Seguir
Johannes Kinder
Johannes Kinder
Professor of Computer Science, LMU Munich
Dirección de correo verificada de lmu.de - Página principal
Título
Citado por
Citado por
Año
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro
28th USENIX Security Symposium (USENIX Security), 729-746, 2019
3952019
Efficient State Merging in Symbolic Execution
V Kuznetsov, J Kinder, S Bucur, G Candea
ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI), 193-204, 2012
3652012
DroidSieve: Fast and accurate classification of obfuscated Android malware
G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro
Conference on Data and Application Security and Privacy (CODASPY), 309-320, 2017
2952017
Detecting malicious code by model checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
Conf. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA …, 2005
2412005
Jakstab: A static analysis platform for binaries
J Kinder, H Veith
Int. Conf. Computer Aided Verification (CAV), 423-427, 2008
222*2008
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 4, 2016
2122016
DroidScribe: Classifying Android Malware Based on Runtime Behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
IEEE Symposium on Security and Privacy Workshops (SPW), Mobile Security …, 2016
2122016
An abstract interpretation-based framework for control flow reconstruction from binaries
J Kinder, F Zuleger, H Veith
Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI …, 2009
1622009
Everything Old is New Again: Binary Security of WebAssembly
D Lehmann, J Kinder, M Pradel
29th USENIX Security Symposium (USENIX Security), 2020
1382020
Malware normalization
M Christodorescu, J Kinder, S Jha, S Katzenbeisser, H Veith
Technical Report 1539, University of Wisconsin, Madison, Wisconsin, USA, 2005
1302005
Towards Static Analysis of Virtualization-Obfuscated Binaries
J Kinder
Working Conference on Reverse Engineering (WCRE), 61-70, 2012
862012
Prototyping Symbolic Execution Engines for Interpreted Languages
S Bucur, J Kinder, G Candea
Architectural Support for Programming Languages and Operating Systems …, 2014
792014
High System-Code Security with Low Overhead
J Wagner, V Kuznetsov, G Candea, J Kinder
IEEE Symposium on Security and Privacy (S&P), 866-879, 2015
742015
Static Analysis of x86 Executables
J Kinder
Technische Universität Darmstadt, 2010
712010
Proactive Detection of Computer Worms Using Model Checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
IEEE Trans. Dependable and Secure Computing 7 (4), 424-438, 2010
692010
Software transformations to improve malware detection
M Christodorescu, S Jha, J Kinder, S Katzenbeisser, H Veith
Journal in Computer Virology 3 (4), 253-265, 2007
552007
Precise static analysis of untrusted driver binaries
J Kinder, H Veith
Formal Methods in Computer-Aided Design (FMCAD), 2010, 43-50, 2010
492010
Alternating Control Flow Reconstruction
J Kinder, D Kravchenko
Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI …, 2012
462012
ExpoSE: Practical Symbolic Execution of Standalone JavaScript
B Loring, D Mitchell, J Kinder
International SPIN Symposium on Model Checking of Software, 196-199, 2017
432017
Modular Synthesis of Heap Exploits
D Repel, J Kinder, L Cavallaro
ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS), 2017
412017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20