TUM Logo

Claudia Eckert

Prof. Dr. Claudia Eckert

Chair

Address:

Technische Universität München
Chair for IT Security (I20)
Boltzmannstraße 3
85748 Garching (near Munich)
Germany


Phone: +49 (0)89 289-18577
Fax: +49 (0)89 289-18579
E-Mail:
Room: 01.08.054




Prof. Dr. Claudia Eckert ist Leiterin des Fraunhofer-Instituts für Angewandte und Integrierte Sicherheit AISEC in Garching und Professorin der Technischen Universität München, wo sie den Lehrstuhl für Sicherheit in der Informatik an der Fakultät für Informatik innehat. Zu ihren Forschungsschwerpunkten zählen die Entwicklung von Technologien zur Erhöhung der System- und Anwendungssicherheit, die Sicherheit eingebetteter Systeme und die Erforschung neuer Techniken zur Erhöhung der Resilienz und Robustheit von Systemen gegen Angriffe. Ihre Forschungsergebnisse wurden in über 160 begutachteten Fachbeiträgen veröffentlicht.

Seit 1.1.2018 ist sie die Sprecherin des Fraunhofer Clusters of Excellence Cognitive Internet Technologies CCIT, in dem die Expertisen von über 20 Fraunhofer-Instituten gebündelt werden, um neue kognitive Lösungen vom Sensor über Edge-Devices bis in die Cloud-Plattformen für die Digitalisierung insbesondere im industriellen Umfeld zu entwickeln und umzusetzen.

Als Mitglied verschiedener nationaler und internationaler industrieller Beiräte und wissenschaftlicher Gremien berät sie Unternehmen, Wirtschaftsverbände sowie die öffentliche Hand in allen Fragen der IT-Sicherheit. In Fachgremien wirkt sie mit an der Gestaltung der technischen und wissenschaftlichen Rahmenbedingungen in Deutschland sowie an der Ausgestaltung von wissenschaftlichen Förderprogrammen auf EU-Ebene.

Office Hours

 Please contact our secretary to arrange individual appointments.

 

Anerkennung von Lehrveranstaltungen

Anerkennungen von Auslandssemestern, Gutachten und Empfehlungsschreiben durch Frau Prof. Eckert können nur nach einem persönlichen Gespräch erfolgen. Wir bitten Sie daher, über das Sekretariat einen Termin zu vereinbaren.

 

Kurzlebenslauf

2001 - 2008 Professur für IT-Sicherheit an der Technischen Universität Darmstadt
2001 - 2011 Leitung des Fraunhofer-Instituts für Sichere Informationstechnologie SIT, Darmstadt
seit 2008 Professur für IT-Sicherheit an der Technischen Universität München und Leitung des Fraunhofer-Instituts für Angewandte und Integrierte Sicherheit AISEC
seit 2018 Sprecherin des Fraunhofer Clusters of Excellence Cognitive Internet Technologies CCIT

 

Contact to the Fraunhofer Institute AISEC

Address: Fraunhofer Institute for Applied and Integrated Security (AISEC)
Lichtenbergstr. 11
85748 Garching (near Munich)
Phone: +49 (0)89 3229986-292
E-Mail: claudia.eckert@aisec.fraunhofer.de

 

 

Publications

2021   Hybroid: Toward Android Malware Detectionand Categorization with Program Code and Network Traffic

International Security Conference (ISC 2021)

  Falcon: Malware Detection and Categorization with Network Traffic Images

ICANN - The International Conference on Artificial Neural Networks

  HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs

ICANN - The International Conference on Artificial Neural Networks

  iTOP: Automating Counterfeit Object-Oriented Programming Attacks

Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2021, San Sebastian, Spain, October 6-8, 2021, Proceedings

2020   ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings

Annual Computer Security Applications Conference (ACSAC), ACM, 2020

  Detecting and Categorizing Android Malware with Graph Neural Networks

The 36th ACM/SIGAPP Symposium On Applied Computing

  IntRepair: Informed Repairing of Integer Overflows

International Conference on Software Engineering (ICSE), Journal First, ACM/IEEE

2019   Analyzing Control Flow Integrity with LLVM-CFI

Annual Computer Security Applications Conference (ACSAC), ACM, 2019.

  IntRepair: Informed Repairing of Integer Overflows

Transactions on Software Engineering (TSE), IEEE

  MANIS: Evading Malware Detection System on Graph Structure

The 35th ACM/SIGAPP Symposium On Applied Computing

2018   Learning on a Budget for User Authentication on Mobile Devices

Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018)

  Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection

Annual Computer Security Applications Conference (ACSAC)

  τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.

Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12,2018, Proceedings

  CastSan: Efficient Detection of Polymorphic {C++} Object Type Confusions with {LLVM}

Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}

  Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks

Proceedings of the 13th International Conference on Availability, Reliability and Security ARES 2018

2017   Cyber-Sicherheit in Industrie 4.0

Handbuch Industrie 4.0 Geschäftsmodelle, Prozesse, Technik

  Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung

Informatik-Spektrum 40

  Dynamic Loader Oriented Programming on Linux

1st Reversing and Offensive-oriented Trends Symposium 2017 (ROOTS)

  Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage

14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)

  Empowering Convolutional Networks for Malware Classification and Analysis

30th International Joint Conference on Neural Networks (IJCNN)

  Combating Control Flow Linearization

32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)

2016   CoKey: Fast token-based cooperative cryptography

Association for Computing Machinery -ACM-

  Deep Learning for Classification of Malware System Call Sequences

29th Australasian Joint Conference on Artificial Intelligence (AI)

  POSTER: vTableShield: Precise Protecting of Virtual Function Dispatches in C++ Programs

Google Ph.D. Student Summit on Compiler & Programming Technology, Munich, Germany

  Novel weaknesses in IEC 62351 protected Smart Grid control systems

IEEE International Conference on Smart Grid Communications, SmartGridComm 2016

  Policy-based implicit attestation for microkernel-based virtualized systems

Information security. 19th international conference, ISC 2016

  SKALD: A Scalable Architecture for Feature Extraction, Multi-User Analysis, and Real-Time Information Sharing

19th International Conference on Information Security (ISC)

  DeepFuzz: Triggering vulnerabilities deeply hidden in binaries

Detection of intrusions and malware, and vulnerability assessment. 13th International Conference

  Adaptive Semantics-Aware Malware Classification

13th Conference on Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)

  Interactive Function Identification Decreasing the Effort of Reverse Engineering

Proceedings of the 11th International Conference on Information Security and Cryptology (Inscrypt 2015)

2015   Neural Network-Based User-Independent Physical Activity Recognition for Mobile Devices

Intelligent Data Engineering and Automated Learning--IDEAL 2015

  iDeFEND: Intrusion Detection Framework for Encrypted Network Data

Proceedings of the 14th International Conference on Cryptology and Network Security (CANS 2015)

  iDeFEND: Intrusion Detection Framework for Encrypted Network Data

Proceedings of the 14th International Conference on Cryptology and Network Security (CANS 2015)

  Counteracting Data-Only Malware with Code Pointer Examination

18th International Symposium on Research in Attacks, Intrusions and Defenses

  POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT

TechDays Cyber Security Workshop, Munich, Germany

  Automated Generation of Buffer Overflows Quick Fixes using Symbolic Execution and SMT

International Conference on Computer Safety, Reliability & Security (SAFECOMP), Delft, The Netherlands, September 2015. Springer LNCS

  Virtual Machine Introspection with Xen on ARM

2nd Workshop on Security in highly connected IT systems (SHCIS)

  Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code

International Conference on Software Quality, Reliability and Security Companion (QRS-C), Vancouver, Canada

  Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units

SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography

  Is Feature Selection Secure against Training Data Poisoning?

Proceedings of The 32nd International Conference on Machine Learning (ICML'15)

  POSTER: Automated Generation of Buffer Overflow Quick Fixes using Symbolic Execution and SMT

Security Network Munich and BICCnet Workshop, Munich, Germany

  Retrospective Protection utilizing Binary Rewriting

14. Deutscher IT-Sicherheitskongress

  User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts

Proceedings of the 11th International Conference on Information Security Practice and Experience (ISPEC 2015)

  Detecting Fingerprinted Data in TLS Traffic

Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)

  Industrie 4.0 meets IT-Sicherheit: eine Herausforderung!

Informatik-Spektrum

  Blind Format String Attacks

Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014)

2014   SobiTra – A Software-based Trust-Anchor for ARM Cortex Application Processors

Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY ’14)

  IT-Sicherheit und Cloud Computing

Springer Vieweg

  Efficient Attack Forest Construction for Automotive On-board Networks

Lecture Notes in Computer Science

  Code Validation for Modern OS Kernels

Workshop on Malware Memory Forensics (MMF)

  Context-sensitive Detection of Information Exposure Bugs with Symbolic Execution

International Workshop on Innovative Software Development Methodologies and Practices (InnoSWDev), Hong Kong, China

  Multi-tiered Security Architecture for ARM via the Virtualization and Security Extensions

