Publications
2024
Tristan Benoit, Yunru Wang, Moritz Dannehl, and Johannes Kinder. BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding. Tech. rep. arXiv:2409.07889, arXiv, 2024.
BibTeX URL
@techreport{blens-arxiv, author = {Tristan Benoit and Yunru Wang and Moritz Dannehl and Johannes Kinder}, title = {BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding}, institution = {arXiv}, number = {arXiv:2409.07889}, year = {2024}, url = {https://arxiv.org/abs/2409.07889}, }
Matías Gobbi and Johannes Kinder. GENIE: Guarding the npm Ecosystem with Semantic Malware Detection. In IEEE Secure Development Conference (SecDev 2024), IEEE, 2024. to appear.
BibTeX PDF
@inproceedings{secdev24-genie, author = {Mat{\'{i}}as Gobbi and Johannes Kinder}, title = {GENIE: Guarding the npm Ecosystem with Semantic Malware Detection}, booktitle = {IEEE Secure Development Conference (SecDev 2024)}, publisher = {IEEE}, year = {2024}, note = {to appear}, }
Zeliang Kan, Shae McFadden, Daniel Arp, Feargus Pendlebury, Roberto Jordaney, Johannes Kinder, Fabio Pierazzi, and Lorenzo Cavallaro. TESSERACT: Eliminating Experimental Bias in Malware Classification
across Space and Time (Extended Version). CoRR, abs/2402.01359:2024.
BibTeX URL
@article{tesseract-extended-arxiv, author = {Zeliang Kan and Shae McFadden and Daniel Arp and Feargus Pendlebury and Roberto Jordaney and Johannes Kinder and Fabio Pierazzi and Lorenzo Cavallaro}, title = {{TESSERACT:} Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)}, journal = {CoRR}, volume = {abs/2402.01359}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.01359}, doi = {10.48550/ARXIV.2402.01359}, }
Benjamin Orthen, Oliver Braunsdorf, Philipp Zieris, and Julian Horsch. SoftBound+CETS Revisited: More Than a Decade Later. In Proc. 17th European Workshop on Systems Security (EuroSec), pp. 22–28, ACM, 2024.
BibTeX
@inproceedings{eurosec24-softbound, author = {Benjamin Orthen and Oliver Braunsdorf and Philipp Zieris and Julian Horsch}, title = {SoftBound+CETS Revisited: More Than a Decade Later}, booktitle = {Proc. 17th European Workshop on Systems Security (EuroSec)}, pages = {22--28}, publisher = {{ACM}}, year = {2024}, doi = {10.1145/3642974.3652285}, }
Oliver Braunsdorf, Konrad Hohentanner, and Johannes Kinder. Poster: Ensuring Memory Safety for the Transition from C/C++ to Rust. In Network and Distributed System Security Symp. (NDSS), 2024.
BibTeX PDF
@inproceedings{ndss24poster-safeffi, author = {Oliver Braunsdorf and Konrad Hohentanner and Johannes Kinder}, title = {Poster: Ensuring Memory Safety for the Transition from C/C++ to Rust}, booktitle = {Network and Distributed System Security Symp. (NDSS)}, year = {2024}, }
Felix Weitkämper. The generalised distribution semantics and projective families of distributions. Journal of Logical and Algebraic Methods in Programming, 139:100975, 2024.
BibTeX URL
@article{Weitkaemper24_JLAMP, author = {Felix Weitk{\"{a}}mper}, journal = {Journal of Logical and Algebraic Methods in Programming}, volume = {139}, pages = {100975}, year = {2024}, issn = {2352-2208}, doi = {https://doi.org/10.1016/j.jlamp.2024.100975}, url = {https://www.sciencedirect.com/science/article/pii/S2352220824000294}, }
2023
Fabian Froh, Matías Gobbi, and Johannes Kinder. Differential Static Analysis for Detecting Malicious Updates to Open Source Packages. In Proc. ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED), ACM, 2023.
BibTeX PDF
@inproceedings{scored23-diff-codeql, author = {Fabian Froh and Mat{\'{i}}as Gobbi and Johannes Kinder}, title = {Differential Static Analysis for Detecting Malicious Updates to Open Source Packages}, booktitle = {Proc. ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED)}, publisher = {ACM}, year = {2023}, doi = {10.1145/3605770.3625211}, }
Christopher Lenk and Johannes Kinder. Poster: Privacy Risks from Misconfigured Android Content Providers. In Proc. 2023 ACM SIGSAC Conf. Computer and Communications Security (CCS), 2023.
BibTeX PDF
@inproceedings{ccs23poster-contentproviders, author = {Christopher Lenk and Johannes Kinder}, title = {Poster: Privacy Risks from Misconfigured Android Content Providers}, booktitle = {Proc. 2023 {ACM} {SIGSAC} Conf. Computer and Communications Security (CCS)}, year = {2023}, doi = {10.1145/3576915.3624389}, }
Matías Gobbi and Johannes Kinder. Poster: Using CodeQL to Detect Malware in npm. In Proc. 2023 ACM SIGSAC Conf. Computer and Communications Security (CCS), 2023.
BibTeX PDF
@inproceedings{ccs23poster-codeql, author = {Mat{\'{i}}as Gobbi and Johannes Kinder}, title = {Poster: Using CodeQL to Detect Malware in npm}, booktitle = {Proc. 2023 {ACM} {SIGSAC} Conf. Computer and Communications Security (CCS)}, year = {2023}, doi = {10.1145/3576915.3624401}, }
Lorenzo Cavallaro, Johannes Kinder, Feargus Pendlebury, and Fabio Pierazzi. Are Machine Learning Models for Malware Detection Ready for Prime
Time? IEEE Secur. Priv., 21(2):53–56, 2023.
BibTeX URL PDF
@article{spmag23-mlmalware, author = {Lorenzo Cavallaro and Johannes Kinder and Feargus Pendlebury and Fabio Pierazzi}, title = {Are Machine Learning Models for Malware Detection Ready for Prime Time?}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {53--56}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3236543}, doi = {10.1109/MSEC.2023.3236543}, }
James Patrick-Evans, Moritz Dannehl, and Johannes Kinder. XFL: Naming Functions in Binaries with Extreme Multi-label Learning. In Proc. IEEE Symp. Security and Privacy (S&P), pp. 1677–1692, IEEE, 2023.
BibTeX PDF
@inproceedings{oakland23-xfl, author = {James Patrick-Evans and Moritz Dannehl and Johannes Kinder}, title = {{XFL}: Naming Functions in Binaries with Extreme Multi-label Learning}, booktitle = {Proc. IEEE Symp. Security and Privacy (S\&P)}, pages = {1677--1692}, publisher = {IEEE}, year = {2023}, doi = {10.1109/SP46215.2023.00096}, }
Vera Koponen and Felix Weitkämper. Asymptotic elimination of partially continuous aggregation functions
in directed graphical models. Inf. Comput., 293:105061, 2023.
