Daniela Oliveira

Learn More
Library OSes are a promising approach for applications to efficiently obtain the benefits of virtual machines, including security isolation, host platform compatibility, and migration. Library OSes refactor a traditional OS kernel into an application library, avoiding overheads incurred by duplicate functionality. When compared to running a single(More)
Kernel extensions, especially device drivers, make up a large fraction of modern OS kernels (approximately 70% in Linux). Most extensions are benign and represent a convenient approach for extending the kernel functionality and allowing a system to communicate with an increasing number of I/O devices. A small fraction of them are malicious and, as they run(More)
The development of graphical user interfaces (GUIs) has been an emergent demand in the area of healthcare technologies. Specifically for respiratory healthcare there is a lack of tools to produce a complete multimedia database, where respiratory sounds and other clinical data are available in a single repository. This is essential for a complete patient's(More)
" No one is so brave that he is not disturbed by something unexpected. " Julius Caesar The operating system is increasingly regarded as un-trustworthy. Applications, hardware, and hypervisors are erecting defenses to insulate themselves from the operating system. This paper explores the potential benefits if operating systems simply embraced these lowered(More)
Twenty adult partridges Rhynchotus rufescens were used to study the morphology of the beak and the tongue. Lengths of the beak and of the tongue were evaluated, and histologic sections of the tongue were stained routinely with hematoxylin-eosin (HE), periodic acid-Schiff (PAS) and Masson's trichrome stain, later analyzed and described. The beak of the(More)
AgreementMakerLight (AML) is an automated ontology matching system based primarily on element-level matching and on the use of external resources as background knowledge. This paper describes its configuration for the OAEI 2015 competition and discusses its results. For this OAEI edition, we focused mainly on the Interactive Matching track due to its(More)
Despite the security community's emphasis on the importance of building secure software, the number of new vulnerabilities found in our systems is increasing. In addition, vulnerabilities that have been studied for years are still commonly reported in vulnerability databases. This paper investigates a new hypothesis that software vulnerabilities are blind(More)
Psychology and neuroscience literature shows the existance of upper bounds on the human capacity for executing cognitive tasks and for information processing. These bounds are where, demonstrably, people start experiencing cognitive strain and consequently committing errors in the tasks execution. We argue that the usable security discipline should(More)