[{"status":"public","type":"dissertation","language":[{"iso":"eng"}],"_id":"20522","department":[{"_id":"76"}],"user_id":"5786","year":"2019","citation":{"ieee":"P. Holzinger, <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn, 2019.","chicago":"Holzinger, Philipp. <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn, 2019.","ama":"Holzinger P. <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn; 2019.","apa":"Holzinger, P. (2019). <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn.","short":"P. Holzinger, A Systematic Analysis and Hardening of the Java Security Architecture, Universität Paderborn, 2019.","mla":"Holzinger, Philipp. <i>A Systematic Analysis and Hardening of the Java Security Architecture</i>. Universität Paderborn, 2019.","bibtex":"@book{Holzinger_2019, title={A Systematic Analysis and Hardening of the Java Security Architecture}, publisher={Universität Paderborn}, author={Holzinger, Philipp}, year={2019} }"},"title":"A Systematic Analysis and Hardening of the Java Security Architecture","main_file_link":[{"url":"http://www.bodden.de/pubs/phdHolzinger.pdf"}],"date_updated":"2022-01-06T06:54:29Z","publisher":"Universität Paderborn","date_created":"2020-11-26T10:44:52Z","supervisor":[{"last_name":"Bodden","full_name":"Bodden, Eric","first_name":"Eric"}],"author":[{"first_name":"Philipp","last_name":"Holzinger","full_name":"Holzinger, Philipp"}]},{"title":"User-Centered Tool Design for Data-Flow Analysis","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:54:29Z","author":[{"first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do"}],"supervisor":[{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_created":"2020-11-26T10:47:51Z","year":"2019","citation":{"apa":"Nguyen Quang Do, L. (2019). <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn.","short":"L. Nguyen Quang Do, User-Centered Tool Design for Data-Flow Analysis, Universität Paderborn, 2019.","mla":"Nguyen Quang Do, Lisa. <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn, 2019.","bibtex":"@book{Nguyen Quang Do_2019, title={User-Centered Tool Design for Data-Flow Analysis}, publisher={Universität Paderborn}, author={Nguyen Quang Do, Lisa}, year={2019} }","ama":"Nguyen Quang Do L. <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn; 2019.","ieee":"L. Nguyen Quang Do, <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn, 2019.","chicago":"Nguyen Quang Do, Lisa. <i>User-Centered Tool Design for Data-Flow Analysis</i>. Universität Paderborn, 2019."},"language":[{"iso":"eng"}],"_id":"20524","department":[{"_id":"76"}],"user_id":"5786","status":"public","type":"dissertation"},{"title":"Architectural Runtime Verification","main_file_link":[{"url":"http://www.bodden.de/pubs/stockmann19architectural.pdf"}],"doi":"10.1109/ICSA-C.2019.00021","date_updated":"2022-01-06T06:54:29Z","author":[{"first_name":"Lars","last_name":"Stockmann","id":"48144","full_name":"Stockmann, Lars"},{"full_name":"Laux, Sven","last_name":"Laux","first_name":"Sven"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2020-11-27T10:16:59Z","year":"2019","citation":{"ieee":"L. Stockmann, S. Laux, and E. Bodden, “Architectural Runtime Verification,” in <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>, 2019, pp. 77–84, doi: <a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">10.1109/ICSA-C.2019.00021</a>.","chicago":"Stockmann, Lars, Sven Laux, and Eric Bodden. “Architectural Runtime Verification.” In <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>, 77–84, 2019. <a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">https://doi.org/10.1109/ICSA-C.2019.00021</a>.","ama":"Stockmann L, Laux S, Bodden E. Architectural Runtime Verification. In: <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>. ; 2019:77-84. doi:<a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">10.1109/ICSA-C.2019.00021</a>","bibtex":"@inproceedings{Stockmann_Laux_Bodden_2019, title={Architectural