Claudia Eckert

According to our database1, Claudia Eckert authored at least 140 papers between 1993 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
MANIS: evading malware detection system on graph structure.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Integrating security evaluations into virtual commissioning.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Analyzing control flow integrity with LLVM-CFI.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
IntRepair: Informed Fixing of Integer Overflows.
CoRR, 2018

τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Learning on a Budget for User Authentication on Mobile Devices.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables.
Proceedings of the 26th European Signal Processing Conference, 2018

CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM.
Proceedings of the Computer Security, 2018

Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
IT-Sicherheit und Cloud Computing.
Proceedings of the Handbuch Industrie 4.0 Bd.4, Allgemeine Grundlagen., 2017

Cybersicherheit beyond 2020! - Herausforderungen für die IT-Sicherheitsforschung.
Inform. Spektrum, 2017

Herausforderungen an der Schnittstelle von Informatik und Gesellschaft - Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt.
Inform. Spektrum, 2017

Practical Integer Overflow Prevention.
CoRR, 2017

Combating Control Flow Linearization.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Empowering convolutional networks for malware classification and analysis.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
Novel weaknesses in IEC 62351 protected Smart Grid control systems.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing.
Proceedings of the Information Security - 19th International Conference, 2016

Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems.
Proceedings of the Information Security - 19th International Conference, 2016

Adaptive Semantics-Aware Malware Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract).
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Deep Learning for Classification of Malware System Call Sequences.
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016

CoKey: fast token-based cooperative cryptography.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Feature Selection and Extraction for Malware Classification.
J. Inf. Sci. Eng., 2015

Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!
Inform. Spektrum, 2015

Support vector machines under adversarial label contamination.
Neurocomputing, 2015

Basis und Überbau.
Datenschutz und Datensicherheit, 2015

Industrie 4.0? Mit Sicherheit!
Datenschutz und Datensicherheit, 2015

Improving mobile device security with operating system-level virtualization.
Comput. Secur., 2015

Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units.
Proceedings of the SECRYPT 2015, 2015

Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Counteracting Data-Only Malware with Code Pointer Examination.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

SMT-constrained symbolic execution engine for integer overflow detection in C code.
Proceedings of the 2015 Information Security for South Africa, 2015

User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts.
Proceedings of the Information Security Practice and Experience, 2015

Neural Network-Based User-Independent Physical Activity Recognition for Mobile Devices.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2015, 2015

Is Feature Selection Secure against Training Data Poisoning?
Proceedings of the 32nd International Conference on Machine Learning, 2015

Learning better while sending less: Communication-efficient online semi-supervised learning in client-server settings.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015

Interactive Function Identification Decreasing the Effort of Reverse Engineering.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Detecting Fingerprinted Data in TLS Traffic.
Proceedings of the 10th ACM Symposium on Information, 2015

iDeFEND: Intrusion Detection Framework for Encrypted Network Data.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2014
A flexible approach to distributed data anonymization.
J. Biomed. Informatics, 2014

Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Context-sensitive detection of information exposure bugs with symbolic execution.
Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices, 2014

Blind Format String Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Persistent Data-only Malware: Function Hooks without Code.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Efficient Attack Forest Construction for Automotive On-board Networks.
Proceedings of the Information Security - 17th International Conference, 2014

Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions.
Proceedings of the 25th International Workshop on Database and Expert Systems Applications, 2014

SobrTrA: a software-based trust anchor for ARM cortex application processors.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Middleware-based Security for Hyperconnected Applications in Future In-Car Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2013

Security Issues of Multi-Core Architectures - The Automotive Case.
it Inf. Technol., 2013

Improving Mobile Device Security with Operating System-Level Virtualization.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Learning from Multiple Observers with Unknown Expertise.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

X-TIER: Kernel Module Injection.
Proceedings of the Network and System Security - 7th International Conference, 2013

Leveraging String Kernels for Malware Detection.
Proceedings of the Network and System Security - 7th International Conference, 2013

Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks.
Proceedings of the Information Security, 16th International Conference, 2013

Active File Integrity Monitoring Using Paravirtualized Filesystems.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Indicative Support Vector Clustering with Its Application on Anomaly Detection.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

Efficient Online Sequence Prediction with Side Information.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

OPARS: Objective Photo Aesthetics Ranking System.
Proceedings of the Advances in Information Retrieval, 2013

Practical information-flow aware middleware for in-car communication.
Proceedings of the CyCAR'13, 2013

Identities for Embedded Systems Enabled by Physical Unclonable Functions.
Proceedings of the Number Theory and Cryptography, 2013

Lazy Gaussian Process Committee for Real-Time Online Regression.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
Actively Learning Probabilistic Subsequential Transducers.
Proceedings of the Eleventh International Conference on Grammatical Inference, 2012

Embedded systems security.
Datenschutz und Datensicherheit, 2012

Flash: Efficient, Stable and Optimal K-Anonymity.
Proceedings of the 2012 International Conference on Privacy, 2012

Towards Secure Fieldbus Communication.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Evasion Attack of Multi-class Linear Classifiers.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012

Automotive Proxy-Based Security Architecture for CE Device Integration.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications, 2012

Adversarial Label Flips Attack on Support Vector Machines.
Proceedings of the ECAI 2012, 2012

Highly efficient optimal k-anonymity for biomedical datasets.
Proceedings of CBMS 2012, 2012

2011
Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen.
Datenschutz und Datensicherheit, 2011

T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011

Nitro: Hardware-Based System Call Tracing for Virtual Machines.
Proceedings of the Advances in Information and Computer Security, 2011

A Universal Semantic Bridge for Virtual Machine Introspection.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
Exploiting the x86 Architecture to Derive Virtual Machine State Information.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Grammatical Inference Algorithms in MATLAB.
Proceedings of the Grammatical Inference: Theoretical Results and Applications, 2010

Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER.
Proceedings of the 40. Jahrestagung der Gesellschaft für Informatik, Service Science - Neue Perspektiven für die Informatik, INFORMATIK 2010, Leipzig, Germany, September 27, 2010

Improving the quality of ring oscillator PUFs on FPGAs.
Proceedings of the 5th Workshop on Embedded Systems Security, 2010

2009
Enhancing Control of Service Compositions in Service-Oriented Architectures.
Proceedings of the The Forth International Conference on Availability, 2009

IT-Sicherheit - Konzepte, Verfahren, Protokolle (6. Aufl.).
Oldenbourg, ISBN: 978-3-486-58999-3, 2009

2008
On handling insider attacks in wireless sensor networks.
Inf. Secur. Tech. Rep., 2008

A reputation system for electronic negotiations.
Comput. Stand. Interfaces, 2008

Measuring unlinkability revisited.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Defending against false-endorsement-based dos attacks in wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

50<sub>6</sub> Ways to Track Your Lover.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Distributed Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology, 2008

Improving the scalability of platform attestation.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Towards Secure E-Commerce Based on Virtualization and Attestation Techniques.
Proceedings of the The Third International Conference on Availability, 2008

IT-Sicherheit - Konzepte, Verfahren, Protokolle (5. Aufl.).
Oldenbourg, ISBN: 978-3-486-58270-3, 2008

2007
Erzeugung elektronischer Signaturen mittels Trusted Platform Module.
Datenschutz und Datensicherheit, 2007

SOA und Sicherheit - Web Service Security Praxis und Offene Probleme.
Datenschutz und Datensicherheit, 2007

An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Situation-Based Policy Enforcement.
Proceedings of the Trust, 2007

Expertise Knowledge-Based Policy Refinement Process.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

On Flexible Modeling of History-Based Access Control Policies for XML Documents.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A System Architecture for History-Based Access Control for XML Documents.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

