Chair of Programming Languages and AI
print


Breadcrumb Navigation


Content

Publications

2024

Tristan Benoit, Yunru Wang, Moritz Dannehl, and Johannes Kinder. BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding. Tech. rep. arXiv:2409.07889, arXiv, 2024.
BibTeX URL

@techreport{blens-arxiv,
  author      = {Tristan Benoit and Yunru Wang and Moritz Dannehl and Johannes Kinder},
  title       = {BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding},
  institution = {arXiv},
  number      = {arXiv:2409.07889},
  year        = {2024},
  url         = {https://arxiv.org/abs/2409.07889},
}

Matías Gobbi and Johannes Kinder. GENIE: Guarding the npm Ecosystem with Semantic Malware Detection. In IEEE Secure Development Conference (SecDev 2024), IEEE, 2024. to appear.
BibTeX PDF

@inproceedings{secdev24-genie,
  author    = {Mat{\'{i}}as Gobbi and Johannes Kinder},
  title     = {GENIE: Guarding the npm Ecosystem with Semantic Malware Detection},
  booktitle = {IEEE Secure Development Conference (SecDev 2024)},
  publisher = {IEEE},
  year      = {2024},
  note      = {to appear},
}

Zeliang Kan, Shae McFadden, Daniel Arp, Feargus Pendlebury, Roberto Jordaney, Johannes Kinder, Fabio Pierazzi, and Lorenzo Cavallaro. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version). CoRR, abs/2402.01359:2024.
BibTeX URL

@article{tesseract-extended-arxiv,
  author       = {Zeliang Kan and
                  Shae McFadden and
                  Daniel Arp and
                  Feargus Pendlebury and
                  Roberto Jordaney and
                  Johannes Kinder and
                  Fabio Pierazzi and
                  Lorenzo Cavallaro},
  title        = {{TESSERACT:} Eliminating Experimental Bias in Malware Classification
                  across Space and Time (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2402.01359},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.01359},
  doi          = {10.48550/ARXIV.2402.01359},
}

Benjamin Orthen, Oliver Braunsdorf, Philipp Zieris, and Julian Horsch. SoftBound+CETS Revisited: More Than a Decade Later. In Proc. 17th European Workshop on Systems Security (EuroSec), pp. 22–28, ACM, 2024.
BibTeX

@inproceedings{eurosec24-softbound,
  author       = {Benjamin Orthen and
                  Oliver Braunsdorf and
                  Philipp Zieris and
                  Julian Horsch},
  title        = {SoftBound+CETS Revisited: More Than a Decade Later},
  booktitle    = {Proc. 17th European Workshop on Systems Security (EuroSec)},
  pages        = {22--28},
  publisher    = {{ACM}},
  year         = {2024},
  doi          = {10.1145/3642974.3652285},
}

Oliver Braunsdorf, Konrad Hohentanner, and Johannes Kinder. Poster: Ensuring Memory Safety for the Transition from C/C++ to Rust. In Network and Distributed System Security Symp. (NDSS), 2024.
BibTeX PDF

@inproceedings{ndss24poster-safeffi,
  author    = {Oliver Braunsdorf and Konrad Hohentanner and Johannes Kinder},
  title     = {Poster: Ensuring Memory Safety for the Transition from C/C++ to Rust},
  booktitle = {Network and Distributed System Security Symp. (NDSS)},
  year      = {2024},
}

Felix Weitkämper. The generalised distribution semantics and projective families of distributions. Journal of Logical and Algebraic Methods in Programming, 139:100975, 2024.
BibTeX URL

@article{Weitkaemper24_JLAMP,
  author  = {Felix Weitk{\"{a}}mper},
  journal = {Journal of Logical and Algebraic Methods in Programming},
  volume  = {139},
  pages   = {100975},
  year    = {2024},
  issn    = {2352-2208},
  doi     = {https://doi.org/10.1016/j.jlamp.2024.100975},
  url     = {https://www.sciencedirect.com/science/article/pii/S2352220824000294},
}

2023

Fabian Froh, Matías Gobbi, and Johannes Kinder. Differential Static Analysis for Detecting Malicious Updates to Open Source Packages. In Proc. ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED), ACM, 2023.
BibTeX PDF

@inproceedings{scored23-diff-codeql,
  author    = {Fabian Froh and Mat{\'{i}}as Gobbi and Johannes Kinder},
  title     = {Differential Static Analysis for Detecting Malicious Updates to Open Source Packages},
  booktitle = {Proc. ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED)},
  publisher = {ACM},
  year      = {2023},
  doi       = {10.1145/3605770.3625211},
}

Christopher Lenk and Johannes Kinder. Poster: Privacy Risks from Misconfigured Android Content Providers. In Proc. 2023 ACM SIGSAC Conf. Computer and Communications Security (CCS), 2023.
BibTeX PDF

@inproceedings{ccs23poster-contentproviders,
  author    = {Christopher Lenk and Johannes Kinder},
  title     = {Poster: Privacy Risks from Misconfigured Android Content Providers},
  booktitle = {Proc. 2023 {ACM} {SIGSAC} Conf. Computer and Communications Security (CCS)},
  year      = {2023},
  doi       = {10.1145/3576915.3624389},
}

Matías Gobbi and Johannes Kinder. Poster: Using CodeQL to Detect Malware in npm. In Proc. 2023 ACM SIGSAC Conf. Computer and Communications Security (CCS), 2023.
BibTeX PDF

@inproceedings{ccs23poster-codeql,
  author    = {Mat{\'{i}}as Gobbi and Johannes Kinder},
  title     = {Poster: Using CodeQL to Detect Malware in npm},
  booktitle = {Proc. 2023 {ACM} {SIGSAC} Conf. Computer and Communications Security (CCS)},
  year      = {2023},
  doi       = {10.1145/3576915.3624401},
}

Lorenzo Cavallaro, Johannes Kinder, Feargus Pendlebury, and Fabio Pierazzi. Are Machine Learning Models for Malware Detection Ready for Prime Time? IEEE Secur. Priv., 21(2):53–56, 2023.
BibTeX URL PDF

@article{spmag23-mlmalware,
  author       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Feargus Pendlebury and
                  Fabio Pierazzi},
  title        = {Are Machine Learning Models for Malware Detection Ready for Prime
                  Time?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {53--56},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3236543},
  doi          = {10.1109/MSEC.2023.3236543},
}

James Patrick-Evans, Moritz Dannehl, and Johannes Kinder. XFL: Naming Functions in Binaries with Extreme Multi-label Learning. In Proc. IEEE Symp. Security and Privacy (S&P), pp. 1677–1692, IEEE, 2023.
BibTeX PDF

@inproceedings{oakland23-xfl,
  author      = {James Patrick-Evans and Moritz Dannehl and Johannes Kinder},
  title       = {{XFL}: Naming Functions in Binaries with Extreme Multi-label Learning},
  booktitle   = {Proc. IEEE Symp. Security and Privacy (S\&P)},
  pages       = {1677--1692},
  publisher   = {IEEE},
  year        = {2023},
  doi         = {10.1109/SP46215.2023.00096},
}

