Julian Kirsch

According to our database1, Julian Kirsch authored at least 10 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Malicious Bits and How to Fight Them.
PhD thesis, 2022

Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

2018
Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Smashing the Stack Protector for Fun and Profit.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

PwIN - Pwning Intel piN: Why DBI is Unsuitable for Security Applications.
Proceedings of the Computer Security, 2018

Honey, I Shrunk Your App Security: The State of Android App Hardening.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2017
Combating Control Flow Linearization.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
Autocorrelation-Based Detection of Infinite Loops at Runtime.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Counteracting Data-Only Malware with Code Pointer Examination.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015


  Loading...