BibTeX URL
@article{KoponenW23, author = {Vera Koponen and Felix Weitk{\"{a}}mper}, title = {Asymptotic elimination of partially continuous aggregation functions in directed graphical models}, journal = {Inf. Comput.}, volume = {293}, pages = {105061}, year = {2023}, url = {https://doi.org/10.1016/j.ic.2023.105061}, doi = {10.1016/J.IC.2023.105061}, }
Felix Weitkämper. Projective families of distributions revisited. Int. J. Approx. Reason., 162:109031, 2023.
BibTeX URL
@article{Weitkaemper23_IJAR, author = {Felix Weitk{\"{a}}mper}, title = {Projective families of distributions revisited}, journal = {Int. J. Approx. Reason.}, volume = {162}, pages = {109031}, year = {2023}, url = {https://doi.org/10.1016/j.ijar.2023.109031}, doi = {10.1016/J.IJAR.2023.109031}, }
Rafael Kiesel, Kilian Rückschloß, and Felix Weitkämper. "What if?" in Probabilistic Logic Programming. Theory Pract. Log. Program., 23(4):884–899, 2023.
BibTeX URL
@article{KieselRW23, author = {Rafael Kiesel and Kilian R{\"{u}}ckschlo{\ss} and Felix Weitk{\"{a}}mper}, title = {"What if?" in Probabilistic Logic Programming}, journal = {Theory Pract. Log. Program.}, volume = {23}, number = {4}, pages = {884--899}, year = {2023}, url = {https://doi.org/10.1017/s1471068423000133}, doi = {10.1017/S1471068423000133}, }
Bao Loi Quach and Felix Weitkämper. asymptoticplp: Approximating probabilistic logic programs on large
domains. In Proceedings of the International Conference on Logic Programming 2023
Workshops co-located with the 39th International Conference on Logic
Programming (ICLP 2023), London, United Kingdom, July 9th and 10th,
2023, CEUR-WS.org, 2023.
BibTeX URL
@inproceedings{QuachW23, author = {Bao Loi Quach and Felix Weitk{\"{a}}mper}, title = {asymptoticplp: Approximating probabilistic logic programs on large domains}, booktitle = {Proceedings of the International Conference on Logic Programming 2023 Workshops co-located with the 39th International Conference on Logic Programming {(ICLP} 2023), London, United Kingdom, July 9th and 10th, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3437}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3437/paper1PLP.pdf}, }
Kilian Rückschloß and Felix Weitkämper. On the Subtlety of Causal Reasoning in Probabilistic Logic Programming:
A Bug Report about the Causal Interpretation of Annotated Disjunctions. In Proceedings of the International Conference on Logic Programming 2023
Workshops co-located with the 39th International Conference on Logic
Programming (ICLP 2023), London, United Kingdom, July 9th and 10th,
2023, CEUR-WS.org, 2023.
BibTeX URL
@inproceedings{RueckschlossW23_lpad, author = {Kilian R{\"{u}}ckschlo{\ss} and Felix Weitk{\"{a}}mper}, title = {On the Subtlety of Causal Reasoning in Probabilistic Logic Programming: {A} Bug Report about the Causal Interpretation of Annotated Disjunctions}, booktitle = {Proceedings of the International Conference on Logic Programming 2023 Workshops co-located with the 39th International Conference on Logic Programming {(ICLP} 2023), London, United Kingdom, July 9th and 10th, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3437}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3437/short4PLP.pdf}, }
Kilian Rückschloß and Felix Weitkämper. What Do Counterfactuals Say About the World? Reconstructing Probabilistic
Logic Programs from Answers to "What If?" Queries. In Inductive Logic Programming - 32nd International Conference, ILP
2023, Bari, Italy, November 13-15, 2023, Proceedings, pp. 93–108, Springer, 2023.
BibTeX URL
@inproceedings{RueckschlossW23_ILP, author = {Kilian R{\"{u}}ckschlo{\ss} and Felix Weitk{\"{a}}mper}, title = {What Do Counterfactuals Say About the World? Reconstructing Probabilistic Logic Programs from Answers to "What If?" Queries}, booktitle = {Inductive Logic Programming - 32nd International Conference, {ILP} 2023, Bari, Italy, November 13-15, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14363}, pages = {93--108}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49299-0\_7}, doi = {10.1007/978-3-031-49299-0\_7}, }
Felix Weitkämper, Dmitriy Ravdin, and Ramona Fabry. Statistical Relational Structure Learning with Scaled Weight Parameters. In Inductive Logic Programming - 32nd International Conference, ILP
2023, Bari, Italy, November 13-15, 2023, Proceedings, pp. 139–153, Springer, 2023.
BibTeX URL
@inproceedings{WeitkaemperRF23, author = {Felix Weitk{\"{a}}mper and Dmitriy Ravdin and Ramona Fabry}, title = {Statistical Relational Structure Learning with Scaled Weight Parameters}, booktitle = {Inductive Logic Programming - 32nd International Conference, {ILP} 2023, Bari, Italy, November 13-15, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14363}, pages = {139--153}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49299-0\_10}, doi = {10.1007/978-3-031-49299-0\_10}, }
Kilian Rückschloß and Felix Weitkämper. "Would life be more interesting if I were in AI?" Answering Counterfactuals
based on Probabilistic Inductive Logic Programming. In Proceedings 39th International Conference on Logic Programming, ICLP
2023, Imperial College London, UK, 9th July 2023 - 15th July 2023, pp. 58–64, 2023.
BibTeX URL
@inproceedings{RueckschlossW23_Counterfactuals, author = {Kilian R{\"{u}}ckschlo{\ss} and Felix Weitk{\"{a}}mper}, title = {"Would life be more interesting if {I} were in AI?" Answering Counterfactuals based on Probabilistic Inductive Logic Programming}, booktitle = {Proceedings 39th International Conference on Logic Programming, {ICLP} 2023, Imperial College London, UK, 9th July 2023 - 15th July 2023}, series = {{EPTCS}}, volume = {385}, pages = {58--64}, year = {2023}, url = {https://doi.org/10.4204/EPTCS.385.7}, doi = {10.4204/EPTCS.385.7}, }
Kilian Rückschloß and Felix Weitkämper. On the Independencies Hidden in the Structure of a Probabilistic Logic
Program. In Proceedings 39th International Conference on Logic Programming, ICLP
2023, Imperial College London, UK, 9th July 2023 - 15th July 2023, pp. 169–182, 2023.