Vera Koponen and Felix Weitkämper. Asymptotic elimination of partially continuous aggregation functions in directed graphical models. Inf. Comput., 293:105061, 2023.
BibTeX URL

@article{KoponenW23,
  author       = {Vera Koponen and
                  Felix Weitk{\"{a}}mper},
  title        = {Asymptotic elimination of partially continuous aggregation functions
                  in directed graphical models},
  journal      = {Inf. Comput.},
  volume       = {293},
  pages        = {105061},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ic.2023.105061},
  doi          = {10.1016/J.IC.2023.105061},
}

Felix Weitkämper. Projective families of distributions revisited. Int. J. Approx. Reason., 162:109031, 2023.
BibTeX URL

@article{Weitkaemper23_IJAR,
  author       = {Felix Weitk{\"{a}}mper},
  title        = {Projective families of distributions revisited},
  journal      = {Int. J. Approx. Reason.},
  volume       = {162},
  pages        = {109031},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijar.2023.109031},
  doi          = {10.1016/J.IJAR.2023.109031},
}

Rafael Kiesel, Kilian Rückschloß, and Felix Weitkämper. "What if?" in Probabilistic Logic Programming. Theory Pract. Log. Program., 23(4):884–899, 2023.
BibTeX URL

@article{KieselRW23,
  author       = {Rafael Kiesel and
                  Kilian R{\"{u}}ckschlo{\ss} and
                  Felix Weitk{\"{a}}mper},
  title        = {"What if?" in Probabilistic Logic Programming},
  journal      = {Theory Pract. Log. Program.},
  volume       = {23},
  number       = {4},
  pages        = {884--899},
  year         = {2023},
  url          = {https://doi.org/10.1017/s1471068423000133},
  doi          = {10.1017/S1471068423000133},
}

Bao Loi Quach and Felix Weitkämper. asymptoticplp: Approximating probabilistic logic programs on large domains. In Proceedings of the International Conference on Logic Programming 2023 Workshops co-located with the 39th International Conference on Logic Programming (ICLP 2023), London, United Kingdom, July 9th and 10th, 2023, CEUR-WS.org, 2023.
BibTeX URL

@inproceedings{QuachW23,
  author       = {Bao Loi Quach and
                  Felix Weitk{\"{a}}mper},
  title        = {asymptoticplp: Approximating probabilistic logic programs on large
                  domains},
  booktitle    = {Proceedings of the International Conference on Logic Programming 2023
                  Workshops co-located with the 39th International Conference on Logic
                  Programming {(ICLP} 2023), London, United Kingdom, July 9th and 10th,
                  2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3437},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3437/paper1PLP.pdf},
}

Kilian Rückschloß and Felix Weitkämper. On the Subtlety of Causal Reasoning in Probabilistic Logic Programming: A Bug Report about the Causal Interpretation of Annotated Disjunctions. In Proceedings of the International Conference on Logic Programming 2023 Workshops co-located with the 39th International Conference on Logic Programming (ICLP 2023), London, United Kingdom, July 9th and 10th, 2023, CEUR-WS.org, 2023.
BibTeX URL

@inproceedings{RueckschlossW23_lpad,
  author       = {Kilian R{\"{u}}ckschlo{\ss} and
                  Felix Weitk{\"{a}}mper},
  title        = {On the Subtlety of Causal Reasoning in Probabilistic Logic Programming:
                  {A} Bug Report about the Causal Interpretation of Annotated Disjunctions},
  booktitle    = {Proceedings of the International Conference on Logic Programming 2023
                  Workshops co-located with the 39th International Conference on Logic
                  Programming {(ICLP} 2023), London, United Kingdom, July 9th and 10th,
                  2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3437},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3437/short4PLP.pdf},
}

Kilian Rückschloß and Felix Weitkämper. What Do Counterfactuals Say About the World? Reconstructing Probabilistic Logic Programs from Answers to "What If?" Queries. In Inductive Logic Programming - 32nd International Conference, ILP 2023, Bari, Italy, November 13-15, 2023, Proceedings, pp. 93–108, Springer, 2023.
BibTeX URL

@inproceedings{RueckschlossW23_ILP,
  author       = {Kilian R{\"{u}}ckschlo{\ss} and
                  Felix Weitk{\"{a}}mper},
  title        = {What Do Counterfactuals Say About the World? Reconstructing Probabilistic
                  Logic Programs from Answers to "What If?" Queries},
  booktitle    = {Inductive Logic Programming - 32nd International Conference, {ILP}
                  2023, Bari, Italy, November 13-15, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14363},
  pages        = {93--108},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49299-0\_7},
  doi          = {10.1007/978-3-031-49299-0\_7},
}

Felix Weitkämper, Dmitriy Ravdin, and Ramona Fabry. Statistical Relational Structure Learning with Scaled Weight Parameters. In Inductive Logic Programming - 32nd International Conference, ILP 2023, Bari, Italy, November 13-15, 2023, Proceedings, pp. 139–153, Springer, 2023.
BibTeX URL

@inproceedings{WeitkaemperRF23,
  author       = {Felix Weitk{\"{a}}mper and
                  Dmitriy Ravdin and
                  Ramona Fabry},
  title        = {Statistical Relational Structure Learning with Scaled Weight Parameters},
  booktitle    = {Inductive Logic Programming - 32nd International Conference, {ILP}
                  2023, Bari, Italy, November 13-15, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14363},
  pages        = {139--153},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49299-0\_10},
  doi          = {10.1007/978-3-031-49299-0\_10},
}

Kilian Rückschloß and Felix Weitkämper. "Would life be more interesting if I were in AI?" Answering Counterfactuals based on Probabilistic Inductive Logic Programming. In Proceedings 39th International Conference on Logic Programming, ICLP 2023, Imperial College London, UK, 9th July 2023 - 15th July 2023, pp. 58–64, 2023.
BibTeX URL

@inproceedings{RueckschlossW23_Counterfactuals,
  author       = {Kilian R{\"{u}}ckschlo{\ss} and
                  Felix Weitk{\"{a}}mper},
  title        = {"Would life be more interesting if {I} were in AI?" Answering Counterfactuals
                  based on Probabilistic Inductive Logic Programming},
  booktitle    = {Proceedings 39th International Conference on Logic Programming, {ICLP}
                  2023, Imperial College London, UK, 9th July 2023 - 15th July 2023},
  series       = {{EPTCS}},
  volume       = {385},
  pages        = {58--64},
  year         = {2023},
  url          = {https://doi.org/10.4204/EPTCS.385.7},
  doi          = {10.4204/EPTCS.385.7},
}

Kilian Rückschloß and Felix Weitkämper. On the Independencies Hidden in the Structure of a Probabilistic Logic Program. In Proceedings 39th International Conference on Logic Programming, ICLP 2023, Imperial College London, UK, 9th July 2023 - 15th July 2023, pp. 169–182, 2023.
BibTeX URL

