Professor Johannes Kinder

  1. Published

    Using Verification Technology to Specify and Detect Malware

    Holzer, A., Kinder, J. & Veith, H., Feb 2007, 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, p. 497-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Towards Static Analysis of Virtualization-Obfuscated Binaries

    Kinder, J., Oct 2012, Proc. 19th Working Conf. Reverse Engineering (WCRE 2012). IEEE, p. 61-70

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., Aug 2019, 28th USENIX Security Symposium (USENIX Sec). p. 729-746 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Supporting Domain-Specific State Space Reductions through Local Partial-Order Reduction

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 26th Int. Conf. Automated Software Engineering (ASE 2011). p. 113-122

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Sound regular expression semantics for dynamic symbolic execution of JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 8 Jun 2019, PLDI'19: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, p. 425-438 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Software transformations to improve malware detection

    Christodorescu, M., Jha, S., Kinder, J., Katzenbeisser, S. & Veith, H., 2007, In : Journal in Computer Virology. 3, 4, p. 253-265

    Research output: Contribution to journalArticle

  7. Published

    Proving memory safety of floating-point computations by combining static and dynamic program analysis

    Godefroid, P. & Kinder, J., 2010, Proc. 19th Int. Symp. Software Testing and Analysis (ISSTA 2010). ACM, p. 1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Prototyping symbolic execution engines for interpreted languages

    Bucur, S., Kinder, J. & Candea, G., Feb 2014, ASPLOS '14: Proceedings of the 19th international conference on Architectural support for programming languages and operating systems. ACM, p. 239-254 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?

    Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G. & Weippl, E., 28 Jul 2016, In : ACM Computing Surveys. 49, 1, 37 p., 4.

    Research output: Contribution to journalArticle

  10. Published

    Proactive Detection of Computer Worms Using Model Checking

    Kinder, J., Katzenbeisser, S., Schallhart, C. & Veith, H., Oct 2010, In : IEEE Transactions on Dependable and Secure Computing. 7, 4, p. 424-438

    Research output: Contribution to journalArticle

Previous 1 2 3 4 Next