default search action
Johannes Kinder
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i7]Zeliang Kan, Shae McFadden, Daniel Arp, Feargus Pendlebury, Roberto Jordaney, Johannes Kinder, Fabio Pierazzi, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version). CoRR abs/2402.01359 (2024) - 2023
- [j4]Lorenzo Cavallaro, Johannes Kinder, Feargus Pendlebury, Fabio Pierazzi:
Are Machine Learning Models for Malware Detection Ready for Prime Time? IEEE Secur. Priv. 21(2): 53-56 (2023) - [c36]Matías F. Gobbi, Johannes Kinder:
Poster: Using CodeQL to Detect Malware in npm. CCS 2023: 3519-3521 - [c35]Christopher Lenk, Johannes Kinder:
Poster: Privacy Risks from Misconfigured Android Content Providers. CCS 2023: 3579-3581 - [c34]Fabian Niklas Froh, Matías Federico Gobbi, Johannes Kinder:
Differential Static Analysis for Detecting Malicious Updates to Open Source Packages. SCORED@CCS 2023: 41-49 - [c33]James Patrick-Evans, Moritz Dannehl, Johannes Kinder:
XFL: Naming Functions in Binaries with Extreme Multi-label Learning. SP 2023: 2375-2390 - 2022
- [c32]Hernán Ponce de León, Johannes Kinder:
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. SP 2022: 235-248 - 2021
- [i6]James Patrick-Evans, Moritz Dannehl, Johannes Kinder:
XFL: eXtreme Function Labeling. CoRR abs/2107.13404 (2021) - [i5]Blake Loring, Johannes Kinder:
Systematic Generation of Conformance Tests for JavaScript. CoRR abs/2108.07075 (2021) - [i4]Hernán Ponce de León, Johannes Kinder:
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. CoRR abs/2108.13818 (2021) - 2020
- [c31]James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder:
Probabilistic Naming of Functions in Stripped Binaries. ACSAC 2020: 373-385 - [c30]Daniel Lehmann, Johannes Kinder, Michael Pradel:
Everything Old is New Again: Binary Security of WebAssembly. USENIX Security Symposium 2020: 217-234
2010 – 2019
- 2019
- [c29]Duncan Mitchell, Johannes Kinder:
A Formal Model for Checking Cryptographic API Usage in JavaScript. ESORICS (1) 2019: 341-360 - [c28]Blake Loring, Duncan Mitchell, Johannes Kinder:
Sound regular expression semantics for dynamic symbolic execution of JavaScript. PLDI 2019: 425-438 - [c27]Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. USENIX Security Symposium 2019: 729-746 - [e4]Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, Jonathan Katz:
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6747-9 [contents] - [e3]Lorenzo Cavallaro, Johannes Kinder, Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6833-9 [contents] - [e2]Lorenzo Cavallaro, Johannes Kinder, Thorsten Holz:
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, CPS-SPC@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6831-5 [contents] - [e1]Lorenzo Cavallaro, Johannes Kinder, Josep Domingo-Ferrer:
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, WPES@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6830-8 [contents] - 2018
- [c26]Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
Enabling Fair ML Evaluations for Security. CCS 2018: 2264-2266 - [c25]Duncan Mitchell, L. Thomas van Binsbergen, Blake Loring, Johannes Kinder:
Checking cryptographic API usage with composable annotations (short paper). PEPM 2018: 53-59 - [c24]Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder:
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. RAID 2018: 25-46 - [i3]Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, Lorenzo Cavallaro:
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. CoRR abs/1807.07838 (2018) - [i2]Blake Loring, Duncan Mitchell, Johannes Kinder:
Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript. CoRR abs/1810.05661 (2018) - 2017
- [c23]Dusan Repel, Johannes Kinder, Lorenzo Cavallaro:
Modular Synthesis of Heap Exploits. PLAS@CCS 2017: 25-35 - [c22]Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, Lorenzo Cavallaro:
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. CODASPY 2017: 309-320 - [c21]Blake Loring, Duncan Mitchell, Johannes Kinder:
