TUM Logo

Publications

Available in Bookstores

IT-Sicherheit: Konzepte - Verfahren - Protokolle
Claudia Eckert:
IT-Sicherheit: Konzepte - Verfahren - Protokolle
9th edition,
De Gruyter, 2014
ca. 1000 pages, flexcover
ISBN 978-3-486-77848-9
69,95 EUR


This list is not complete !

Publication List

2018

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
Bojan Kolosnjaji
EUSIPCO (accepted)

Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks
Martin Salfer and Claudia Eckert

Learning on a Budget for User Authentication on Mobile Devices
Bojan Kolosnjaji, Antonia Hüfner, Claudia Eckert, and Apostolis Zarras
ICASSP (accepted)

Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
Sergej Proskurin, Tamas Lengyel, Marius Momeu, Claudia Eckert, and Apostolis Zarras
Annual Computer Security Applications Conference (ACSAC)

Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
Sergej Proskurin, Julian Kirsch, and Apostolis Zarras
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

Smashing the Stack Protector for Fun and Profit
Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon, and Apostolis Zarras
IFIP Information Security Conference & Privacy Conference (IFIP SEC)

2017

Spoilers: Effective Malware Triage Using Hidden Fields
Zachary Hanif and Bojan Kolosnjaji
Microsoft DCC

Security Testing over Encrypted Channels on the ARM Platform
Fatih Kilic, Benedikt Geßele, and Hasan Ibne Akram
Proceedings of the 12th International Conference on Internet Monitoring and Protection (ICIMP 2017)

Dynamic Loader Oriented Programming on Linux
Julian Kirsch, Bruno Bierbaumer, Thomas Kittel, and Claudia Eckert

Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks
Apostolis Zarras and Federico Maggi

Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
George Webster, Bojan Kolosnjaji, Christian von Pentz, Zachary Hanif, Julian Kirsch, Apostolis Zarras, and Claudia Eckert

Architecture for Resource-Aware VMI-based Cloud Malware Analysis
B. Taubmann and Bojan Kolosnjaji
4th Workshop on Security in highly connected IT systems

Empowering Convolutional Networks for Malware Classification and Analysis
Bojan Kolosnjaji, Ghadir Eraisha, George Webster, Apostolis Zarras, and Claudia Eckert

Combating Control Flow Linearization
Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, and Claudia Eckert

Towards Automated Classification of Firmware Images and Identification of Embedded Devices
Andrei Costin, Apostolis Zarras, and Aurélien Francillon

Size Matters: Open-Source Framework for Large Scale Analysis
George Webster and Christian von Pentz
Microsoft DCC

From Mole Hills to Mountains: Revealing Rich Header and Malware Triage
George Webster and Zachary Hanif
RSA USA

2016

Deep Learning for Classification of Malware System Call Sequences
Bojan Kolosnjaji, Apostolis Zarras, George Webster, and Claudia Eckert

POSTER: vTableShield: Precise Protecting of Virtual Function Dispatches in C++ Programs
Paul Muntean, Peng Xu, and Claudia Eckert
Google Ph.D. Student Summit on Compiler & Programming Technology, Munich, Germany}

A Study of the Rich Header and Respective Malware Triage
George Webster and Julian Kirsch
Hacktivity

Leveraging Internet Services to Evade Censorship
Apostolis Zarras

Efficient Data-Race Detection with Dynamic Symbolic Execution
Andreas Ibing

Autocorrelation-Based Detection of Infinite Loops at Runtime
Andreas Ibing, Julian Kirsch, and Lorenz Panny

Adaptive Semantics-Aware Malware Classification
Bojan Kolosnjaji, Apostolis Zarras, Tamas Lengyel, George Webster, and Claudia Eckert

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Andrei Costin, Apostolis Zarras, and Aurélien Francillon

Interactive Function Identification Decreasing the Effort of Reverse Engineering
Fatih Kilic, Hannes Laner, and Claudia Eckert
Proceedings of the 11th International Conference on Information Security and Cryptology (Inscrypt 2015)

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
Apostolis Zarras, Katharina Kohls, Markus Duermuth, and Christina Poepper

Dynamic Symbolic Execution with Interpolation Based Path Merging
Andreas Ibing

2015

iDeFEND: Intrusion Detection Framework for Encrypted Network Data
Fatih Kilic and Claudia Eckert
Proceedings of the 14th International Conference on Cryptology and Network Security (CANS 2015)

seTPM: Towards Flexible Trusted Computing on Mobile Devices based on GlobalPlatform Secure Elements
Sergej Proskurin, Michael Weiss, and Georg Sigl

Counteracting Data-Only Malware with Code Pointer Examination
Thomas Kittel, Julian Kirsch, and Claudia Eckert