BibTeX URL
@inproceedings{RueckschlossW23_Independencies, author = {Kilian R{\"{u}}ckschlo{\ss} and Felix Weitk{\"{a}}mper}, title = {On the Independencies Hidden in the Structure of a Probabilistic Logic Program}, booktitle = {Proceedings 39th International Conference on Logic Programming, {ICLP} 2023, Imperial College London, UK, 9th July 2023 - 15th July 2023}, series = {{EPTCS}}, volume = {385}, pages = {169--182}, year = {2023}, url = {https://doi.org/10.4204/EPTCS.385.17}, doi = {10.4204/EPTCS.385.17}, }
Joaquín Arias, Sotiris Batsakis, Wolfgang Faber, Gopal Gupta, Francesco Pacenza, Emmanuel Papadakis, Livio Robaldo, Kilian Rückschloß, Elmer Salazar, Zeynep G. Saribatur, Ilias Tachmazidis, Felix Weitkämper, and Adam Z. Wyner (eds). Proceedings of the International Conference on Logic Programming 2023
Workshops co-located with the 39th International Conference on Logic
Programming (ICLP 2023), London, United Kingdom, July 9th and 10th,
2023. CEUR-WS.org, 2023.
BibTeX URL
@proceedings{ICLP23_WS, editor = {Joaqu{\'{\i}}n Arias and Sotiris Batsakis and Wolfgang Faber and Gopal Gupta and Francesco Pacenza and Emmanuel Papadakis and Livio Robaldo and Kilian R{\"{u}}ckschlo{\ss} and Elmer Salazar and Zeynep G. Saribatur and Ilias Tachmazidis and Felix Weitk{\"{a}}mper and Adam Z. Wyner}, title = {Proceedings of the International Conference on Logic Programming 2023 Workshops co-located with the 39th International Conference on Logic Programming {(ICLP} 2023), London, United Kingdom, July 9th and 10th, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3437}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3437}, urn = {urn:nbn:de:0074-3437-4}, }
2022
Hernán Ponce-de-León and Johannes Kinder. Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. In Proc. IEEE Symp. Security and Privacy (S&P), pp. 1415–1428, IEEE, 2022.
BibTeX PDF
@inproceedings{oakland22-cats-vs-spectre, author = {Hern{\'{a}}n Ponce-de-Le{\'{o}}n and Johannes Kinder}, title = {Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks}, booktitle = {Proc. IEEE Symp. Security and Privacy (S\&P)}, pages = {1415--1428}, publisher = {IEEE}, year = {2022}, doi = {10.1109/SP46214.2022.00082}, }
Kilian Rückschloß and Felix Weitkämper. Correct Causal Inference in Probabilistic Logic Programming. In Proceedings of the International Conference on Logic Programming 2022
Workshops co-located with the 38th International Conference on Logic
Programming (ICLP 2022), Haifa, Israel, July 31st - August 1st,
2022, CEUR-WS.org, 2022.
BibTeX URL
@inproceedings{RueckschlossW22_Causal, author = {Kilian R{\"{u}}ckschlo{\ss} and Felix Weitk{\"{a}}mper}, title = {Correct Causal Inference in Probabilistic Logic Programming}, booktitle = {Proceedings of the International Conference on Logic Programming 2022 Workshops co-located with the 38th International Conference on Logic Programming {(ICLP} 2022), Haifa, Israel, July 31st - August 1st, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3193}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3193/paper1CAUSAL.pdf}, }
Kilian Rückschloß and Felix Weitkämper. Exploiting the Full Power of Pearl's Causality in Probabilistic Logic
Programming. In Proceedings of the International Conference on Logic Programming 2022
Workshops co-located with the 38th International Conference on Logic
Programming (ICLP 2022), Haifa, Israel, July 31st - August 1st,
2022, CEUR-WS.org, 2022.
BibTeX URL
@inproceedings{RueckschlossW22_PLP, author = {Kilian R{\"{u}}ckschlo{\ss} and Felix Weitk{\"{a}}mper}, title = {Exploiting the Full Power of Pearl's Causality in Probabilistic Logic Programming}, booktitle = {Proceedings of the International Conference on Logic Programming 2022 Workshops co-located with the 38th International Conference on Logic Programming {(ICLP} 2022), Haifa, Israel, July 31st - August 1st, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3193}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3193/paper1PLP.pdf}, }
Felix Weitkämper. Functional Lifted Bayesian Networks: Statistical Relational Learning
and Reasoning with Relative Frequencies. In Inductive Logic Programming - 31st International Conference, ILP
2022, Windsor Great Park, UK, September 28-30, 2022, Proceedings, pp. 142–156, Springer, 2022.
BibTeX URL
@inproceedings{Weitkaemper22_ILP, author = {Felix Weitk{\"{a}}mper}, title = {Functional Lifted Bayesian Networks: Statistical Relational Learning and Reasoning with Relative Frequencies}, booktitle = {Inductive Logic Programming - 31st International Conference, {ILP} 2022, Windsor Great Park, UK, September 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13779}, pages = {142--156}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-55630-2\_11}, doi = {10.1007/978-3-031-55630-2\_11}, }
2021
Hernán Ponce-de-León and Johannes Kinder. Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks. Tech. rep. arXiv:2108.13818, arXiv, 2021.
BibTeX URL
@techreport{cats-vs-spectre-arxiv, author = {Hern{\'{a}}n Ponce-de-Le{\'{o}}n and Johannes Kinder}, title = {Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks}, institution = {arXiv}, number = {arXiv:2108.13818}, year = {2021}, url = {https://arxiv.org/abs/2108.13818}, }
Blake Loring and Johannes Kinder. Systematic Generation of Conformance Tests for JavaScript. Tech. rep. arXiv:2108.07075, arXiv, 2021.
BibTeX URL
@techreport{conformance-testing-arxiv, author = {Blake Loring and Johannes Kinder}, title = {Systematic Generation of Conformance Tests for JavaScript}, institution = {arXiv}, number = {arXiv:2108.07075}, year = {2021}, url = {https://arxiv.org/abs/2108.07075}, }
James Patrick-Evans, Moritz Dannehl, and Johannes Kinder. XFL: eXtreme Function Labeling. Tech. rep. arXiv:2107.13404, arXiv, 2021.
BibTeX URL
@techreport{xfl-arxiv, author = {James Patrick-Evans and Moritz Dannehl and Johannes Kinder}, title = {{XFL}: eXtreme Function Labeling}, institution = {arXiv}, number = {arXiv:2107.13404}, year = {2021}, url = {https://arxiv.org/abs/2107.13404}, }
Felix Q. Weitkämper. An Asymptotic Analysis of Probabilistic Logic Programming, with Implications
for Expressing Projective Families of Distributions. Theory Pract. Log. Program., 21(6):802–817, 2021.