1st Workshop on Security in highly connected IT systems

  Support Vector Machines under Adversarial Label Contamination

Journal of Neurocomputing, Special Issue on Advances in Learning with Label Noise

  Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data

Proceedings of the 23rd USENIX Security Symposium

  Persistent Data-only Malware: Function Hooks without Code

Proceedings of the 21th Annual Network & Distributed System Security Symposium (NDSS)

2013   Identities for Embedded Systems Enabled by Physical Unclonable Functions

Number Theory and Cryptography (Lecture Notes in Computer Science)

  Security Issues of Multi-Core Architectures—The Automotive Case

it-Information Technology

  Middleware-based Security for Hyperconnected Applications in Future In-Car Networks

EAI Endorsed Transactions on Mobile Communications and Applications

  Practical Information-Flow Aware Middleware for In-Car Communication

Workshop on Security, Privacy and Dependability for CyberVehicles (CyCAR’13)

  Leveraging In-Car Security by Combining Information Flow Monitoring Techniques

Second International Conference on Advances in Vehicular Systems Technologies and Applications (VEHICULAR 2013)

  Automotive Proxy-based Security Architecture for CE Device Integration

Mobile Wireless Middleware, Operating Systems, and Applications

  Improving Mobile Device Security with Operating System-level Virtualization

28th IFIP International Information Security and Privacy Conference (SEC 2013)

  Online Lazy Gaussian Process Committee and its Application in Real-Time Trajectory Prediction

Information Sciences

  Efficient Online Sequence Prediction with Side Information

IEEE International Conference on Data Mining (ICDM)

  Active File Integrity Monitoring using Paravirtualized Filesystems.

Proceedings of the 5th International Conference on Trusted Systems (InTrust 2013)

  Indicative Support Vector Clustering with its Application on Anomaly Detection

IEEE 12th International Conference on Machine Learning and Applications (ICMLA'13)

  Verifiable Trust between Electronic Control Units based on a single Trust Anchor

11th Embedded Security in Cars (escar)

  Lightweight Attestation & Secure Code Update for Multiple Separated Microkernel Tasks

Proceedings of the ISC 2013: The 16th Information Security Conference

  Lazy Gaussian Process Committee for Real-Time Online Regression

27th AAAI Conference on Artificial Intelligence (AAAI '13)

  Leveraging String Kernels for Malware Detection

Proceedings of the 7th International Conference on Network and System Security

  X-TIER: Kernel Module Injection

Proceedings of the 7th International Conference on Network and System Security

  Learning from Multiple Observers with Unknown Expertise

Proceedings of 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining

  OPARS: Objective Photo Aesthetics Ranking System

34th European Conference on Information Retrieval (ECIR'13)

2012   Smart Mobile Apps -- Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesse

Springer

  Actively Learning Probabilistic Subsequential Transducers

Proceedings of ICGI

  Automotive Proxy-based Security Architecture for CE Device Integration

MOBILWARE 2012, 5th International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, Berlin, Germany, November 13–14, 2012

  Towards Secure Fieldbus Communication

31st International Conference on Computer Safety, Reliability and Security (SAFECOMP)

  Flash: Efficient, Stable and Optimal K-Anonymity

Proceedings of the 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT)

  Adversarial Label Flips Attack on Support Vector Machines

20th European Conference on Artificial Intelligence (ECAI)

  Highly Efficient Optimal K-Anonymity For Biomedical Datasets

Proceedings of the 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)

  Evasion Attack of Multi-Class Linear Classifiers

Proceedings of the 16th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD)

  Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture

Proceedings of {EuroSec}'12, 5th European Workshop on System Security

  Bridging the Semantic Gap Through Static Code Analysis

Proceedings of {EuroSec}'12, 5th European Workshop on System Security

2011   Sicherheit im Smart Grid - Herausforderungen und Handlungsempfehlungen

Datenschutz und Datensicherheit

  Innovative Sicherheitstechnologien: sine-qua-non für safety-kritische Systeme?

