Skip to main content

Showing 1–5 of 5 results for author: Asăvoae, I M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1911.07523  [pdf, other

    cs.CL cs.CR cs.IT cs.LG

    Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning

    Authors: Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent

    Abstract: The ability to efficiently detect the software protections used is at a prime to facilitate the selection and application of adequate deob-fuscation techniques. We present a novel approach that combines semantic reasoning techniques with ensemble learning classification for the purpose of providing a static detection framework for obfuscation transformations. By contrast to existing work, we provi… ▽ More

    Submitted 18 November, 2019; originally announced November 2019.

    Comments: Software Security, Protection, and Reverse Engineering Workshop (SSPREW9), Dec 2019, San Juan, United States

  2. arXiv:1709.06897  [pdf, other

    cs.PL cs.LO

    Context-Updates Analysis and Refinement in Chisel

    Authors: Irina Mariuca Asavoae, Mihail Asavoae, Adrian Riesco

    Abstract: This paper presents the context-updates synthesis component of Chisel--a tool that synthesizes a program slicer directly from a given algebraic specification of a programming language operational semantics. (By context-updates we understand programming language constructs such as goto instructions or function calls.) The context-updates synthesis follows two directions: an overapproximating phase… ▽ More

    Submitted 20 September, 2017; originally announced September 2017.

    Comments: Pre-proceedings paper presented at the 27th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2017), Namur, Belgium, 10-12 October 2017 (arXiv:1708.07854)

    Report number: LOPSTR/2017/30

  3. Software Model Checking: A Promising Approach to Verify Mobile App Security

    Authors: Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh

    Abstract: In this position paper we advocate software model checking as a technique suitable for security analysis of mobile apps. Our recommendation is based on promising results that we achieved on analysing app collusion in the context of the Android operating system. Broadly speaking, app collusion appears when, in performing a threat, several apps are working together, i.e., they exchange information w… ▽ More

    Submitted 15 June, 2017; originally announced June 2017.

    Comments: 2 pages, 2 figures, FTFJP'17

  4. arXiv:1603.02308  [pdf, other

    cs.SE cs.CR

    Towards Automated Android App Collusion Detection

    Authors: Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh

    Abstract: Android OS supports multiple communication methods between apps. This opens the possibility to carry out threats in a collaborative fashion, c.f. the Soundcomber example from 2011. In this paper we provide a concise definition of collusion and report on a number of automated detection approaches, developed in co-operation with Intel Security.

    Submitted 7 March, 2016; originally announced March 2016.

  5. Interacting via the Heap in the Presence of Recursion

    Authors: Jurriaan Rot, Irina Măriuca Asăvoae, Frank de Boer, Marcello M. Bonsangue, Dorel Lucanu

    Abstract: Almost all modern imperative programming languages include operations for dynamically manipulating the heap, for example by allocating and deallocating objects, and by updating reference fields. In the presence of recursive procedures and local variables the interactions of a program with the heap can become rather complex, as an unbounded number of objects can be allocated either on the call… ▽ More

    Submitted 16 December, 2012; originally announced December 2012.

    Comments: In Proceedings ICE 2012, arXiv:1212.3458

    ACM Class: F.1.1, F.1.2, F.3.1, F.3.3

    Journal ref: EPTCS 104, 2012, pp. 99-113