@inproceedings{RueckschlossW23_Independencies,
  author       = {Kilian R{\"{u}}ckschlo{\ss} and
                  Felix Weitk{\"{a}}mper},
  title        = {On the Independencies Hidden in the Structure of a Probabilistic Logic
                  Program},
  booktitle    = {Proceedings 39th International Conference on Logic Programming, {ICLP}
                  2023, Imperial College London, UK, 9th July 2023 - 15th July 2023},
  series       = {{EPTCS}},
  volume       = {385},
  pages        = {169--182},
  year         = {2023},
  url          = {https://doi.org/10.4204/EPTCS.385.17},
  doi          = {10.4204/EPTCS.385.17},
}

Joaquín Arias, Sotiris Batsakis, Wolfgang Faber, Gopal Gupta, Francesco Pacenza, Emmanuel Papadakis, Livio Robaldo, Kilian Rückschloß, Elmer Salazar, Zeynep G. Saribatur, Ilias Tachmazidis, Felix Weitkämper, and Adam Z. Wyner (eds). Proceedings of the International Conference on Logic Programming 2023 Workshops co-located with the 39th International Conference on Logic Programming (ICLP 2023), London, United Kingdom, July 9th and 10th, 2023. CEUR-WS.org, 2023.
BibTeX URL

@proceedings{ICLP23_WS,
  editor       = {Joaqu{\'{\i}}n Arias and
                  Sotiris Batsakis and
                  Wolfgang Faber and
                  Gopal Gupta and
                  Francesco Pacenza and
                  Emmanuel Papadakis and
                  Livio Robaldo and
                  Kilian R{\"{u}}ckschlo{\ss} and
                  Elmer Salazar and
                  Zeynep G. Saribatur and
                  Ilias Tachmazidis and
                  Felix Weitk{\"{a}}mper and
                  Adam Z. Wyner},
  title        = {Proceedings of the International Conference on Logic Programming 2023
                  Workshops co-located with the 39th International Conference on Logic
                  Programming {(ICLP} 2023), London, United Kingdom, July 9th and 10th,
                  2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3437},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3437},
  urn          = {urn:nbn:de:0074-3437-4},
}

2022

Hernán Ponce-de-León and Johannes Kinder. Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. In Proc. IEEE Symp. Security and Privacy (S&P), pp. 1415–1428, IEEE, 2022.
BibTeX PDF

@inproceedings{oakland22-cats-vs-spectre,
  author    = {Hern{\'{a}}n Ponce-de-Le{\'{o}}n and Johannes Kinder},
  title     = {Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks},
  booktitle = {Proc. IEEE Symp. Security and Privacy (S\&P)},
  pages     = {1415--1428},
  publisher = {IEEE},
  year      = {2022},
  doi       = {10.1109/SP46214.2022.00082},
}

Kilian Rückschloß and Felix Weitkämper. Correct Causal Inference in Probabilistic Logic Programming. In Proceedings of the International Conference on Logic Programming 2022 Workshops co-located with the 38th International Conference on Logic Programming (ICLP 2022), Haifa, Israel, July 31st - August 1st, 2022, CEUR-WS.org, 2022.
BibTeX URL

@inproceedings{RueckschlossW22_Causal,
  author       = {Kilian R{\"{u}}ckschlo{\ss} and
                  Felix Weitk{\"{a}}mper},
  title        = {Correct Causal Inference in Probabilistic Logic Programming},
  booktitle    = {Proceedings of the International Conference on Logic Programming 2022
                  Workshops co-located with the 38th International Conference on Logic
                  Programming {(ICLP} 2022), Haifa, Israel, July 31st - August 1st,
                  2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3193},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3193/paper1CAUSAL.pdf},
}

Kilian Rückschloß and Felix Weitkämper. Exploiting the Full Power of Pearl's Causality in Probabilistic Logic Programming. In Proceedings of the International Conference on Logic Programming 2022 Workshops co-located with the 38th International Conference on Logic Programming (ICLP 2022), Haifa, Israel, July 31st - August 1st, 2022, CEUR-WS.org, 2022.
BibTeX URL

@inproceedings{RueckschlossW22_PLP,
  author       = {Kilian R{\"{u}}ckschlo{\ss} and
                  Felix Weitk{\"{a}}mper},
  title        = {Exploiting the Full Power of Pearl's Causality in Probabilistic Logic
                  Programming},
  booktitle    = {Proceedings of the International Conference on Logic Programming 2022
                  Workshops co-located with the 38th International Conference on Logic
                  Programming {(ICLP} 2022), Haifa, Israel, July 31st - August 1st,
                  2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3193},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3193/paper1PLP.pdf},
}

Felix Weitkämper. Functional Lifted Bayesian Networks: Statistical Relational Learning and Reasoning with Relative Frequencies. In Inductive Logic Programming - 31st International Conference, ILP 2022, Windsor Great Park, UK, September 28-30, 2022, Proceedings, pp. 142–156, Springer, 2022.
BibTeX URL

@inproceedings{Weitkaemper22_ILP,
  author       = {Felix Weitk{\"{a}}mper},
  title        = {Functional Lifted Bayesian Networks: Statistical Relational Learning
                  and Reasoning with Relative Frequencies},
  booktitle    = {Inductive Logic Programming - 31st International Conference, {ILP}
                  2022, Windsor Great Park, UK, September 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13779},
  pages        = {142--156},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-55630-2\_11},
  doi          = {10.1007/978-3-031-55630-2\_11},
}

2021

Hernán Ponce-de-León and Johannes Kinder. Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. Tech. rep. arXiv:2108.13818, arXiv, 2021.
BibTeX URL

@techreport{cats-vs-spectre-arxiv,
  author      = {Hern{\'{a}}n Ponce-de-Le{\'{o}}n and Johannes Kinder},
  title       = {Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks},
  institution = {arXiv},
  number      = {arXiv:2108.13818},
  year        = {2021},
  url         = {https://arxiv.org/abs/2108.13818},
}

Blake Loring and Johannes Kinder. Systematic Generation of Conformance Tests for JavaScript. Tech. rep. arXiv:2108.07075, arXiv, 2021.
BibTeX URL

@techreport{conformance-testing-arxiv,
  author      = {Blake Loring and Johannes Kinder},
  title       = {Systematic Generation of Conformance Tests for JavaScript},
  institution = {arXiv},
  number      = {arXiv:2108.07075},
  year        = {2021},
  url         = {https://arxiv.org/abs/2108.07075},
}

James Patrick-Evans, Moritz Dannehl, and Johannes Kinder. XFL: eXtreme Function Labeling. Tech. rep. arXiv:2107.13404, arXiv, 2021.
BibTeX URL

@techreport{xfl-arxiv,
  author      = {James Patrick-Evans and Moritz Dannehl and Johannes Kinder},
  title       = {{XFL}: eXtreme Function Labeling},
  institution = {arXiv},
  number      = {arXiv:2107.13404},
  year        = {2021},
  url         = {https://arxiv.org/abs/2107.13404},
}

Felix Q. Weitkämper. An Asymptotic Analysis of Probabilistic Logic Programming, with Implications for Expressing Projective Families of Distributions. Theory Pract. Log. Program., 21(6):802–817, 2021.
BibTeX URL

