Παρακολούθηση
Johannes Kinder
Johannes Kinder
Professor of Computer Science, LMU Munich
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα lmu.de - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro
28th USENIX Security Symposium (USENIX Security), 729-746, 2019
4542019
Efficient State Merging in Symbolic Execution
V Kuznetsov, J Kinder, S Bucur, G Candea
ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI), 193-204, 2012
3822012
DroidSieve: Fast and accurate classification of obfuscated Android malware
G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro
Conference on Data and Application Security and Privacy (CODASPY), 309-320, 2017
3142017
Detecting malicious code by model checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
Conf. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA …, 2005
2452005
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl
ACM Computing Surveys (CSUR) 49 (1), 4, 2016
2312016
Jakstab: A static analysis platform for binaries
J Kinder, H Veith
Int. Conf. Computer Aided Verification (CAV), 423-427, 2008
226*2008
DroidScribe: Classifying Android Malware Based on Runtime Behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
IEEE Symposium on Security and Privacy Workshops (SPW), Mobile Security …, 2016
2162016
Everything Old is New Again: Binary Security of WebAssembly
D Lehmann, J Kinder, M Pradel
29th USENIX Security Symposium (USENIX Security), 2020
1762020
An abstract interpretation-based framework for control flow reconstruction from binaries
J Kinder, F Zuleger, H Veith
Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI …, 2009
1672009
Malware normalization
M Christodorescu, J Kinder, S Jha, S Katzenbeisser, H Veith
Technical Report 1539, University of Wisconsin, Madison, Wisconsin, USA, 2005
1312005
Towards Static Analysis of Virtualization-Obfuscated Binaries
J Kinder
Working Conference on Reverse Engineering (WCRE), 61-70, 2012
902012
Prototyping Symbolic Execution Engines for Interpreted Languages
S Bucur, J Kinder, G Candea
Architectural Support for Programming Languages and Operating Systems …, 2014
842014
High System-Code Security with Low Overhead
J Wagner, V Kuznetsov, G Candea, J Kinder
IEEE Symposium on Security and Privacy (S&P), 866-879, 2015
752015
Static Analysis of x86 Executables
J Kinder
Technische Universität Darmstadt, 2010
722010
Proactive Detection of Computer Worms Using Model Checking
J Kinder, S Katzenbeisser, C Schallhart, H Veith
IEEE Trans. Dependable and Secure Computing 7 (4), 424-438, 2010
712010
Software transformations to improve malware detection
M Christodorescu, S Jha, J Kinder, S Katzenbeisser, H Veith
Journal in Computer Virology 3 (4), 253-265, 2007
582007
Precise static analysis of untrusted driver binaries
J Kinder, H Veith
Formal Methods in Computer-Aided Design (FMCAD), 2010, 43-50, 2010
522010
ExpoSE: Practical Symbolic Execution of Standalone JavaScript
B Loring, D Mitchell, J Kinder
International SPIN Symposium on Model Checking of Software, 196-199, 2017
502017
Alternating Control Flow Reconstruction
J Kinder, D Kravchenko
Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI …, 2012
462012
Modular Synthesis of Heap Exploits
D Repel, J Kinder, L Cavallaro
ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS), 2017
452017
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20