TUM Logo

Publications

Available in Bookstores

IT-Sicherheit: Konzepte - Verfahren - Protokolle
Claudia Eckert:
IT-Sicherheit: Konzepte - Verfahren - Protokolle
10th edition,
De Gruyter, 2018
ca. 1004 pages, flexcover
ISBN 978-3-11-056390-0
69,95 EUR

2018 2017 2016 2015 2014 2013 2012 2011


2018

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
Bojan Kolosnjaji
Proceedings of the European Signal Processing Conference (EUSIPCO 2018)

Freeze and crypt: Linux kernel support for main memory encryption
Manuel Huber, Julian Horsch, Junaid Ali, and Sascha Wessel
Computers & security

Hardware-accelerated Data Acquisition and Authentication for High-speed Video Streams on Future Heterogeneous Automotive Processing Platforms [pdf]
Martin Geier and Fabian Franzen
Proceedings of the International Conference on Computer-Aided Design

Learning on a Budget for User Authentication on Mobile Devices
Bojan Kolosnjaji, Antonia Hüfner, Claudia Eckert, and Apostolis Zarras
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018)

Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection
Sergej Proskurin, Tamas Lengyel, Marius Momeu, Claudia Eckert, and Apostolis Zarras
Annual Computer Security Applications Conference (ACSAC)

SEVered: Subverting AMD's virtual machine encryption [pdf]
Mathias Morbitzer, Manuel Huber, Julian Horsch, and Sascha Wessel
European Workshop on Systems Security (EuroSec)

Kernel-Assisted Debugging of Linux Applications
Tobias Holl, Philipp Klocke, Fabian Franzen, and Julian Kirsch
2nd Reversing and Offensive-oriented Trends Symposium 2018 (ROOTS)

CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries [pdf]
Paul Muntean, Gang Tan, Zhiqiang Lin, Jens Grossklags, and Claudia Eckert
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,2018, Proceedings

PwIN: Pwning Intel piN -- Why DBI is Unsuitable for Security
Julian Kirsch, Zhechko Zhechev, Bruno Bierbaumer, and Thomas Kittel
23rd European Symposium on Research in Computer Security (ESORICS)

Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection
Sergej Proskurin, Julian Kirsch, and Apostolis Zarras
IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

Practical Decentralized Attribute-Based Delegation Using Secure Name Systems [pdf]
Martin Schanzenbach, Christian Banse, and Julian Schütte
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

CastSan: Efficient Detection of Polymorphic {C++} Object Type Confusions with {LLVM} [pdf]
Paul Muntean, Sebastian Wuerl, Jens Grossklags, and Claudia Eckert
Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}

Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks [pdf]
Martin Salfer and Claudia Eckert
Proceedings of the 13th International Conference on Availability, Reliability and Security ARES 2018

reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption [pdf]
Martin Schanzenbach, Georg Bramm, and Julian Schütte
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

Smashing the Stack Protector for Fun and Profit
Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon, and Apostolis Zarras
IFIP Information Security Conference & Privacy Conference (IFIP SEC)

Deep Reinforcement Fuzzing [pdf]
Konstantin Böttinger, Patrice Godefroid, and Rishabh Singh
IEEE Symposium on Security and Privacy Workshops, SPW 2018

Security Verification of Third Party Design Files in Manufacturing [pdf]
Alexander Giehl and Norbert Wiedermann
International Conference on Computer and Automation Engineering (ICCAE)

Graph-based Anomaly Detection for IoT Microservices [pdf]
François-Xavier Aubet, Marc-Oliver Pahl, Stefan Liebald, and Mohammad Reza Norouzian
Passive and Active Measurement (PAM)

2017

Cyber-Sicherheit in Industrie 4.0 [pdf]
Claudia Eckert
Handbuch Industrie 4.0 Geschäftsmodelle, Prozesse, Technik

Evaluating the performance of continuous test-based cloud service certification [pdf]
Phlilipp Stephanow and Christian Banse
17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID

Spoilers: Effective Malware Triage Using Hidden Fields
Zachary Hanif and Bojan Kolosnjaji
Microsoft DCC

Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung
Claudia Eckert
Informatik-Spektrum 40

Security Testing over Encrypted Channels on the ARM Platform
Fatih Kilic, Benedikt Geßele, and Hasan Ibne Akram
Proceedings of the 12th International Conference on Internet Monitoring and Protection (ICIMP 2017)

Enhancing Control Flow Graph Based Binary Function Identification
Clemens Jonischkeit and Julian Kirsch
1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS)

Dynamic Loader Oriented Programming on Linux
Julian Kirsch, Bruno Bierbaumer, Thomas Kittel, and Claudia Eckert
1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS)

A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation [pdf]
Ava Ahadipour and Martin Schanzenbach
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications,

TransCrypt: Transparent main memory encryption using a minimal ARM hypervisor [pdf]
Julian Horsch, Manuel Huber, and Sascha Wessel
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications

Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks
Apostolis Zarras and Federico Maggi
15th Annual Conference on Privacy, Security and Trust (PST)

Freeze & crypt: Linux kernel support for main memory encryption [pdf]
Manuel Huber, Julian Horsch, and Sascha Wessel
CETE 2017, 14th International Joint Conference on e-Business and Telecommunications.

Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage [pdf]
George Webster, Bojan Kolosnjaji, Christian von Pentz, Zachary Hanif, Julian Kirsch, Apostolis Zarras, and Claudia Eckert
14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)

Architecture for Resource-Aware VMI-based Cloud Malware Analysis
B. Taubmann and Bojan Kolosnjaji
4th Workshop on Security in highly connected IT systems

A taxonomy-based approach for security in software-defined networking [pdf]
Christian Banse and Julian Schütte
EEE International Conference on Communications, ICC 2017

Guiding a colony of black-box fuzzers with chemotaxis [pdf]
Konstantin Böttinger
SPW 2017, IEEE Symposium on Security and Privacy Workshops.

Empowering Convolutional Networks for Malware Classification and Analysis
Bojan Kolosnjaji, Ghadir Eraisha, George Webster, Apostolis Zarras, and Claudia Eckert
30th International Joint Conference on Neural Networks (IJCNN)

Combating Control Flow Linearization
Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, and Claudia Eckert
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

Towards Automated Classification of Firmware Images and Identification of Embedded Devices
Andrei Costin, Apostolis Zarras, and Aurélien Francillon
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

Protecting Suspended Devices from Memory Attacks [pdf]
Manuel Huber, Julian Horsch, and Sascha Wessel
EuroSec'17 Proceedings of the 10th European Workshop on Systems Security

A process model to support continuous certification of cloud services [pdf]
Immanuel Kunz and Phlilipp Stephanow
AINA 2017, 31st IEEE International Conference on Advanced Information Networking and Applications

Towards continuous security certification of Software-as-a-Service applications using web application testing techniques [pdf]
Phlilipp Stephanow and Koosha Khajehmoogahi
AINA 2017, 31st IEEE International Conference on Advanced Information Networking and Applications

Size Matters: Open-Source Framework for Large Scale Analysis
George Webster and Christian von Pentz
Microsoft DCC

From Mole Hills to Mountains: Revealing Rich Header and Malware Triage
George Webster and Zachary Hanif
RSA USA

2016

Fuzzing binaries with Lévy flight swarms [pdf]
Konstantin Böttinger
EURASIP journal on information security (2016)

CoKey: Fast token-based cooperative cryptography [pdf]
Julian Horsch, Sascha Wessel, and Claudia Eckert
Association for Computing Machinery -ACM-

Deep Learning for Classification of Malware System Call Sequences
Bojan Kolosnjaji, Apostolis Zarras, George Webster, and Claudia Eckert
29th Australasian Joint Conference on Artificial Intelligence (AI)

POSTER: vTableShield: Precise Protecting of Virtual Function Dispatches in C++ Programs
Paul Muntean, Peng Xu, and Claudia Eckert
Google Ph.D. Student Summit on Compiler & Programming Technology, Munich, Germany

Managing and presenting user attributes over a decentralized secure name system [pdf]
Martin Schanzenbach and Christian Banse
Data privacy management and security assurance. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016

A Study of the Rich Header and Respective Malware Triage
George Webster and Julian Kirsch
Hacktivity

Policy-based implicit attestation for microkernel-based virtualized systems [pdf]
Steffen Wagner and Claudia Eckert
Information security. 19th international conference, ISC 2016

Leveraging Internet Services to Evade Censorship
Apostolis Zarras
19th International Conference on Information Security (ISC)

SKALD: A Scalable Architecture for Feature Extraction, Multi-User Analysis, and Real-Time Information Sharing [pdf]
George Webster, Zachary Hanif, Apostolis Zarras, and Claudia Eckert
19th International Conference on Information Security (ISC)

Efficient Data-Race Detection with Dynamic Symbolic Execution
Andreas Ibing
IEEE Software Engineering Workshop

Autocorrelation-Based Detection of Infinite Loops at Runtime
Andreas Ibing, Julian Kirsch, and Lorenz Panny
IEEE Int. Conf. Dependable, Autonomic and Secure Computing

DeepFuzz: Triggering vulnerabilities deeply hidden in binaries [pdf]
Konstantin Böttinger and Claudia Eckert
Detection of intrusions and malware, and vulnerability assessment. 13th International Conference

Adaptive Semantics-Aware Malware Classification
Bojan Kolosnjaji, Apostolis Zarras, Tamas Lengyel, George Webster, and Claudia Eckert
13th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)

Hunting bugs with Lévy flight foraging [pdf]
Konstantin Böttinger
IEEE Symposium on Security and Privacy Workshops, SPW 2016

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Andrei Costin, Apostolis Zarras, and Aurélien Francillon
11th ACM Asia Conference on Computer and Communications Security (ASIACCS)

Interactive Function Identification Decreasing the Effort of Reverse Engineering [pdf]
Fatih Kilic, Hannes Laner, and Claudia Eckert
Proceedings of the 11th International Conference on Information Security and Cryptology (Inscrypt 2015)

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
Apostolis Zarras, Katharina Kohls, Markus Duermuth, and Christina Poepper
6th ACM Conference on Data and Application Security and Privacy (CODASPY)

Dynamic Symbolic Execution with Interpolation Based Path Merging
Andreas Ibing
Int. Conf. Advances and Trends in Software Engineering