BibTeX URL
@article{Weitkaemper21_TPLP, author = {Felix Q. Weitk{\"{a}}mper}, title = {An Asymptotic Analysis of Probabilistic Logic Programming, with Implications for Expressing Projective Families of Distributions}, journal = {Theory Pract. Log. Program.}, volume = {21}, number = {6}, pages = {802--817}, year = {2021}, url = {https://doi.org/10.1017/S1471068421000314}, doi = {10.1017/S1471068421000314}, }
Kilian Rückschloß and Felix Weitkämper. Reasoning about Independence in Open Universe Probabilistic Logic
Programs. In Proceedings of the International Conference on Logic Programming 2021
Workshops co-located with the 37th International Conference on Logic
Programming (ICLP 2021), Porto, Portugal (virtual), September 20th-21st,
2021, CEUR-WS.org, 2021.
BibTeX URL
@inproceedings{RueckschlossW21_PLP, author = {Kilian R{\"{u}}ckschlo{\ss} and Felix Weitk{\"{a}}mper}, title = {Reasoning about Independence in Open Universe Probabilistic Logic Programs}, booktitle = {Proceedings of the International Conference on Logic Programming 2021 Workshops co-located with the 37th International Conference on Logic Programming {(ICLP} 2021), Porto, Portugal (virtual), September 20th-21st, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2970}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2970/plppaper3.pdf}, }
Felix Weitkämper, Beatrice Sarbu, and Kailin Sun. Modelling Infectious Disease Dynamics with Probabilistic Logic Programming. In Proceedings of the International Conference on Logic Programming 2021
Workshops co-located with the 37th International Conference on Logic
Programming (ICLP 2021), Porto, Portugal (virtual), September 20th-21st,
2021, CEUR-WS.org, 2021.
BibTeX URL
@inproceedings{WeitkamperSS21, author = {Felix Weitk{\"{a}}mper and Beatrice Sarbu and Kailin Sun}, title = {Modelling Infectious Disease Dynamics with Probabilistic Logic Programming}, booktitle = {Proceedings of the International Conference on Logic Programming 2021 Workshops co-located with the 37th International Conference on Logic Programming {(ICLP} 2021), Porto, Portugal (virtual), September 20th-21st, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2970}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2970/plppaper2.pdf}, }
Joaquín Arias, Fabio Aurelio D'Asaro, Abeer Dyoub, Gopal Gupta, Markus Hecher, Emily LeBlanc, Rafael Peñaloza, Elmer Salazar, Ari Saptawijaya, Felix Weitkämper, and Jessica Zangari (eds). Proceedings of the International Conference on Logic Programming 2021
Workshops co-located with the 37th International Conference on Logic
Programming (ICLP 2021), Porto, Portugal (virtual), September 20th-21st,
2021. CEUR-WS.org, 2021.
BibTeX URL
@proceedings{ICLP21_WS, editor = {Joaqu{\'{\i}}n Arias and Fabio Aurelio D'Asaro and Abeer Dyoub and Gopal Gupta and Markus Hecher and Emily LeBlanc and Rafael Pe{\~{n}}aloza and Elmer Salazar and Ari Saptawijaya and Felix Weitk{\"{a}}mper and Jessica Zangari}, title = {Proceedings of the International Conference on Logic Programming 2021 Workshops co-located with the 37th International Conference on Logic Programming {(ICLP} 2021), Porto, Portugal (virtual), September 20th-21st, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2970}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2970}, urn = {urn:nbn:de:0074-2970-2}, }
2020
James Patrick-Evans, Lorenzo Cavallaro, and Johannes Kinder. Probabilistic Naming of Functions in Stripped Binaries. In Proc. 35th Annu. Computer Security Applications Conference (ACSAC), pp. 373–385, ACM, 2020.
BibTeX PDF
@inproceedings{acsac20-punstrip, author = {James Patrick-Evans and Lorenzo Cavallaro and Johannes Kinder}, title = {Probabilistic Naming of Functions in Stripped Binaries}, booktitle = {Proc. 35th Annu. Computer Security Applications Conference (ACSAC)}, pages = {373--385}, doi = {10.1145/3427228.3427265}, year = {2020}, publisher = {ACM}, }
Daniel Lehmann, Johannes Kinder, and Michael Pradel. Everything Old is New Again: Binary Security of WebAssembly. In 29th USENIX Security Symposium (USENIX Security), pp. 217–234, USENIX Association, 2020.
BibTeX PDF
@inproceedings{usenixsecurity20-wasm, author = {Daniel Lehmann and Johannes Kinder and Michael Pradel}, title = {Everything Old is New Again: Binary Security of WebAssembly}, booktitle = {29th USENIX Security Symposium (USENIX Security)}, pages = {217--234}, year = {2020}, publisher = {USENIX Association}, }
Felix Weitkämper. Proportional dependencies and asymptotics of probabilistic representations. In International Conference on Logic Programming 2020 Workshop Proceedings
co-located with 36th International Conference on Logic Programming
(ICLP 2020), Rende, Italy, September 18-19, 2020, CEUR-WS.org, 2020.
BibTeX URL
@inproceedings{Weitkaemper20_PLP, author = {Felix Weitk{\"{a}}mper}, title = {Proportional dependencies and asymptotics of probabilistic representations}, booktitle = {International Conference on Logic Programming 2020 Workshop Proceedings co-located with 36th International Conference on Logic Programming {(ICLP} 2020), Rende, Italy, September 18-19, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2678}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2678/short2.pdf}, }
2019
Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz (eds). Proceedings of the 2019 ACM SIGSAC Conference on Computer and
Communications Security, CCS 2019, London, UK, November 11-15, 2019. ACM, 2019.
BibTeX URL
@proceedings{ccs2019, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, publisher = {{ACM}}, year = {2019}, doi = {10.1145/3319535}, isbn = {978-1-4503-6747-9}, url = {https://dl.acm.org/doi/proceedings/10.1145/3319535} }
Duncan Mitchell and Johannes Kinder. A Formal Model for Checking Cryptographic API Usage in JavaScript. In Proc. European Symposium on Research in Computer Security (ESORICS), pp. 341–360, Springer, 2019.
BibTeX PDF
@inproceedings{esorics19-secannjs, author = {Duncan Mitchell and Johannes Kinder}, title = {A Formal Model for Checking Cryptographic API Usage in JavaScript}, booktitle = {Proc. European Symposium on Research in Computer Security (ESORICS)}, series = {LNCS}, volume = {11735}, pages = {341--360}, year = {2019}, publisher = {Springer}, doi = {10.1007/978-3-030-29959-0\_17}, rate = {19.5}, }
Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. In 28th USENIX Security Symposium (USENIX Security), pp. 729–746, USENIX Association, 2019.
