Johannes Kinder
Orcid: 0000-0002-8594-7839
According to our database1,
Johannes Kinder
authored at least 46 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version).
CoRR, 2024
Proceedings of the IEEE Secure Development Conference, 2024
2023
IEEE Secur. Priv., 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Differential Static Analysis for Detecting Malicious Updates to Open Source Packages.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017
2016
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
2014
Proceedings of the Twelfth ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2014
Proceedings of the Formal Methods in Computer-Aided Design, 2014
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014
2013
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013
Proceedings of the Asia-Pacific Workshop on Systems, 2013
2012
Proceedings of the 19th Working Conference on Reverse Engineering, 2012
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2012
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Supporting domain-specific state space reductions through local partial-order reduction.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
Static analysis of x86 executables (Statische Analyse von Programmen in x86-Maschinensprache).
PhD thesis, 2010
IEEE Trans. Dependable Secur. Comput., 2010
Proving memory safety of floating-point computations by combining static and dynamic program analysis.
Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, 2010
Proceedings of 10th International Conference on Formal Methods in Computer-Aided Design, 2010
2009
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
Proceedings of the Verification, 2009
2008
Proceedings of the Computer Aided Verification, 20th International Conference, 2008
2007
Proceedings of the Computer Aided Systems Theory, 2007
2005
Proceedings of the Detection of Intrusions and Malware, 2005