TUM Logo

Claudia Eckert

Prof. Dr. Claudia Eckert

Chair

Address:

Technische Universität München
Chair for IT Security (I20)
Boltzmannstraße 3
85748 Garching (near Munich)
Germany


Phone: +49 (0)89 289-18577
Fax: +49 (0)89 289-18579
E-Mail:
Room: 01.08.054

Office Hours

 Please contact our secretary to arrange individual appointments.

 

Anerkennung von Lehrveranstaltungen

Anerkennungen von Auslandssemestern, Gutachten und Empfehlungsschreiben durch Frau Prof. Eckert können nur nach einem persönlichen Gespräch erfolgen. Wir bitten Sie daher, über das Sekretariat einen Termin zu vereinbaren.

 

Contact to the Fraunhofer Institute AISEC

Address: Fraunhofer Institute for Applied and Integrated Security (AISEC)
Parkring 4
85748 Garching (near Munich)
Phone: +49 (0)89 3229986-292
Fax: +49 (0)89 3229986-299
E-Mail: claudia.eckert@aisec.fraunhofer.de

Further Activities

 aisec-logo-klein

Director of the Fraunhofer Institute for Applied and Integrated Security (AISEC)

Bundesdruckerei Board member of the German Bundesdruckerei GmbH
BITKOM-Logo Member of the BITKOM Working Group Board for the Advancement of Research
DGRI-Logo Member of the DGRI Advisory Committee (Deutsche Gesellschaft für Recht und Informatik)
OFFIS-Logo Member of the OFFIS Scientific Advisory Board
GDD-Logo Member of the Scientific Advisory Board of the German Association for Data Protection and Data Security (GDD)
Deutschland sicher im Netz Logo Member of the DsiN Scientific Advisory Board (Deutschland sicher im Netz)
ResizedImage14350-stg_logo.png Member of the Kuratoriums der Alcatel-Lucent Stiftung
Schutzkommission des Bundesinnenministeriums Member of the Schutzkommission des Bundesinnenministeriums
acatech_logo.png Member of the Akademie der Technik-Wissenschaften (acatech)
hiig-logo.jpg Member of the wissenschaftlichen Beirats des Alexander von Humboldt-Instituts für Internet und Gesellschaft GmbH
divsi-logo.png Chairwoman of the wissenschaftlichen Beirats des Deutsches Institut für Vertrauen und Sicherheit im Internet (DIVSI)
logo-tzi.png Member of the wissenschaftlichen Beirats des TZI (Technologie-Zentrum Informatik) der Universität Bremen
vk06_logo.gif Chairwoman of the Kuratoriums des Kompetenzzentrums Technik-Diversity-Chancengleichheit
IT-Gipfel-klein.png Member of the Arbeitsgruppe Vertrauen, Datenschutz und Sicherheit im Internet (IT-Gipfel)
BFS_Logo_RZ2011_rgb-small.jpg Member of the Wissenschaftlichen Beirat der Bayerischen Forschungsstiftung (starting at 1.1.2013)

 

