1994 …2024

Publikationen pro Jahr

Filter
Konferenzbeitrag

Suchergebnisse

  • 2021

    Detecting and categorizing Android malware with graph neural networks

    Xu, P., Eckert, C. & Zarras, A., 22 März 2021, Proceedings of the 36th Annual ACM Symposium on Applied Computing, SAC 2021. Association for Computing Machinery, S. 409-412 4 S. (Proceedings of the ACM Symposium on Applied Computing).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    23 Zitate (Scopus)
  • Falcon: Malware Detection and Categorization with Network Traffic Images

    Xu, P., Eckert, C. & Zarras, A., 2021, Artificial Neural Networks and Machine Learning – ICANN 2021 - 30th International Conference on Artificial Neural Networks, Proceedings. Farkaš, I., Masulli, P., Otte, S. & Wermter, S. (Hrsg.). Springer Science and Business Media Deutschland GmbH, S. 117-128 12 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12891 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    10 Zitate (Scopus)
  • HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs

    Xu, P., Zhang, Y., Eckert, C. & Zarras, A., 2021, Artificial Neural Networks and Machine Learning – ICANN 2021 - 30th International Conference on Artificial Neural Networks, Proceedings. Farkaš, I., Masulli, P., Otte, S. & Wermter, S. (Hrsg.). Springer Science and Business Media Deutschland GmbH, S. 127-138 12 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 12893 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    8 Zitate (Scopus)
  • Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic

    Norouzian, M. R., Xu, P., Eckert, C. & Zarras, A., 2021, Information Security - 24th International Conference, ISC 2021, Proceedings. Liu, J. K., Katsikas, S., Meng, W., Susilo, W. & Intan, R. (Hrsg.). Springer Science and Business Media Deutschland GmbH, S. 259-278 20 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 13118 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    14 Zitate (Scopus)
  • ITOP: Automating counterfeit object-oriented programming attacks

    Muntean, P., Viehoever, R., Lin, Z., Tan, G., Grossklags, J. & Eckert, C., 6 Okt. 2021, Proceedings of 2021 24th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2021. Association for Computing Machinery, S. 162-176 15 S. (ACM International Conference Proceeding Series).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    2 Zitate (Scopus)
  • 2020

    Integrating security evaluations into virtual commissioning

    Giehl, A., Wiedermann, N., Gholamzadeh, M. T. & Eckert, C., Aug. 2020, 2020 IEEE 16th International Conference on Automation Science and Engineering, CASE 2020. IEEE Computer Society, S. 1193-1200 8 S. 9217004. (IEEE International Conference on Automation Science and Engineering; Band 2020-August).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    1 Zitat (Scopus)
  • MANIS: Evading malware detection system on graph structure

    Xu, P., Kolosnjaji, B., Eckert, C. & Zarras, A., 30 März 2020, 35th Annual ACM Symposium on Applied Computing, SAC 2020. Association for Computing Machinery, S. 1688-1695 8 S. (Proceedings of the ACM Symposium on Applied Computing).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    10 Zitate (Scopus)
  • PFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings

    Muntean, P., Neumayer, M., Lin, Z., Tan, G., Grossklags, J. & Eckert, C., 7 Dez. 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, S. 466-479 14 S. 3427246. (ACM International Conference Proceeding Series).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    2 Zitate (Scopus)
  • 2019

    Analyzing control flow integrity with LLVM-CFI

    Muntean, P., Neumayer, M., Lin, Z., Tan, G., Grossklags, J. & Eckert, C., 9 Dez. 2019, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, S. 584-597 14 S. (ACM International Conference Proceeding Series).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    13 Zitate (Scopus)
  • 2018

    Adversarial malware binaries: Evading deep learning for malware detection in executables

    Kolosnjaji, B., Demontis, A., Biggio, B., Maiorca, D., Giacinto, G., Eckert, C. & Roli, F., 29 Nov. 2018, 2018 26th European Signal Processing Conference, EUSIPCO 2018. European Signal Processing Conference, EUSIPCO, S. 533-537 5 S. 8553214. (European Signal Processing Conference; Band 2018-September).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    247 Zitate (Scopus)
  • Agile method development: A Live-lab case study on product properties for process planning

    Albers, A., Bursac, N., Eckert, C. M., Walter, B., Wilmsen, M. & Heimicke, J., 2018, 15th International Design Conference, DESIGN 2018. Marjanovic, D., Pavkovic, N., Storga, M., Skec, S. & Bojcetic, N. (Hrsg.). Faculty of Mechanical Engineering and Naval Architecture, S. 713-724 12 S. (Proceedings of International Design Conference, DESIGN; Band 2).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    7 Zitate (Scopus)
  • Attack graph-based assessment of exploitability risks in automotive on-board networks

