Johannes Kinder

Orcid: 0000-0002-8594-7839

According to our database1, Johannes Kinder authored at least 44 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version).
CoRR, 2024

2023
Are Machine Learning Models for Malware Detection Ready for Prime Time?
IEEE Secur. Priv., 2023

XFL: Naming Functions in Binaries with Extreme Multi-label Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Differential Static Analysis for Detecting Malicious Updates to Open Source Packages.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023

Poster: Privacy Risks from Misconfigured Android Content Providers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Using CodeQL to Detect Malware in npm.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Systematic Generation of Conformance Tests for JavaScript.
CoRR, 2021

XFL: eXtreme Function Labeling.
CoRR, 2021

2020
Everything Old is New Again: Binary Security of WebAssembly.
Proceedings of the 29th USENIX Security Symposium, 2020

Probabilistic Naming of Functions in Stripped Binaries.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time.
Proceedings of the 28th USENIX Security Symposium, 2019

Sound regular expression semantics for dynamic symbolic execution of JavaScript.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

A Formal Model for Checking Cryptographic API Usage in JavaScript.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Checking cryptographic API usage with composable annotations (short paper).
Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2018

Enabling Fair ML Evaluations for Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

ExpoSE: practical symbolic execution of standalone JavaScript.
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017

DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Modular Synthesis of Heap Exploits.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

2016
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016

DroidScribe: Classifying Android Malware Based on Runtime Behavior.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

2015
High System-Code Security with Low Overhead.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Efficient State Merging in Symbolic Execution.
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014

Tutorial I: Efficient symbolic execution for software testing.
Proceedings of the Twelfth ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2014

Efficient symbolic execution for software testing.
Proceedings of the Formal Methods in Computer-Aided Design, 2014

Prototyping symbolic execution engines for interpreted languages.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

2013
Automated Debugging for Arbitrarily Long Executions.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Making automated testing of cloud applications an integral component of PaaS.
Proceedings of the Asia-Pacific Workshop on Systems, 2013

2012
Towards Static Analysis of Virtualization-Obfuscated Binaries.
Proceedings of the 19th Working Conference on Reverse Engineering, 2012

Alternating Control Flow Reconstruction.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2012

2011
Malware Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Supporting domain-specific state space reductions through local partial-order reduction.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Efficient model checking of fault-tolerant distributed protocols.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Static analysis of x86 executables (Statische Analyse von Programmen in x86-Maschinensprache).
PhD thesis, 2010

Proactive Detection of Computer Worms Using Model Checking.
IEEE Trans. Dependable Secur. Comput., 2010

Proving memory safety of floating-point computations by combining static and dynamic program analysis.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010

Precise static analysis of untrusted driver binaries.
Proceedings of 10th International Conference on Formal Methods in Computer-Aided Design, 2010

2009
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
Proceedings of the Verification, 2009

2008
Jakstab: A Static Analysis Platform for Binaries.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008

2007
Software transformations to improve malware detection.
J. Comput. Virol., 2007

Using Verification Technology to Specify and Detect Malware.
Proceedings of the Computer Aided Systems Theory, 2007

2005
Detecting Malicious Code by Model Checking.
Proceedings of the Detection of Intrusions and Malware, 2005


  Loading...