Follow
Dr. Paul Muntean
Title
Cited by
Cited by
Year
CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries
P Muntean, M Fischer, G Tan, Z Lin, J Grossklags, C Eckert
Proceedings of the 21th International Symposium on Research in Attacks …, 2018
272018
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography
F Fischer, H Xiao, CY Kao, Y Stachelscheid, B Johnson, D Raza, ...
USENIX Security Symposium, 2019
232019
Automated generation of buffer overflow quick fixes using symbolic execution and SMT
P Muntean, V Kommanapalli, A Ibing, C Eckert
International Conference on Computer Safety, Reliability, and Security …, 2015
232015
IntRepair: Informed Repairing of Integer Overflows
P Muntean, M Monperrus, H Sun, J Grossklags, C Eckert
IEEE Transactions on Software Engineering (TSE), 16, 2019
132019
Castsan: Efficient detection of polymorphic C++ object type confusions with LLVM
P Muntean, S Wuerl, J Grossklags, C Eckert
European Symposium on Research in Computer Security (ESORICS), 3-25, 2018
122018
Context-sensitive detection of information exposure bugs with symbolic execution
P Muntean, C Eckert, A Ibing
Proceedings of the International Workshop on Innovative Software Development …, 2014
112014
Analyzing control flow integrity with LLVM-CFI
P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
102019
τcfi: Type-assisted control flow integrity for x86-64 binaries
J Grossklags, C Eckert
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
62018
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code
P Muntean, A Rabbi, A Ibing, C Eckert
International Conference on Software Quality, Reliability and Security …, 2015
62015
Practical Integer Overflow Prevention
P Muntean, J Grossklags, C Eckert
arXiv preprint arXiv:1710.03720, 2017
52017
A Framework for the Creation of Mobile Educational Games for Dyslexic Children
J Haladjian, D Richter, P Muntean, D Ismailovic, B Brügge
International Association for Development of the Information Society, 2013
52013
SMT-constrained symbolic execution engine for integer overflow detection in C code
P Muntean, M Rahman, A Ibing, C Eckert
Information Security for South Africa (ISSA), 1-8, 2015
42015
Mobile robot navigation on partially known maps using a fast a star algorithm version
P Muntean
arXiv preprint arXiv:1604.08708, 2016
32016
Computer Safety, Reliability, and Security: 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015
P Muntean, V Kommanapalli, A Ibing, C Eckert
Proceedings, 441-456, 2015
3*2015
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings
P Muntean, M Neumayer, Z Lin, G Tan, J Grossklags, C Eckert
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
22020
Intrepair: Informed fixing of integer overflows
P Muntean, M Monperrus, H Sun, J Grossklags, C Eckert
arXiv preprint arXiv, 2018
22018
A framework for game tuning
J Haladjian, F Ziegler, B Simeonova, B Köhler, P Muntean, D Ismailović, ...
IADIS Game and Entertainment Techonologies, 2012
12012
iTOP: Automating Counterfeit Object-Oriented Programming Attacks
P Muntean, R Viehoever, Z Lin, G Tan, J Grossklags, C Eckert
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
2021
Mitigation of Advanced Code Reuse Attacks, PhD Thesis
P Muntean
https://mediatum.ub.tum.de/?id=1576007, 2021
2021
Automated CFI Policy Assessment with Reckon
P Muntean
arXiv preprint arXiv:1812.08496, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20