    Salfer, M. & Eckert, C., 27 Aug. 2018, ARES 2018 - 13th International Conference on Availability, Reliability and Security. Association for Computing Machinery, 3230851. (ACM International Conference Proceeding Series).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    10 Zitate (Scopus)
  • CASTSAN: Efficient detection of polymorphic C++ object type confusions with LLVM

    Muntean, P., Wuerl, S., Grossklags, J. & Eckert, C., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Lopez, J., Zhou, J. & Soriano, M. (Hrsg.). Springer Verlag, S. 3-25 23 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 11098 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    5 Zitate (Scopus)
  • Hiding in the shadows: Empowering arm for stealthy virtual machine introspection

    Proskurin, S., Lengyel, T., Momeu, M., Eckert, C. & Zarras, A., 3 Dez. 2018, ACM International Conference Proceeding Series. Association for Computing Machinery, S. 407-417 11 S. (ACM International Conference Proceeding Series).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    16 Zitate (Scopus)
  • Learning on a Budget for User Authentication on Mobile Devices

    Kolosnjaji, B., Hufner, A., Eckert, C. & Zarras, A., 10 Sept. 2018, 2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., S. 2042-2046 5 S. 8461898. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; Band 2018-April).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    2 Zitate (Scopus)
  • Margins leading to over-capacity

    Jones, D. A., Eckert, C. M. & Gericke, K., 2018, 15th International Design Conference, DESIGN 2018. Marjanovic, D., Pavkovic, N., Storga, M., Skec, S. & Bojcetic, N. (Hrsg.). Faculty of Mechanical Engineering and Naval Architecture, S. 781-792 12 S. (Proceedings of International Design Conference, DESIGN; Band 2).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    12 Zitate (Scopus)
  • Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics

    Webster, G. D., Harris, R. L., Hanif, Z. D., Hembree, B. A., Grossklags, J. & Eckert, C., Juli 2018, Proceedings - IEEE 2018 International Congress on Cybermatics: 2018 IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018. Institute of Electrical and Electronics Engineers Inc., S. 1402-1409 8 S. 8726690. (Proceedings - IEEE 2018 International Congress on Cybermatics: 2018 IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    5 Zitate (Scopus)
  • τCFI: Type-assisted control flow integrity for x86-64 binaries

    Muntean, P., Fischer, M., Tan, G., Lin, Z., Grossklags, J. & Eckert, C., 2018, Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Proceedings. Bailey, M., Ioannidis, S., Stamatogiannakis, M. & Holz, T. (Hrsg.). Springer Verlag, S. 423-444 22 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 11050 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    24 Zitate (Scopus)
  • 2017

    Combating control flow linearization

    Kirsch, J., Jonischkeit, C., Kittel, T., Zarras, A. & Eckert, C., 2017, ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Proceedings. De Capitani di Vimercati, S. & Martinelli, F. (Hrsg.). Springer New York LLC, S. 385-398 14 S. (IFIP Advances in Information and Communication Technology; Band 502).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    4 Zitate (Scopus)
  • Dynamic loader oriented programming on Linux

    Kirsch, J., Bierbaumer, B., Kittel, T. & Eckert, C., 16 Nov. 2017, ROOTS 2017 - Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium 2017, Co-Located with DEEPSEC. Association for Computing Machinery, a5. (ACM International Conference Proceeding Series).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    1 Zitat (Scopus)
  • Empowering convolutional networks for malware classification and analysis

    Kolosnjaji, B., Eraisha, G., Webster, G., Zarras, A. & Eckert, C., 30 Juni 2017, 2017 International Joint Conference on Neural Networks, IJCNN 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., S. 3838-3845 8 S. 7966340. (Proceedings of the International Joint Conference on Neural Networks; Band 2017-May).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    76 Zitate (Scopus)
  • Finding the needle: A study of the PE32 rich header and respective malware triage

    Webster, G. D., Kolosnjaji, B., Von Pentz, C., Kirsch, J., Hanif, Z. D., Zarras, A. & Eckert, C., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Polychronakis, M. & Meier, M. (Hrsg.). Springer Verlag, S. 119-138 20 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 10327 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    14 Zitate (Scopus)
  • GSFS-A new group-aware cryptographic file system

    Eckert, C., Erhard, F. & Geiger, J., 2017, Information Security for global information infrastructures IFIP TC11- 16th Annual Working Conference on Information Security, 2000. Eloff, J. H. P. & Qing, S. (Hrsg.). Springer New York LLC, S. 221-230 10 S. (IFIP Advances in Information and Communication Technology; Band 47).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
  • 2016

    Adaptive semantics-aware malware classification

    Kolosnjaji, B., Zarras, A., Lengyel, T., Webster, G. & Eckert, C., 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings. Zurutuza, U., Rodríguez, R. J. & Caballero, J. (Hrsg.). Springer Verlag, S. 419-439 21 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9721).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    19 Zitate (Scopus)
  • CoKey: Fast token-based cooperative cryptography

