Paul Muntean

Orcid: 0000-0002-2462-7612

Affiliations:
  • Technical University of Munich, Germany


According to our database1, Paul Muntean authored at least 16 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Mitigation of Advanced Code Reuse Attacks.
PhD thesis, 2021

IntRepair: Informed Repairing of Integer Overflows.
IEEE Trans. Software Eng., 2021

iTOP: Automating Counterfeit Object-Oriented Programming Attacks.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography.
Proceedings of the 28th USENIX Security Symposium, 2019

Analyzing control flow integrity with LLVM-CFI.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Automated CFI Policy Assessment with Reckon.
CoRR, 2018

IntRepair: Informed Fixing of Integer Overflows.
CoRR, 2018

τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM.
Proceedings of the Computer Security, 2018

2017
Practical Integer Overflow Prevention.
CoRR, 2017

2016
Mobile Robot Navigation on Partially Known Maps using a Fast A Star Algorithm Version.
CoRR, 2016

2015
Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

SMT-constrained symbolic execution engine for integer overflow detection in C code.
Proceedings of the 2015 Information Security for South Africa, 2015

2014
Context-sensitive detection of information exposure bugs with symbolic execution.
Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices, 2014


  Loading...