Runtime Verification}, DOI={<a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">10.1109/ICSA-C.2019.00021</a>}, booktitle={2019 IEEE International Conference on Software Architecture Companion (ICSA-C)}, author={Stockmann, Lars and Laux, Sven and Bodden, Eric}, year={2019}, pages={77–84} }","mla":"Stockmann, Lars, et al. “Architectural Runtime Verification.” <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>, 2019, pp. 77–84, doi:<a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">10.1109/ICSA-C.2019.00021</a>.","short":"L. Stockmann, S. Laux, E. Bodden, in: 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 2019, pp. 77–84.","apa":"Stockmann, L., Laux, S., &#38; Bodden, E. (2019). Architectural Runtime Verification. <i>2019 IEEE International Conference on Software Architecture Companion (ICSA-C)</i>, 77–84. <a href=\"https://doi.org/10.1109/ICSA-C.2019.00021\">https://doi.org/10.1109/ICSA-C.2019.00021</a>"},"page":"77-84","language":[{"iso":"eng"}],"_id":"20525","user_id":"5786","department":[{"_id":"76"}],"status":"public","type":"conference","publication":"2019 IEEE International Conference on Software Architecture Companion (ICSA-C)"},{"status":"public","type":"conference","publication":"2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)","language":[{"iso":"eng"}],"_id":"20527","user_id":"5786","department":[{"_id":"76"}],"year":"2019","citation":{"ama":"Hazhirpasand M, Ghafari M, Krüger S, Bodden E, Nierstrasz O. The Impact of Developer Experience in Using Java Cryptography. In: <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>. ; 2019:1-6. doi:<a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">10.1109/ESEM.2019.8870184</a>","ieee":"M. Hazhirpasand, M. Ghafari, S. Krüger, E. Bodden, and O. Nierstrasz, “The Impact of Developer Experience in Using Java Cryptography,” in <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>, 2019, pp. 1–6, doi: <a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">10.1109/ESEM.2019.8870184</a>.","chicago":"Hazhirpasand, Mohammadreza, Mohammad Ghafari, Stefan Krüger, Eric Bodden, and Oskar Nierstrasz. “The Impact of Developer Experience in Using Java Cryptography.” In <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>, 1–6, 2019. <a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">https://doi.org/10.1109/ESEM.2019.8870184</a>.","apa":"Hazhirpasand, M., Ghafari, M., Krüger, S., Bodden, E., &#38; Nierstrasz, O. (2019). The Impact of Developer Experience in Using Java Cryptography. <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>, 1–6. <a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">https://doi.org/10.1109/ESEM.2019.8870184</a>","bibtex":"@inproceedings{Hazhirpasand_Ghafari_Krüger_Bodden_Nierstrasz_2019, title={The Impact of Developer Experience in Using Java Cryptography}, DOI={<a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">10.1109/ESEM.2019.8870184</a>}, booktitle={2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)}, author={Hazhirpasand, Mohammadreza and Ghafari, Mohammad and Krüger, Stefan and Bodden, Eric and Nierstrasz, Oskar}, year={2019}, pages={1–6} }","mla":"Hazhirpasand, Mohammadreza, et al. “The Impact of Developer Experience in Using Java Cryptography.” <i>2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</i>, 2019, pp. 1–6, doi:<a href=\"https://doi.org/10.1109/ESEM.2019.8870184\">10.1109/ESEM.2019.8870184</a>.","short":"M. Hazhirpasand, M. Ghafari, S. Krüger, E. Bodden, O. Nierstrasz, in: 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019, pp. 1–6."