@article{Weitkaemper21_TPLP,
  author       = {Felix Q. Weitk{\"{a}}mper},
  title        = {An Asymptotic Analysis of Probabilistic Logic Programming, with Implications
                  for Expressing Projective Families of Distributions},
  journal      = {Theory Pract. Log. Program.},
  volume       = {21},
  number       = {6},
  pages        = {802--817},
  year         = {2021},
  url          = {https://doi.org/10.1017/S1471068421000314},
  doi          = {10.1017/S1471068421000314},
}

Kilian Rückschloß and Felix Weitkämper. Reasoning about Independence in Open Universe Probabilistic Logic Programs. In Proceedings of the International Conference on Logic Programming 2021 Workshops co-located with the 37th International Conference on Logic Programming (ICLP 2021), Porto, Portugal (virtual), September 20th-21st, 2021, CEUR-WS.org, 2021.
BibTeX URL

@inproceedings{RueckschlossW21_PLP,
  author       = {Kilian R{\"{u}}ckschlo{\ss} and
                  Felix Weitk{\"{a}}mper},
  title        = {Reasoning about Independence in Open Universe Probabilistic Logic
                  Programs},
  booktitle    = {Proceedings of the International Conference on Logic Programming 2021
                  Workshops co-located with the 37th International Conference on Logic
                  Programming {(ICLP} 2021), Porto, Portugal (virtual), September 20th-21st,
                  2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2970},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2970/plppaper3.pdf},
}

Felix Weitkämper, Beatrice Sarbu, and Kailin Sun. Modelling Infectious Disease Dynamics with Probabilistic Logic Programming. In Proceedings of the International Conference on Logic Programming 2021 Workshops co-located with the 37th International Conference on Logic Programming (ICLP 2021), Porto, Portugal (virtual), September 20th-21st, 2021, CEUR-WS.org, 2021.
BibTeX URL

@inproceedings{WeitkamperSS21,
  author       = {Felix Weitk{\"{a}}mper and
                  Beatrice Sarbu and
                  Kailin Sun},
  title        = {Modelling Infectious Disease Dynamics with Probabilistic Logic Programming},
  booktitle    = {Proceedings of the International Conference on Logic Programming 2021
                  Workshops co-located with the 37th International Conference on Logic
                  Programming {(ICLP} 2021), Porto, Portugal (virtual), September 20th-21st,
                  2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2970},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2970/plppaper2.pdf},
}

Joaquín Arias, Fabio Aurelio D'Asaro, Abeer Dyoub, Gopal Gupta, Markus Hecher, Emily LeBlanc, Rafael Peñaloza, Elmer Salazar, Ari Saptawijaya, Felix Weitkämper, and Jessica Zangari (eds). Proceedings of the International Conference on Logic Programming 2021 Workshops co-located with the 37th International Conference on Logic Programming (ICLP 2021), Porto, Portugal (virtual), September 20th-21st, 2021. CEUR-WS.org, 2021.
BibTeX URL

@proceedings{ICLP21_WS,
  editor       = {Joaqu{\'{\i}}n Arias and
                  Fabio Aurelio D'Asaro and
                  Abeer Dyoub and
                  Gopal Gupta and
                  Markus Hecher and
                  Emily LeBlanc and
                  Rafael Pe{\~{n}}aloza and
                  Elmer Salazar and
                  Ari Saptawijaya and
                  Felix Weitk{\"{a}}mper and
                  Jessica Zangari},
  title        = {Proceedings of the International Conference on Logic Programming 2021
                  Workshops co-located with the 37th International Conference on Logic
                  Programming {(ICLP} 2021), Porto, Portugal (virtual), September 20th-21st,
                  2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2970},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2970},
  urn          = {urn:nbn:de:0074-2970-2},
}

2020

James Patrick-Evans, Lorenzo Cavallaro, and Johannes Kinder. Probabilistic Naming of Functions in Stripped Binaries. In Proc. 35th Annu. Computer Security Applications Conference (ACSAC), pp. 373–385, ACM, 2020.
BibTeX PDF

@inproceedings{acsac20-punstrip,
  author    = {James Patrick-Evans and Lorenzo Cavallaro and Johannes Kinder},
  title     = {Probabilistic Naming of Functions in Stripped Binaries},
  booktitle = {Proc. 35th Annu. Computer Security Applications Conference (ACSAC)},
  pages     = {373--385},
  doi       = {10.1145/3427228.3427265},
  year      = {2020},
  publisher = {ACM},
}

Daniel Lehmann, Johannes Kinder, and Michael Pradel. Everything Old is New Again: Binary Security of WebAssembly. In 29th USENIX Security Symposium (USENIX Security), pp. 217–234, USENIX Association, 2020.
BibTeX PDF

@inproceedings{usenixsecurity20-wasm,
  author    = {Daniel Lehmann and Johannes Kinder and Michael Pradel},
  title     = {Everything Old is New Again: Binary Security of WebAssembly},
  booktitle = {29th USENIX Security Symposium (USENIX Security)},
  pages     = {217--234},
  year      = {2020},
  publisher = {USENIX Association},
}

Felix Weitkämper. Proportional dependencies and asymptotics of probabilistic representations. In International Conference on Logic Programming 2020 Workshop Proceedings co-located with 36th International Conference on Logic Programming (ICLP 2020), Rende, Italy, September 18-19, 2020, CEUR-WS.org, 2020.
BibTeX URL

@inproceedings{Weitkaemper20_PLP,
  author       = {Felix Weitk{\"{a}}mper},
  title        = {Proportional dependencies and asymptotics of probabilistic representations},
  booktitle    = {International Conference on Logic Programming 2020 Workshop Proceedings
                  co-located with 36th International Conference on Logic Programming
                  {(ICLP} 2020), Rende, Italy, September 18-19, 2020},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2678},
  publisher    = {CEUR-WS.org},
  year         = {2020},
  url          = {https://ceur-ws.org/Vol-2678/short2.pdf},
}

2019

Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz (eds). Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019. ACM, 2019.
BibTeX URL

@proceedings{ccs2019,
  editor    = {Lorenzo Cavallaro and
               Johannes Kinder and
               XiaoFeng Wang and
               Jonathan Katz},
  title     = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  publisher = {{ACM}},
  year      = {2019},
  doi       = {10.1145/3319535},
  isbn      = {978-1-4503-6747-9},
  url       = {https://dl.acm.org/doi/proceedings/10.1145/3319535}
}

Duncan Mitchell and Johannes Kinder. A Formal Model for Checking Cryptographic API Usage in JavaScript. In Proc. European Symposium on Research in Computer Security (ESORICS), pp. 341–360, Springer, 2019.
BibTeX PDF

@inproceedings{esorics19-secannjs,
  author    = {Duncan Mitchell and Johannes Kinder},
  title     = {A Formal Model for Checking Cryptographic API Usage in JavaScript},
  booktitle = {Proc. European Symposium on Research in Computer Security (ESORICS)},
  series    = {LNCS},
  volume    = {11735},
  pages     = {341--360},
  year      = {2019},
  publisher = {Springer},
  doi       = {10.1007/978-3-030-29959-0\_17},
  rate      = {19.5},
}

Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. In 28th USENIX Security Symposium (USENIX Security), pp. 729–746, USENIX Association, 2019.
BibTeX PDF

