Daniel Lehmann

[firstname].[lastname] at crisp-da.de
+49 6151 16-24571
Software Lab
TU Darmstadt
Room 4.3.07
Mornewegstrasse 32
64293 Darmstadt

I am a PhD student at the Software Lab group, advised by Prof. Dr. Michael Pradel. I am interested in programming languages and program analysis for performance and security, e.g., to identify performance bottlenecks or to find and prevent bugs.

Studies and Internships

Internship at Microsoft Research
Redmond, WA, USA
March 2019 – June 2019
Working on a fuzzer for automatic finding of regressions in REST APIs.
Mentors: Marina Polishchuk and Patrice Godefroid
PhD student at Software Lab
TU Darmstadt, Germany
December 2017 – Present
Advisor: Prof. Dr. Michael Pradel
Internship at Oracle Labs
Redwood Shores, CA, USA
May 2016 – September 2016
Working on Green-Marl, a domain-specific language for graph algorithms.
Master studies in IT Security and in Computer Science
TU Darmstadt, Germany
April 2014 – July 2017
Visiting student at IIT Delhi, India
July 2012 – December 2012
Bachelor studies in Computer Science
TU Darmstadt, Germany
October 2010 – March 2014


Sandro Tolksdorf, Daniel Lehmann, Michael Pradel. 2019. Interactive Metamorphic Testing of Debuggers. To appear in Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2019). [paper]

Daniel Lehmann and Michael Pradel. 2019. Wasabi: A Framework for Dynamically Analyzing WebAssembly. In Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '19). Won a best paper award. [paper] [slides] [DOI] [project website] [GitHub repository] [short news in Linux Magazin]

Daniel Lehmann and Michael Pradel. 2018. Feedback-Directed Differential Testing of Interactive Debuggers. In Proceedings of the 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '18). [paper] [DOI] [GitHub repository]

Daniel Lehmann. 2017. Automatic Testing of Interactive JavaScript Debuggers. Student Research Competition abstract, poster, and presentation (2nd place in the graduate category). In Proceedings Companion of the 2017 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity (SPLASH Companion 2017). [poster] [DOI]

Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose. 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14). [paper]


Daniel Lehmann. 18th June 2018. Differential Testing of Interactive Debuggers. At University of Pennsylvania in the Distributed Systems Laboratory seminar.

Daniel Lehmann. 12th December 2017. Differential Testing of Interactive Debuggers. At Dagstuhl Seminar 17502: Testing and Verification of Compilers. [Dagstuhl report DOI]

Ahmad-Reza Sadeghi and Daniel Lehmann. 6th August 2014. The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques. Talk and live demo of an exploit against Microsoft Enhanced Mitigation Experience Toolkit (EMET). At Black Hat Briefings USA 2014. [talk abstract] [video at YouTube] [release notes of Microsoft EMET 5.1]


GitHub LinkedIn