2015

Neural Network-Based User-Independent Physical Activity Recognition for Mobile Devices
Bojan Kolosnjaji and Claudia Eckert
Intelligent Data Engineering and Automated Learning--IDEAL 2015

iDeFEND: Intrusion Detection Framework for Encrypted Network Data [pdf]
Fatih Kilic and Claudia Eckert
Proceedings of the 14th International Conference on Cryptology and Network Security (CANS 2015)

iDeFEND: Intrusion Detection Framework for Encrypted Network Data [pdf]
Fatih Kilic and Claudia Eckert
Proceedings of the 14th International Conference on Cryptology and Network Security (CANS 2015)

seTPM: Towards Flexible Trusted Computing on Mobile Devices based on GlobalPlatform Secure Elements
Sergej Proskurin, Michael Weiss, and Georg Sigl
14th International Conference on Smart Card Research and Advanced Applications (CARDIS)

Counteracting Data-Only Malware with Code Pointer Examination
Thomas Kittel, Julian Kirsch, and Claudia Eckert
18th International Symposium on Research in Attacks, Intrusions and Defenses

Dynamic Symbolic Execution using Eclipse CDT
Andreas Ibing
Int. Conf. Software Eng. Advances

CloudIDEA: A Malware Defense Architecture for Cloud Data Centers
Andreas Fischer, Thomas Kittel, Bojan Kolosnjaji, Tamas Lengyel, Waseem Mandarawi, Hans P Reiser, B. Taubmann, Eva Weishäupl, Hermann de Meer, Tilo Müller, and Mykola Protsenko
5th International Symposium on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures - Cloud and Trusted Computing (C&TC 2015)

POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Paul Muntean and Claudia Eckert
TechDays Cyber Security Workshop, Munich, Germany

Automated Generation of Buffer Overflows Quick Fixes using Symbolic Execution and SMT
Paul Muntean, Vasantha Kommanapalli, Andreas Ibing, and Claudia Eckert
International Conference on Computer Safety, Reliability & Security (SAFECOMP), Delft, The Netherlands, September 2015. Springer LNCS

Virtual Machine Introspection with Xen on ARM
Tamas Lengyel, Thomas Kittel, and Claudia Eckert
2nd Workshop on Security in highly connected IT systems (SHCIS)

Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code
Paul Muntean, Adnan Rabbi, Andreas Ibing, and Claudia Eckert
International Conference on Software Quality, Reliability and Security Companion (QRS-C), Vancouver, Canada

Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units [pdf]
Martin Salfer and Claudia Eckert
SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography

Internet-Scale File Analysis
Zachary Hanif, Tamas Lengyel, and George Webster
Black Hat - USA

Revealing the Relationship Network Behind Link Spam
Apostolis Zarras, Antonis Papadogiannakis, Sotiris Ioannidis, and Thorsten Holz
13th Annual Conference on Privacy, Security and Trust (PST)

Is Feature Selection Secure against Training Data Poisoning?
Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, and Fabio Roli
Proceedings of The 32nd International Conference on Machine Learning (ICML'15)

POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Paul Muntean and Claudia Eckert
Security Network Munich and BICCnet Workshop, Munich, Germany

Retrospective Protection utilizing Binary Rewriting
Sergej Proskurin, Fatih Kilic, and Claudia Eckert
14. Deutscher IT-Sicherheitskongress

User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts
Michael Velten, Peter Schneider, Sascha Wessel, and Claudia Eckert
Proceedings of the 11th International Conference on Information Security Practice and Experience (ISPEC 2015)

Detecting Fingerprinted Data in TLS Traffic
Konstantin Böttinger, Dieter Schuster, and Claudia Eckert
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)

Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!
Claudia Eckert and Niels Fallenbeck
Informatik-Spektrum

Blind Format String Attacks
Fatih Kilic, Thomas Kittel, and Claudia Eckert
Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)

A Fixed-Point Algorithm for Automated Static Detection of Infinite Loops
Andreas Ibing and A. Mai
IEEE Int. Symp. High Assurance Systems Eng.

2014

SobiTra – A Software-based Trust-Anchor for ARM Cortex Application Processors
Julian Horsch, Sascha Wessel, Frederic Stumpf, and Claudia Eckert
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY ’14)

IT-Sicherheit und Cloud Computing
Niels Fallenbeck and Claudia Eckert
Springer Vieweg

Efficient Attack Forest Construction for Automotive On-board Networks
Martin Salfer, Hendrik Schweppe, and Claudia Eckert
Lecture Notes in Computer Science

Virtual Machine Introspection with Xen on ARM
Tamas Lengyel
-

Code Validation for Modern OS Kernels
Thomas Kittel, Sebastian Vogl, Tamas Lengyel, Jonas Pfoh, and Claudia Eckert
Workshop on Malware Memory Forensics (MMF)

Pitfalls of virtual machine introspection on modern hardware
Tamas Lengyel, Thomas Kittel, George Webster, and Jacob Torrey
1st Workshop on Malware Memory Forensics (MMF)

Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System
Tamas Lengyel, Steve Maresca, Bryan Payne, George Webster, Sebastian Vogl, and Aggelos Kiayias
Proceedings of the 30th Annual Computer Security Applications Conference

Context-sensitive Detection of Information Exposure Bugs with Symbolic Execution
Paul Muntean, Claudia Eckert, and Andreas Ibing
International Workshop on Innovative Software Development Methodologies and Practices (InnoSWDev), Hong Kong, China

