Follow
Paul Muntean
Paul Muntean
Other namesPaul I. Muntean, Dr. P. Muntean, Dr. Paul Muntean
Technical University of Munich, Chair of IT Security, Post Doc
Verified email at sec.in.tum.de - Homepage
Title
Cited by
Cited by
Year
τCFI: Type-assisted control flow integrity for x86-64 binaries
P Muntean, M Fischer, G Tan, Z Lin, J Grossklags, C Eckert
Research in Attacks, Intrusions, and Defenses (RAID), 423-444, 2018
58*2018
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography
F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Raza, ...
USENIX Security Symposium (USENIX Security), 2019
482019
IntRepair: Informed Repairing of Integer Overflows
P Muntean, M Monperrus, H Sun, J Grossklags, C Eckert
Transactions on Software Engineering (TSE), 16, 2019
342019
Analyzing control flow integrity with LLVM-CFI
P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert
Annual Computer Security Applications Conference (ACSAC), 584-597, 2019
252019
Automated generation of buffer overflow quick fixes using symbolic execution and SMT
P Muntean, V Kommanapalli, A Ibing, C Eckert
Computer Safety, Reliability, and Security (SAFECOMP), 441-456, 2015
252015
Castsan: Efficient detection of polymorphic C++ object type confusions with LLVM
P Muntean, S Wuerl, J Grossklags, C Eckert
European Symposium on Research in Computer Security (ESORICS), 3-25, 2018
182018
Context-sensitive detection of information exposure bugs with symbolic execution
P Muntean, C Eckert, A Ibing
International Workshop on Innovative Software Development Methodologies and …, 2014
112014
Mobile robot navigation on partially known maps using a fast a star algorithm version
P Muntean
arXiv preprint arXiv:1604.08708, 2016
82016
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code
P Muntean, A Rabbi, A Ibing, C Eckert
Software Quality, Reliability and Security-Companion (QRS), 128-137, 2015
82015
A Framework for the Creation of Mobile Educational Games for Dyslexic Children
J Haladjian, D Richter, P Muntean, D Ismailovic, B Brügge
International Association for Development of the Information Society, 2013
72013
iTOP: Automating Counterfeit Object-Oriented Programming Attacks
P Muntean, R Viehoever, Z Lin, G Tan, J Grossklags, C Eckert
Research in Attacks, Intrusions and Defenses (RAID), 15, 2021
42021
Practical Integer Overflow Prevention
P Muntean, J Grossklags, C Eckert
arXiv preprint arXiv:1710.03720, 2017
42017
SMT-constrained symbolic execution engine for integer overflow detection in C code
P Muntean, M Rahman, A Ibing, C Eckert
Information Security for South Africa (ISSA), 1-8, 2015
42015
Computer Safety, Reliability, and Security: 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015
P Muntean, V Kommanapalli, A Ibing, C Eckert
Proceedings, 441-456, 2015
3*2015
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings
P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert
Annual Computer Security Applications Conference (ACSAC), 14, 2020
22020
A framework for game tuning
J Haladjian, F Ziegler, B Simeonova, B Köhler, P Muntean, D Ismailović, ...
IADIS Game and Entertainment Techonologies, 2012
12012
Digitales Wallet: Was tun, wenn das Smartphone verloren geht?
P Muntean
www.it-daily.net/it-sicherheit/mobile-security/digitales-wallet-was-tun-wenn …, 2022
2022
Self Sovereign Identity: Wieso die selbstverwaltete digitale Identität sicher ist
P Muntean
www.it-daily.net/it-sicherheit/identity-access-management/self-sovereign …, 2022
2022
Self Sovereign Identity: Selbstverwaltet und trotzdem sicher
P Muntean
www.iavcworld.de/it-security/7649-self-sovereign-identity-selbstverwaltet …, 2022
2022
Mitigation of Advanced Code Reuse Attacks
P Muntean
https://mediatum.ub.tum.de/?id=1576007, 222, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20