Seguir
Johannes Kinder
Johannes Kinder
Professor of Computer Science, LMU Munich
Dirección de correo verificada de lmu.de - Página principal
Título
Citado por
Citado por
Año
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro
28th USENIX Security Symposium (USENIX Security), 729-746, 2019
4902019
Efficient State Merging in Symbolic Execution
V Kuznetsov, J Kinder, S Bucur, G Candea
ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI), 193-204, 2012
3822012
DroidSieve: Fast and accurate classification of obfuscated Android malware
G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro
Conference on Data and Application Security and Privacy (CODASPY), 309-320, 2017
3172017
Detecting malicious code by model checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
Conf. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA …, 2005
2482005
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 4, 2016
2402016
Jakstab: A static analysis platform for binaries
J Kinder, H Veith
Int. Conf. Computer Aided Verification (CAV), 423-427, 2008
225*2008
DroidScribe: Classifying Android Malware Based on Runtime Behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
IEEE Symposium on Security and Privacy Workshops (SPW), Mobile Security …, 2016
2182016
Everything Old is New Again: Binary Security of WebAssembly
D Lehmann, J Kinder, M Pradel
29th USENIX Security Symposium (USENIX Security), 2020
1902020
An abstract interpretation-based framework for control flow reconstruction from binaries
J Kinder, F Zuleger, H Veith
Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI …, 2009
1672009
Malware normalization
M Christodorescu, J Kinder, S Jha, S Katzenbeisser, H Veith
Technical Report 1539, University of Wisconsin, Madison, Wisconsin, USA, 2005
1312005
Towards Static Analysis of Virtualization-Obfuscated Binaries
J Kinder
Working Conference on Reverse Engineering (WCRE), 61-70, 2012
932012
High System-Code Security with Low Overhead
J Wagner, V Kuznetsov, G Candea, J Kinder
IEEE Symposium on Security and Privacy (S&P), 866-879, 2015
802015
Prototyping Symbolic Execution Engines for Interpreted Languages
S Bucur, J Kinder, G Candea
Architectural Support for Programming Languages and Operating Systems …, 2014
802014
Static Analysis of x86 Executables
J Kinder
Technische Universität Darmstadt, 2010
772010
Proactive Detection of Computer Worms Using Model Checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
IEEE Trans. Dependable and Secure Computing 7 (4), 424-438, 2010
702010
Software transformations to improve malware detection
M Christodorescu, S Jha, J Kinder, S Katzenbeisser, H Veith
Journal in Computer Virology 3 (4), 253-265, 2007
582007
ExpoSE: Practical Symbolic Execution of Standalone JavaScript
B Loring, D Mitchell, J Kinder
International SPIN Symposium on Model Checking of Software, 196-199, 2017
532017
Precise static analysis of untrusted driver binaries
J Kinder, H Veith
Formal Methods in Computer-Aided Design (FMCAD), 2010, 43-50, 2010
522010
Alternating Control Flow Reconstruction
J Kinder, D Kravchenko
Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI …, 2012
492012
Modular Synthesis of Heap Exploits
D Repel, J Kinder, L Cavallaro
ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS), 2017
472017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20