@inproceedings{usenixsecurity19-tesseract,
  author    = {Feargus Pendlebury and Fabio Pierazzi and Roberto Jordaney and Johannes Kinder and Lorenzo Cavallaro},
  title     = {{TESSERACT}: Eliminating Experimental Bias in Malware Classification across Space and Time},
  booktitle = {28th USENIX Security Symposium (USENIX Security)},
  pages     = {729--746},
  year      = {2019},
  publisher = {USENIX Association},
}

Blake Loring, Duncan Mitchell, and Johannes Kinder. Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript. In Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI), pp. 425–438, ACM, 2019.
BibTeX PDF

@inproceedings{pldi19-regex,
  author    = {Blake Loring and Duncan Mitchell and Johannes Kinder},
  title     = {Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript},
  booktitle = {Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI)},
  pages     = {425--438},
  publisher = {ACM},
  year      = {2019},
  doi       = {10.1145/3314221.3314645},
}

2018

Blake Loring, Duncan Mitchell, and Johannes Kinder. Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript. Tech. rep. CoRR:abs/1810.05661, arXiv, 2018.
BibTeX URL

@techreport{regex-arxiv,
  author      = {Blake Loring and Duncan Mitchell and Johannes Kinder},
  title       = {Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript},
  institution = {arXiv},
  number      = {CoRR:abs/1810.05661},
  year        = {2018},
  url         = {https://arxiv.org/abs/1810.05661},
}

Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. Tech. rep. CoRR:abs/1807.07838, arXiv, 2018.
BibTeX URL

@techreport{tesseract-arxiv,
  author      = {Feargus Pendlebury and Fabio Pierazzi and Roberto Jordaney and Johannes Kinder and Lorenzo Cavallaro},
  title       = {{TESSERACT}: Eliminating Experimental Bias in Malware Classification across Space and Time},
  institution = {arXiv},
  number      = {CoRR:abs/1807.07838},
  year        = {2018},
  url         = {https://arxiv.org/abs/1807.07838},
}

Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. Enabling Fair ML Evaluations for Security. In Proc. 2018 ACM SIGSAC Conf. Computer and Communications Security (CCS), pp. 2264–2266, 2018.
BibTeX PDF

@inproceedings{ccs18poster,
  author    = {Feargus Pendlebury and
               Fabio Pierazzi and
               Roberto Jordaney and
               Johannes Kinder and
               Lorenzo Cavallaro},
  title     = {Enabling Fair {ML} Evaluations for Security},
  booktitle = {Proc. 2018 {ACM} {SIGSAC} Conf. Computer and
               Communications Security (CCS)},
  pages     = {2264--2266},
  year      = {2018},
  doi       = {10.1145/3243734.3278505},
}

Claudio Rizzo, Lorenzo Cavallaro, and Johannes Kinder. BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. In Int. Symp. Research in Attacks, Intrusions, and Defenses (RAID), 2018.
BibTeX PDF

@inproceedings{raid18-babelview,
  author    = {Claudio Rizzo and
               Lorenzo Cavallaro and
               Johannes Kinder},
  title     = {BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews},
  booktitle = {Int. Symp. Research in Attacks, Intrusions, and Defenses (RAID)},
  year      = {2018},
  doi       = {10.1007/978-3-030-00470-5\_2},
}

Duncan Mitchell, L. Thomas van Binsbergen, Blake Loring, and Johannes Kinder. Checking Cryptographic API Usage with Composable Annotations. In ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM), 2018.
BibTeX PDF

@inproceedings{pepm18-security-annotations,
  author    = {Duncan Mitchell and L. Thomas van Binsbergen and Blake Loring and Johannes Kinder},
  title     = {Checking Cryptographic {API} Usage with Composable Annotations},
  booktitle = {ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM)},
  year      = {2018},
  doi       = {10.1145/3162071},
  rate      = {50},
}

2017

Claudio Rizzo, Lorenzo Cavallaro, and Johannes Kinder. BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. Tech. rep. CoRR:abs/1709.05690, arXiv, 2017.
BibTeX URL

@techreport{babelview-arxiv,
  author      = {Claudio Rizzo and
                 Lorenzo Cavallaro and
                 Johannes Kinder},
  title       = {BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews},
  institution = {arXiv},
  number      = {CoRR:abs/1709.05690},
  year        = {2017},
  url         = {https://arxiv.org/abs/1709.05690},
}

Dusan Repel, Johannes Kinder, and Lorenzo Cavallaro. Modular Synthesis of Heap Exploits. In Proc. ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS), ACM, 2017.
BibTeX PDF

@inproceedings{plas17-heapaeg,
  author    = {Dusan Repel and Johannes Kinder and Lorenzo Cavallaro},
  title     = {Modular Synthesis of Heap Exploits},
  booktitle = {Proc. ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS)},
  doi       = {10.1145/3139337.3139346},
  publisher = {{ACM}},
  year      = {2017},
}

James Patrick-Evans, Lorenzo Cavallaro, and Johannes Kinder. POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection. In 11th USENIX Workshop on Offensive Technologies (WOOT), 2017. Best Paper Award.
BibTeX PDF

@inproceedings{woot17-potus,
  author    = {James Patrick-Evans and Lorenzo Cavallaro and Johannes Kinder},
  title     = {{POTUS}: Probing Off-The-Shelf {USB} Drivers with Symbolic Fault
             Injection},
  booktitle = {11th USENIX Workshop on Offensive Technologies (WOOT)},
  note      = {Best Paper Award},
  year      = {2017},
  rate      = {43},
}

Blake Loring, Duncan Mitchell, and Johannes Kinder. ExpoSE: Practical Symbolic Execution of Standalone JavaScript. In Proc. Int. SPIN Symp. Model Checking of Software (SPIN), pp. 196–199, ACM, 2017.
BibTeX PDF

@inproceedings{spin17-expose,
  author    = {Blake Loring and Duncan Mitchell and Johannes Kinder},
  title     = {{ExpoSE}: Practical Symbolic Execution of Standalone {JavaScript}},
  booktitle = {Proc. Int. SPIN Symp. Model Checking of Software (SPIN)},
  pages     = {196--199},
  publisher = {ACM},
  year      = {2017},
  rate      = {47},
}

Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, and Lorenzo Cavallaro. DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. In Proc. 7th ACM Conf. Data and Application Security and Privacy (CODASPY), pp. 309–320, ACM, 2017.
BibTeX PDF

@inproceedings{codaspy17-droidsieve,
  author    = {Guillermo Suarez-Tangil and Santanu Kumar Dash and Mansour Ahmadi and Johannes Kinder and Giorgio Giacinto and Lorenzo Cavallaro},
  title     = {{DroidSieve}: Fast and Accurate Classification of Obfuscated Android Malware},
  booktitle = {Proc. 7th ACM Conf. Data and Application Security
               and Privacy (CODASPY)},
  pages     = {309--320},
  publisher = {ACM},
  doi       = {10.1145/3029806.3029825},
  year      = {2017},
}

2016

Santanu Kumar Dash, Kimberly Tam, Johannes Kinder, and Lorenzo Cavallaro. Barometer: Sizing Up Android Applications Through Statistical Evaluation. In 37th IEEE Symp. Security and Privacy (S&P), 2016. Poster.
BibTeX