IT-Sicherheit zwischen Regulierung und Innovation, Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit

  Nitro: Hardware-based System Call Tracing for Virtual Machines

Advances in Information and Computer Security

  A Universal Semantic Bridge for Virtual Machine Introspection

Information Systems Security

  T-CUP: A TPM-based Code Update Protocol Enabling Attestations for Sensor Networks

7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm)

2010   Grammatical Inference Algorithms in MATLAB

ICGI 2010: Proceedings of the 10th International Colloquium on Grammatical Inference

  PSMA: A Parallel Algorithm for Learning Regular Languages

NIPS Workshop on Learning on Cores, Clusters and Clouds

  Improving the Quality of Ring Oscillator PUFs on FPGAs

Proceedings of the 5th Workshop on Embedded Systems Security (WESS'2010)

  Konzept für ein deutschlandweites Krankheitsnetz am Beispiel von mitoREGISTER

GI Jahrestagung (2)

  Datenschutz und Datensicherheit in intelligenten Energienetzen

DACH Security 2010

  Exploiting the x86 Architecture to Derive Virtual Machine State Information

Proceedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2010)

  Digitale Daten in Geräten und Systemen

Carl-Heymanns-Verlag

2009   PDoS-Resilient Push Protocols for Sensor Networks

The Third International Conference on Sensor Technologies and Applications (SENSORCOMM 2009)

  On Multi-Authority Ciphertext-Policy Attribute-Based Encryption

Bulletin of the Korean Mathematical Society

  A Formal Model for Virtual Machine Introspection

Proceedings of the 2nd Workshop on Virtual Machine Security (VMSec '09)

  On Controlled Sharing of Virtual Goods

Proceedings of the 7th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods

  ITK-Kompendium 2010

FAZ-Institut

  Enhancing Control of Service Compositions in Service-Oriented Architectures

Proceedings of the Third International Workshop on Advances in Information Security ({WAIS} 2009)

2008   Ways to Track Your Lover

Proceedings of the WiVeC Symposium 2008

  Measuring Unlinkability Revisited

Seventh ACM Workshop on Privacy in the Electronic Society (WPES '08)

  Defending against False-Endorsement-Based DoS Attacks in Wireless Sensor Networks

WiSec '08: Proceedings of the First ACM Conference on Wireless Network Security

  An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs

International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications

  On Handling Insider Attacks in Wireless Sensor Networks

Information Security Technical Report

  Distributed Attribute-Based Encryption

11th International Conference on Information Security and Cryptology (ICISC 08)

  Towards Secure E-Commerce Based on Virtualization and Attestation Techniques

Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008)

  A Reputation System for Electronic Negotiations

Computer Standards & Interfaces

  Improving the Scalability of Platform Attestation

Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC'08)

  Distributed Attribute-Based Encryption

11th International Conference on Information Security and Cryptology (ICISC 08)

  Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques

Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008)

  Measuring Unlinkability Revisited

Seventh ACM Workshop on Privacy in the Electronic Society (WPES '08)

2007   Situation-based Policy Enforcement

Proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus'07)

  Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques

Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks

  Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques

Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks

  A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks

2nd International Conference on Availability, Reliability and Security ({ARES}) 2007

  Ambient Intelligence: Neue Herausforderungen fuer die IT-Sicherheit

TU-Darmstadt, thema Forschung

2006   Artificial Immune Systems for IT-Security

it-Information Technology (Systems Biology and Information Technology)

  On the Use of Hyperspheres in Artificial Immune Systems as Antibody Recognition Regions

Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)

  On Permutation Masks in Hamming Negative Selection

Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)

  Hades - Hardware Assisted Document Security

Second Workshop on Advances in Trusted Computing (WATC '06 Fall)

  A Robust Integrity Reporting Protocol for Remote Attestation

Second Workshop on Advances in Trusted Computing (WATC '06 Fall)

  History-based Access Control and Information Flow Control for Structured Documents

Proceedings of the First International Workshop on Security (IWSEC 2006)

  Experimental Performance Evaluation of Secure, Mobile IP-based, 3G-WLAN Handover.

Wireless Personal Multimedia Communications (WPMC)

  Secure Mobility in Beyond 3G

Wireless Personal Multimedia Communications (WPMC)

  The Link between r-contiguous Detectors and k-CNF Satisfiability

Proceedings of the Congress on Evolutionary Computation (CEC-2006)

  Generalization Regions in Hamming Negative Selection

Intelligent Information Systems (IIS-2006)

  Interworking von UMTS und WLAN: Nutzen und Sicherheitsaspekte

Telekommunikation Aktuell, Berichte aus Forschung und Entwicklung in Informationstechnik und Telekommunikation

2005   Secure mobile business solutions for real-time enterprises

Springer-Verlag

  Security Issues of Mobile Devices

Security in Pervasive Computing, Second International Conference, SPC 2005

  RBAC Policy Engineering with Patterns

Proceedings of the Semantic Web and Policy Workshop

  Is Negative Selection Appropriate for Anomaly Detection ?

Proceedings of the ACM SIGEVO Genetic and Evolutionary Computation Conference (GECCO-2005)

  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques

Proceedings of the 4th International Conference on Artificial Immune Systems (ICARIS-2005)

  Mobile Kommunikation: Technik und Sicherheitsprobleme

Datenschutz in der mobilen Welt - Realität oder Utopie?

