Johannes Kinder

According to our database1, Johannes Kinder authored at least 36 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time.
Proceedings of the 28th USENIX Security Symposium, 2019

Sound regular expression semantics for dynamic symbolic execution of JavaScript.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

A Formal Model for Checking Cryptographic API Usage in JavaScript.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript.
CoRR, 2018

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time.
CoRR, 2018

BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Checking cryptographic API usage with composable annotations (short paper).
Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2018

Enabling Fair ML Evaluations for Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews.
CoRR, 2017

POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

ExpoSE: practical symbolic execution of standalone JavaScript.
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017

DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

Modular Synthesis of Heap Exploits.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016

DroidScribe: Classifying Android Malware Based on Runtime Behavior.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

2015
High System-Code Security with Low Overhead.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Tutorial I: Efficient symbolic execution for software testing.
Proceedings of the Twelfth ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2014

Efficient symbolic execution for software testing.
Proceedings of the Formal Methods in Computer-Aided Design, 2014

Prototyping symbolic execution engines for interpreted languages.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

2013
Automated Debugging for Arbitrarily Long Executions.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Making automated testing of cloud applications an integral component of PaaS.
Proceedings of the Asia-Pacific Workshop on Systems, 2013

2012
Towards Static Analysis of Virtualization-Obfuscated Binaries.
Proceedings of the 19th Working Conference on Reverse Engineering, 2012

Alternating Control Flow Reconstruction.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2012

Efficient state merging in symbolic execution.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

2011
Malware Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Supporting domain-specific state space reductions through local partial-order reduction.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Efficient model checking of fault-tolerant distributed protocols.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Static analysis of x86 executables (Statische Analyse von Programmen in x86-Maschinensprache).
PhD thesis, 2010

Proactive Detection of Computer Worms Using Model Checking.
IEEE Trans. Dependable Sec. Comput., 2010

Proving memory safety of floating-point computations by combining static and dynamic program analysis.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Precise static analysis of untrusted driver binaries.
Proceedings of 10th International Conference on Formal Methods in Computer-Aided Design, 2010

2009
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
Proceedings of the Verification, 2009

2008
Jakstab: A Static Analysis Platform for Binaries.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008

2007
Software transformations to improve malware detection.
Journal in Computer Virology, 2007

Using Verification Technology to Specify and Detect Malware.
Proceedings of the Computer Aided Systems Theory, 2007

2005
Detecting Malicious Code by Model Checking.
Proceedings of the Detection of Intrusions and Malware, 2005


  Loading...