BibTeX PDF
@inproceedings{usenixsecurity19-tesseract, author = {Feargus Pendlebury and Fabio Pierazzi and Roberto Jordaney and Johannes Kinder and Lorenzo Cavallaro}, title = {{TESSERACT}: Eliminating Experimental Bias in Malware Classification across Space and Time}, booktitle = {28th USENIX Security Symposium (USENIX Security)}, pages = {729--746}, year = {2019}, publisher = {USENIX Association}, }
Blake Loring, Duncan Mitchell, and Johannes Kinder. Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript. In Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI), pp. 425–438, ACM, 2019.
BibTeX PDF
@inproceedings{pldi19-regex, author = {Blake Loring and Duncan Mitchell and Johannes Kinder}, title = {Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript}, booktitle = {Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI)}, pages = {425--438}, publisher = {ACM}, year = {2019}, doi = {10.1145/3314221.3314645}, }
2018
Blake Loring, Duncan Mitchell, and Johannes Kinder. Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript. Tech. rep. CoRR:abs/1810.05661, arXiv, 2018.
BibTeX URL
@techreport{regex-arxiv, author = {Blake Loring and Duncan Mitchell and Johannes Kinder}, title = {Sound Regular Expression Semantics for Dynamic Symbolic Execution of JavaScript}, institution = {arXiv}, number = {CoRR:abs/1810.05661}, year = {2018}, url = {https://arxiv.org/abs/1810.05661}, }
Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time. Tech. rep. CoRR:abs/1807.07838, arXiv, 2018.
BibTeX URL
@techreport{tesseract-arxiv, author = {Feargus Pendlebury and Fabio Pierazzi and Roberto Jordaney and Johannes Kinder and Lorenzo Cavallaro}, title = {{TESSERACT}: Eliminating Experimental Bias in Malware Classification across Space and Time}, institution = {arXiv}, number = {CoRR:abs/1807.07838}, year = {2018}, url = {https://arxiv.org/abs/1807.07838}, }
Feargus Pendlebury, Fabio Pierazzi, Roberto Jordaney, Johannes Kinder, and Lorenzo Cavallaro. Enabling Fair ML Evaluations for Security. In Proc. 2018 ACM SIGSAC Conf. Computer and
Communications Security (CCS), pp. 2264–2266, 2018.
BibTeX PDF
@inproceedings{ccs18poster, author = {Feargus Pendlebury and Fabio Pierazzi and Roberto Jordaney and Johannes Kinder and Lorenzo Cavallaro}, title = {Enabling Fair {ML} Evaluations for Security}, booktitle = {Proc. 2018 {ACM} {SIGSAC} Conf. Computer and Communications Security (CCS)}, pages = {2264--2266}, year = {2018}, doi = {10.1145/3243734.3278505}, }
Claudio Rizzo, Lorenzo Cavallaro, and Johannes Kinder. BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. In Int. Symp. Research in Attacks, Intrusions, and Defenses (RAID), 2018.
BibTeX PDF
@inproceedings{raid18-babelview, author = {Claudio Rizzo and Lorenzo Cavallaro and Johannes Kinder}, title = {BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews}, booktitle = {Int. Symp. Research in Attacks, Intrusions, and Defenses (RAID)}, year = {2018}, doi = {10.1007/978-3-030-00470-5\_2}, }
Duncan Mitchell, L. Thomas van Binsbergen, Blake Loring, and Johannes Kinder. Checking Cryptographic API Usage with Composable Annotations. In ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM), 2018.
BibTeX PDF
@inproceedings{pepm18-security-annotations, author = {Duncan Mitchell and L. Thomas van Binsbergen and Blake Loring and Johannes Kinder}, title = {Checking Cryptographic {API} Usage with Composable Annotations}, booktitle = {ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM)}, year = {2018}, doi = {10.1145/3162071}, rate = {50}, }
2017
Claudio Rizzo, Lorenzo Cavallaro, and Johannes Kinder. BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. Tech. rep. CoRR:abs/1709.05690, arXiv, 2017.
BibTeX URL
@techreport{babelview-arxiv, author = {Claudio Rizzo and Lorenzo Cavallaro and Johannes Kinder}, title = {BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews}, institution = {arXiv}, number = {CoRR:abs/1709.05690}, year = {2017}, url = {https://arxiv.org/abs/1709.05690}, }
Dusan Repel, Johannes Kinder, and Lorenzo Cavallaro. Modular Synthesis of Heap Exploits. In Proc. ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS), ACM, 2017.
BibTeX PDF
@inproceedings{plas17-heapaeg, author = {Dusan Repel and Johannes Kinder and Lorenzo Cavallaro}, title = {Modular Synthesis of Heap Exploits}, booktitle = {Proc. ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS)}, doi = {10.1145/3139337.3139346}, publisher = {{ACM}}, year = {2017}, }
James Patrick-Evans, Lorenzo Cavallaro, and Johannes Kinder. POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault
Injection. In 11th USENIX Workshop on Offensive Technologies (WOOT), 2017. Best Paper Award.
BibTeX PDF
@inproceedings{woot17-potus, author = {James Patrick-Evans and Lorenzo Cavallaro and Johannes Kinder}, title = {{POTUS}: Probing Off-The-Shelf {USB} Drivers with Symbolic Fault Injection}, booktitle = {11th USENIX Workshop on Offensive Technologies (WOOT)}, note = {Best Paper Award}, year = {2017}, rate = {43}, }
Blake Loring, Duncan Mitchell, and Johannes Kinder. ExpoSE: Practical Symbolic Execution of Standalone JavaScript. In Proc. Int. SPIN Symp. Model Checking of Software (SPIN), pp. 196–199, ACM, 2017.
BibTeX PDF
@inproceedings{spin17-expose, author = {Blake Loring and Duncan Mitchell and Johannes Kinder}, title = {{ExpoSE}: Practical Symbolic Execution of Standalone {JavaScript}}, booktitle = {Proc. Int. SPIN Symp. Model Checking of Software (SPIN)}, pages = {196--199}, publisher = {ACM}, year = {2017}, rate = {47}, }
Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, and Lorenzo Cavallaro. DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. In Proc. 7th ACM Conf. Data and Application Security
and Privacy (CODASPY), pp. 309–320, ACM, 2017.
BibTeX PDF
@inproceedings{codaspy17-droidsieve, author = {Guillermo Suarez-Tangil and Santanu Kumar Dash and Mansour Ahmadi and Johannes Kinder and Giorgio Giacinto and Lorenzo Cavallaro}, title = {{DroidSieve}: Fast and Accurate Classification of Obfuscated Android Malware}, booktitle = {Proc. 7th ACM Conf. Data and Application Security and Privacy (CODASPY)}, pages = {309--320}, publisher = {ACM}, doi = {10.1145/3029806.3029825}, year = {2017}, }
2016
Santanu Kumar Dash, Kimberly Tam, Johannes Kinder, and Lorenzo Cavallaro. Barometer: Sizing Up Android Applications Through Statistical Evaluation. In 37th IEEE Symp. Security and Privacy (S&P), 2016. Poster.
