 100 best-selling IoT devices on the Amazon website to verify whether these apps contained potential vulnerabilities in terms of security and privacy. To our surprise, we found that most of these apps indeed could be leveraged to create attacks and exploit the smart devices*.

*Paper has been accepted to SafeThings'19 and will be available soon.
A CoRR extended version can be found here.

IoT-Flows image

We're proposing a security system that leverages a traditional autonomic computer architecture originally introduced by IBM (MAPE-K) to detect attacks on IoT infrastructures via Complex Event Processing (CEP) rules. The system acts on all TCP/IP network layers, promoting extensibility and a multilayer defense against both traditional and new attacks*.

*Paper has been accepted to SERP4IoT'19 and will be available soon.