  Kundenbindung durch ein anonymes Rabattsystem

Konferenz D-A-CH Security

  Mobile Technologien -- Chancen und neue IT-Sicherheitsrisiken

9ter deutscher Sicherheitskongreß des BSI

  Ubiquitäre Sicherheit für dynamische, mobile Systeme – eine Herausforderung für die IT-Sicherheit

PIK

  Identification of Security Requirements in WLAN-WLAN Inter-Domain Handovers based on Threat And Risk Analysis

The 8th International Symposium on Wireless Personal Multimedia Communications WPMC 2005

  On the Appropriateness of Negative Selection defined over Hamming Shape-Space as a Network Intrusion Detection System

Proceedings of the Congress on Evolutionary Computation (CEC-2005)

2004   An Investigation of R-Chunk Detector Generation on Higher Alphabets

Genetic and Evolutionary Computation GECCO 2004

  Protected Transmission of Biometric Authentication Data for Oncard-Matching

SAC 2004 Security

  NGN, AII-IP, B3G: Enabler für das Future Net?! Üerblick über Entwicklungen im Bereich zukünftiger Netze

Informatik-Spektrum

  Interworking von UMTS und WLAN: eine sicherheitstechnische Betrachtung

18. DFN-Tagung

  Technologie-Entwicklungen und Probleme auf dem Weg zum Future Net

18. DFN-Tagung

  SIMS - eine Simulationsumgebung zur Analyse von Klassen von Angriffen

Konferenz D-A-CH Security,

  IT-Sicherheit: Probleme, Lösungen und einige neue Herausforderungen

TU-Darmstadt, thema Forschung

2003   Sicheres mobiles Arbeiten - Zwischen Wunsch und Wirklichkeit

Zeitschrift FifF-Kommunikation

  Mobil, aber sicher!

Springer Verlag

  Schwerpunkt "IT-Sicherheit" Mobiles Arbeiten, sind Sie sicher?

Zeitschrift "Frauenarbeit und Informatik", Schwerpunkt "IT-Sicherheit"

  Sicherheit und E-Learning

Workshop "E-Learning: Beherrschbarkeit und Sicherheit"

  Die Technik in der IT-Sicherheit

Zeitschrift "Frauenarbeit und Informatik", Schwerpunkt "IT-Sicherheit"

  Schutz biometrischer Daten bei Authentisierung auf Smartcards

Konferenz D-A-CH Security

  Sicherheit -- Bremse oder Schrittmacher?

Comtec zeitschrift für Telekommunikationstechnik

2002   Pseudonymes Einkaufen physischer Güter für Internet-Shops ohne Zwischenhändler

Konferenz Elektronische Geschäftsprozesse

  IT-Sicherheit - Schrittmacher oder Bremser der Innovationen

Springer Verlag

  IT-Sicherheit: Innovationen für die Informations- und Wissensgesellschaft

M, Fachzeitschrift für Information Management & Consulting

  Ein Vergleich moderner Linux-Sicherheitsmechanismen

Konferenz Elektronische Geschäftsprozesse

2001   Anonym im Internet? Probleme und Lösungen

Arbeitskonferenz Kommunikationssicherheit

  Internet Anonymity: Problems and Solutions

Proceedings of the International Conference on Information Security, Trusted Information - The New Decade Challenge

  Zur Sicherheit mobiler persönlicher Endgeräte - eine Bestandsaufnahme

Arbeitskonferenz Kommunikationssicherheit

2000   Mobile Devices In eBusiness - New Opportunities And New Risks

Proceedings of the SIS2000 Workshop

  Trust and Confidence in Open Systems: Does Security Harmonize with Mobility?

9th ACM SIGOPS European Workshop Beyond the PC: New Challenges for the Operating Systems

  GSFS - a New Group-Aware Cryptographic File System

Proceedings of the World Computer Congress, SEC2000

  Flexible, Distributed and Adaptive Ressource Managament in MoDIS

Proceedings Europar2000

  GSFS - ein gruppenfähiges, verschlüsselndes Dateisystem

Arbeitskonferenz Systemsicherheit

1999   Improving Resource Management in Distributed Systems using Language-level Structuring Concepts

The Journal of Supercomputing

1998   Mobil und anonym im Netz mit dem Mixed Mobile Internet Protocol

Zeitschrift der Datenschutz-Berater

  Sichere, verteilte Systeme – Konzepte, Modelle und Systemarchitekturen