Yuri Gil Dantas

Yuri Gil Dantas
Office: S2|02 E321
Phone: +49 6151 16-25256
Fax: +49 6151 16-25251
Mail: dantasatmais.informatik.tu-darmstadt.de

TU Darmstadt

Department of Computer Science

Modeling and Analysis of Information Systems

Hochschulstraße 10

D-64289 Darmstadt


GPG-Key: 4096R/5AFACF5F, Fingerprint: BB0B E0D3 9FC4 F9AC C0C0 55B9 A7CF 40A0 5AFA CF5F.

Yuri Gil Dantas received his bachelor's and master's degree in Computer Science in 2013 and 2015,
respectively, from Federal University of Paraiba, Brazil. During his master degree, he proposed
a novel defense, named SeVen, for mitigating Application Layer DDoS attacks. He is currently a Ph.D.
candidate in Computer Science at Technische Universität Darmstadt.

Research Interests

  • Runtime Monitoring and Enforcement
  • Denial of Service Attacks and Defences
  • Software-Defined Networking
  • Side-Channel Attacks and Defences
  • Trust Computing


These documents have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.


  • Tulio A. Pascoal, Yuri Gil Dantas, Iguatemi E. Fonseca and Vivek Nigam. Slow TCAM Exhaustion DDoS Attack. In Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIPSEC), 2017. To appear.


  • Marcilio O. O. Lemos, Yuri Gil Dantas, Iguatemi E. Fonseca, Vivek Nigam and Gustavo Sampaio. A Selective Defense for Mitigating Coordinated Call Attacks. In Proceedings of the XXXIV Brazilian Symposium on Computer Networks and Distributed Systems (SBRC), 2016. To appear.


  • Yuri Gil Dantas, Vivek Nigam and Iguatemi E. Fonseca. A Selective Defense for Application Layer DDoS Attacks. In Proceedings of the Joint Intelligence and Security Informatics Conference (JISIC), pages 75-82. 2014.


Last modified on 10 April 2017.

A A A | Print | Imprint | Sitemap | Contact
zum Seitenanfang