Daniel Lehmann

E-mail:
[firstname].[lastname] at crisp-da.de
Phone:
+49 6151 16-24571
Address:
Software Lab
TU Darmstadt
Room 4.3.07
Mornewegstrasse 32
64293 Darmstadt

I am a PhD student at the Software Lab group, advised by Prof. Dr. Michael Pradel. I am interested in programming languages and program analysis for performance and security, e.g., to identify performance bottlenecks or to find and prevent bugs.

Education

PhD student at Software Lab
TU Darmstadt, Germany
December 2017 – Present
Advisor: Prof. Dr. Michael Pradel
Internship at Oracle Labs
Redwood Shores, CA, USA
May 2016 – September 2016
Development of a compiler for Green-Marl, a domain-specific language for graph algorithms
Master studies in IT Security and in Computer Science
TU Darmstadt, Germany
April 2014 – July 2017
Visiting student at IIT Delhi, India
July 2012 – December 2012
Bachelor studies in Computer Science
TU Darmstadt, Germany
October 2010 – March 2014

Research

Daniel Lehmann and Michael Pradel. 2018. Wasabi: A Framework for Dynamically Analyzing WebAssembly. Technical Report. [PDF] [arXiv] [website] [short news in Linux Magazin]

Daniel Lehmann and Michael Pradel. 2018. Feedback-Directed Differential Testing of Interactive Debuggers. In Proceedings of the 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '18). [to appear]

Daniel Lehmann. 2017. Automatic Testing of Interactive JavaScript Debuggers. Student Research Competition poster and presentation. In Proceedings Companion of the 2017 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity (SPLASH Companion 2017). [poster] [DOI]

Ahmad-Reza Sadeghi and Daniel Lehmann. 2014. The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques. Talk and live demo of an exploit against Microsoft Enhanced Mitigation Experience Toolkit (EMET). Black Hat Briefings USA 2014. [talk abstract] [YouTube] [release notes of Microsoft EMET 5.1]

Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose. 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14). [PDF]

Social

GitHub LinkedIn