Name
Affiliation
Papers
CLAUDIA ECKERT
Tech Univ Munich, Inst Informat, D-80290 Munich, Germany
33
Collaborators
Citations 
PageRank 
55
76
13.13
Referers 
Referees 
References 
226
922
363
Search Limit
100922
Title
Citations
PageRank
Year
Falcon: Malware Detection and Categorization with Network Traffic Images00.342021
IntRepair : Informed Repairing of Integer Overflows20.372021
ρFEM - Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.00.342020
MANIS: evading malware detection system on graph structure10.352020
Analyzing control flow integrity with LLVM-CFI00.342019
Practical Integer Overflow Prevention.00.342017
Herausforderungen an der Schnittstelle von Informatik und Gesellschaft - Institutionalisierte Erforschung der Digitalisierung zur Sicherung von Wohlstand und Fortschritt.00.342017
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage.00.342017
Combating Control Flow Linearization00.342017
Adaptive Semantics-Aware Malware Classification.50.502016
Skald: A Scalable Architecture For Feature Extraction, Multi-User Analysis, And Real-Time Information Sharing40.452016
Deep Learning for Classification of Malware System Call Sequences.120.592016
CoKey: fast token-based cooperative cryptography.00.342016
DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract).00.342016
Policy-Based Implicit Attestation For Microkernel-Based Virtualized Systems00.342016
Automated Generation of Buffer Overflow Quick Fixes Using Symbolic Execution and SMT.40.392015
Industrie 4.0? Mit Sicherheit!00.342015
Counteracting Data-Only Malware with Code Pointer Examination.20.372015
Learning better while sending less: Communication-efficient online semi-supervised learning in client-server settings00.342015
Feature Selection and Extraction for Malware Classification.40.402015
Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units.10.392015
User Identity Verification Based On Touchscreen Interaction Analysis In Web Contexts20.382015
Interactive Function Identification Decreasing the Effort of Reverse Engineering.00.342015
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code00.342015
Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!00.342015
Efficient Attack Forest Construction for Automotive On-board Networks.00.342014
A flexible approach to distributed data anonymization.130.742014
Blind Format String Attacks.10.382014
Active File Integrity Monitoring Using Paravirtualized Filesystems00.342013
Security Issues Of Multi-Core Architectures - The Automotive Case10.442013
Lightweight Attestation And Secure Code Update For Multiple Separated Microkernel Tasks00.342013
Efficient Online Sequence Prediction With Side Information20.382013
Flash: Efficient, Stable and Optimal K-Anonymity220.902012