Dynamic Symbolic Execution using Eclipse CDT
Andreas Ibing

CloudIDEA: A Malware Defense Architecture for Cloud Data Centers
Andreas Fischer, Thomas Kittel, Bojan Kolosnjaji, Tamas Lengyel, Waseem Mandarawi, Hans P Reiser, B. Taubmann, Eva Weishäupl, Hermann de Meer, Tilo Müller, and Mykola Protsenko

POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Paul Muntean and Claudia Eckert

Automated Generation of Buffer Overflows Quick Fixes using Symbolic Execution and SMT
Paul Muntean, Vasantha Kommanapalli, Andreas Ibing, and Claudia Eckert

Virtual Machine Introspection with Xen on ARM
Tamas Lengyel, Thomas Kittel, and Claudia Eckert

Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units
Martin Salfer and Claudia Eckert

Internet-Scale File Analysis
Zachary Hanif, Tamas Lengyel, and George Webster
Black Hat - USA

POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Paul Muntean and Claudia Eckert
Security Network Munich and BICCnet Workshop, Munich, Germany

Retrospective Protection utilizing Binary Rewriting
Sergej Proskurin, Fatih Kilic, and Claudia Eckert

Blind Format String Attacks
Fatih Kilic, Thomas Kittel, and Claudia Eckert
Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)

2014

Efficient Attack Forest Construction for Automotive On-board Networks
Martin Salfer, Hendrik Schweppe, and Claudia Eckert
Lecture Notes in Computer Science

Virtual Machine Introspection with Xen on ARM
Tamas Lengyel
-

Code Validation for Modern OS Kernels
Thomas Kittel, Sebastian Vogl, Tamas Lengyel, Jonas Pfoh, and Claudia Eckert

Pitfalls of virtual machine introspection on modern hardware
Tamas Lengyel, Thomas Kittel, George Webster, and Jacob Torrey

Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System
Tamas Lengyel, Steve Maresca, Bryan Payne, George Webster, Sebastian Vogl, and Aggelos Kiayias

Context-sensitive Detection of Information Exposure Bugs with Symbolic Execution
Paul Muntean, Claudia Eckert, and Andreas Ibing
International Workshop on Innovative Software Development Methodologies and Practices (InnoSWDev), Hong Kong, China

The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
Apostolis Zarras

Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions
Tamas Lengyel, Thomas Kittel, and Claudia Eckert

IT-Sicherheit im Auto - Graphen-basierte Angriffssicherheitsevaluation von automobilen Bordnetzen.
Martin Salfer

Persistent Data-only Malware: Function Hooks without Code
Sebastian Vogl, Jonas Pfoh, Thomas Kittel, and Claudia Eckert

2013

Indicative Support Vector Clustering with its Application on Anomaly Detection
Huang Xiao and Claudia Eckert

Sicherheitsarchitektur - Quantitative Bewertung von Sicherheitsarchitekturen virtualisierter Mehrkern-Steuergeräte.
Martin Salfer

Leveraging String Kernels for Malware Detection
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Proceedings of the 7th International Conference on Network and System Security

X-TIER: Kernel Module Injection
Sebastian Vogl, Fatih Kilic, Christian Schneider, and Claudia Eckert
Proceedings of the 7th International Conference on Network and System Security

Full Virtual Machine State Reconstruction for Security Applications
Christian Schneider

2012

E/E-Sicherheitsarchitektur - IT-Sicherheit virtualisierter Mehrkern-Systeme im Fahrzeug.
Martin Salfer

Smart Camp: Building Scalable and Highly Available IT-Infrastructures
Sergej Proskurin, David McMeekin, and Achim Karduck

Virtualisierung: Vision einer intelligenten Vernetzung.
Hans-Ulrich Michel, Dirk Kaule, and Martin Salfer
Elektronik automotive

Bridging the Semantic Gap Through Static Code Analysis
Christian Schneider, Jonas Pfoh, and Claudia Eckert

2011

Nitro: Hardware-based System Call Tracing for Virtual Machines
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Advances in Information and Computer Security

A cooperative in-car game for heterogeneous players
Nora Broy, Sebastian Goebl, Matheus Hauder, Thomas Kothmayr, Michael Kugler, Florian Reinhart, Martin Salfer, Kevin Schlieper, and Elisabeth André

A Universal Semantic Bridge for Virtual Machine Introspection
Christian Schneider, Jonas Pfoh, and Claudia Eckert
Information Systems Security

Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery
Martin Salfer, Sven Wohlgemuth, Sebastian Schrittwieser, Bernhard Bauer, and Isao Echizen

A Supervised Topic Transition Model for Detecting Malicious System Call Sequences
Thomas Stibor and Han Xiao
KDD Workshop on Knowledge Discovery, Modeling, and Simulation