The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
Apostolis Zarras
48th IEEE International Carnahan Conference on Security Technology (ICCST)

Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions
Tamas Lengyel, Thomas Kittel, and Claudia Eckert
1st Workshop on Security in highly connected IT systems

Support Vector Machines under Adversarial Label Contamination
Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, and Fabio Roli
Journal of Neurocomputing, Special Issue on Advances in Learning with Label Noise

Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data [pdf]
Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, and Thorsten Holz
Proceedings of the 23rd USENIX Security Symposium

Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware
Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, and Thorsten Holz
12th Annual Conference on Privacy, Security and Trust (PST)

IT-Sicherheit im Auto - Graphen-basierte Angriffssicherheitsevaluation von automobilen Bordnetzen.
Martin Salfer
BMW ProMotion Dialogtag

Persistent Data-only Malware: Function Hooks without Code [pdf]
Sebastian Vogl, Jonas Pfoh, Thomas Kittel, and Claudia Eckert
Proceedings of the 21th Annual Network & Distributed System Security Symposium (NDSS)

2013

Security Challenges in Automotive Hardware/Software Architecture Design
Florian Sagstetter, Martin Lukasiewycz, Sebastian Steinhorst, Marko Wolf, Alexandre Bouard, William R. Harris, Somesh Jha, Thomas Peyrin, Axel Poschmann, and Samarjit Chakraborty
Design, Automation and Test in Europe (DATE 2013)

Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids
Cristina Rottondi, Giacomo Verticale, and Christoph Krauß
IEEE Journal on Selected Areas in Communication (JSAC) - JSAC Smart Grid Communications Series

Identities for Embedded Systems Enabled by Physical Unclonable Functions
Dominik Merli, Georg Sigl, and Claudia Eckert
Number Theory and Cryptography (Lecture Notes in Computer Science)

Security Issues of Multi-Core Architectures—The Automotive Case
Thomas Kittel and Claudia Eckert
it-Information Technology

Middleware-based Security for Hyperconnected Applications in Future In-Car Networks
Alexandre Bouard, Dennis Burgkhardt, and Claudia Eckert
EAI Endorsed Transactions on Mobile Communications and Applications

Practical Information-Flow Aware Middleware for In-Car Communication
Alexandre Bouard, Benjamin Weyl, and Claudia Eckert
Workshop on Security, Privacy and Dependability for CyberVehicles (CyCAR’13)

Leveraging In-Car Security by Combining Information Flow Monitoring Techniques
Alexandre Bouard, Hendrik Schweppe, Benjamin Weyl, and Claudia Eckert
Second International Conference on Advances in Vehicular Systems Technologies and Applications (VEHICULAR 2013)

Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications
Alexandre Bouard, Maximilian Graf, and Dennis Burgkhardt
Trust Management VII

Automotive Proxy-based Security Architecture for CE Device Integration
Alexandre Bouard, Johannes Schanda, Daniel Herrscher, and Claudia Eckert
Mobile Wireless Middleware, Operating Systems, and Applications

Comprehensive Analysis of Software Countermeasures Against Fault Attacks
Nikolaus Theissing, Dominik Merli, Michael Smola, Frederic Stumpf, and Georg Sigl
Design, Automation and Test in Europe (DATE 2013)

PAL - Privacy Augmented LTE: A Privacy-Preserving Scheme for Vehicular LTE Communication
Daniel Angermeier, Alexander Kiening, and Frederic Stumpf
Proceedings of the 10th ACM International Workshop on Vehicular Internetworking, Systems, and Applications (ACM VANET 2013)

Improving Mobile Device Security with Operating System-level Virtualization
Sascha Wessel, Frederic Stumpf, Ilja Herdt, and Claudia Eckert
28th IFIP International Information Security and Privacy Conference (SEC 2013)

A Decisional Attack to Privacy-friendly Data Aggregation in Smart Grids
Cristina Rottondi, Marco Savi, Daniele Polenghi, Giacomo Verticale, and Christoph Krauß
IEEE Globecom 2013 - Symposium on Selected Areas in Communications - GC13 SAC Green Communication Systems and Networks

k-subscription: Privacy-preserving Microblogging Browsing through Obfuscation
Panagiotis Papadopoulos, Antonis Papadogiannakis, Apostolis Zarras, Thorsten Holz, Michalis Polychronakis, and Evangelos P. Markatos
29th ACM Annual Computer Security Applications Conference (ACSAC)

Online Lazy Gaussian Process Committee and its Application in Real-Time Trajectory Prediction
Han Xiao and Claudia Eckert
Information Sciences

Efficient Online Sequence Prediction with Side Information
Han Xiao and Claudia Eckert
IEEE International Conference on Data Mining (ICDM)

Active File Integrity Monitoring using Paravirtualized Filesystems.
Michael Velten, Sascha Wessel, Frederic Stumpf, and Claudia Eckert
Proceedings of the 5th International Conference on Trusted Systems (InTrust 2013)

Indicative Support Vector Clustering with its Application on Anomaly Detection
Huang Xiao and Claudia Eckert
IEEE 12th International Conference on Machine Learning and Applications (ICMLA'13)

Verifiable Trust between Electronic Control Units based on a single Trust Anchor
Alexander Kiening, Christoph Krauß, and Claudia Eckert
11th Embedded Security in Cars (escar)

