Dr. Paul Muntean
Dr. Paul Muntean
ex-researcher, Chair for IT Security, Technical University of Munich
Verified email at sec.in.tum.de - Homepage
Title
Cited by
Cited by
Year
Automated generation of buffer overflow quick fixes using symbolic execution and SMT
P Muntean, V Kommanapalli, A Ibing, C Eckert
International Conference on Computer Safety, Reliability, and Security …, 2015
192015
CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries
P Muntean, M Fischer, G Tan, Z Lin, J Grossklags, C Eckert
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
162018
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography
F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Raza, ...
USENIX Security, 17, 2019
102019
Castsan: Efficient detection of polymorphic C++ object type confusions with LLVM
P Muntean, S Wuerl, J Grossklags, C Eckert
European Symposium on Research in Computer Security (ESORICS), 3-25, 2018
102018
Context-sensitive detection of information exposure bugs with symbolic execution
P Muntean, C Eckert, A Ibing
Proceedings of the International Workshop on Innovative Software Development …, 2014
102014
Analyzing control flow integrity with LLVM-CFI
P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
62019
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code
P Muntean, A Rabbi, A Ibing, C Eckert
International Conference on Software Quality, Reliability and Security …, 2015
52015
IntRepair: Informed Repairing of Integer Overflows
P Muntean, M Monperrus, H Sun, J Grossklags, C Eckert
IEEE Transactions on Software Engineering (TSE), https://ieeexplore.ieee.org …, 2019
42019
Practical Integer Overflow Prevention
P Muntean, J Grossklags, C Eckert
arXiv preprint arXiv:1710.03720, 2017
32017
SMT-constrained symbolic execution engine for integer overflow detection in C code
P Muntean, M Rahman, A Ibing, C Eckert
Information Security for South Africa (ISSA), 1-8, 2015
32015
A Framework for the Creation of Mobile Educational Games for Dyslexic Children.
J Haladjian, D Richter, P Muntean, D Ismailovic, B Brügge
International Association for Development of the Information Society, 2013
32013
Intrepair: Informed fixing of integer overflows
P Muntean, M Monperrus, H Sun, J Grossklags, C Eckert
arXiv preprint arXiv, 2018
22018
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings
P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
12020
Mobile robot navigation on partially known maps using a fast a star algorithm version
P Muntean
arXiv preprint arXiv:1604.08708, 2016
12016
A framework for game tuning
J Haladjian, F Ziegler, B Simeonova, B Köhler, P Muntean, D Ismailović, ...
IADIS Game and Entertainment Techonologies, 2012
12012
iTOP: Automating Counterfeit Object-Oriented Programming Attacks
P Muntean, R Viehoever, Z Lin, G Tan, J Grossklags, C Eckert
The 24th International Symposium on Research in Attacks, Intrusions and …, 2021
2021
Mitigation of Advanced Code Reuse Attacks
PI Muntean
https://mediatum.ub.tum.de/?id=1576007, 2021
2021
Automated CFI Policy Assessment with Reckon
P Muntean
arXiv preprint arXiv:1812.08496, 2018
2018
POSTER: vTableShield: Precise Protecting of Virtual Function Dispatches in C++ Programs
P Muntean, P Xu, C Eckert
Google Ph.D. Student Summit on Compiler & Programming Technology, Munich …, 2016
2016
Automatic Security Checks on the Model Level
P Muntean, A Malkis
https://mediatum.ub.tum.de/doc/1341307/1341307.pdf, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20