2010

A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods
Thomas Stibor

Exploiting the x86 Architecture to Derive Virtual Machine State Information
Jonas Pfoh, Christian Schneider, and Claudia Eckert

2009

A Formal Model for Virtual Machine Introspection
Jonas Pfoh, Christian Schneider, and Claudia Eckert

ITK-Kompendium 2010
Claudia Eckert

Enhancing Control of Service Compositions in Service-Oriented Architectures
Christian Schneider, Frederic Stumpf, and Claudia Eckert

2008

Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
Frederic Stumpf and Claudia Eckert

Supports for Identity Management in Ambient Environments - The Hydra Approach
Hasan Ibne Akram and Mario Hoffmann

Requirements Analysis for Identity Management in. Ambient Environments: The HYDRA Approach
Hasan Ibne Akram and Mario Hoffmann

2007

Phase Transition and the Computational Complexity of Generating r-contiguous Detectors
Thomas Stibor

Comments on Real-Valued Negative Selection vs. Real-Valued Positive Selection and One-Class SVM
Thomas Stibor and J. Timmis

Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Christoph Krauß, Thomas Stibor, and Claudia Eckert

Ambient Intelligence: Neue Herausforderungen f\"ur die IT-Sicherheit
Claudia Eckert
TU-Darmstadt, thema Forschung

2006

Artificial Immune Systems for IT-Security
Thomas Stibor, J. Timmis, and Claudia Eckert
it-Information Technology (Systems Biology and Information Technology)

On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions
Thomas Stibor, J. Timmis, and Claudia Eckert

On Permutation Masks in Hamming Negative Selection
Thomas Stibor, J. Timmis, and Claudia Eckert

The Link between r-contiguous Detectors and k-CNF Satisfiability
Thomas Stibor, J. Timmis, and Claudia Eckert

Generalization Regions in Hamming Negative Selection
Thomas Stibor, J. Timmis, and Claudia Eckert

On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection
Thomas Stibor

2005

Mobile Technologien -- Chancen und neue IT-Sicherheitsrisiken
Claudia Eckert

Ubiquitäre Sicherheit für dynamische, mobile Systeme – eine Herausforderung für die IT-Sicherheit
Claudia Eckert

2004

Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net
Claudia Eckert

IT-Sicherheit: Probleme, Lösungen und einige neue Herausforderungen
Claudia Eckert

2003

Sicheres mobiles Arbeiten - Zwischen Wunsch und Wirklichkeit
Claudia Eckert
Zeitschrift FifF-Kommunikation

Mobil, aber sicher!
Claudia Eckert

Sicherheit -- Bremse oder Schrittmacher?
Claudia Eckert
Comtec zeitschrift für Telekommunikationstechnik

2002

Pseudonymes Einkaufen physischer Güter für Internet-Shops ohne Zwischenhändler
M. Enzmann and Claudia Eckert

IT-Sicherheit - Schrittmacher oder Bremser der Innovationen
Claudia Eckert and H. Thielman

IT-Sicherheit: Innovationen für die Informations- und Wissensgesellschaft
Claudia Eckert and H. Thielman
M, Fachzeitschrift für Information Management & Consulting

Ein Vergleich moderner Linux-Sicherheitsmechanismen
Claudia Eckert, H. Görl, and A. Buchmann

2001

Anonym im Internet? Probleme und Lösungen
Claudia Eckert and A. Pircher

Internet Anonymity: Problems and Solutions
Claudia Eckert and A. Pircher

Zur Sicherheit mobiler persönlicher Endgeräte - eine Bestandsaufnahme
Claudia Eckert

2000

Mobile Devices In eBusiness - New Opportunities And New Risks
Claudia Eckert

Trust and Confidence in Open Systems: Does Security Harmonize with Mobility?
U. Baumgarten, Claudia Eckert, and H. Görl

GSFS - a New Group-Aware Cryptographic File System
Claudia Eckert, F. Erhard, and J. Geiger

Flexible, Distributed and Adaptive Ressource Managament in MoDIS
Claudia Eckert, M. Pizka, and C. Rehn

GSFS - ein gruppenfähiges, verschlüsselndes Dateisystem
F. Erhard, J. Geiger, and Claudia Eckert

1999

Improving Resource Management in Distributed Systems using Language-level Structuring Concepts
Claudia Eckert and M. Pizka

1998

Mobil und anonym im Netz mit dem Mixed Mobile Internet Protocol
Claudia Eckert and U. Baumgarten
Zeitschrift der Datenschutz-Berater

Sichere, verteilte Systeme – Konzepte, Modelle und Systemarchitekturen
Claudia Eckert