Daniel Lehmann

E-mail:
[firstname].[lastname] at crisp-da.de
Phone:
+49 6151 16-24571
Address:
Software Lab
TU Darmstadt
Room 4.3.07
Mornewegstrasse 32
64293 Darmstadt

I am a PhD student at the Software Lab group, advised by Prof. Dr. Michael Pradel. I am interested in programming languages and program analysis for performance and security, e.g., to identify performance bottlenecks or to find and prevent bugs.

Education

PhD student at Software Lab
TU Darmstadt, Germany
December 2017 – Present
Advisor: Prof. Dr. Michael Pradel
Internship at Oracle Labs
Redwood Shores, CA, USA
May 2016 – September 2016
Development of a compiler for Green-Marl, a domain-specific language for graph algorithms
Master studies in IT Security and in Computer Science
TU Darmstadt, Germany
April 2014 – July 2017
Visiting student at IIT Delhi, India
July 2012 – December 2012
Bachelor studies in Computer Science
TU Darmstadt, Germany
October 2010 – March 2014

Publications

Daniel Lehmann and Michael Pradel. 2018. Wasabi: A Framework for Dynamically Analyzing WebAssembly. To appear in Proceedings of the 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '18). [arXiv PDF] [project website] [GitHub repository] [short news in Linux Magazin]

Daniel Lehmann and Michael Pradel. 2018. Feedback-Directed Differential Testing of Interactive Debuggers. In Proceedings of the 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '18). [DOI] [pre-print PDF] [GitHub repository]

Daniel Lehmann. 2017. Automatic Testing of Interactive JavaScript Debuggers. Student Research Competition abstract, poster, and presentation (2nd place in the graduate category). In Proceedings Companion of the 2017 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity (SPLASH Companion 2017). [DOI] [poster]

Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose. 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14). [paper PDF]

Talks

Daniel Lehmann. 18th June 2018. Differential Testing of Interactive Debuggers. At University of Pennsylvania in the Distributed Systems Laboratory seminar.

Daniel Lehmann. 12th December 2017. Differential Testing of Interactive Debuggers. At Dagstuhl Seminar 17502: Testing and Verification of Compilers. [Dagstuhl report DOI]

Ahmad-Reza Sadeghi and Daniel Lehmann. 6th August 2014. The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques. Talk and live demo of an exploit against Microsoft Enhanced Mitigation Experience Toolkit (EMET). At Black Hat Briefings USA 2014. [talk abstract] [video at YouTube] [release notes of Microsoft EMET 5.1]

Social

GitHub LinkedIn