BibTeX
@conference{sp16poster, author = {Santanu Kumar Dash and Kimberly Tam and Johannes Kinder and Lorenzo Cavallaro}, title = {Barometer: Sizing Up {Android} Applications Through Statistical Evaluation}, booktitle = {37th IEEE Symp. Security and Privacy (S\&P)}, note = {Poster}, year = {2016}, }
Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik, and Edgar Weippl. Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Computing Surveys, 49(1):April 2016.
BibTeX PDF
@article{csur16-obfuscation, author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar Weippl}, title = {Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?}, journal = {ACM Computing Surveys}, volume = {49}, number = {1}, year = {2016}, month = apr, }
Santanu Kumar Dash, Guillermo Suarez-Tangil, Salahuddin Khan, Kimberly Tam, Mansour Ahmadi, Johannes Kinder, and Lorenzo Cavallaro. DroidScribe: Classifying Android Malware Based on Runtime Behavior. In Proc. IEEE Symp. Security and Privacy Workshops (SPW), Mobile Security Technologies (MoST), pp. 252–261, 2016.
BibTeX PDF
@inproceedings{most16-droidscribe, author = {Santanu Kumar Dash and Guillermo Suarez-Tangil and Salahuddin Khan and Kimberly Tam and Mansour Ahmadi and Johannes Kinder and Lorenzo Cavallaro}, title = {{DroidScribe}: Classifying Android Malware Based on Runtime Behavior}, booktitle = {Proc. IEEE Symp. Security and Privacy Workshops (SPW), Mobile Security Technologies (MoST)}, year = {2016}, pages = {252--261}, rate = {28}, }
2015
Santanu Kumar Dash, Kimberly Tam, Johannes Kinder, and Lorenzo Cavallaro. Set-based Classification of Android Malware from Behavioral Abstractions. In 24th USENIX Security Symp. (USENIX Security), August 2015. Poster.
BibTeX
@conference{usenix15poster, author = {Santanu Kumar Dash and Kimberly Tam and Johannes Kinder and Lorenzo Cavallaro}, title = {Set-based Classification of Android Malware from Behavioral Abstractions}, booktitle = {24th USENIX Security Symp. (USENIX Security)}, note = {Poster}, month = aug, year = {2015}, }
Jonas Wagner, Volodymyr Kuznetsov, George Candea, and Johannes Kinder. High System-Code Security with Low Overhead. In Proc. IEEE Symp. Security and Privacy (S&P), pp. 866-879, IEEE, 2015.
BibTeX PDF
@inproceedings{oakland15-asap, author = {Jonas Wagner and Volodymyr Kuznetsov and George Candea and Johannes Kinder}, title = {High System-Code Security with Low Overhead}, booktitle = {Proc. IEEE Symp. Security and Privacy (S\&P)}, pages = {866-879}, publisher = {IEEE}, year = {2015}, rate = {13.5}, }
Johannes Kinder. Hypertesting: The Case for Automated Testing of Hyperproperties. In 3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot), pp. 1-8, 2015.
BibTeX PDF
@inproceedings{hotspot15-hypertesting, author = {Johannes Kinder}, title = {Hypertesting: The Case for Automated Testing of Hyperproperties}, booktitle = {3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot)}, year = {2015}, pages = {1-8}, }
Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, and George Candea. Advantageous State Merging During Symbolic Analysis. Pat. US 9,141,354 B2, September 2015. Issued.
BibTeX
@patent{statemerging-patent, author = {Volodymyr Kuznetsov and Johannes Kinder and Stefan Bucur and George Candea}, title = {Advantageous State Merging During Symbolic Analysis}, number = {US 9,141,354 B2}, pubstate = {Issued}, month = sep, year = {2015}, }
2014
Jonas Wagner, Volodymyr Kuznetsov, Johannes Kinder, Azqa
Nadeem, and George Candea. ASAP: High Security at Low Overhead. In 11th USENIX Symp. Operating Systems Design and Implementation (OSDI), October 2014. Poster.
BibTeX
@conference{osdi14poster, author = {Jonas Wagner and Volodymyr Kuznetsov and Johannes Kinder and Azqa Nadeem and George Candea}, title = {ASAP: High Security at Low Overhead}, booktitle = {11th USENIX Symp. Operating Systems Design and Implementation (OSDI)}, note = {Poster}, month = oct, year = {2014}, }
Stefan Bucur, Johannes Kinder, and George Candea. Prototyping Symbolic Execution Engines for Interpreted Languages. In Proc. 19th Int. Conf. Architectural Support for Programming
Languages and Operating Systems (ASPLOS), pp. 239–254, ACM, 2014.
BibTeX PDF
@inproceedings{asplos14-chef, author = {Stefan Bucur and Johannes Kinder and George Candea}, title = {Prototyping Symbolic Execution Engines for Interpreted Languages}, booktitle = {Proc. 19th Int. Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS)}, pages = {239--254}, doi = {10.1145/2541940.2541977}, publisher = {ACM}, year = {2014}, rate = {23}, }
Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, and George Candea. Efficient State Merging in Symbolic Execution (Extended Abstract). In Software Engineering 2014, Fachtagung des GI-Fachbereichs
Softwaretechnik (SE), pp. 45–46, GI, 2014.
BibTeX
@inproceedings{se14-statemerging, author = {Volodymyr Kuznetsov and Johannes Kinder and Stefan Bucur and George Candea}, title = {Efficient State Merging in Symbolic Execution (Extended Abstract)}, booktitle = {Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik (SE)}, year = {2014}, pages = {45--46}, publisher = {GI}, series = {LNI}, volume = {227}, }
Patrice Godefroid and Johannes Kinder. Memory Safety of Floating-Point Computations. Pat. US 8,782,625 B2, July 2014. Issued.
BibTeX
@patent{fpsafety-patent, author = {Patrice Godefroid and Johannes Kinder}, title = {Memory Safety of Floating-Point Computations}, number = {US 8,782,625 B2}, pubstate = {Issued}, month = jul, year = {2014}, }
2013
Stefan Bucur, Johannes Kinder, and George Candea. Making Automated Testing of Cloud Applications
an Integral Component of PaaS. In Proc. 4th Asia-Pacific Workshop on Systems (APSYS), pp. 18:1-18:7, ACM, 2013.