Lightweight Attestation & Secure Code Update for Multiple Separated Microkernel Tasks
Steffen Wagner, Christoph Krauß, and Claudia Eckert
Proceedings of the ISC 2013: The 16th Information Security Conference

Sicherheitsarchitektur - Quantitative Bewertung von Sicherheitsarchitekturen virtualisierter Mehrkern-Steuergeräte.
Martin Salfer
BMW ProMotion Dialogtag

Lazy Gaussian Process Committee for Real-Time Online Regression
Han Xiao and Claudia Eckert
27th AAAI Conference on Artificial Intelligence (AAAI '13)

Powwow: A Tool for Collaborative Software Jam Sessions [pdf]
Paul Muntean, Damir Ismailović, Sebastian Paetzold, and Bernd Bruegge
International Conference on Advanced Collaborative Networks, Systems and Applications (COLLA), Nice, France

Secure Distributed Data Aggregation in the Automatic Metering Infrastructure of Smart Grids
Cristina Rottondi, Giacomo Verticale, and Christoph Krauß
IEEE International Conference on Communications (ICC) - Selected Areas in Communications Symposium (ICC SAC)

Using Trusted Platform Modules for Location Assurance in Cloud Networking
Christoph Krauß and Volker Fusenig
Proceedings of the 7th International Conference on Network and System Security (NSS 2013)

Leveraging String Kernels for Malware Detection
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Proceedings of the 7th International Conference on Network and System Security

X-TIER: Kernel Module Injection
Sebastian Vogl, Fatih Kilic, Christian Schneider, and Claudia Eckert
Proceedings of the 7th International Conference on Network and System Security

Learning from Multiple Observers with Unknown Expertise
Han Xiao, Huang Xiao, and Claudia Eckert
Proceedings of 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining

Full Virtual Machine State Reconstruction for Security Applications
Christian Schneider

OPARS: Objective Photo Aesthetics Ranking System
Huang Xiao, Han Xiao, and Claudia Eckert
34th European Conference on Information Retrieval (ECIR'13)

A Framework for the Creation of Mobile Educational Games for Dyslexic Children
Juan Haladjian, Daniel Richter, Paul Muntean, Damir Ismailović, and Bernd Bruegge
International Conference on Mobile Learning (ML), Lisbon, Portugal

2012

Smart Mobile Apps -- Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesse [pdf]
Claudia Eckert and Christian Schneider
Springer

Actively Learning Probabilistic Subsequential Transducers [pdf]
Hasan Ibne Akram, Colin de la Higuera, and Claudia Eckert
Proceedings of ICGI

Localized Electromagnetic Analysis of Cryptographic Implementations
Johann Heyszl, Stefan Mangard, Benedikt Heinz, Frederic Stumpf, and Georg Sigl
Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012

A Cache Timing Attack on AES in Virtualization Environments
Michael Weiss, Benedikt Heinz, and Frederic Stumpf
14th International Conference on Financial Cryptography and Data Security (Financial Crypto 2012)

Page-based Runtime Integrity Protection of User and Kernel Code
Sascha Wessel and Frederic Stumpf
Proceedings of EuroSec'12, 5th European Workshop on System Security

Complementary IBS: Application Specific Error Correction for PUFs
Matthias Hiller, Dominik Merli, Frederic Stumpf, and Georg Sigl
IEEE Int. Symposium on Hardware-Oriented Security and Trust

Attestation of Mobile Baseband Stacks
Steffen Wagner, Sascha Wessel, and Frederic Stumpf
The 6th International Conference on Network and System Security (NSS 2012)

Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines
Michael Velten and Frederic Stumpf
15th International Conference on Information Security and Cryptology (ICISC 2012)

A Secure Architecture for Smart Meter Systems
Konstantin Böttinger, Daniel Angermeier, Andreas Ibing, Dieter Schuster, Frederic Stumpf, and Dirk Wacker
4th International Symposium on Cyberspace Safety and Security (CSS 2012)

A New Security Architecture for Smartcards Utilizing PUFs
Thomas Esbach, Walter Fumy, Olga Kulikovska, Dominik Merli, Dieter Schuster, and Frederic Stumpf
Information Security Solutions Europe (ISSE 2012)

Implementation of a Protocol for Secure Distributed Aggregation of Smart Metering Data
Cristina Rottondi, Giacomo Verticale, and Christoph Krauß
International Conference on Smart Grid Technology, Economics and Policies (SG-TEP 2012)

Automotive Proxy-based Security Architecture for CE Device Integration
Alexandre Bouard, Daniel Herrscher, Johannes Schanda, and Claudia Eckert
MOBILWARE 2012, 5th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, Berlin, Germany, November 13–14, 2012

Driving Automotive Middleware Towards a Secure IP-based Future
Alexandre Bouard, Anke Jentzsch, Benjamin Glas, Alexander Kiening, Thomas Kittel, and Benjamin Weyl
10th conference for Embedded Security in Cars (Escar'12)

Towards Secure Fieldbus Communication
Felix Wieczorek, Christoph Krauß, Frank Schiller, and Claudia Eckert
31st International Conference on Computer Safety, Reliability and Security (SAFECOMP)

Flash: Efficient, Stable and Optimal K-Anonymity
Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Alfons Kemper, and Klaus A. Kuhn
Proceedings of the 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT)

