Follow
Dr. Paul Muntean
Dr. Paul Muntean
Technical University of Munich, Chair of IT Security, PostDoc
Verified email at sec.in.tum.de - Homepage
Title
Cited by
Cited by
Year
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography
F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Raza, ...
USENIX Security Symposium, 2019
402019
τCFI: Type-assisted control flow integrity for x86-64 binaries
P Muntean, M Fischer, G Tan, Z Lin, J Grossklags, C Eckert
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
402018
Automated generation of buffer overflow quick fixes using symbolic execution and SMT
P Muntean, V Kommanapalli, A Ibing, C Eckert
International Conference on Computer Safety, Reliability, and Security …, 2015
252015
IntRepair: Informed Repairing of Integer Overflows
P Muntean, M Monperrus, H Sun, J Grossklags, C Eckert
IEEE Transactions on Software Engineering (TSE), 16, 2019
232019
Analyzing control flow integrity with LLVM-CFI
P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
172019
Castsan: Efficient detection of polymorphic C++ object type confusions with LLVM
P Muntean, S Wuerl, J Grossklags, C Eckert
European Symposium on Research in Computer Security (ESORICS), 3-25, 2018
172018
τcfi: Type-assisted control flow integrity for x86-64 binaries
J Grossklags, C Eckert
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
122018
Context-sensitive detection of information exposure bugs with symbolic execution
P Muntean, C Eckert, A Ibing
Proceedings of the International Workshop on Innovative Software Development …, 2014
112014
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code
P Muntean, A Rabbi, A Ibing, C Eckert
International Conference on Software Quality, Reliability and Security …, 2015
82015
A Framework for the Creation of Mobile Educational Games for Dyslexic Children
J Haladjian, D Richter, P Muntean, D Ismailovic, B Brügge
International Association for Development of the Information Society, 2013
72013
Mobile robot navigation on partially known maps using a fast a star algorithm version
P Muntean
arXiv preprint arXiv:1604.08708, 2016
62016
Practical Integer Overflow Prevention
P Muntean, J Grossklags, C Eckert
arXiv preprint arXiv:1710.03720, 2017
42017
SMT-constrained symbolic execution engine for integer overflow detection in C code
P Muntean, M Rahman, A Ibing, C Eckert
Information Security for South Africa (ISSA), 1-8, 2015
42015
Computer Safety, Reliability, and Security: 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015
P Muntean, V Kommanapalli, A Ibing, C Eckert
Proceedings, 441-456, 2015
3*2015
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings
P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
22020
Intrepair: Informed fixing of integer overflows
P Muntean, M Monperrus, H Sun, J Grossklags, C Eckert
arXiv preprint arXiv, 2018
22018
iTOP: Automating Counterfeit Object-Oriented Programming Attacks
P Muntean, R Viehoever, Z Lin, G Tan, J Grossklags, C Eckert
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
12021
A framework for game tuning
J Haladjian, F Ziegler, B Simeonova, B Köhler, P Muntean, D Ismailović, ...
IADIS Game and Entertainment Techonologies, 2012
12012
Digitales Wallet: Was tun, wenn das Smartphone verloren geht?
P Muntean
https://www.it-daily.net/it-sicherheit/mobile-security/digitales-wallet-was …, 2022
2022
Self Sovereign Identity: Wieso die selbstverwaltete digitale Identität sicher ist
P Muntean
https://www.it-daily.net/it-sicherheit/identity-access-management/self …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20