Skip to main content

Showing 1–10 of 10 results for author: Banescu, S

Searching in archive cs. Search in all archives.
.
  1. Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities

    Authors: Behkish Nassirzadeh, Huaiying Sun, Sebastian Banescu, Vijay Ganesh

    Abstract: In recent years we have witnessed a dramatic increase in the adoption and application of smart contracts in a variety of contexts such as decentralized finance, supply chain management, and identity management. However, a critical stumbling block to the further adoption of smart contracts is their security. A particularly widespread class of security vulnerabilities that afflicts Ethereum smart co… ▽ More

    Submitted 9 July, 2022; v1 submitted 28 December, 2021; originally announced December 2021.

    Comments: 13 pages, 12 figures

  2. arXiv:2007.00510  [pdf, other

    cs.CR cs.LG

    Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection

    Authors: Aleieldin Salem, Sebastian Banescu, Alexander Pretschner

    Abstract: The malware analysis and detection research community relies on the online platform VirusTotal to label Android apps based on the scan results of around 60 antiviral scanners. Unfortunately, there are no standards on how to best interpret the scan results acquired from VirusTotal, which leads to the utilization of different threshold-based labeling strategies (e.g., if ten or more scanners deem an… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

  3. MPro: Combining Static and Symbolic Analysis for Scalable Testing of Smart Contract

    Authors: William Zhang, Sebastian Banescu, Leonardo Passos, Steven Stewart, Vijay Ganesh

    Abstract: Smart contracts are executable programs that enable the building of a programmable trust mechanism between multiple entities without the need of a trusted third-party. Researchers have developed several security scanners in the past couple of years. However, many of these analyzers either do not scale well, or if they do, produce many false positives. This issue is exacerbated when bugs are trigge… ▽ More

    Submitted 14 December, 2020; v1 submitted 1 November, 2019; originally announced November 2019.

  4. VirtSC: Combining Virtualization Obfuscation with Self-Checksumming

    Authors: Mohsen Ahmadvand, Daniel Below, Sebastian Banescu, Alexander Pretschner

    Abstract: Self-checksumming (SC) is a tamper-proofing technique that ensures certain program segments (code) in memory hash to known values at runtime. SC has few restrictions on application and hence can protect a vast majority of programs. The code verification in SC requires computation of the expected hashes after compilation, as the machine-code is not known before. This means the expected hash values… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

  5. arXiv:1909.11401  [pdf, other

    cs.CR

    SIP Shaker: Software Integrity Protection Composition

    Authors: Mohsen Ahmadvand, Dennis Fischer, Sebastian Banescu

    Abstract: Man-At-The-End (MATE) attackers are almighty adversaries against whom there exists no silver-bullet countermeasure. To raise the bar, a wide range of protection measures were proposed in the literature each of which adds resilience against certain attacks on certain digital assets of a program. Intuitively, composing a set of protections (rather than applying just one of them) can mitigate a wider… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

  6. arXiv:1903.10560  [pdf, other

    cs.CR

    Don't Pick the Cherry: An Evaluation Methodology for Android Malware Detection Methods

    Authors: Aleieldin Salem, Sebastian Banescu, Alexander Pretschner

    Abstract: In evaluating detection methods, the malware research community relies on scan results obtained from online platforms such as VirusTotal. Nevertheless, given the lack of standards on how to interpret the obtained data to label apps, researchers hinge on their intuitions and adopt different labeling schemes. The dynamicity of VirusTotal's results along with adoption of different labeling schemes si… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

  7. Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS

    Authors: Luca Allodi, Sebastian Banescu, Henning Femmer, Kristian Beckers

    Abstract: The assessment of new vulnerabilities is an activity that accounts for information from several data sources and produces a `severity' score for the vulnerability. The Common Vulnerability Scoring System (\CVSS) is the reference standard for this assessment. Yet, no guidance currently exists on \emph{which information} aids a correct assessment and should therefore be considered. In this paper w… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

    Comments: 9 pages, CODASPY 2018

    Journal ref: Proceedings of the 2018 ACM Conference on Data and Application Security and Privacy

  8. arXiv:1701.06743  [pdf, other

    cs.CR

    Reasoning about Probabilistic Defense Mechanisms against Remote Attacks

    Authors: Martín Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh

    Abstract: Despite numerous countermeasures proposed by practitioners and researchers, remote control-flow alteration of programs with memory-safety vulnerabilities continues to be a realistic threat. Guaranteeing that complex software is completely free of memory-safety vulnerabilities is extremely expensive. Probabilistic countermeasures that depend on random secret keys are interesting, because they are a… ▽ More

    Submitted 17 February, 2017; v1 submitted 24 January, 2017; originally announced January 2017.

  9. arXiv:1502.04023  [pdf, other

    cs.CR

    The Meaning of Attack-Resistant Systems

    Authors: Vijay Ganesh, Sebastian Banescu, Martín Ochoa

    Abstract: In this paper, we introduce a formal notion of partial compliance, called Attack-resistance, of a computer program running together with a defense mechanism w.r.t a non-exploitability specification. In our setting, a program may contain exploitable vulnerabilities, such as buffer overflows, but appropriate defense mechanisms built into the program or the operating system render such vulnerabilitie… ▽ More

    Submitted 11 June, 2015; v1 submitted 13 February, 2015; originally announced February 2015.

  10. arXiv:1502.03245  [pdf, other

    cs.CR

    FEEBO: An Empirical Evaluation Framework for Malware Behavior Obfuscation

    Authors: Sebastian Banescu, Tobias Wüchner, Marius Guggenmos, Martín Ochoa, Alexander Pretschner

    Abstract: Program obfuscation is increasingly popular among malware creators. Objectively comparing different malware detection approaches with respect to their resilience against obfuscation is challenging. To the best of our knowledge, there is no common empirical framework for evaluating the resilience of malware detection approaches w.r.t. behavior obfuscation. We propose and implement such a framework… ▽ More

    Submitted 13 February, 2015; v1 submitted 11 February, 2015; originally announced February 2015.