ExpoSE: practical symbolic execution of standalone JavaScript. SPIN 2017: 196-199 - [c20]James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder:
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection. WOOT 2017 - [i1]Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder:
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. CoRR abs/1709.05690 (2017) - 2016
- [j3]Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik, Edgar R. Weippl:
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Comput. Surv. 49(1): 4:1-4:37 (2016) - [c19]Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin J. Khan, Kimberly Tam, Mansour Ahmadi, Johannes Kinder, Lorenzo Cavallaro:
DroidScribe: Classifying Android Malware Based on Runtime Behavior. IEEE Symposium on Security and Privacy Workshops 2016: 252-261 - 2015
- [c18]Jonas Wagner, Volodymyr Kuznetsov, George Candea, Johannes Kinder:
High System-Code Security with Low Overhead. IEEE Symposium on Security and Privacy 2015: 866-879 - 2014
- [c17]Stefan Bucur, Johannes Kinder, George Candea:
Prototyping symbolic execution engines for interpreted languages. ASPLOS 2014: 239-254 - [c16]Johannes Kinder:
Efficient symbolic execution for software testing. FMCAD 2014: 5 - [c15]Johannes Kinder:
Tutorial I: Efficient symbolic execution for software testing. MEMOCODE 2014: 231 - [c14]Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, George Candea:
Efficient State Merging in Symbolic Execution. Software Engineering 2014: 45-46 - 2013
- [c13]Stefan Bucur, Johannes Kinder, George Candea:
Making automated testing of cloud applications an integral component of PaaS. APSys 2013: 18:1-18:7 - [c12]Cristian Zamfir, Baris Kasikci, Johannes Kinder, Edouard Bugnion, George Candea:
Automated Debugging for Arbitrarily Long Executions. HotOS 2013 - 2012
- [c11]Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, George Candea:
Efficient state merging in symbolic execution. PLDI 2012: 193-204 - [c10]Johannes Kinder, Dmitry Kravchenko:
Alternating Control Flow Reconstruction. VMCAI 2012: 267-282 - [c9]Johannes Kinder:
Towards Static Analysis of Virtualization-Obfuscated Binaries. WCRE 2012: 61-70 - 2011
- [c8]Péter Bokor, Johannes Kinder, Marco Serafini, Neeraj Suri:
Efficient model checking of fault-tolerant distributed protocols. DSN 2011: 73-84 - [c7]Péter Bokor, Johannes Kinder, Marco Serafini, Neeraj Suri:
Supporting domain-specific state space reductions through local partial-order reduction. ASE 2011: 113-122 - [r1]Stefan Katzenbeisser, Johannes Kinder, Helmut Veith:
Malware Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 752-755 - 2010
- [b1]Johannes Kinder:
Static analysis of x86 executables (Statische Analyse von Programmen in x86-Maschinensprache). Darmstadt University of Technology, 2010, pp. 1-199 - [j2]Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Proactive Detection of Computer Worms Using Model Checking. IEEE Trans. Dependable Secur. Comput. 7(4): 424-438 (2010) - [c6]Johannes Kinder, Helmut Veith:
Precise static analysis of untrusted driver binaries. FMCAD 2010: 43-50 - [c5]Patrice Godefroid, Johannes Kinder:
Proving memory safety of floating-point computations by combining static and dynamic program analysis. ISSTA 2010: 1-12
2000 – 2009
- 2009
- [c4]Johannes Kinder, Florian Zuleger, Helmut Veith:
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. VMCAI 2009: 214-228 - 2008
- [c3]Johannes Kinder, Helmut Veith:
Jakstab: A Static Analysis Platform for Binaries. CAV 2008: 423-427 - 2007
- [j1]Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith:
Software transformations to improve malware detection. J. Comput. Virol. 3(4): 253-265 (2007) - [c2]Andreas Holzer, Johannes Kinder, Helmut Veith:
Using Verification Technology to Specify and Detect Malware. EUROCAST 2007: 497-504 - 2005
- [c1]Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Detecting Malicious Code by Model Checking. DIMVA 2005: 174-187
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint