Professor Johannes Kinder

  1. Article › Research › Peer-reviewed
  2. Published

    Proactive Detection of Computer Worms Using Model Checking

    Kinder, J., Katzenbeisser, S., Schallhart, C. & Veith, H., Oct 2010, In : IEEE Transactions on Dependable and Secure Computing. 7, 4, p. 424-438

    Research output: Contribution to journalArticle

  3. Published

    Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?

    Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G. & Weippl, E., 28 Jul 2016, In : ACM Computing Surveys. 49, 1, 37 p., 4.

    Research output: Contribution to journalArticle

  4. Published

    Software transformations to improve malware detection

    Christodorescu, M., Jha, S., Kinder, J., Katzenbeisser, S. & Veith, H., 2007, In : Journal in Computer Virology. 3, 4, p. 253-265

    Research output: Contribution to journalArticle

  5. Entry for encyclopedia/dictionary › Research
  6. Published

    Malware Detection

    Katzenbeisser, S., Kinder, J. & Veith, H., 2011, Encyclopedia of Cryptography and Security, 2nd Ed.. van Tilborg, H. & Jajodia, S. (eds.). Springer, p. 752-755

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  7. Conference contribution › Research
  8. E-pub ahead of print

    A Formal Model for Checking Cryptographic API Usage in JavaScript

    Mitchell, D. & Kinder, J., 15 Sep 2019, ESORICS'19: Proceedings of the 24th European Symposium on Research in Computer Security. Springer, Vol. 11735. p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Alternating Control Flow Reconstruction

    Kinder, J. & Kravchenko, D., Jan 2012, Proc. 13th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2012). Springer, p. 267-282

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries

    Kinder, J., Zuleger, F. & Veith, H., 2009, Proc. 10th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2009). Springer, p. 214-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Automated Debugging for Arbitrarily Long Executions

    Zamfir, C., Kasikci, B., Kinder, J., Bugnion, E. & Candea, G., May 2013, Proc. 14th Workshop on Hot Topics in Operating Systems (HotOS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Checking cryptographic API usage with composable annotations

    Mitchell, D., van Binsbergen, L. T., Loring, B. & Kinder, J., 25 Dec 2017, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2018). p. 53-59 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Detecting Malicious Code by Model Checking

    Kinder, J., Katzenbeisser, S., Schallhart, C. & Veith, H., 2005, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, p. 174-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Efficient model checking of fault-tolerant distributed protocols

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 41st Int Conf. Dependable Systems and Networks (DSN-DCCS 2011). IEEE, p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Efficient state merging in symbolic execution

    Kuznetsov, V., Kinder, J., Bucur, S. & Candea, G., Jun 2012, Proc. 33rd Conf. Programming Language Design and Implementation (PLDI 2012). ACM, p. 193-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    ExpoSE: practical symbolic execution of standalone JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 13 Jul 2017, SPIN 2017 : Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. ACM, p. 196–199 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    High System-Code Security with Low Overhead

    Wagner, J., Kuznetsov, V., Candea, G. & Kinder, J., 20 Jul 2015, Proc. IEEE Symp. Security and Privacy (S&P 2015). p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Hypertesting: The Case for Automated Testing of Hyperproperties

    Kinder, J., Mar 2015, 3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Jakstab: A Static Analysis Platform for Binaries

    Kinder, J. & Veith, H., 2008, Proc. 20th Int. Conf. Computer Aided Verification (CAV 2008). Springer, p. 423-427

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Making Automated Testing of Cloud Applications an Integral Component of PaaS

    Bucur, S., Kinder, J. & Candea, G., Jul 2013, Proc. 4th Asia-Pacific Workshop on Systems (APSYS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Precise static analysis of untrusted driver binaries

    Kinder, J. & Veith, H., 2010, Proc. 10th Int. Conf. Formal Methods in Computer Aided Design (FMCAD 2010). p. 43-50

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Prototyping symbolic execution engines for interpreted languages

    Bucur, S., Kinder, J. & Candea, G., 2014, Proc. Architectural Support for Programming Languages and Operating Systems (ASPLOS 2014). ACM, p. 239-254

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Proving memory safety of floating-point computations by combining static and dynamic program analysis

    Godefroid, P. & Kinder, J., 2010, Proc. 19th Int. Symp. Software Testing and Analysis (ISSTA 2010). ACM, p. 1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Sound regular expression semantics for dynamic symbolic execution of JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 8 Jun 2019, PLDI'19: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, p. 425-438 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Supporting Domain-Specific State Space Reductions through Local Partial-Order Reduction

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 26th Int. Conf. Automated Software Engineering (ASE 2011). p. 113-122

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Towards Static Analysis of Virtualization-Obfuscated Binaries

    Kinder, J., Oct 2012, Proc. 19th Working Conf. Reverse Engineering (WCRE 2012). IEEE, p. 61-70

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Using Verification Technology to Specify and Detect Malware

    Holzer, A., Kinder, J. & Veith, H., Feb 2007, 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, p. 497-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Poster › Research › Peer-reviewed
  34. Published

    Enabling Fair ML Evaluations for Security

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., 8 Oct 2018, p. 2264-2266. 3 p.

    Research output: Contribution to conferencePoster

  35. Abstract › Research › Peer-reviewed
  36. Published

    Efficient State Merging in Symbolic Execution (Extended Abstract)

    Kuznetsov, V., Kinder, J., Bucur, S. & Candea, G., 2014, p. 45-46. 2 p.

    Research output: Contribution to conferenceAbstract