BibTeX PDF
@inproceedings{apsys13-cloud-testing, author = {Stefan Bucur and Johannes Kinder and George Candea}, title = {Making Automated Testing of Cloud Applications an Integral Component of {PaaS}}, booktitle = {Proc. 4th Asia-Pacific Workshop on Systems (APSYS)}, publisher = {ACM}, pages = {18:1-18:7}, doi = {10.1145/2500727.2500730}, year = {2013}, rate = {27}, }
Cristian Zamfir, Baris Kasikci, Johannes Kinder, Edouard Bugnion, and George Candea. Automated Debugging for Arbitrarily Long Executions. In Proc. 14th Workshop on Hot Topics in Operating Systems
(HotOS), USENIX, 2013.
BibTeX URL PDF
@inproceedings{hotos13-res, author = {Cristian Zamfir and Baris Kasikci and Johannes Kinder and Edouard Bugnion and George Candea}, title = {Automated Debugging for Arbitrarily Long Executions}, booktitle = {Proc. 14th Workshop on Hot Topics in Operating Systems (HotOS)}, publisher = {USENIX}, url = {https://www.usenix.org/conference/hotos13/session/zamfir}, year = {2013}, rate = {30}, }
2012
Stefan Bucur, Johannes Kinder, and George Candea. C3A: Client/Server Co-Verification for Cloud Applications. In 10th USENIX Symp. Operating Systems Design and Implementation (OSDI), 2012. Poster.
BibTeX
@conference{osdi12poster, author = {Stefan Bucur and Johannes Kinder and George Candea}, title = {C3A: Client/Server Co-Verification for Cloud Applications}, booktitle = {10th USENIX Symp. Operating Systems Design and Implementation (OSDI)}, note = {Poster}, year = {2012}, }
Volodymyr Kuznetsov, Johannes Kinder, Stefan Bucur, and George Candea. Efficient state merging in symbolic execution. In Proc. ACM SIGPLAN Conf. Programming Language Design and
Implementation (PLDI), pp. 193–204, ACM, 2012.
BibTeX PDF
@inproceedings{pldi12-statemerging, author = {Volodymyr Kuznetsov and Johannes Kinder and Stefan Bucur and George Candea}, title = {Efficient state merging in symbolic execution}, pages = {193--204}, booktitle = {Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI)}, publisher = {ACM}, year = {2012}, rate = {19}, }
Johannes Kinder. Towards Static Analysis of Virtualization-Obfuscated Binaries. In Proc. 19th Working Conf. Reverse Engineering (WCRE), pp. 61–70, IEEE, 2012.
BibTeX PDF
@inproceedings{wcre12-virtobf, author = {Johannes Kinder}, title = {Towards Static Analysis of Virtualization-Obfuscated Binaries}, booktitle = {Proc. 19th Working Conf. Reverse Engineering (WCRE)}, pages = {61--70}, publisher = {IEEE}, year = {2012}, rate = {25}, }
Johannes Kinder and Dmitry Kravchenko. Alternating Control Flow Reconstruction. In Proc. 13th Int. Conf. Verification,
Model Checking, and Abstract Interpretation (VMCAI), pp. 267–282, Springer, 2012.
BibTeX PDF
@inproceedings{vmcai12-acfr, author = {Johannes Kinder and Dmitry Kravchenko}, title = {Alternating Control Flow Reconstruction}, booktitle = {Proc. 13th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI)}, series = {LNCS}, volume = {7148}, publisher = {Springer}, pages = {267--282}, year = {2012}, rate = {36}, }
2011
Péter Bokor, Johannes Kinder, Marco Serafini, and Neeraj Suri. Supporting domain-specific state space reductions through
local partial-order reduction. In 26th IEEE/ACM Int. Conf. Automated Software
Engineering (ASE), pp. 113–122, IEEE, 2011.
BibTeX PDF
@inproceedings{ase11-lpor, author = {P{\'e}ter Bokor and Johannes Kinder and Marco Serafini and Neeraj Suri}, title = {Supporting domain-specific state space reductions through local partial-order reduction}, pages = {113--122}, booktitle = {26th IEEE/ACM Int. Conf. Automated Software Engineering (ASE)}, publisher = {IEEE}, year = {2011}, rate = {35}, }
Péter Bokor, Johannes Kinder, Marco Serafini, and Neeraj Suri. Efficient model checking of fault-tolerant distributed protocols. In Proc. 2011 IEEE/IFIP Int. Conf. Dependable Systems and
Networks (DSN), pp. 73–84, IEEE, 2011.
BibTeX PDF
@inproceedings{dsn11-mpbasset, author = {P{\'e}ter Bokor and Johannes Kinder and Marco Serafini and Neeraj Suri}, title = {Efficient model checking of fault-tolerant distributed protocols}, pages = {73--84}, booktitle = {Proc. 2011 IEEE/IFIP Int. Conf. Dependable Systems and Networks (DSN)}, publisher = {IEEE}, year = {2011}, rate = {25}, }
Stefan Katzenbeisser, Johannes Kinder, and Helmut Veith. Malware Detection. In Henk C. A. van Tilborg and Sushil Jajodia, eds., Encyclopedia of Cryptography and Security (2nd Ed.), pp. 752–755, Springer, 2011.
BibTeX
@incollection{cryptosec11, author = {Stefan Katzenbeisser and Johannes Kinder and Helmut Veith}, title = {Malware Detection}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {752--755}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, publisher = {Springer}, year = {2011}, }
Péter Bokor, Johannes Kinder, Marco Serafini, and Neeraj Suri. Supporting domain-specific state space reductions through
local partial-order reduction. Tech. rep. TR-TUD-DEEDS-07-01-2011, Technische Universität Darmstadt, 2011.
BibTeX
@techreport{lpor-tr, author = {P{\'e}ter Bokor and Johannes Kinder and Marco Serafini and Neeraj Suri}, title = {Supporting domain-specific state space reductions through local partial-order reduction}, institution = {Technische Universit{\"a}t Darmstadt}, number = {TR-TUD-DEEDS-07-01-2011}, year = {2011}, }
Péter Bokor, Johannes Kinder, Marco Serafini, and Neeraj Suri. Efficient model checking of fault-tolerant distributed protocols. Tech. rep. TR-TUD-DEEDS-01-01-2011, Technische Universität Darmstadt, 2011.
BibTeX
@techreport{mpbasset-tr, author = {P{\'e}ter Bokor and Johannes Kinder and Marco Serafini and Neeraj Suri}, title = {Efficient model checking of fault-tolerant distributed protocols}, institution = {Technische Universit{\"a}t Darmstadt}, number = {TR-TUD-DEEDS-01-01-2011}, year = {2011}, }
Earlier
Johannes Kinder. Static Analysis of x86 Executables. Ph.D. Thesis, Technische Universität Darmstadt, 2010.
