Banescu, Sebastian
64  Ergebnisse:
Personensuche X
?
1

Timely Identification of Victim Addresses in DeFi Attacks:

, In: Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science,
 
?
2

Gas Gauge: A Security Analysis Tool for Smart Contract Out-..:

, In: Mathematical Research for Blockchain Economy; Lecture Notes in Operations Research,
 
?
3

Green Fuzzing: A Saturation-Based Stopping Criterion using ..:

, In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis,
Lipp, Stephan ; Elsner, Daniel ; Kacianka, Severin... - p. 127-139 , 2023
 
?
4

An empirical study on the effectiveness of static C code an..:

, In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis,
 
?
5

FuzzTastic: A Fine-grained, Fuzzer-agnostic Coverage Analyz..:

, In: 2022 IEEE/ACM 44th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion),
 
?
6

FuzzTastic : a fine-grained, fuzzer-agnostic coverage an..:

, In: Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: Companion Proceedings,
 
?
8

Maat : Automatically Analyzing VirusTotal for Accurate L..:

Salem, Aleieldin ; Banescu, Sebastian ; Pretschner, Alexander
ACM Transactions on Privacy and Security (TOPS).  24 (2021)  4 - p. 1-35 , 2021
 
?
9

Dynamic Taint Analysis versus Obfuscated Self-Checking:

, In: Annual Computer Security Applications Conference,
 
?
 
?
11

Constant-Time Updates Using Token Mechanics:

, In: 2020 IEEE International Conference on Blockchain (Blockchain),
Banescu, Sebastian ; Derka, Martin ; Gorzny, Jan.. - p. 300-304 , 2020
 
?
12

MPro: Combining Static and Symbolic Analysis for Scalable T..:

, In: 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE),
 
?
13

VirtSC : Combining Virtualization Obfuscation with Self-..:

, In: Proceedings of the 3rd ACM Workshop on Software Protection,
 
?
14

SIP shaker : software integrity protection composition:

, In: Proceedings of the 35th Annual Computer Security Applications Conference,
 
?
15

Identifying Relevant Information Cues for Vulnerability Ass..:

, In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy,
 
1-15