Model Checking of Restricted CTL* Formulas using ALCK.
Proceedings of the 2007 International Workshop on Description Logics (DL2007), 2007

Using patterns paradigm to refine workflow policies.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

History-based access control for XML documents.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

An Approach to a Trustworthy System Architecture Using Virtualization.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks.
Proceedings of the The Second International Conference on Availability, 2007

2006
Artificial Immune Systems for IT-Security (Künstliche Immunsysteme für IT-Sicherheit).
it Inf. Technol., 2006

Generalization Regions in Hamming Negative Selection.
Proceedings of the Intelligent Information Processing and Web Mining, 2006

On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

On Permutation Masks in Hamming Negative Selection.
Proceedings of the Artificial Immune Systems, 5th International Conference, 2006

The Link between r-contiguous Detectors and k-CNF Satisfiability.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

IT-Sicherheit - Konzepte, Verfahren, Protokolle (4. Aufl.).
Oldenbourg, ISBN: 978-3-486-57851-5, 2006

2005
Ubiquitäre Sicherheit für dynamische, mobile Systeme. Eine Herausforderung für die IT-Sicherheit.
PIK Prax. Informationsverarbeitung Kommun., 2005

Security Issues of Mobile Devices.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques.
Proceedings of the Artificial Immune Systems: 4th International Conference, 2005

Is negative selection appropriate for anomaly detection?
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Attack Goal Generation Using Description Logic-based Knowledge Representation.
Proceedings of the 2005 International Workshop on Description Logics (DL2005), 2005

On the appropriateness of negative selection defined over Hamming shape-space as a network intrusion detection system.
Proceedings of the IEEE Congress on Evolutionary Computation, 2005

2004
NGN, All-IP, B3G: Enabler für das Future Net?!: Überblick über Entwicklungen im Bereich zukünftiger Netze.
Inform. Spektrum, 2004

Protected transmission of biometric user authentication data for oncard-matching.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

An Investigation of R-Chunk Detector Generation on Higher Alphabets.
Proceedings of the Genetic and Evolutionary Computation, 2004

Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net.
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004

Interworking von UMTS und LAN: Eine sicherheitstechnische Betrachtung.
Proceedings of the E-Science and Grid - Ad-hoc-Netze, 2004

IT-Sicherheit - Konzepte, Verfahren, Protokolle (3. Aufl.).
Oldenbourg, ISBN: 978-3-486-20000-3, 2004

2003
Sicherheit an der Schnittstelle zum Nutzer.
PIK Prax. Informationsverarbeitung Kommun., 2003

Der elektronische Sicherheitsinspektor eSI: Ein Tool zur dynamischen Analyse der IT-Sicherheit eines Systems.
Proceedings of the Security, 2003

IT-Sicherheit - Konzepte, Verfahren, Protokolle (2. Aufl.).
Oldenbourg, ISBN: 978-3-486-27205-5, 2003

2001
Mobil und trotzdem sicher? (Mobile, but Nevertheless Secure?).
Informationstechnik Tech. Inform., 2001

Internet Anonymity: Problems and Solutions.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

2000
Trust and confidence in open systems: does security harmonize with mobility?
Proceedings of the 9th ACM SIGOPS European Workshop, 2000

GSFS - A New Group-Aware Cryptographic File System.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Improving Resource Management in Distributed Systems using Language-Level Structuring Concepts.
J. Supercomput., 1999

1997
MVS-SAT: a security administration tool to support SMF protocol data evaluation.
Proceedings of the Information Security in Research and Business, 1997

Developing secure applications: a systematic approach.
Proceedings of the Information Security in Research and Business, 1997

Evolving Software Tools for New Distributed Computing Environments.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

A Language-Based Approach to Construct Structured and Efficient.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
On security models.
Proceedings of the Information Systems Security, 1996

1993
Konzepte und Verfahren zur Konstruktion sicherer, verteilter Systeme.
PhD thesis, 1993


  Loading...