According to our database1, Johannes Kinder authored at least 35 papers between 2005 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014
Proceedings of the Twelfth ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2014
Proceedings of the Formal Methods in Computer-Aided Design, 2014
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013
Proceedings of the Asia-Pacific Workshop on Systems, 2013
Proceedings of the 19th Working Conference on Reverse Engineering, 2012
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2012
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Supporting domain-specific state space reductions through local partial-order reduction.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Static analysis of x86 executables (Statische Analyse von Programmen in x86-Maschinensprache).
PhD thesis, 2010
IEEE Trans. Dependable Secur. Comput., 2010
Proving memory safety of floating-point computations by combining static and dynamic program analysis.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of 10th International Conference on Formal Methods in Computer-Aided Design, 2010
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
Proceedings of the Verification, 2009
Proceedings of the Computer Aided Verification, 20th International Conference, 2008
Proceedings of the Computer Aided Systems Theory, 2007
Proceedings of the Detection of Intrusions and Malware, 2005