B@bel: Leveraging Email Delivery for Spam Mitigation
Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna
21st USENIX Security Symposium

Adversarial Label Flips Attack on Support Vector Machines
Han Xiao, Huang Xiao, and Claudia Eckert
20th European Conference on Artificial Intelligence (ECAI)

AWESOME - Automated Web Emulation for Secure Operation of a Malware-Analysis Environment [pdf]
Martin Brunner, Christian M. Fuchs, and Sascha Todt
Proceedings of the Sixth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012)

E/E-Sicherheitsarchitektur - IT-Sicherheit virtualisierter Mehrkern-Systeme im Fahrzeug.
Martin Salfer
BMW ProMotion Dialogtag

A Framework for Game Tuning [pdf]
Juan Haladjian, Blagina Simeonova, Barbara Köhler, Frank Ziegler, Paul Muntean, Damir Ismailović, and Bernd Bruegge
IADIS Game and Entertainment Techonologies (GET), Lisbon, Portugal

Smart Camp: Building Scalable and Highly Available IT-Infrastructures
Sergej Proskurin, David McMeekin, and Achim Karduck
6th IEEE International Conference on Digital Ecosystems and Technologies (DEST) - Complex Environment Engineering

Highly Efficient Optimal K-Anonymity For Biomedical Datasets
Florian Kohlmayer, Fabian Prasser, Claudia Eckert, Alfons Kemper, and Klaus A. Kuhn
Proceedings of the 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)

Evasion Attack of Multi-Class Linear Classifiers
Han Xiao, Thomas Stibor, and Claudia Eckert
Proceedings of the 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD)

Virtualisierung: Vision einer intelligenten Vernetzung. [pdf]
Hans-Ulrich Michel, Dirk Kaule, and Martin Salfer
Elektronik automotive

Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture
Sebastian Vogl and Claudia Eckert
Proceedings of {EuroSec}'12, 5th European Workshop on System Security

Bridging the Semantic Gap Through Static Code Analysis
Christian Schneider, Jonas Pfoh, and Claudia Eckert
Proceedings of {EuroSec}'12, 5th European Workshop on System Security

2011

Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen
Claudia Eckert and Christoph Krauß
Datenschutz und Datensicherheit

Innovative Sicherheitstechnologien: sine-qua-non für safety-kritische Systeme?
Claudia Eckert
IT-Sicherheit zwischen Regulierung und Innovation, Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit

A Cost-Effective FPGA-based Fault Simulation Environment
Angelika Janning, Johann Heyszl, Frederic Stumpf, and Georg Sigl
Proceedings of the Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2011)

Semi-invasive EM Attack on FPGA RO PUFs and Countermeasures
Dominik Merli, Dieter Schuster, Frederic Stumpf, and Georg Sigl
Proceedings of the 6th Workshop on Embedded Systems Security (WESS 2011)

Asymmetric Cryptography in Automotive Access and Immobilizers
Johann Heyszl and Frederic Stumpf
Proceedings of the 9th escar Embedded Security in Cars Conference

Nitro: Hardware-based System Call Tracing for Virtual Machines
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Advances in Information and Computer Security

A Universal Semantic Bridge for Virtual Machine Introspection
Christian Schneider, Jonas Pfoh, and Claudia Eckert
Information Systems Security

T-CUP: A TPM-based Code Update Protocol Enabling Attestations for Sensor Networks
Steffen Wagner, Christoph Krauß, and Claudia Eckert
7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm)

Understanding Fraudulent Activities in Online Ad Exchanges
Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna
11th ACM SIGCOMM Internet Measurement Conference (IMC)

A cooperative in-car game for heterogeneous players [pdf]
Nora Broy, Sebastian Goebl, Matheus Hauder, Thomas Kothmayr, Michael Kugler, Florian Reinhart, Martin Salfer, Kevin Schlieper, and Elisabeth André
Proceedings of the 3rd International Conference on Automotive User Interfaces and Interactive Vehicular Applications

Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery
Martin Salfer, Sven Wohlgemuth, Sebastian Schrittwieser, Bernhard Bauer, and Isao Echizen
Internet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing

A Supervised Topic Transition Model for Detecting Malicious System Call Sequences
Thomas Stibor and Han Xiao
KDD Workshop on Knowledge Discovery, Modeling, and Simulation

Artificial Immune Systems - 10th International Conference, ICARIS 2011, Cambridge, UK, July 18-21, 2011. Proceeding [pdf]
Pietro Lio, Giuseppe Nicosia, and Thomas Stibor

Side-Channel Analysis of PUFs and Fuzzy Extractors
Dominik Merli, Dieter Schuster, Frederic Stumpf, and Georg Sigl
4th International Conference on Trust and Trustworthy Computing (Trust 2011)

2010

Toward Artificial Synesthesia: Linking Images and Sounds via Words
Han Xiao and Frederic Stumpf
NIPS Workshop on Machine Learning for Next Generation Computer Vision Challenges

Leveraging Attestation Techniques for Trust-Establishment in Distributed Systems
Frederic Stumpf

On Immunological Memory as a Function of a Recursive Proliferation Process
Thomas Stibor and Anastasio Salazar-Banuelos
15th IEEE International Conference on Engineering of Complex Computer Systems

Grammatical Inference Algorithms in MATLAB
Hasan Ibne Akram, Colin de la Higuera, Huang Xiao, and Claudia Eckert
ICGI 2010: Proceedings of the 10th International Colloquium on Grammatical Inference