Publications

2018 Learning on a Budget for User Authentication on Mobile Devices
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks
2017 Dynamic Loader Oriented Programming on Linux
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
Empowering Convolutional Networks for Malware Classification and Analysis
Combating Control Flow Linearization
2016 Deep Learning for Classification of Malware System Call Sequences
POSTER: vTableShield: Precise Protecting of Virtual Function Dispatches in C++ Programs
Adaptive Semantics-Aware Malware Classification
Interactive Function Identification Decreasing the Effort of Reverse Engineering
2015 Neural Network-Based User-Independent Physical Activity Recognition for Mobile Devices
iDeFEND: Intrusion Detection Framework for Encrypted Network Data
iDeFEND: Intrusion Detection Framework for Encrypted Network Data
Counteracting Data-Only Malware with Code Pointer Examination
POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Automated Generation of Buffer Overflows Quick Fixes using Symbolic Execution and SMT
Virtual Machine Introspection with Xen on ARM
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code
Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units
Is Feature Selection Secure against Training Data Poisoning?
POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Retrospective Protection utilizing Binary Rewriting
User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts
Detecting Fingerprinted Data in TLS Traffic
Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!
Blind Format String Attacks
2014 SobiTra – A Software-based Trust-Anchor for ARM Cortex Application Processors
IT-Sicherheit und Cloud Computing
Efficient Attack Forest Construction for Automotive On-board Networks
Code Validation for Modern OS Kernels
Context-sensitive Detection of Information Exposure Bugs with Symbolic Execution
Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions
Support Vector Machines under Adversarial Label Contamination
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data
Persistent Data-only Malware: Function Hooks without Code
2013 Identities for Embedded Systems Enabled by Physical Unclonable Functions
Security Issues of Multi-Core Architectures—The Automotive Case
Middleware-based Security for Hyperconnected Applications in Future In-Car Networks
Practical Information-Flow Aware Middleware for In-Car Communication
Leveraging In-Car Security by Combining Information Flow Monitoring Techniques
Automotive Proxy-based Security Architecture for CE Device Integration
Improving Mobile Device Security with Operating System-level Virtualization
Online Lazy Gaussian Process Committee and its Application in Real-Time Trajectory Prediction
Efficient Online Sequence Prediction with Side Information
Active File Integrity Monitoring using Paravirtualized Filesystems.
Indicative Support Vector Clustering with its Application on Anomaly Detection
Verifiable Trust between Electronic Control Units based on a single Trust Anchor
Lightweight Attestation & Secure Code Update for Multiple Separated Microkernel Tasks
Lazy Gaussian Process Committee for Real-Time Online Regression
Leveraging String Kernels for Malware Detection
X-TIER: Kernel Module Injection
Learning from Multiple Observers with Unknown Expertise
OPARS: Objective Photo Aesthetics Ranking System
2012 Smart Mobile Apps -- Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesse
Actively Learning Probabilistic Subsequential Transducers
Automotive Proxy-based Security Architecture for CE Device Integration
Towards Secure Fieldbus Communication
Flash: Efficient, Stable and Optimal K-Anonymity
Adversarial Label Flips Attack on Support Vector Machines
Highly Efficient Optimal K-Anonymity For Biomedical Datasets
Evasion Attack of Multi-Class Linear Classifiers
Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture
Bridging the Semantic Gap Through Static Code Analysis
2011 Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen
Innovative Sicherheitstechnologien: sine-qua-non für safety-kritische Systeme?
Nitro: Hardware-based System Call Tracing for Virtual Machines
A Universal Semantic Bridge for Virtual Machine Introspection
T-CUP: A TPM-based Code Update Protocol Enabling Attestations for Sensor Networks
2010 Grammatical Inference Algorithms in MATLAB
PSMA: A Parallel Algorithm for Learning Regular Languages
Improving the Quality of Ring Oscillator PUFs on FPGAs
Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER
Datenschutz und Datensicherheit in intelligenten Energienetzen
Exploiting the x86 Architecture to Derive Virtual Machine State Information
Digitale Daten in Geräten und Systemen
2009 A Formal Model for Virtual Machine Introspection
ITK-Kompendium 2010
Enhancing Control of Service Compositions in Service-Oriented Architectures
2008 Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
2007 Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Ambient Intelligence: Neue Herausforderungen fuer die IT-Sicherheit
2006 Artificial Immune Systems for IT-Security
On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions
On Permutation Masks in Hamming Negative Selection
The Link between r-contiguous Detectors and k-CNF Satisfiability
Generalization Regions in Hamming Negative Selection
2005 Mobile Technologien -- Chancen und neue IT-Sicherheitsrisiken
Ubiquitäre Sicherheit für dynamische, mobile Systeme – eine Herausforderung für die IT-Sicherheit
2004 Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net
IT-Sicherheit: Probleme, Lösungen und einige neue Herausforderungen
2003 Sicheres mobiles Arbeiten - Zwischen Wunsch und Wirklichkeit
Mobil, aber sicher!
Schwerpunkt "IT-Sicherheit" Mobiles Arbeiten, sind Sie sicher?
Sicherheit und E-Learning
Schutz biometrischer Daten bei Authentisierung auf Smartcards
Sicherheit -- Bremse oder Schrittmacher?
2002 Pseudonymes Einkaufen physischer Güter für Internet-Shops ohne Zwischenhändler
IT-Sicherheit - Schrittmacher oder Bremser der Innovationen
IT-Sicherheit: Innovationen für die Informations- und Wissensgesellschaft
Ein Vergleich moderner Linux-Sicherheitsmechanismen
2001 Anonym im Internet? Probleme und Lösungen
Internet Anonymity: Problems and Solutions
Zur Sicherheit mobiler persönlicher Endgeräte - eine Bestandsaufnahme
2000 Mobile Devices In eBusiness - New Opportunities And New Risks
Trust and Confidence in Open Systems: Does Security Harmonize with Mobility?
GSFS - a New Group-Aware Cryptographic File System
Flexible, Distributed and Adaptive Ressource Managament in MoDIS
GSFS - ein gruppenfähiges, verschlüsselndes Dateisystem
1999 Improving Resource Management in Distributed Systems using Language-level Structuring Concepts
1998 Mobil und anonym im Netz mit dem Mixed Mobile Internet Protocol
Sichere, verteilte Systeme – Konzepte, Modelle und Systemarchitekturen