Johannes Kinder

According to our database1, Johannes Kinder authored at least 35 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Everything Old is New Again: Binary Security of WebAssembly.
Proceedings of the 29th USENIX Security Symposium, 2020

Probabilistic Naming of Functions in Stripped Binaries.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time.
Proceedings of the 28th USENIX Security Symposium, 2019

Sound regular expression semantics for dynamic symbolic execution of JavaScript.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

A Formal Model for Checking Cryptographic API Usage in JavaScript.
Proceedings of the Computer Security - ESORICS 2019, 2019

BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Checking cryptographic API usage with composable annotations (short paper).
Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2018

Enabling Fair ML Evaluations for Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

ExpoSE: practical symbolic execution of standalone JavaScript.
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017

DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Modular Synthesis of Heap Exploits.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016

DroidScribe: Classifying Android Malware Based on Runtime Behavior.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

High System-Code Security with Low Overhead.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Efficient State Merging in Symbolic Execution.
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014

Tutorial I: Efficient symbolic execution for software testing.
Proceedings of the Twelfth ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2014

Efficient symbolic execution for software testing.
Proceedings of the Formal Methods in Computer-Aided Design, 2014

Prototyping symbolic execution engines for interpreted languages.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

Automated Debugging for Arbitrarily Long Executions.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Making automated testing of cloud applications an integral component of PaaS.
Proceedings of the Asia-Pacific Workshop on Systems, 2013

Towards Static Analysis of Virtualization-Obfuscated Binaries.
Proceedings of the 19th Working Conference on Reverse Engineering, 2012

Alternating Control Flow Reconstruction.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2012

Malware Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Supporting domain-specific state space reductions through local partial-order reduction.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Efficient model checking of fault-tolerant distributed protocols.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Static analysis of x86 executables (Statische Analyse von Programmen in x86-Maschinensprache).
PhD thesis, 2010

Proactive Detection of Computer Worms Using Model Checking.
IEEE Trans. Dependable Secur. Comput., 2010

Proving memory safety of floating-point computations by combining static and dynamic program analysis.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Precise static analysis of untrusted driver binaries.
Proceedings of 10th International Conference on Formal Methods in Computer-Aided Design, 2010

An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
Proceedings of the Verification, 2009

Jakstab: A Static Analysis Platform for Binaries.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008

Software transformations to improve malware detection.
J. Comput. Virol., 2007

Using Verification Technology to Specify and Detect Malware.
Proceedings of the Computer Aided Systems Theory, 2007

Detecting Malicious Code by Model Checking.
Proceedings of the Detection of Intrusions and Malware, 2005