Sebastian Banescu

According to our database1, Sebastian Banescu authored at least 28 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods.
CoRR, 2019

MPro: Combining Static and Symbolic Analysis for Scalable Testing of Smart Contract.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

VirtSC: Combining Virtualization Obfuscation with Self-Checksumming.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019

SIP shaker: software integrity protection composition.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

Chapter Five - A Tutorial on Software Obfuscation.
Advances in Computers, 2018

Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Practical Integrity Protection with Oblivious Hashing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning.
Proceedings of the 26th USENIX Security Symposium, 2017

Reasoning about Probabilistic Defense Mechanisms against Remote Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Detecting Patching of Executables without System Calls.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

Nequivack: Assessing Mutation Score Confidence.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

StIns4CS: A State Inspection Tool for C#.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

VOT4CS: A Virtualization Obfuscation Tool for C#.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

Metadata recovery from obfuscated programs using machine learning.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

Code obfuscation against symbolic execution attacks.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

The Meaning of Attack-Resistant Programs.
CoRR, 2015

FEEBO: An Empirical Evaluation Framework for Malware Behavior Obfuscation.
CoRR, 2015

ISA2R: Improving Software Attack and Analysis Resilience via Compiler-Level Software Diversity.
Proceedings of the Computer Safety, Reliability, and Security, 2015

A framework for empirical evaluation of malware detection resilience against behavior obfuscation.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

A Framework for Measuring Software Obfuscation Resilience against Automated Attacks.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Short Paper: The Meaning of Attack-Resistant Systems.
Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, 2015

Software-Based Protection against Changeware.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Measuring Privacy Compliance Using Fitness Metrics.
Proceedings of the Business Process Management - 10th International Conference, 2012

Unpredictable Random Number Generator Based on Hardware Performance Counters.
Proceedings of the Digital Information Processing and Communications, 2011

Measuring Privacy Compliance with Process Specifications.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

Multipliers for floating-point double precision and beyond on FPGAs.
SIGARCH Computer Architecture News, 2010

Software Random Number Generation Based on Race Conditions.
Proceedings of the SYNASC 2008, 2008