
Contact details
Email: | |
Office: | NU building, room 11A-01 |
Mailing address: | Brian Johannesmeyer Vrije Universiteit Amsterdam De Boelelaan 1081A 1081 HV, Amsterdam The Netherlands |
About me
I joined the VUSec group in 2019 as a PhD student. My research interests span systems security, program analysis, and microarchitectural attacks.
Previously, I did my MS at UC San Diego, where I worked with the security group. Before that I did my BS at the University of Arizona, where I worked on the Lynx Project.
Publications
- Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. Brian Johannesmeyer, Jakob Koschel, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida. NDSS 2022. [paper | slides | web | code | video].
- On the Effectiveness of Same-Domain Memory Deduplication. Andreas Costi, Brian Johannesmeyer, Erik Bosman, Cristiano Giuffrida, Herbert Bos. ACM EuroSec 2022. [paper | slides | web | code].
- Triton: A Software-Reconfigurable Federated Avionics Testbed. Sam Crow, Brown Farinholt, Brian Johannesmeyer, Karl Koscher, Stephen Checkoway, Stefan Savage, Aaron Schulman, Alex C. Snoeren, Kirill Levchenko. USENIX CSET 2019. [paper].
- FaCT: A DSL for Timing-Sensitive Computation. Sunjay Cauligi, Gary Soeller, Brian Johannesmeyer, Fraser Brown, Riad S. Wahby, John Renner, Benjamin Grégoire, Gilles Barthe, Ranjit Jhala, Deian Stefan. ACM PLDI 2019. [paper | slides | code | video | demo].
- FaCT: A Flexible Constant-Time Programming Language. Sunjay Cauligi, Gary Soeller, Fraser Brown, Brian Johannesmeyer, Yunlu Huang, Ranjit Jhala, Deian Stefan. IEEE SecDev 2017. [paper | slides | code].
- Dead Store Elimination (Still) Considered Harmful. Zhaomo Yang, Brian Johannesmeyer, Anders Trier Olesen, Sorin Lerner, Kirill Levchenko. USENIX Security 2017. [paper | video].
- A Generic Approach to Automatic Deobfuscation of Executable Code. Babak Yadegari, Brian Johannesmeyer, Benjamin Whitely, Saumya Debray. IEEE S&P 2015. [paper | web | code (tar.gz, 2.3 MB) | video | input programs | traces (tar.gz, 6.0 GB)]. CSAW Applied Research 2015 finalist.
- Identifying and Understanding Self-Checksumming Defenses in Software. Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su. ACM CODASPY 2015. [paper | web].
- A Framework for Understanding Dynamic Anti-Analysis Defenses. Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su. ACM PREW 2014. [paper | web].
Teaching
I’ve helped teach a few classes, including:
- Network Security (VU Amsterdam): P2 2021, P2 2022.
- Computer and Network Security (VU Amsterdam): P1 2019, P1 2020.
- Introduction to Computer Security (UC San Diego, CSE 127): Fall 2017, Spring 2018.
- Introduction to Communications (University of Arizona, ECE 340A): Fall 2014, Spring 2015.