What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Claudia Eckert
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2020
conf/acsac
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
Paul Muntean
Matthias Neumayer
Zhiqiang Lin
Gang Tan
Jens Grossklags
Claudia Eckert
2019
conf/acsac
Analyzing control flow integrity with LLVM-CFI.
Paul Muntean
Matthias Neumayer
Zhiqiang Lin
Gang Tan
Jens Grossklags
Claudia Eckert
2018
conf/esorics
CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM.
Paul Muntean
Sebastian Wuerl
Jens Grossklags
Claudia Eckert
2018
conf/acsac
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection.
Sergej Proskurin
Tamas K. Lengyel
Marius Momeu
Claudia Eckert
Apostolis Zarras
2017
conf/sec
Combating Control Flow Linearization.
Julian Kirsch
Clemens Jonischkeit
Thomas Kittel
Apostolis Zarras
Claudia Eckert
2016
conf/acsac
CoKey: fast token-based cooperative cryptography.
Julian Horsch
Sascha Wessel
Claudia Eckert
2015
journals/compsec
Improving mobile device security with operating system-level virtualization.
Sascha Wessel
Manuel Huber
Frederic Stumpf
Claudia Eckert
2015
conf/ccs
Detecting Fingerprinted Data in TLS Traffic.
Konstantin Böttinger
Dieter Schuster
Claudia Eckert
2015
conf/cans
iDeFEND: Intrusion Detection Framework for Encrypted Network Data.
Fatih Kiliç
Claudia Eckert
2014
conf/uss
Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data.
Sebastian Vogl
Robert Gawlik
Behrad Garmany
Thomas Kittel
Jonas Pfoh
Claudia Eckert
Thorsten Holz
2014
conf/ndss
Persistent Data-only Malware: Function Hooks without Code.
Sebastian Vogl
Jonas Pfoh
Thomas Kittel
Claudia Eckert
2013
conf/ccs
Practical information-flow aware middleware for in-car communication.
Alexandre Bouard
Benjamin Weyl
Claudia Eckert
2013
conf/sec
Improving Mobile Device Security with Operating System-Level Virtualization.
Sascha Wessel
Frederic Stumpf
Ilja Herdt
Claudia Eckert
2011
conf/iciss
A Universal Semantic Bridge for Virtual Machine Introspection.
Christian A. Schneider
Jonas Pfoh
Claudia Eckert
2011
conf/iwsec
Nitro: Hardware-Based System Call Tracing for Virtual Machines.
Jonas Pfoh
Christian A. Schneider
Claudia Eckert
2009
conf/ccs
A formal model for virtual machine introspection.
Jonas Pfoh
Christian A. Schneider
Claudia Eckert
2008
journals/istr
On handling insider attacks in wireless sensor networks.
Christoph Krauß
Markus Schneider
Claudia Eckert
2008
conf/ccs
Improving the scalability of platform attestation.
Frederic Stumpf
Andreas Fuchs
Stefan Katzenbeisser
Claudia Eckert
2008
conf/icisc
Distributed Attribute-Based Encryption.
Sascha Müller
Stefan Katzenbeisser
Claudia Eckert
2008
conf/wisec
Defending against false-endorsement-based dos attacks in wireless sensor networks.
Christoph Krauß
Markus Schneider
Claudia Eckert
2007
conf/ccs
History-based access control for XML documents.
Patrick Röder
Omid Tafreschi
Claudia Eckert
2007
conf/wisa
An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks.
Frederic Stumpf
Patrick Röder
Claudia Eckert
2007
conf/icics
A System Architecture for History-Based Access Control for XML Documents.
Patrick Röder
Omid Tafreschi
Fredrik Mellgren
Claudia Eckert
2001
conf/sec
Internet Anonymity: Problems and Solutions.
Claudia Eckert
A. Pircher
2000
conf/sec
GSFS - A New Group-Aware Cryptographic File System.
Claudia Eckert
Florian Erhard
Johannes Geiger
1997
conf/sec
Developing secure applications: a systematic approach.
Claudia Eckert
D. Marek
1997
conf/sec
MVS-SAT: a security administration tool to support SMF protocol data evaluation.
Claudia Eckert
Th. Stoesslein
1996
conf/sec
On security models.
Claudia Eckert
Coauthors
A. Pircher
(1)
Alexandre Bouard
(1)
Andreas Fuchs
(1)
Apostolis Zarras
(2)
Behrad Garmany
(1)
Benjamin Weyl
(1)
Christian A. Schneider
(3)
Christoph Krauß
(2)
Claudia Eckert
(28)
Clemens Jonischkeit
(1)
D. Marek
(1)
Dieter Schuster
(1)
Fatih Kiliç
(1)
Florian Erhard
(1)
Frederic Stumpf
(4)
Fredrik Mellgren
(1)
Gang Tan
(2)
Ilja Herdt
(1)
Jens Grossklags
(3)
Johannes Geiger
(1)
Jonas Pfoh
(5)
Julian Horsch
(1)
Julian Kirsch
(1)
Konstantin Böttinger
(1)
Manuel Huber
(1)
Marius Momeu
(1)
Markus Schneider
(2)
Matthias Neumayer
(2)
Omid Tafreschi
(2)
Patrick Röder
(3)
Paul Muntean
(3)
Robert Gawlik
(1)
Sascha Müller
(1)
Sascha Wessel
(3)
Sebastian Vogl
(2)
Sebastian Wuerl
(1)
Sergej Proskurin
(1)
Stefan Katzenbeisser
(2)
Tamas K. Lengyel
(1)
Th. Stoesslein
(1)
Thomas Kittel
(3)
Thorsten Holz
(1)
Zhiqiang Lin
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to