@conference{sp16poster,
  author    = {Santanu Kumar Dash and Kimberly Tam and Johannes Kinder and Lorenzo Cavallaro},
  title     = {Barometer: Sizing Up {Android} Applications Through Statistical Evaluation},
  booktitle = {37th IEEE Symp. Security and Privacy (S\&P)},
  note      = {Poster},
  year      = {2016},
}

Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik, and Edgar Weippl. Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Computing Surveys, 49(1):April 2016.
BibTeX PDF

@article{csur16-obfuscation,
  author    = {Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar Weippl},
  title     = {Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?},
  journal   = {ACM Computing Surveys},
  volume    = {49},
  number    = {1},
  year      = {2016},
  month     = apr,
}

Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin Khan, Kimberly Tam, Mansour Ahmadi, Johannes Kinder, and Lorenzo Cavallaro. DroidScribe: Classifying Android Malware Based on Runtime Behavior. In Proc. IEEE Symp. Security and Privacy Workshops (SPW), Mobile Security Technologies (MoST), pp. 252–261, 2016.
BibTeX PDF

@inproceedings{most16-droidscribe,
  author    = {Santanu Kumar Dash and Guillermo Suarez-Tangil and Salahuddin Khan and Kimberly Tam and
            Mansour Ahmadi and Johannes Kinder and Lorenzo Cavallaro},
  title     = {{DroidScribe}: Classifying Android Malware Based on Runtime Behavior},
  booktitle = {Proc. IEEE Symp. Security and Privacy Workshops (SPW), Mobile Security Technologies (MoST)},
  year      = {2016},
  pages     = {252--261},
  rate      = {28},
}

2015

Santanu Kumar Dash, Kimberly Tam, Johannes Kinder, and Lorenzo Cavallaro. Set-based Classification of Android Malware from Behavioral Abstractions. In 24th USENIX Security Symp. (USENIX Security), August 2015. Poster.
BibTeX

@conference{usenix15poster,
  author    = {Santanu Kumar Dash and Kimberly Tam and Johannes Kinder and Lorenzo Cavallaro},
  title     = {Set-based Classification of Android Malware from Behavioral Abstractions},
  booktitle = {24th USENIX Security Symp. (USENIX Security)},
  note      = {Poster},
  month     = aug,
  year      = {2015},
}

Jonas Wagner, Volodymyr Kuznetsov, George Candea, and Johannes Kinder. High System-Code Security with Low Overhead. In Proc. IEEE Symp. Security and Privacy (S&P), pp. 866-879, IEEE, 2015.
BibTeX PDF

@inproceedings{oakland15-asap,
  author    = {Jonas Wagner and Volodymyr Kuznetsov and George Candea and Johannes Kinder},
  title     = {High System-Code Security with Low Overhead},
  booktitle = {Proc. IEEE Symp. Security and Privacy (S\&P)},
  pages     = {866-879},
  publisher = {IEEE},
  year      = {2015},
  rate      = {13.5},
}

Johannes Kinder. Hypertesting: The Case for Automated Testing of Hyperproperties. In 3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot), pp. 1-8, 2015.
BibTeX PDF

@inproceedings{hotspot15-hypertesting,
  author    = {Johannes Kinder},
  title     = {Hypertesting: The Case for Automated Testing of Hyperproperties},
  booktitle = {3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot)},
  year      = {2015},
  pages     = {1-8},
}

Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, and George Candea. Advantageous State Merging During Symbolic Analysis. Pat. US 9,141,354 B2, September 2015. Issued.
BibTeX

@patent{statemerging-patent,
  author   = {Volodymyr Kuznetsov and
              Johannes Kinder and
              Stefan Bucur and
              George Candea},
  title    = {Advantageous State Merging During Symbolic Analysis},
  number   = {US 9,141,354 B2},
  pubstate = {Issued},
  month    = sep,
  year     = {2015},
}

2014

Jonas Wagner, Volodymyr Kuznetsov, Johannes Kinder, Azqa Nadeem, and George Candea. ASAP: High Security at Low Overhead. In 11th USENIX Symp. Operating Systems Design and Implementation (OSDI), October 2014. Poster.
BibTeX

@conference{osdi14poster,
  author    = {Jonas Wagner and Volodymyr Kuznetsov and Johannes Kinder and Azqa
                  Nadeem and George Candea},
  title     = {ASAP: High Security at Low Overhead},
  booktitle = {11th USENIX Symp. Operating Systems Design and Implementation (OSDI)},
  note      = {Poster},
  month     = oct,
  year      = {2014},
}

Stefan Bucur, Johannes Kinder, and George Candea. Prototyping Symbolic Execution Engines for Interpreted Languages. In Proc. 19th Int. Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 239–254, ACM, 2014.
BibTeX PDF

@inproceedings{asplos14-chef,
  author    = {Stefan Bucur and
               Johannes Kinder and
               George Candea},
  title     = {Prototyping Symbolic Execution Engines for Interpreted Languages},
  booktitle = {Proc. 19th Int. Conf. Architectural Support for Programming 
               Languages and Operating Systems (ASPLOS)},
  pages     = {239--254},
  doi       = {10.1145/2541940.2541977},
  publisher = {ACM},
  year      = {2014},
  rate      = {23},
}

Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, and George Candea. Efficient State Merging in Symbolic Execution (Extended Abstract). In Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik (SE), pp. 45–46, GI, 2014.
BibTeX

@inproceedings{se14-statemerging,
  author    = {Volodymyr Kuznetsov and
               Johannes Kinder and
               Stefan Bucur and
               George Candea},
  title     = {Efficient State Merging in Symbolic Execution (Extended Abstract)},
  booktitle = {Software Engineering 2014, Fachtagung des GI-Fachbereichs
               Softwaretechnik (SE)},
  year      = {2014},
  pages     = {45--46},
  publisher = {GI},
  series    = {LNI},
  volume    = {227},
}

Patrice Godefroid and Johannes Kinder. Memory Safety of Floating-Point Computations. Pat. US 8,782,625 B2, July 2014. Issued.
BibTeX

@patent{fpsafety-patent,
  author   = {Patrice Godefroid and Johannes Kinder},
  title    = {Memory Safety of Floating-Point Computations},
  number   = {US 8,782,625 B2},
  pubstate = {Issued},
  month    = jul,
  year     = {2014},
}

2013

Stefan Bucur, Johannes Kinder, and George Candea. Making Automated Testing of Cloud Applications an Integral Component of PaaS. In Proc. 4th Asia-Pacific Workshop on Systems (APSYS), pp. 18:1-18:7, ACM, 2013.
BibTeX PDF

@inproceedings{apsys13-cloud-testing,
  author    = {Stefan Bucur and Johannes Kinder and George Candea},
  title     = {Making Automated Testing of Cloud Applications 
               an Integral Component of {PaaS}},
  booktitle = {Proc. 4th Asia-Pacific Workshop on Systems (APSYS)},
  publisher = {ACM},
  pages     = {18:1-18:7},
  doi       = {10.1145/2500727.2500730},
  year      = {2013},
  rate      = {27},
}

Cristian Zamfir, Baris Kasikci, Johannes Kinder, Edouard Bugnion, and George Candea. Automated Debugging for Arbitrarily Long Executions. In Proc. 14th Workshop on Hot Topics in Operating Systems (HotOS), USENIX, 2013.
BibTeX URL PDF

@inproceedings{hotos13-res,
  author     = {Cristian Zamfir and Baris Kasikci and Johannes Kinder and
                Edouard Bugnion and George Candea},
  title     = {Automated Debugging for Arbitrarily Long Executions},
  booktitle = {Proc. 14th Workshop on Hot Topics in Operating Systems
                  (HotOS)},
  publisher = {USENIX},
  url       = {https://www.usenix.org/conference/hotos13/session/zamfir},
  year      = {2013},
  rate      = {30},
}

2012

Stefan Bucur, Johannes Kinder, and George Candea. C3A: Client/Server Co-Verification for Cloud Applications. In 10th USENIX Symp. Operating Systems Design and Implementation (OSDI), 2012. Poster.
BibTeX

@conference{osdi12poster,
  author    = {Stefan Bucur and Johannes Kinder and George Candea},
  title     = {C3A: Client/Server Co-Verification for Cloud Applications},
  booktitle = {10th USENIX Symp. Operating Systems Design and Implementation (OSDI)},
  note      = {Poster},
  year      = {2012},
}

Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, and George Candea. Efficient state merging in symbolic execution. In Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI), pp. 193–204, ACM, 2012.
BibTeX PDF

@inproceedings{pldi12-statemerging,
  author    = {Volodymyr Kuznetsov and
               Johannes Kinder and
               Stefan Bucur and
               George Candea},
  title     = {Efficient state merging in symbolic execution},
  pages     = {193--204},
  booktitle = {Proc. ACM SIGPLAN Conf. Programming Language Design and
               Implementation (PLDI)},
  publisher = {ACM},
  year      = {2012},
  rate      = {19},
}

Johannes Kinder. Towards Static Analysis of Virtualization-Obfuscated Binaries. In Proc. 19th Working Conf. Reverse Engineering (WCRE), pp. 61–70, IEEE, 2012.
BibTeX PDF

@inproceedings{wcre12-virtobf,
  author    = {Johannes Kinder},
  title     = {Towards Static Analysis of Virtualization-Obfuscated Binaries},
  booktitle = {Proc. 19th Working Conf. Reverse Engineering (WCRE)},
  pages     = {61--70},
  publisher = {IEEE},
  year      = {2012},
  rate      = {25},
}

Johannes Kinder and Dmitry Kravchenko. Alternating Control Flow Reconstruction. In Proc. 13th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI), pp. 267–282, Springer, 2012.
BibTeX PDF

@inproceedings{vmcai12-acfr,
  author    = {Johannes Kinder and
               Dmitry Kravchenko},
  title     = {Alternating Control Flow Reconstruction},
  booktitle = {Proc. 13th Int. Conf. Verification,
               Model Checking, and Abstract Interpretation (VMCAI)},
  series    = {LNCS},
  volume    = {7148},
  publisher = {Springer},
  pages     = {267--282},
  year      = {2012},
  rate      = {36},
}

2011

Péter Bokor, Johannes Kinder, Marco Serafini, and Neeraj Suri. Supporting domain-specific state space reductions through local partial-order reduction. In 26th IEEE/ACM Int. Conf. Automated Software Engineering (ASE), pp. 113–122, IEEE, 2011.
BibTeX PDF

@inproceedings{ase11-lpor,
  author    = {P{\'e}ter Bokor and
               Johannes Kinder and
               Marco Serafini and
               Neeraj Suri},
  title     = {Supporting domain-specific state space reductions through
               local partial-order reduction},
  pages     = {113--122},
  booktitle = {26th IEEE/ACM Int. Conf. Automated Software
               Engineering (ASE)},
  publisher = {IEEE},
  year      = {2011},
  rate      = {35},
}

Péter Bokor, Johannes Kinder, Marco Serafini, and Neeraj Suri. Efficient model checking of fault-tolerant distributed protocols. In Proc. 2011 IEEE/IFIP Int. Conf. Dependable Systems and Networks (DSN), pp. 73–84, IEEE, 2011.
BibTeX PDF

@inproceedings{dsn11-mpbasset,
  author    = {P{\'e}ter Bokor and
               Johannes Kinder and
               Marco Serafini and
               Neeraj Suri},
  title     = {Efficient model checking of fault-tolerant distributed protocols},
  pages     = {73--84},
  booktitle = {Proc. 2011 IEEE/IFIP Int. Conf. Dependable Systems and 
               Networks (DSN)},
  publisher = {IEEE},
  year      = {2011},
  rate      = {25},
}

Stefan Katzenbeisser, Johannes Kinder, and Helmut Veith. Malware Detection. In Henk C. A. van Tilborg and Sushil Jajodia, eds., Encyclopedia of Cryptography and Security (2nd Ed.), pp. 752–755, Springer, 2011.
BibTeX

@incollection{cryptosec11,
  author    = {Stefan Katzenbeisser and
               Johannes Kinder and
               Helmut Veith},
  title     = {Malware Detection},
  booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages     = {752--755},
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  publisher = {Springer},
  year      = {2011},
}

Péter Bokor, Johannes Kinder, Marco Serafini, and Neeraj Suri. Supporting domain-specific state space reductions through local partial-order reduction. Tech. rep. TR-TUD-DEEDS-07-01-2011, Technische Universität Darmstadt, 2011.
BibTeX

@techreport{lpor-tr,
  author      = {P{\'e}ter Bokor and
                Johannes Kinder and
                Marco Serafini and
                Neeraj Suri},
  title       = {Supporting domain-specific state space reductions through
                local partial-order reduction},
  institution = {Technische Universit{\"a}t Darmstadt},
  number      = {TR-TUD-DEEDS-07-01-2011},
  year        = {2011},
}

Péter Bokor, Johannes Kinder, Marco Serafini, and Neeraj Suri. Efficient model checking of fault-tolerant distributed protocols. Tech. rep. TR-TUD-DEEDS-01-01-2011, Technische Universität Darmstadt, 2011.
BibTeX

@techreport{mpbasset-tr,
  author      = {P{\'e}ter Bokor and
                 Johannes Kinder and
                 Marco Serafini and
                 Neeraj Suri},
  title       = {Efficient model checking of fault-tolerant distributed protocols},
  institution = {Technische Universit{\"a}t Darmstadt},
  number      = {TR-TUD-DEEDS-01-01-2011},
  year        = {2011},
}

Earlier

Johannes Kinder. Static Analysis of x86 Executables. Ph.D. Thesis, Technische Universität Darmstadt, 2010.
BibTeX PDF

@phdthesis{phdthesis-kinder,
  author    = {Johannes Kinder},
  title     = {Static Analysis of x86 Executables},
  school    = {Technische Universit{\"a}t Darmstadt},
  year      = {2010},
}

Johannes Kinder and Helmut Veith. Precise Static Analysis of Untrusted Driver Binaries. In Proc. 10th Int. Conf. Formal Methods in Computer-Aided Design (FMCAD), pp. 43–50, 2010.
BibTeX PDF

@inproceedings{fmcad10-drivers-bat,
  author    = {Johannes Kinder and Helmut Veith},
  title     = {Precise Static Analysis of Untrusted Driver Binaries},
  booktitle = {Proc. 10th Int. Conf. Formal Methods in Computer-Aided 
               Design (FMCAD)},
  pages     = {43--50},
  year      = {2010},
  rate      = {38},
}

Patrice Godefroid and Johannes Kinder. Proving memory safety of floating-point computations by combining static and dynamic program analysis. In Proc. 19th Int. Symp. Software Testing and Analysis (ISSTA), pp. 1–12, ACM, 2010.
BibTeX PDF

@inproceedings{issta10-fpsafety,
  author    = {Patrice Godefroid and
               Johannes Kinder},
  title     = {Proving memory safety of floating-point computations by
               combining static and dynamic program analysis},
  pages     = {1--12},
  doi       = {10.1145/1831708.1831710},
  booktitle = {Proc. 19th Int. Symp. Software Testing and 
               Analysis (ISSTA)},
  publisher = {ACM},
  year      = {2010},
  rate      = {23},
}

Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, and Helmut Veith. Proactive Detection of Computer Worms Using Model Checking. IEEE Trans. Dependable Sec. Comput., 7(4):424–438, October 2010.
BibTeX PDF

@article{tdsc10-mocca,
  author    = {Johannes Kinder and Stefan Katzenbeisser and 
               Christian Schallhart and Helmut Veith},
  title     = {Proactive Detection of Computer Worms Using Model Checking},
  journal   = {IEEE Trans. Dependable Sec. Comput.},
  volume    = {7},
  number    = {4},
  pages     = {424--438},
  month     = oct,
  year      = {2010},
}

Mihai Christodorescu, Johannes Kinder, Somesh Jha, Stefan Katzenbeisser, and Helmut Veith. System for Malware Normalization and Detection. Pat. US 2010/0011441 A1, January 2010. Published.
BibTeX

@patent{malwarenorm-patent,
  author   = {Mihai Christodorescu and Johannes Kinder and Somesh Jha and Stefan Katzenbeisser and Helmut Veith},
  title    = {System for Malware Normalization and Detection},
  year     = {2010},
  number   = {US 2010/0011441 A1},
  pubstate = {Published},
  month    = jan,
}

Johannes Kinder, Helmut Veith, and Florian Zuleger. An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. In Proc. 10th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI), pp. 214–228, Springer, 2009.
BibTeX PDF

@inproceedings{vmcai09-cfr,
  author    = {Johannes Kinder and Helmut Veith and Florian Zuleger},
  title     = {An Abstract Interpretation-Based Framework for Control Flow 
               Reconstruction from Binaries},
  booktitle = {Proc. 10th Int. Conf. Verification,
               Model Checking, and Abstract Interpretation (VMCAI)},
  pages     = {214--228},
  series    = {LNCS},
  volume    = {5403},
  publisher = {Springer},
  year      = {2009},
  rate      = {33},
}

Patrice Godefroid and Johannes Kinder. Proving Memory Safety of Floating-Point Computations by Combining Static and Dynamic Program Analysis. Tech. rep. MSR-TR-2009-167, Microsoft Research, November 2009.
BibTeX

@techreport{fpsafety-tr,
  author      = {Patrice Godefroid and Johannes Kinder},
  title       = {Proving Memory Safety of Floating-Point Computations by Combining Static and Dynamic Program Analysis},
  institution = {Microsoft Research},
  number      = {MSR-TR-2009-167},
  month       = nov,
  year        = {2009},
}

Johannes Kinder and Helmut Veith. Jakstab: A Static Analysis Platform for Binaries. In Proc. 20th Int. Conf. Computer Aided Verification (CAV), pp. 423–427, Springer, 2008.
BibTeX PDF

@inproceedings{cav08-jakstab,
  author    = {Johannes Kinder and Helmut Veith},
  title     = {Jakstab: A Static Analysis Platform for Binaries},
  booktitle = {Proc. 20th Int. Conf. Computer Aided Verification (CAV)},
  pages     = {423--427},
  publisher = {Springer},
  series    = {LNCS},
  volume    = {5123},
  year      = {2008},
  rate      = {36},
}

Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, and Helmut Veith. Software transformations to improve malware detection. J. Comput. Virol., 3(4):253–265, November 2007.
BibTeX PDF

@article{jicv07-malware-transform,
  author    = {Mihai Christodorescu and
               Somesh Jha and
               Johannes Kinder and
               Stefan Katzenbeisser and
               Helmut Veith},
  title     = {Software transformations to improve malware detection},
  journal   = {J. Comput. Virol.},
  volume    = {3},
  number    = {4},
  year      = {2007},
  month     = nov,
  pages     = {253--265},
  doi       = {10.1007/s11416-007-0059-8},
}

Andreas Holzer, Johannes Kinder, and Helmut Veith. Using Verification Technology to Specify and Detect Malware. In Proc. 11th Int. Conf. Computer Aided Systems Theory (EUROCAST), pp. 497–504, Springer, 2007.
BibTeX PDF

@inproceedings{eurocast07-symac,
  author    = {Andreas Holzer and Johannes Kinder and Helmut Veith},
  title     = {Using Verification Technology to Specify and Detect Malware},
  year      = {2007},
  booktitle = {Proc. 11th Int. Conf. Computer Aided Systems Theory (EUROCAST)},
  pages     = {497--504},
  publisher = {Springer},
  series    = {LNCS},
  volume    = {4739},
}

Mihai Christodorescu, Johannes Kinder, Somesh Jha, Stefan Katzenbeisser, and Helmut Veith. Malware Normalization. Tech. rep. 1539, University of Wisconsin, November 2005.
BibTeX PDF

@techreport{malwarenorm,
  author      = {Mihai Christodorescu and Johannes Kinder and Somesh Jha and Stefan Katzenbeisser and Helmut Veith},
  title       = {Malware Normalization},
  institution = {University of Wisconsin},
  year        = {2005},
  number      = 1539,
  address     = {Madison, WI, USA},
  month       = nov,
}

Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, and Helmut Veith. Detecting Malicious Code by Model Checking. In Second Int. Conf. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), pp. 174–187, Springer, 2005.
BibTeX PDF

@inproceedings{dimva05-ctpl,
  author    = {Johannes Kinder and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith},
  title     = {Detecting Malicious Code by Model Checking},
  booktitle	= {Second Int. Conf. Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)},
  year      = {2005},
  pages     = {174--187},
  volume    = {3548},
  series    = {LNCS},
  publisher	= {Springer},
  rate      = {33},
}

Johannes Kinder. Model Checking Malicious Code. M.Sc. Thesis, Technische Universität München, 2005.
BibTeX PDF

@thesis{da-kinder,
  author    = {Johannes Kinder},
  title     = {Model Checking Malicious Code},
  type      = {MSc thesis},
  school    = {Technische Universit{\"a}t M{\"u}nchen},
  year      = {2005},
}