Brian Johannesmeyer

Contact details

Email:
Office:NU building, room 11A-01
Mailing address:Brian Johannesmeyer
Vrije Universiteit Amsterdam
De Boelelaan 1081A
1081 HV, Amsterdam
The Netherlands

About me

I joined the VUSec group in 2019 as a PhD student. My research interests span systems security, program analysis, and microarchitectural attacks.

Previously, I did my MS at UC San Diego, where I worked with the security group. Before that I did my BS at the University of Arizona, where I worked on the Lynx Project.

Publications

  • Practical Data-Only Attack Generation. Brian Johannesmeyer, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida. USENIX Security 2024. [paper | code].
  • Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. Brian Johannesmeyer, Jakob Koschel, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida. NDSS 2022. [paper | slides | web | code | video].
  • On the Effectiveness of Same-Domain Memory Deduplication. Andreas Costi, Brian Johannesmeyer, Erik Bosman, Cristiano Giuffrida, Herbert Bos. ACM EuroSec 2022. [paper | slides | web | code].
  • Triton: A Software-Reconfigurable Federated Avionics Testbed. Sam Crow, Brown Farinholt, Brian Johannesmeyer, Karl Koscher, Stephen Checkoway, Stefan Savage, Aaron Schulman, Alex C. Snoeren, Kirill Levchenko. USENIX CSET 2019. [paper].
  • FaCT: A DSL for Timing-Sensitive Computation. Sunjay Cauligi, Gary Soeller, Brian Johannesmeyer, Fraser Brown, Riad S. Wahby, John Renner, Benjamin GrĂ©goire, Gilles Barthe, Ranjit Jhala, Deian Stefan. ACM PLDI 2019. [paper | slides | code | video | demo].
  • FaCT: A Flexible Constant-Time Programming Language. Sunjay Cauligi, Gary Soeller, Fraser Brown, Brian Johannesmeyer, Yunlu Huang, Ranjit Jhala, Deian Stefan. IEEE SecDev 2017. [paper | slides | code].
  • Dead Store Elimination (Still) Considered Harmful. Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, Kirill Levchenko. USENIX Security 2017. [paper | video].
  • A Generic Approach to Automatic Deobfuscation of Executable Code. Babak Yadegari, Brian Johannesmeyer, Benjamin Whitely, Saumya Debray. IEEE S&P 2015. [paper | web | code (tar.gz, 2.3 MB) | video | input programs | traces (tar.gz, 6.0 GB)]. CSAW Applied Research 2015 finalist.
  • Identifying and Understanding Self-Checksumming Defenses in Software. Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su. ACM CODASPY 2015. [paper | web].
  • A Framework for Understanding Dynamic Anti-Analysis Defenses. Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su. ACM PREW 2014. [paper | web].

Teaching

I’ve helped teach a few classes, including: