τCFI: Type-assisted control flow integrity for x86-64 binaries P Muntean, M Fischer, G Tan, Z Lin, J Grossklags, C Eckert Research in Attacks, Intrusions, and Defenses (RAID), 423-444, 2018 | 58* | 2018 |
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Raza, ... USENIX Security Symposium (USENIX Security), 2019 | 48 | 2019 |
IntRepair: Informed Repairing of Integer Overflows P Muntean, M Monperrus, H Sun, J Grossklags, C Eckert Transactions on Software Engineering (TSE), 16, 2019 | 34 | 2019 |
Analyzing control flow integrity with LLVM-CFI P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert Annual Computer Security Applications Conference (ACSAC), 584-597, 2019 | 25 | 2019 |
Automated generation of buffer overflow quick fixes using symbolic execution and SMT P Muntean, V Kommanapalli, A Ibing, C Eckert Computer Safety, Reliability, and Security (SAFECOMP), 441-456, 2015 | 25 | 2015 |
Castsan: Efficient detection of polymorphic C++ object type confusions with LLVM P Muntean, S Wuerl, J Grossklags, C Eckert European Symposium on Research in Computer Security (ESORICS), 3-25, 2018 | 18 | 2018 |
Context-sensitive detection of information exposure bugs with symbolic execution P Muntean, C Eckert, A Ibing International Workshop on Innovative Software Development Methodologies and …, 2014 | 11 | 2014 |
Mobile robot navigation on partially known maps using a fast a star algorithm version P Muntean arXiv preprint arXiv:1604.08708, 2016 | 8 | 2016 |
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code P Muntean, A Rabbi, A Ibing, C Eckert Software Quality, Reliability and Security-Companion (QRS), 128-137, 2015 | 8 | 2015 |
A Framework for the Creation of Mobile Educational Games for Dyslexic Children J Haladjian, D Richter, P Muntean, D Ismailovic, B Brügge International Association for Development of the Information Society, 2013 | 7 | 2013 |
iTOP: Automating Counterfeit Object-Oriented Programming Attacks P Muntean, R Viehoever, Z Lin, G Tan, J Grossklags, C Eckert Research in Attacks, Intrusions and Defenses (RAID), 15, 2021 | 4 | 2021 |
Practical Integer Overflow Prevention P Muntean, J Grossklags, C Eckert arXiv preprint arXiv:1710.03720, 2017 | 4 | 2017 |
SMT-constrained symbolic execution engine for integer overflow detection in C code P Muntean, M Rahman, A Ibing, C Eckert Information Security for South Africa (ISSA), 1-8, 2015 | 4 | 2015 |
Computer Safety, Reliability, and Security: 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015 P Muntean, V Kommanapalli, A Ibing, C Eckert Proceedings, 441-456, 2015 | 3* | 2015 |
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert Annual Computer Security Applications Conference (ACSAC), 14, 2020 | 2 | 2020 |
A framework for game tuning J Haladjian, F Ziegler, B Simeonova, B Köhler, P Muntean, D Ismailović, ... IADIS Game and Entertainment Techonologies, 2012 | 1 | 2012 |
Digitales Wallet: Was tun, wenn das Smartphone verloren geht? P Muntean www.it-daily.net/it-sicherheit/mobile-security/digitales-wallet-was-tun-wenn …, 2022 | | 2022 |
Self Sovereign Identity: Wieso die selbstverwaltete digitale Identität sicher ist P Muntean www.it-daily.net/it-sicherheit/identity-access-management/self-sovereign …, 2022 | | 2022 |
Self Sovereign Identity: Selbstverwaltet und trotzdem sicher P Muntean www.iavcworld.de/it-security/7649-self-sovereign-identity-selbstverwaltet …, 2022 | | 2022 |
Mitigation of Advanced Code Reuse Attacks P Muntean https://mediatum.ub.tum.de/?id=1576007, 222, 2021 | | 2021 |