Professor Johannes Kinder

  1. Article › Research › Peer-reviewed
  2. Published

    Proactive Detection of Computer Worms Using Model Checking

    Kinder, J., Katzenbeisser, S., Schallhart, C. & Veith, H., Oct 2010, In : IEEE Transactions on Dependable and Secure Computing. 7, 4, p. 424-438

    Research output: Contribution to journalArticle

  3. Published

    Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?

    Schrittwieser, S., Katzenbeisser, S., Kinder, J., Merzdovnik, G. & Weippl, E., 28 Jul 2016, In : ACM Computing Surveys. 49, 1, 37 p., 4.

    Research output: Contribution to journalArticle

  4. Published

    Software transformations to improve malware detection

    Christodorescu, M., Jha, S., Kinder, J., Katzenbeisser, S. & Veith, H., 2007, In : Journal in Computer Virology. 3, 4, p. 253-265

    Research output: Contribution to journalArticle

  5. Entry for encyclopedia/dictionary › Research
  6. Published

    Malware Detection

    Katzenbeisser, S., Kinder, J. & Veith, H., 2011, Encyclopedia of Cryptography and Security, 2nd Ed.. van Tilborg, H. & Jajodia, S. (eds.). Springer, p. 752-755

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  7. Conference contribution › Research
  8. E-pub ahead of print

    A Formal Model for Checking Cryptographic API Usage in JavaScript

    Mitchell, D. & Kinder, J., 15 Sep 2019, ESORICS'19: Proceedings of the 24th European Symposium on Research in Computer Security. Springer, Vol. 11735. p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Alternating Control Flow Reconstruction

    Kinder, J. & Kravchenko, D., Jan 2012, Proc. 13th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2012). Springer, p. 267-282

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries

    Kinder, J., Zuleger, F. & Veith, H., 2009, Proc. 10th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2009). Springer, p. 214-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Automated Debugging for Arbitrarily Long Executions

    Zamfir, C., Kasikci, B., Kinder, J., Bugnion, E. & Candea, G., May 2013, Proc. 14th Workshop on Hot Topics in Operating Systems (HotOS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Checking cryptographic API usage with composable annotations

    Mitchell, D., van Binsbergen, L. T., Loring, B. & Kinder, J., 25 Dec 2017, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2018). p. 53-59 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 Next