TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time F Pendlebury, F Pierazzi, R Jordaney, J Kinder, L Cavallaro 28th USENIX Security Symposium (USENIX Security), 729-746, 2019 | 400 | 2019 |
Efficient State Merging in Symbolic Execution V Kuznetsov, J Kinder, S Bucur, G Candea ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI), 193-204, 2012 | 367 | 2012 |
DroidSieve: Fast and accurate classification of obfuscated Android malware G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro Conference on Data and Application Security and Privacy (CODASPY), 309-320, 2017 | 299 | 2017 |
Detecting malicious code by model checking J Kinder, S Katzenbeisser, C Schallhart, H Veith Conf. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA …, 2005 | 241 | 2005 |
Jakstab: A static analysis platform for binaries J Kinder, H Veith Int. Conf. Computer Aided Verification (CAV), 423-427, 2008 | 222* | 2008 |
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? S Schrittwieser, S Katzenbeisser, J Kinder, G Merzdovnik, E Weippl ACM Computing Surveys (CSUR) 49 (1), 4, 2016 | 215 | 2016 |
DroidScribe: Classifying Android Malware Based on Runtime Behavior SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ... IEEE Symposium on Security and Privacy Workshops (SPW), Mobile Security …, 2016 | 212 | 2016 |
An abstract interpretation-based framework for control flow reconstruction from binaries J Kinder, F Zuleger, H Veith Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI …, 2009 | 162 | 2009 |
Everything Old is New Again: Binary Security of WebAssembly D Lehmann, J Kinder, M Pradel 29th USENIX Security Symposium (USENIX Security), 2020 | 143 | 2020 |
Malware normalization M Christodorescu, J Kinder, S Jha, S Katzenbeisser, H Veith Technical Report 1539, University of Wisconsin, Madison, Wisconsin, USA, 2005 | 131 | 2005 |
Towards Static Analysis of Virtualization-Obfuscated Binaries J Kinder Working Conference on Reverse Engineering (WCRE), 61-70, 2012 | 87 | 2012 |
Prototyping Symbolic Execution Engines for Interpreted Languages S Bucur, J Kinder, G Candea Architectural Support for Programming Languages and Operating Systems …, 2014 | 79 | 2014 |
High System-Code Security with Low Overhead J Wagner, V Kuznetsov, G Candea, J Kinder IEEE Symposium on Security and Privacy (S&P), 866-879, 2015 | 73 | 2015 |
Static Analysis of x86 Executables J Kinder Technische Universität Darmstadt, 2010 | 72 | 2010 |
Proactive Detection of Computer Worms Using Model Checking J Kinder, S Katzenbeisser, C Schallhart, H Veith IEEE Trans. Dependable and Secure Computing 7 (4), 424-438, 2010 | 70 | 2010 |
Software transformations to improve malware detection M Christodorescu, S Jha, J Kinder, S Katzenbeisser, H Veith Journal in Computer Virology 3 (4), 253-265, 2007 | 56 | 2007 |
Precise static analysis of untrusted driver binaries J Kinder, H Veith Formal Methods in Computer-Aided Design (FMCAD), 2010, 43-50, 2010 | 49 | 2010 |
Alternating Control Flow Reconstruction J Kinder, D Kravchenko Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI …, 2012 | 46 | 2012 |
ExpoSE: Practical Symbolic Execution of Standalone JavaScript B Loring, D Mitchell, J Kinder International SPIN Symposium on Model Checking of Software, 196-199, 2017 | 43 | 2017 |
Modular Synthesis of Heap Exploits D Repel, J Kinder, L Cavallaro ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS), 2017 | 41 | 2017 |