    Horsch, J., Wessel, S. & Eckert, C., 5 Dez. 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, S. 314-323 10 S. (ACM International Conference Proceeding Series; Band 5-9-December-2016).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    1 Zitat (Scopus)
  • Deepfuzz: Triggering vulnerabilities deeply hidden in binaries

    Böttinger, K. & Eckert, C., 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings. Zurutuza, U., Rodríguez, R. J. & Caballero, J. (Hrsg.). Springer Verlag, S. 25-34 10 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9721).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    20 Zitate (Scopus)
  • Deep learning for classification of malware system call sequences

    Kolosnjaji, B., Zarras, A., Webster, G. & Eckert, C., 2016, AI 2016: Advances in Artificial Intelligence - 29th Australasian Joint Conference, Proceedings. Kang, B. H. & Bai, Q. (Hrsg.). Springer Verlag, S. 137-149 13 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9992 LNAI).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    415 Zitate (Scopus)
  • Interactive function identification decreasing the effort of reverse engineering

    Kilic, F., Laner, H. & Eckert, C., 2016, Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers. Lin, D., Wang, X. F. & Yung, M. (Hrsg.). Springer Verlag, S. 468-487 20 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9589).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

  • Novel weaknesses in IEC 62351 protected Smart Grid control systems

    Strobel, M., Wiedermann, N. & Eckert, C., 8 Dez. 2016, 2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016. Institute of Electrical and Electronics Engineers Inc., S. 266-270 5 S. 7778772. (2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    39 Zitate (Scopus)
  • Policy-based implicit attestation for microkernel-based virtualized systems

    Wagner, S. & Eckert, C., 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (Hrsg.). Springer Verlag, S. 305-322 18 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9866 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

  • SKALD: A scalable architecture for feature extraction, multi-user analysis, and real-time information sharing

    Webster, G. D., Hanif, Z. D., Ludwig, A. L. P., Lengyel, T. K., Zarras, A. & Eckert, C., 2016, Information Security - 19th International Conference, ISC 2016, Proceedings. Bishop, M. & Nascimento, A. C. A. (Hrsg.). Springer Verlag, S. 231-249 19 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9866 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    11 Zitate (Scopus)
  • 2015

    Attack surface and vulnerability assessment of automotive Electronic Control Units

    Salfer, M., Schweppe, H. & Eckert, C., 2015, SECRYPT 2015 - 12th International Conference on Security and Cryptography, Proceedings; Part of 12th International Joint Conference on e-Business and Telecommunications, ICETE 2015. Obaidat, M. S., Lorenz, P. & Samarati, P. (Hrsg.). SciTePress, S. 317-326 10 S. (SECRYPT 2015 - 12th International Conference on Security and Cryptography, Proceedings; Part of 12th International Joint Conference on e-Business and Telecommunications, ICETE 2015).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    23 Zitate (Scopus)
  • Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code

    Muntean, P., Rabbi, A., Ibing, A. & Eckert, C., 6 Nov. 2015, Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015. Institute of Electrical and Electronics Engineers Inc., S. 128-137 10 S. 7322134. (Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    2 Zitate (Scopus)
  • Automated generation of buffer overflow quick fixes using symbolic execution and SMT

    Muntean, P., Kommanapalli, V., Ibing, A. & Eckert, C., 2015, Computer Safety, Reliability, and Security - 34th International Conference, SAFECOMP 2015, Proceedings. Koornneef, F. & van Gulijk, C. (Hrsg.). Springer Verlag, S. 441-456 16 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9337).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    10 Zitate (Scopus)
  • Blind format string attacks

    Kilic, F., Kittel, T. & Eckert, C., 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (Hrsg.). Springer Verlag, S. 301-314 14 S. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; Band 153).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    5 Zitate (Scopus)
  • Counteracting data-only malware with code pointer examination

    Kittel, T., Vogl, S., Kirsch, J. & Eckert, C., 2015, Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Proceedings. Bos, H., Blanc, G. & Monrose, F. (Hrsg.). Springer Verlag, S. 177-197 21 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9404).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    5 Zitate (Scopus)
  • Detecting fingerprinted data in TLS traffic

    Böttinger, K., Schuster, D. & Eckert, C., 14 Apr. 2015, ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, S. 633-638 6 S. (ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    4 Zitate (Scopus)
  • iDeFEND: Intrusion detection framework for encrypted network data

    Kilic, F. & Eckert, C., 2015, Cryptology and Network Security - 14th International Conference, CANS 2015, Proceedings. Reiter, M. & Naccache, D. (Hrsg.). Springer Verlag, S. 111-118 8 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9476).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    5 Zitate (Scopus)
  • Is feature selection secure against training data poisoning?

