<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="https://repositorio.ufu.br/handle/123456789/17904" />
  <subtitle />
  <id>https://repositorio.ufu.br/handle/123456789/17904</id>
  <updated>2026-04-24T17:32:40Z</updated>
  <dc:date>2026-04-24T17:32:40Z</dc:date>
  <entry>
    <title>Visualização e Interação no Tesouro Direto: Uma Análise de Usabilidade e Acessibilidade na Seção de Histórico de Preços e Taxas</title>
    <link rel="alternate" href="https://repositorio.ufu.br/handle/123456789/48631" />
    <author>
      <name />
    </author>
    <id>https://repositorio.ufu.br/handle/123456789/48631</id>
    <updated>2026-04-11T06:31:31Z</updated>
    <published>2026-03-20T00:00:00Z</published>
    <summary type="text">Title: Visualização e Interação no Tesouro Direto: Uma Análise de Usabilidade e Acessibilidade na Seção de Histórico de Preços e Taxas</summary>
    <dc:date>2026-03-20T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Extração automatizada de chaves criptográficas em Ransomwares: uma abordagem forense baseada em AOB</title>
    <link rel="alternate" href="https://repositorio.ufu.br/handle/123456789/48151" />
    <author>
      <name />
    </author>
    <id>https://repositorio.ufu.br/handle/123456789/48151</id>
    <updated>2026-02-05T06:25:18Z</updated>
    <published>2025-12-19T00:00:00Z</published>
    <summary type="text">Title: Extração automatizada de chaves criptográficas em Ransomwares: uma abordagem forense baseada em AOB
Abstract: Ransomware threats have emerged as a primary vector for cyberattacks, with incidence&#xD;
and the complexity of their techniques continuing to grow. Recent reports highlight the&#xD;
significant financial impacts of these attacks, with losses reaching millions of dollars per&#xD;
incident. Ransomware typically employs cryptographic mechanisms to encrypt files on&#xD;
compromised systems, making data recovery contingent on the payment of a ransom,&#xD;
generally associated with the receipt of the cryptographic key or a decryption tool. In&#xD;
this context, this work proposes an automated mechanism for extracting cryptographic&#xD;
keys from ransomware by analyzing volatile memory during malware execution. To gain&#xD;
greater control over the malware’s internal behavior and to enable reproducible experi&#xD;
ments, a custom ransomware sample was developed, inspired by notable strains such as&#xD;
WannaCry and LockBit. The proposed approach leverages AOB (Array of Bytes) signa&#xD;
tures to identify, in real-time, routines related to the generation and temporary storage of&#xD;
cryptographic keys in volatile memory. The experimental process involved static analysis&#xD;
with IDA Free, dynamic memory inspection with Cheat Engine, and the development of&#xD;
an automated tool, AOBTool. The results indicate that the cryptographic key can be&#xD;
located and extracted from memory before it is disposed of, within a timeframe shorter&#xD;
than that required to complete the file encryption process. This highlights the potential of&#xD;
the proposed technique as a valuable support tool for digital forensics and for mitigating&#xD;
ransomware-related incidents.</summary>
    <dc:date>2025-12-19T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Análise Comparativa de Tecnologias de IA para  o Desenvolvimento de Chatbots Especializados</title>
    <link rel="alternate" href="https://repositorio.ufu.br/handle/123456789/48103" />
    <author>
      <name />
    </author>
    <id>https://repositorio.ufu.br/handle/123456789/48103</id>
    <updated>2026-01-29T06:20:41Z</updated>
    <published>2025-09-23T00:00:00Z</published>
    <summary type="text">Title: Análise Comparativa de Tecnologias de IA para  o Desenvolvimento de Chatbots Especializados</summary>
    <dc:date>2025-09-23T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>GPT Teacher: desenvolvimento de um agente de LLM para programação assistida em ambiente VSCode</title>
    <link rel="alternate" href="https://repositorio.ufu.br/handle/123456789/48094" />
    <author>
      <name />
    </author>
    <id>https://repositorio.ufu.br/handle/123456789/48094</id>
    <updated>2026-01-28T06:29:02Z</updated>
    <published>2025-09-26T00:00:00Z</published>
    <summary type="text">Title: GPT Teacher: desenvolvimento de um agente de LLM para programação assistida em ambiente VSCode
Abstract: The computer programming teaching and learning process presents significant challenges that often result in comprehension difficulties and student demotivation. This paper presents the development and evaluation of GPT Teacher, an LLM-based agent for assisted programming integrated into the Visual Studio Code (VSCode) environment. The primary objective was to design and implement an LLM-based tool focused on programming education, capable of supporting the acquisition of programming competencies more effectively than generic coding assistants. The methodology involved creating a functional prototype based on a dual-agent architecture: a Diagnostic Agent, responsible for technical code analysis, and a Guidance Agent, tasked with translating this analysis into a constructive and educational dialogue for the student. The results of the functional validation demonstrate that the proposed approach is robust and promising, confirming the hypothesis that LLM agents, when structured within a specialized system, can serve as powerful allies in the programming teaching-learning process by reconciling technical rigor with pedagogical effectiveness.</summary>
    <dc:date>2025-09-26T00:00:00Z</dc:date>
  </entry>
</feed>