Detecting Compromised Nodes in Wireless Sensor Networks: Misbehavior-based Detection versus Attestation-based Detection
Christoph Krauß
it-Information Technology

A Security Model for Future Vehicular Electronic Infrastructures
Roland Bless, Gerrit Grotewold, Christian Haas, Boris Hackstein, Stefan Hofmann, Anke Jentzsch, Alexander Kiening, Christoph Krauß, Julian Lamberty, Michael Müter, Peter Schoo, Lars Völker, and Christoph Werle
8th Embedded Security in Cars (escar)

Handling Insider Attacks in Wireless Sensor Networks
Christoph Krauß

Efficient Collapsed Gibbs Sampling For Latent Dirichlet Allocation
Han Xiao and Thomas Stibor
Asian Conference on Machine Learning (ACML)

Simplifying Parallel and Distributed Simulation with the DUP System
Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, and Matthew J. Rutherford
Proceedings of the 2010 Spring Simulation Multiconference (SpringSim'10)

Distributed Stream Processing with DUP
Kai Christian Bader, Tilo Eißler, Nathan S. Evans, Chris GauthierDickey, Christian Grothoff, Krista Grothoff, Jeff Keene, Harald Meier, Craig Ritzdorf, and Matthew J. Rutherford
IFIP International Conference on Network and Parallel Computing (NPC 2010)

PSMA: A Parallel Algorithm for Learning Regular Languages [pdf]
Hasan Ibne Akram, Alban Batard, Colin de la Higuera, and Claudia Eckert
NIPS Workshop on Learning on Cores, Clusters and Clouds

A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods
Thomas Stibor
A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods

Infiltrating critical infrastructures with next-generation attacks: W32.Stuxnet as a showcase threat [pdf]
Martin Brunner, Hans Hofinger, Christoph Krauß, Christopher Roblee, Peter Schoo, and Sascha Todt
Fraunhofer SIT, Darmstadt

Improving the Quality of Ring Oscillator PUFs on FPGAs
Dominik Merli, Frederic Stumpf, and Claudia Eckert
Proceedings of the 5th Workshop on Embedded Systems Security (WESS'2010)

Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER
Florian Kohlmayer, R.R. Lautenschläger, S.H.R Wurst, T. Klopstock, H. Prokisch, T. Meitinger, Claudia Eckert, and Klaus A. Kuhn
GI Jahrestagung (2)

Anonymity and Privacy in Distributed Early Warning Systems
Martin Brunner, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt
roceedings of the 5th International Conference on Critical Information Infrastructures Security (CRITIS 2010)

The Fraunhofer SIT malware analysis laboratory - establishing a secured, honeynet-based cyber threat analysis and research environment [pdf]
Martin Brunner, Michael Epah, Hans Hofinger, Christopher Roblee, Peter Schoo, and Sascha Todt
Fraunhofer SIT, Darmstadt

Datenschutz und Datensicherheit in intelligenten Energienetzen
Petra Beenken, Hans-Jürgen Appelrath, and Claudia Eckert
DACH Security 2010

MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot Using Reconfigurable Technology [pdf]
Sascha Muehlbach, Martin Brunner, Christopher Roblee, and Andreas Koch
Field Programmable Logic and Applications (FPL), 2010 International Conference on

Exploiting the x86 Architecture to Derive Virtual Machine State Information
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Proceedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2010)

Efficient One-Pass Entity Authentication based on ECC for Constrained Devices
Johann Heyszl and Frederic Stumpf
IEEE Int. Symposium on Hardware-Oriented Security and Trust

Mobile Robot Navigation on Partially Known Maps using a Fast A* Algorithm Version
Paul Muntean
IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2010), presented at the student session, not published

Digitale Daten in Geräten und Systemen
Claudia Eckert
Carl-Heymanns-Verlag

2009

A Formal Model for Virtual Machine Introspection
Jonas Pfoh, Christian Schneider, and Claudia Eckert
Proceedings of the 2nd Workshop on Virtual Machine Security (VMSec '09)

ITK-Kompendium 2010
Claudia Eckert
FAZ-Institut

Enhancing Control of Service Compositions in Service-Oriented Architectures
Christian Schneider, Frederic Stumpf, and Claudia Eckert
Proceedings of the Third International Workshop on Advances in Information Security ({WAIS} 2009)

2008

Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
Frederic Stumpf and Claudia Eckert
Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008)

Supports for Identity Management in Ambient Environments - The Hydra Approach [pdf]
Hasan Ibne Akram and Mario Hoffmann
International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services I-CENTRIC 2008, In Proceedings of ICSNC '08.

