TUM Logo

Publications

Available in Bookstores

IT-Sicherheit: Konzepte - Verfahren - Protokolle
Claudia Eckert:
IT-Sicherheit: Konzepte - Verfahren - Protokolle
9th edition,
De Gruyter, 2014
ca. 1000 pages, flexcover
ISBN 978-3-486-77848-9
69,95 EUR


Publication List

2017

Spoilers: Effective Malware Triage Using Hidden Fields
Zachary Hanif and Bojan Kolosnjaji
Microsoft DCC

Security Testing over Encrypted Channels on the ARM Platform
Fatih Kilic, Benedikt Geßele, and Hasan Ibne Akram
Proceedings of the 12th International Conference on Internet Monitoring and Protection (ICIMP 2017)

Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks
Apostolis Zarras and Federico Maggi
15th Annual Conference on Privacy, Security and Trust (PST)

Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
George Webster, Bojan Kolosnjaji, Christian von Pentz, Zachary Hanif, Julian Kirsch, Apostolis Zarras, and Claudia Eckert
14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)

Architecture for Resource-Aware VMI-based Cloud Malware Analysis
Bojan Kolosnjaji and B. Taubmann
SHCIS 2017

Empowering Convolutional Networks for Malware Classification and Analysis
Bojan Kolosnjaji, Ghadir Eraisha, George Webster, Apostolis Zarras, and Claudia Eckert
30th International Joint Conference on Neural Networks (IJCNN)

Combating Control Flow Linearization
Julian Kirsch, Clemens Jonischkeit, Thomas Kittel, Apostolis Zarras, and Claudia Eckert
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

Towards Automated Classification of Firmware Images and Identification of Embedded Devices
Andrei Costin, Apostolis Zarras, and Aurélien Francillon
32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

Size Matters: Open-Source Framework for Large Scale Analysis
George Webster and Christian von Pentz
Microsoft DCC

From Mole Hills to Mountains: Revealing Rich Header and Malware Triage
George Webster and Zachary Hanif
RSA USA

2016

Interactive Function Identification Decreasing the Effort of Reverse Engineering
Fatih Kilic, Hannes Laner, and Claudia Eckert
Proceedings of the 11th International Conference on Information Security and Cryptology (Inscrypt 2015)

Deep Learning for Classification of Malware System Call Sequences
Bojan Kolosnjaji, Apostolis Zarras, George Webster, and Claudia Eckert
29th Australasian Joint Conference on Artificial Intelligence (AI)

POSTER: vTableShield: Precise Protecting of Virtual Function Dispatches in C++ Programs
Paul Muntean, Peng Xu, and Claudia Eckert
Google Ph.D. Student Summit on Compiler & Programming Technology, Munich, Germany}

A Study of the Rich Header and Respective Malware Triage
George Webster and Julian Kirsch
Hacktivity

Leveraging Internet Services to Evade Censorship
Apostolis Zarras
19th International Conference on Information Security (ISC)

Efficient Data-Race Detection with Dynamic Symbolic Execution
Andreas Ibing
IEEE Software Engineering Workshop

Autocorrelation-Based Detection of Infinite Loops at Runtime
Andreas Ibing, Julian Kirsch, and Lorenz Panny
IEEE Int. Conf. Dependable, Autonomic and Secure Computing

Adaptive Semantics-Aware Malware Classification
Bojan Kolosnjaji, Apostolis Zarras, Tamas Lengyel, George Webster, and Claudia Eckert
13th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Andrei Costin, Apostolis Zarras, and Aurélien Francillon
11th ACM Asia Conference on Computer and Communications Security (ASIACCS)

Neuralyzer: Flexible Expiration Times for the Revocation of Online Data
Apostolis Zarras, Katharina Kohls, Markus Duermuth, and Christina Poepper
6th ACM Conference on Data and Application Security and Privacy (CODASPY)

Dynamic Symbolic Execution with Interpolation Based Path Merging
Andreas Ibing
Int. Conf. Advances and Trends in Software Engineering

2015

Counteracting Data-Only Malware with Code Pointer Examination
Thomas Kittel, Julian Kirsch, and Claudia Eckert
18th International Symposium on Research in Attacks, Intrusions and Defenses

Dynamic Symbolic Execution using Eclipse CDT
Andreas Ibing
Int. Conf. Software Eng. Advances

POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT
Paul Muntean and Claudia Eckert
TechDays Cyber Security Workshop, Munich, Germany

Automated Generation of Buffer Overflows Quick Fixes using Symbolic Execution and SMT
Paul Muntean and Claudia Eckert
International Conference on Computer Safety, Reliability & Security (SAFECOMP), Delft, The Netherlands, September 2015. Springer LNCS

Virtual Machine Introspection with Xen on ARM
Tamas Lengyel, Thomas Kittel, and Claudia Eckert
2nd Workshop on Security in highly connected IT systems (SHCIS)

1998

Sichere, verteilte Systeme – Konzepte, Modelle und Systemarchitekturen
Claudia Eckert