    Xiao, H., Biggio, B., Brown, G., Fumera, G., Eckert, C. & Roli, F., 2015, 32nd International Conference on Machine Learning, ICML 2015. Blei, D. & Bach, F. (Hrsg.). International Machine Learning Society (IMLS), S. 1689-1698 10 S. (32nd International Conference on Machine Learning, ICML 2015; Band 2).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    297 Zitate (Scopus)
  • Learning better while sending less: Communication-efficient online semi-supervised learning in client-server settings

    Xiao, H., Lin, S. D., Yeh, M. Y., Gibbons, P. B. & Eckert, C., 2 Dez. 2015, Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, DSAA 2015. Pasi, G., Kwok, J., Zaiane, O., Gallinari, P., Gaussier, E. & Cao, L. (Hrsg.). Institute of Electrical and Electronics Engineers Inc., 7344833. (Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, DSAA 2015).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

  • Lightweight attestation and secure code update for multiple separated microkernel tasks

    Wagner, S., Krauß, C. & Eckert, C., 2015, Information Security - 16th International Conference, ISC 2013, Proceedings. Desmedt, Y. (Hrsg.). Springer Verlag, S. 20-36 17 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 7807).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

  • SMT-constrained symbolic execution engine for integer overflow detection in C code

    Muntean, P., Rahman, M., Ibing, A. & Eckert, C., 20 Nov. 2015, 2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference. Eloff, M. M., Flowerday, S., Venter, H. S., Loock, M. & Coetzee, M. (Hrsg.). Institute of Electrical and Electronics Engineers Inc., 7335070. (2015 Information Security for South Africa - Proceedings of the ISSA 2015 Conference).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    1 Zitat (Scopus)
  • User identity verification based on touchscreen interaction analysis in web contexts

    Velten, M., Schneider, P., Wessel, S. & Eckert, C., 2015, Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Proceedings. Lopez, J. & Wu, Y. (Hrsg.). Springer Verlag, S. 268-282 15 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 9065).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    9 Zitate (Scopus)
  • 2014

    Context-Sensitive detection of information exposure bugs with symbolic execution

    Muntean, P., Eckert, C. & Ibing, A., 16 Nov. 2014, International Workshop on Innovative Software Development Methodologies and Practices, InnoSWDev 2014 - Proceedings. Association for Computing Machinery, S. 84-93 10 S. (International Workshop on Innovative Software Development Methodologies and Practices, InnoSWDev 2014 - Proceedings).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    4 Zitate (Scopus)
  • Design margins as a key to understanding design iteration

    Eckert, C. M., Isaksson, O. & Earl, C. F., 2014, 2nd Biennial International Conference on Dynamics for Design; 26th International Conference on Design Theory and Methodology. American Society of Mechanical Engineers (ASME), (Proceedings of the ASME Design Engineering Technical Conference; Band 7).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    9 Zitate (Scopus)
  • Dynamic hooks: Hiding control flow changes within non-control data

    Vogl, S., Gawlik, R., Garmany, B., Kittel, T., Pfoh, J., Eckert, C. & Holz, T., 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, S. 813-828 16 S. (Proceedings of the 23rd USENIX Security Symposium).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    22 Zitate (Scopus)
  • Multi-tiered security architecture for ARM via the virtualization and security extensions

    Lengyel, T. K., Kittel, T., Pfoh, J. & Eckert, C., 3 Dez. 2014, Proceedings - 25th International Workshop on Database and Expert Systems Applications, DEXA 2014. Morvan, F., Wagner, R. R. & Tjoa, A. M. (Hrsg.). Institute of Electrical and Electronics Engineers Inc., S. 308-312 5 S. 6974867. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    6 Zitate (Scopus)
  • 2013

    Active file integrity monitoring using paravirtualized filesystems

    Velten, M., Wessel, S., Stumpf, F. & Eckert, C., 2013, Trusted Systems - 5th International Conference, INTRUST 2013, Proceedings. S. 53-69 17 S. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8292 LNCS).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

  • Automotive proxy-based security architecture for CE device integration

    Bouard, A., Schanda, J., Herrscher, D. & Eckert, C., 2013, Mobile Wireless Middleware, Operating Systems, and Applications - 5th International Conference, Mobilware 2012, Revised Selected Papers. S. 62-76 15 S. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Band 65 LNICST).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    9 Zitate (Scopus)
  • Components margins through the product lifecycle

    Eckert, C., Earl, C., Lebjioui, S. & Isaksson, O., 2013, Product Lifecycle Management for Society - 10th IFIPWG 5.1 International Conference, PLM 2013, Proceedings. Bernard, A., Rivest, L. & Dutta, D. (Hrsg.). Springer New York LLC, S. 39-47 9 S. (IFIP Advances in Information and Communication Technology; Band 409).

    Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

    Open Access
    17 Zitate (Scopus)