Requirements Analysis for Identity Management in. Ambient Environments: The HYDRA Approach
Hasan Ibne Akram and Mario Hoffmann
In Proceedings of the 2nd International Workshop on Combining Context with Trust, Security, and Privacy

2007

Phase Transition and the Computational Complexity of Generating r-contiguous Detectors
Thomas Stibor
Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS-2007)

Comments on Real-Valued Negative Selection vs. Real-Valued Positive Selection and One-Class SVM
Thomas Stibor and J. Timmis
Proceedings of the Congress on Evolutionary Computation (CEC-2007)

Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Christoph Krauß, Thomas Stibor, and Claudia Eckert
Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks

Ambient Intelligence: Neue Herausforderungen fuer die IT-Sicherheit
Claudia Eckert
TU-Darmstadt, thema Forschung

2006

Artificial Immune Systems for IT-Security
Thomas Stibor, J. Timmis, and Claudia Eckert
it-Information Technology (Systems Biology and Information Technology)

On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions
Thomas Stibor, J. Timmis, and Claudia Eckert
Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)

On Permutation Masks in Hamming Negative Selection
Thomas Stibor, J. Timmis, and Claudia Eckert
Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)

The Link between r-contiguous Detectors and k-CNF Satisfiability
Thomas Stibor, J. Timmis, and Claudia Eckert
Proceedings of the Congress on Evolutionary Computation (CEC-2006)

Generalization Regions in Hamming Negative Selection
Thomas Stibor, J. Timmis, and Claudia Eckert
Intelligent Information Systems (IIS-2006)

On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection
Thomas Stibor

2005

Mobile Technologien -- Chancen und neue IT-Sicherheitsrisiken
Claudia Eckert
9ter deutscher Sicherheitskongreß des BSI

Ubiquitäre Sicherheit für dynamische, mobile Systeme – eine Herausforderung für die IT-Sicherheit
Claudia Eckert
PIK

2004

Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net
Claudia Eckert
18. DFN-Tagung

IT-Sicherheit: Probleme, Lösungen und einige neue Herausforderungen
Claudia Eckert
TU-Darmstadt, thema Forschung

2003

gap - Practical Anonymous Networking
Krista Grothoff and Christian Grothoff
Privacy Enhancing Technologies, Third International Workshop (PET 2003)

Sicheres mobiles Arbeiten - Zwischen Wunsch und Wirklichkeit
Claudia Eckert
Zeitschrift FifF-Kommunikation

Mobil, aber sicher!
Claudia Eckert
Springer Verlag

Schwerpunkt "IT-Sicherheit" Mobiles Arbeiten, sind Sie sicher?
Claudia Eckert
Zeitschrift "Frauenarbeit und Informatik", Schwerpunkt "IT-Sicherheit"

Sicherheit und E-Learning
Claudia Eckert
Workshop "E-Learning: Beherrschbarkeit und Sicherheit"

Schutz biometrischer Daten bei Authentisierung auf Smartcards
U. Waldmann, D. Scheuermann, and Claudia Eckert
Konferenz D-A-CH Security

Sicherheit -- Bremse oder Schrittmacher? [pdf]
Claudia Eckert
Comtec zeitschrift für Telekommunikationstechnik

2002

Pseudonymes Einkaufen physischer Güter für Internet-Shops ohne Zwischenhändler
M. Enzmann and Claudia Eckert
Konferenz Elektronische Geschäftsprozesse

IT-Sicherheit - Schrittmacher oder Bremser der Innovationen
Claudia Eckert and H. Thielman
Springer Verlag

Efficient Sharing of Encrypted Data
Krista Grothoff, Christian Grothoff, Tzvetan Horozov, and Ioana Patrascu
Information Security and Privacy, 7th Australian Conference (ACISP 2002)

IT-Sicherheit: Innovationen für die Informations- und Wissensgesellschaft
Claudia Eckert and H. Thielman
M, Fachzeitschrift für Information Management & Consulting

Ein Vergleich moderner Linux-Sicherheitsmechanismen
Claudia Eckert, H. Görl, and A. Buchmann
Konferenz Elektronische Geschäftsprozesse

2001

Anonym im Internet? Probleme und Lösungen
Claudia Eckert and A. Pircher
Arbeitskonferenz Kommunikationssicherheit

Internet Anonymity: Problems and Solutions
Claudia Eckert and A. Pircher
Proceedings of the International Conference on Information Security, Trusted Information - The New Decade Challenge

Zur Sicherheit mobiler persönlicher Endgeräte - eine Bestandsaufnahme
Claudia Eckert
Arbeitskonferenz Kommunikationssicherheit

2000

Mobile Devices In eBusiness - New Opportunities And New Risks
Claudia Eckert
Proceedings of the SIS2000 Workshop

Trust and Confidence in Open Systems: Does Security Harmonize with Mobility?
U. Baumgarten, Claudia Eckert, and H. Görl
9th ACM SIGOPS European Workshop Beyond the PC: New Challenges for the Operating Systems

GSFS - a New Group-Aware Cryptographic File System
Claudia Eckert, F. Erhard, and J. Geiger
Proceedings of the World Computer Congress, SEC2000

Flexible, Distributed and Adaptive Ressource Managament in MoDIS
Claudia Eckert, M. Pizka, and C. Rehn
Proceedings Europar2000

GSFS - ein gruppenfähiges, verschlüsselndes Dateisystem
F. Erhard, J. Geiger, and Claudia Eckert
Arbeitskonferenz Systemsicherheit

1999

Improving Resource Management in Distributed Systems using Language-level Structuring Concepts
Claudia Eckert and M. Pizka
The Journal of Supercomputing

1998

Mobil und anonym im Netz mit dem Mixed Mobile Internet Protocol
Claudia Eckert and U. Baumgarten
Zeitschrift der Datenschutz-Berater

Sichere, verteilte Systeme – Konzepte, Modelle und Systemarchitekturen
Claudia Eckert



This list is not complete !