Tarcísio Marinho

New York, New York, United States Contact Info
2K followers 500+ connections

Join to view profile

About

Experienced Software Engineer with a background in developing, scaling, architecting…

Articles by Tarcísio

See all articles

Activity

Join now to see all activity

Experience & Education

  • dub

View Tarcísio’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Volunteer Experience

  • Universidade Católica de Pernambuco Graphic

    Teacher

    Universidade Católica de Pernambuco

    - 1 year 8 months

    Science and Technology

    Taught Introduction to Python Course and done several speeches about
    Data Science, Machine Learning, Security and hacking. Also actively helping organize and give several lectures and courses throughout Comp week years: 2016, 2017, 2018, 2019 and 2020
    Courses:
    - Introduction to data science
    - Introduction to Python
    Lectures:
    - Malware development
    - Data Science and Machine Learning
    - Using ML to detect API attacks

  • Speaker

    Python User Group - PE

    - 1 year

    Science and Technology

    PUG-PE is a local python group.
    I've gave lectures about:
    - Secure web development,
    - Ransomware internals
    - Malware development
    - Machine learning applied to application security

Publications

  • A Deep Learning Approach to Web Application Firewall

    Medium

    - Abstract -
    Web applications receive a variety of input parameters from users and attackers which generally inject malicious payloads trying to whether steal data or manipulate the application in their favor.
    An approach widely used to protect the application is the WAF (web application firewall), which generally is rule-based. In the present work, deep learning and Transformer, which is a state-of-the-art model in natural language processing, are applied in the scenario of hard-coded…

    - Abstract -
    Web applications receive a variety of input parameters from users and attackers which generally inject malicious payloads trying to whether steal data or manipulate the application in their favor.
    An approach widely used to protect the application is the WAF (web application firewall), which generally is rule-based. In the present work, deep learning and Transformer, which is a state-of-the-art model in natural language processing, are applied in the scenario of hard-coded rules, successfully evading anti-WAF techniques. The proposed method achieves 96.5% accuracy in the proposed dataset.

    See publication
  • How can a malware encrypt a company existence

    Medium

    More than 4,000 ransomware attacks occur daily, according to the FBI.

    In May 2019, the Baltimore City government system was hit with a ransomware attack that estimates put the cost to recovery over $18 million dollars, even with the ransom price being only $75,000 worth of Bitcoin. This attack impacted vaccine production, airports, hospitals, and ATMs.

    2017 was the year of ransomware attacks with the massive global attack of WannaCry that infected 200,000 computers across 150…

    More than 4,000 ransomware attacks occur daily, according to the FBI.

    In May 2019, the Baltimore City government system was hit with a ransomware attack that estimates put the cost to recovery over $18 million dollars, even with the ransom price being only $75,000 worth of Bitcoin. This attack impacted vaccine production, airports, hospitals, and ATMs.

    2017 was the year of ransomware attacks with the massive global attack of WannaCry that infected 200,000 computers across 150 countries, with damages ranging from hundreds of millions to billions of dollars.

    See publication
  • Ransomware encryption techniques

    Medium

    Modern ransomware that affected several countries in 2017 such as WannaCry, Petya, NotPetya, and Locky, uses a hybrid encryption scheme, with a combination of AES and RSA encryption to secure their malware against the researchers getting encrypted files back.

    What’s necessary from the ransomware point of view to get its job done properly and securely? starting from the premise that the ransomware wants to encrypt and decrypt the files.

    See publication
  • RSA encryption algorithm

    With the growth of the internet and the need to transfer data safely, cryptographic algorithms began to be developed to ensure data integrity, thus ensuring secure communication between the two parties, usually the client/server structure. The RSA algorithm was described in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.

    See publication

Projects

  • GonnaCry Ransomware

    - Present

    Code behind these Medium blog posts:
    - How can malware encrypt a company's existence
    - Ransomware encryption techniques

    - https://medium.com/@tarcisioma/how-can-a-malware-encrypt-a-company-existence-c7ed584f66b3
    - https://medium.com/@tarcisioma/ransomware-encryption-techniques-696531d07bb9

    GonnaCry is an academic Linux ransomware made for awareness about security/cryptography.
    It encrypts all the user files with a strong encryption scheme (RSA 2048 bits, AES 256…

    Code behind these Medium blog posts:
    - How can malware encrypt a company's existence
    - Ransomware encryption techniques

    - https://medium.com/@tarcisioma/how-can-a-malware-encrypt-a-company-existence-c7ed584f66b3
    - https://medium.com/@tarcisioma/ransomware-encryption-techniques-696531d07bb9

    GonnaCry is an academic Linux ransomware made for awareness about security/cryptography.
    It encrypts all the user files with a strong encryption scheme (RSA 2048 bits, AES 256 bits, SHA256).

    This project is OpenSource, feel free to use, study, and/or send a pull request

    See project
  • A Deep Learning Approach to Web Application Firewall - implementation

    -

    Code behind the paper: A Deep Learning Approach to Web Application Firewall

    - https://medium.com/@tarcisioma/a-deep-learning-approach-to-web-application-firewall-c6190a9bd31a

    Web applications receive a variety of input parameters from users and attackers which generally inject malicious payloads trying to whether steal data or manipulate the application in their favor.
    An approach widely used to protect the application is the WAF (web application firewall), which generally is…

    Code behind the paper: A Deep Learning Approach to Web Application Firewall

    - https://medium.com/@tarcisioma/a-deep-learning-approach-to-web-application-firewall-c6190a9bd31a

    Web applications receive a variety of input parameters from users and attackers which generally inject malicious payloads trying to whether steal data or manipulate the application in their favor.
    An approach widely used to protect the application is the WAF (web application firewall), which generally is rule-based. In the present work, deep learning and Transformer, which is a state-of-the-art model in natural language processing, are applied in the scenario of hard-coded rules, successfully evading anti-WAF techniques. The proposed method achieves 96.5% accuracy in the proposed dataset.

    See project
  • RSA encryption algorithm implementation

    -

    Code behind the Medium: RSA encryption algorithm

    - https://medium.com/@tarcisioma/algoritmo-de-criptografia-assim%C3%A9trica-rsa-c6254a3c7042

    Simple implementation of the RSA Asymmetric Encryption Algorithm

    See project
  • Backdoor

    -

    Reverse Shell Backdoor is a framework to control infected machines with some cool interactions. It's capable of sending files, running programs in the background, take screenshots.

    There are two versions of the code, C and Python. If you want to learn about sockets and reverse connections, you should check it out.

    See project

Languages

  • Inglês

    Native or bilingual proficiency

  • Português

    Native or bilingual proficiency

Recommendations received

More activity by Tarcísio

View Tarcísio’s full profile

  • See who you know in common
  • Get introduced
  • Contact Tarcísio directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Tarcísio Marinho

Add new skills with these courses