Skip to main content

Showing 1–5 of 5 results for author: Stefanescu, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.06375  [pdf, ps, other

    cs.PL

    Macaw: A Machine Code Toolbox for the Busy Binary Analyst

    Authors: Ryan G. Scott, Brett Boston, Benjamin Davis, Iavor Diatchki, Mike Dodds, Joe Hendrix, Daniel Matichuk, Kevin Quick, Tristan Ravitch, Valentin Robert, Benjamin Selfridge, Andrei Stefănescu, Daniel Wagner, Simon Winwood

    Abstract: When attempting to understand the behavior of an executable, a binary analyst can make use of many different techniques. These include program slicing, dynamic instrumentation, binary-level rewriting, symbolic execution, and formal verification, all of which can uncover insights into how a piece of machine code behaves. As a result, there is no one-size-fits-all binary analysis tool, so a binary a… ▽ More

    Submitted 18 February, 2025; v1 submitted 8 July, 2024; originally announced July 2024.

  2. arXiv:2107.05754  [pdf, other

    cs.CR cs.CV cs.LG

    EvoBA: An Evolution Strategy as a Strong Baseline forBlack-Box Adversarial Attacks

    Authors: Andrei Ilie, Marius Popescu, Alin Stefanescu

    Abstract: Recent work has shown how easily white-box adversarial attacks can be applied to state-of-the-art image classifiers. However, real-life scenarios resemble more the black-box adversarial conditions, lacking transparency and usually imposing natural, hard constraints on the query budget. We propose $\textbf{EvoBA}$, a black-box adversarial attack based on a surprisingly simple evolutionary search… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

  3. arXiv:2004.13107  [pdf

    cs.CR

    Identity Management on Blockchain -- Privacy and Security Aspects

    Authors: Andreea-Elena Panait, Ruxandra F. Olimid, Alin Stefanescu

    Abstract: In the last years, identity management solutions on blockchain were proposed as a possible solution to the digital identity management problem. However, they are still at an early stage and further research needs to be done to conclude whether identity systems could benefit from the use of blockchain or not. Motivated by this, we investigate identity management solutions on blockchain intending to… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

    Comments: extended version of "Identity Management on Blockchain - Privacy and Security Aspects" available at https://acad.ro/sectii2002/proceedings/doc2020-1/06-Panait.pdf

  4. All-Path Reachability Logic

    Authors: Andrei Stefanescu, Stefan Ciobaca, Radu Mereuta, Brandon Moore, Traian Florin Serbanuta, Grigore Rosu

    Abstract: This paper presents a language-independent proof system for reachability properties of programs written in non-deterministic (e.g., concurrent) languages, referred to as all-path reachability logic. It derives partial-correctness properties with all-path semantics (a state satisfying a given precondition reaches states satisfying a given postcondition on all terminating execution paths). The proof… ▽ More

    Submitted 29 April, 2019; v1 submitted 25 October, 2018; originally announced October 2018.

    Journal ref: Logical Methods in Computer Science, Volume 15, Issue 2 (April 30, 2019) lmcs:4939

  5. arXiv:1709.05045  [pdf, ps, other

    cs.PL cs.LO

    A Constructor-Based Reachability Logic for Rewrite Theories

    Authors: Stephen Skeirik, Andrei Stefanescu, José Meseguer

    Abstract: Reachability logic has been applied to $\mathbb{K}$ rewrite-rule-based language definitions as a language-generic logic of programs. To be able to verify not just code but also distributed system designs, a new rewrite-theory-generic reachability logic is presented and proved sound for a wide class of rewrite theories. The logic's automation is increased by means of constructor-based semantic unif… ▽ More

    Submitted 14 September, 2017; originally announced September 2017.

    Comments: Pre-proceedings paper presented at the 27th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2017), Namur, Belgium, 10-12 October 2017 (arXiv:1708.07854)

    Report number: Report number: LOPSTR/2017/2