Sebastian Banescu

Orcid: 0000-0003-0771-4826

According to our database1, Sebastian Banescu authored at least 41 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mutation Testing of Smart Contracts As a Service.
Proceedings of the Quality of Information and Communications Technology, 2024

Enhanced mutation testing of smart contracts in support of code inspection.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

2023
Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Timely Identification of Victim Addresses in DeFi Attacks.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities.
Proceedings of the 3rd International Conference on Mathematical Research for Blockchain Economy, 2022

An empirical study on the effectiveness of static C code analyzers for vulnerability detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

FuzzTastic: A Fine-grained, Fuzzer-agnostic Coverage Analyzer.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

2021
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection.
ACM Trans. Priv. Secur., 2021

Dynamic Taint Analysis versus Obfuscated Self-Checking.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Constant-Time Updates Using Token Mechanics.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods.
CoRR, 2019

MPro: Combining Static and Symbolic Analysis for Scalable Testing of Smart Contract.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

VirtSC: Combining Virtualization Obfuscation with Self-Checksumming.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019

SIP shaker: software integrity protection composition.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Chapter Five - A Tutorial on Software Obfuscation.
Adv. Comput., 2018

Diagnosis of Safety Incidents for Cyber-Physical Systems: A UAV Example.
Proceedings of the 3rd International Conference on System Reliability and Safety, 2018

Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

ByteWise: A case study in neural network obfuscation identification.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

Practical Integrity Protection with Oblivious Hashing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Characterizing the Strength of Software Obfuscation Against Automated Attacks (Charakterisierung der Stärke der Softwareverschleierung gegen automatisierte Angriffe)
PhD thesis, 2017

Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning.
Proceedings of the 26th USENIX Security Symposium, 2017

Reasoning about Probabilistic Defense Mechanisms against Remote Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Detecting Patching of Executables without System Calls.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Nequivack: Assessing Mutation Score Confidence.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

StIns4CS: A State Inspection Tool for C#.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

VOT4CS: A Virtualization Obfuscation Tool for C#.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

Metadata recovery from obfuscated programs using machine learning.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

Code obfuscation against symbolic execution attacks.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
The Meaning of Attack-Resistant Programs.
CoRR, 2015

FEEBO: An Empirical Evaluation Framework for Malware Behavior Obfuscation.
CoRR, 2015

ISA2R: Improving Software Attack and Analysis Resilience via Compiler-Level Software Diversity.
Proceedings of the Computer Safety, Reliability, and Security, 2015

A framework for empirical evaluation of malware detection resilience against behavior obfuscation.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

A Framework for Measuring Software Obfuscation Resilience against Automated Attacks.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Short Paper: The Meaning of Attack-Resistant Systems.
Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, 2015

Software-Based Protection against Changeware.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2012
Measuring Privacy Compliance Using Fitness Metrics.
Proceedings of the Business Process Management - 10th International Conference, 2012

2011
Unpredictable Random Number Generator Based on Hardware Performance Counters.
Proceedings of the Digital Information Processing and Communications, 2011

Measuring Privacy Compliance with Process Specifications.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

2010
Multipliers for floating-point double precision and beyond on FPGAs.
SIGARCH Comput. Archit. News, 2010

2008
Software Random Number Generation Based on Race Conditions.
Proceedings of the SYNASC 2008, 2008


  Loading...