BibTeX PDF
@phdthesis{phdthesis-kinder, author = {Johannes Kinder}, title = {Static Analysis of x86 Executables}, school = {Technische Universit{\"a}t Darmstadt}, year = {2010}, }
Johannes Kinder and Helmut Veith. Precise Static Analysis of Untrusted Driver Binaries. In Proc. 10th Int. Conf. Formal Methods in Computer-Aided
Design (FMCAD), pp. 43–50, 2010.
BibTeX PDF
@inproceedings{fmcad10-drivers-bat, author = {Johannes Kinder and Helmut Veith}, title = {Precise Static Analysis of Untrusted Driver Binaries}, booktitle = {Proc. 10th Int. Conf. Formal Methods in Computer-Aided Design (FMCAD)}, pages = {43--50}, year = {2010}, rate = {38}, }
Patrice Godefroid and Johannes Kinder. Proving memory safety of floating-point computations by
combining static and dynamic program analysis. In Proc. 19th Int. Symp. Software Testing and
Analysis (ISSTA), pp. 1–12, ACM, 2010.
BibTeX PDF
@inproceedings{issta10-fpsafety, author = {Patrice Godefroid and Johannes Kinder}, title = {Proving memory safety of floating-point computations by combining static and dynamic program analysis}, pages = {1--12}, doi = {10.1145/1831708.1831710}, booktitle = {Proc. 19th Int. Symp. Software Testing and Analysis (ISSTA)}, publisher = {ACM}, year = {2010}, rate = {23}, }
Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, and Helmut Veith. Proactive Detection of Computer Worms Using Model Checking. IEEE Trans. Dependable Sec. Comput., 7(4):424–438, October 2010.
BibTeX PDF
@article{tdsc10-mocca, author = {Johannes Kinder and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith}, title = {Proactive Detection of Computer Worms Using Model Checking}, journal = {IEEE Trans. Dependable Sec. Comput.}, volume = {7}, number = {4}, pages = {424--438}, month = oct, year = {2010}, }
Mihai Christodorescu, Johannes Kinder, Somesh Jha, Stefan Katzenbeisser, and Helmut Veith. System for Malware Normalization and Detection. Pat. US 2010/0011441 A1, January 2010. Published.
BibTeX
@patent{malwarenorm-patent, author = {Mihai Christodorescu and Johannes Kinder and Somesh Jha and Stefan Katzenbeisser and Helmut Veith}, title = {System for Malware Normalization and Detection}, year = {2010}, number = {US 2010/0011441 A1}, pubstate = {Published}, month = jan, }
Johannes Kinder, Helmut Veith, and Florian Zuleger. An Abstract Interpretation-Based Framework for Control Flow
Reconstruction from Binaries. In Proc. 10th Int. Conf. Verification,
Model Checking, and Abstract Interpretation (VMCAI), pp. 214–228, Springer, 2009.
BibTeX PDF
@inproceedings{vmcai09-cfr, author = {Johannes Kinder and Helmut Veith and Florian Zuleger}, title = {An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries}, booktitle = {Proc. 10th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI)}, pages = {214--228}, series = {LNCS}, volume = {5403}, publisher = {Springer}, year = {2009}, rate = {33}, }
Patrice Godefroid and Johannes Kinder. Proving Memory Safety of Floating-Point Computations by Combining Static and Dynamic Program Analysis. Tech. rep. MSR-TR-2009-167, Microsoft Research, November 2009.
BibTeX
@techreport{fpsafety-tr, author = {Patrice Godefroid and Johannes Kinder}, title = {Proving Memory Safety of Floating-Point Computations by Combining Static and Dynamic Program Analysis}, institution = {Microsoft Research}, number = {MSR-TR-2009-167}, month = nov, year = {2009}, }
Johannes Kinder and Helmut Veith. Jakstab: A Static Analysis Platform for Binaries. In Proc. 20th Int. Conf. Computer Aided Verification (CAV), pp. 423–427, Springer, 2008.
BibTeX PDF
@inproceedings{cav08-jakstab, author = {Johannes Kinder and Helmut Veith}, title = {Jakstab: A Static Analysis Platform for Binaries}, booktitle = {Proc. 20th Int. Conf. Computer Aided Verification (CAV)}, pages = {423--427}, publisher = {Springer}, series = {LNCS}, volume = {5123}, year = {2008}, rate = {36}, }
Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, and Helmut Veith. Software transformations to improve malware detection. J. Comput. Virol., 3(4):253–265, November 2007.
BibTeX PDF
@article{jicv07-malware-transform, author = {Mihai Christodorescu and Somesh Jha and Johannes Kinder and Stefan Katzenbeisser and Helmut Veith}, title = {Software transformations to improve malware detection}, journal = {J. Comput. Virol.}, volume = {3}, number = {4}, year = {2007}, month = nov, pages = {253--265}, doi = {10.1007/s11416-007-0059-8}, }
Andreas Holzer, Johannes Kinder, and Helmut Veith. Using Verification Technology to Specify and Detect Malware. In Proc. 11th Int. Conf. Computer Aided Systems Theory (EUROCAST), pp. 497–504, Springer, 2007.
BibTeX PDF
@inproceedings{eurocast07-symac, author = {Andreas Holzer and Johannes Kinder and Helmut Veith}, title = {Using Verification Technology to Specify and Detect Malware}, year = {2007}, booktitle = {Proc. 11th Int. Conf. Computer Aided Systems Theory (EUROCAST)}, pages = {497--504}, publisher = {Springer}, series = {LNCS}, volume = {4739}, }
Mihai Christodorescu, Johannes Kinder, Somesh Jha, Stefan Katzenbeisser, and Helmut Veith. Malware Normalization. Tech. rep. 1539, University of Wisconsin, November 2005.
BibTeX PDF
@techreport{malwarenorm, author = {Mihai Christodorescu and Johannes Kinder and Somesh Jha and Stefan Katzenbeisser and Helmut Veith}, title = {Malware Normalization}, institution = {University of Wisconsin}, year = {2005}, number = 1539, address = {Madison, WI, USA}, month = nov, }
Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, and Helmut Veith. Detecting Malicious Code by Model Checking. In Second Int. Conf. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), pp. 174–187, Springer, 2005.
BibTeX PDF
@inproceedings{dimva05-ctpl, author = {Johannes Kinder and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith}, title = {Detecting Malicious Code by Model Checking}, booktitle = {Second Int. Conf. Detection of Intrusions and Malware \& Vulnerability Assessment (DIMVA)}, year = {2005}, pages = {174--187}, volume = {3548}, series = {LNCS}, publisher = {Springer}, rate = {33}, }
Johannes Kinder. Model Checking Malicious Code. M.Sc. Thesis, Technische Universität München, 2005.
BibTeX PDF
@thesis{da-kinder, author = {Johannes Kinder}, title = {Model Checking Malicious Code}, type = {MSc thesis}, school = {Technische Universit{\"a}t M{\"u}nchen}, year = {2005}, }