},"page":"1-6","publication_identifier":{"issn":["1949-3770"]},"title":"The Impact of Developer Experience in Using Java Cryptography","main_file_link":[{"url":"http://www.bodden.de/pubs/hazhirpasand19impact.pdf"}],"doi":"10.1109/ESEM.2019.8870184","date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-27T10:20:37Z","author":[{"last_name":"Hazhirpasand","full_name":"Hazhirpasand, Mohammadreza","first_name":"Mohammadreza"},{"last_name":"Ghafari","full_name":"Ghafari, Mohammad","first_name":"Mohammad"},{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"last_name":"Nierstrasz","full_name":"Nierstrasz, Oskar","first_name":"Oskar"}]},{"type":"conference","publication":"10th Workshop on Tools for Automatic Program Analysis (TAPAS)","year":"2019","citation":{"apa":"Piskachev, G., Petrasch, T., Späth, J., &#38; Bodden, E. (2019). AuthCheck: Program-state Analysis for Access-control Vulnerabilities. <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>.","bibtex":"@inproceedings{Piskachev_Petrasch_Späth_Bodden_2019, title={AuthCheck: Program-state Analysis for Access-control Vulnerabilities}, booktitle={10th Workshop on Tools for Automatic Program Analysis (TAPAS)}, author={Piskachev, Goran and Petrasch, Tobias and Späth, Johannes and Bodden, Eric}, year={2019} }","mla":"Piskachev, Goran, et al. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>, 2019.","short":"G. Piskachev, T. Petrasch, J. Späth, E. Bodden, in: 10th Workshop on Tools for Automatic Program Analysis (TAPAS), 2019.","ama":"Piskachev G, Petrasch T, Späth J, Bodden E. AuthCheck: Program-state Analysis for Access-control Vulnerabilities. In: <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>. ; 2019.","ieee":"G. Piskachev, T. Petrasch, J. Späth, and E. Bodden, “AuthCheck: Program-state Analysis for Access-control Vulnerabilities,” 2019.","chicago":"Piskachev, Goran, Tobias Petrasch, Johannes Späth, and Eric Bodden. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” In <i>10th Workshop on Tools for Automatic Program Analysis (TAPAS)</i>, 2019."},"status":"public","date_updated":"2022-01-06T06:54:29Z","_id":"20528","author":[{"last_name":"Piskachev","full_name":"Piskachev, Goran","first_name":"Goran"},{"first_name":"Tobias","full_name":"Petrasch, Tobias","last_name":"Petrasch"},{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"user_id":"5786","date_created":"2020-11-27T10:21:19Z","department":[{"_id":"76"},{"_id":"241"}],"title":"AuthCheck: Program-state Analysis for Access-control Vulnerabilities","main_file_link":[{"url":"http://www.bodden.de/pubs/piskachev19authcheck.pdf"}],"language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"20529","department":[{"_id":"76"}],"user_id":"5786","status":"public","publication":"1st International Workshop on Explainable Software (EXPLAIN) at ASE","type":"conference","title":"Explaining Static Analysis -- A Perspective","main_file_link":[{"url":"http://www.bodden.de/pubs/nachtigall19explaining.pdf"}],"date_updated":"2022-01-06T06:54:29Z","author":[{"last_name":"Nachtigall","id":"41213","full_name":"Nachtigall, Marcus","first_name":"Marcus"},{"first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric"}],"date_created":"2020-11-27T10:22:38Z","year":"2019","citation":{"chicago":"Nachtigall, Marcus, Lisa Nguyen Quang Do, and Eric Bodden. “Explaining Static Analysis -- A Perspective.” In <i>1st International Workshop on Explainable Software (EXPLAIN) at ASE</i>, 2019.","ieee":"M. Nachtigall, L. Nguyen Quang Do, and E. Bodden, “Explaining Static Analysis -- A Perspective,” 2019.","ama":"Nachtigall M, Nguyen Quang Do L, Bodden E. Explaining Static Analysis -- A Perspective. In: <i>1st International Workshop on Explainable Software (EXPLAIN) at ASE</i>. ; 2019.","short":"M. Nachtigall, L. Nguyen Quang Do, E. Bodden, in: 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","bibtex":"@inproceedings{Nachtigall_Nguyen Quang Do_Bodden_2019, title={Explaining Static Analysis -- A Perspective}, booktitle={1st International Workshop on Explainable Software (EXPLAIN) at ASE}, author={Nachtigall, Marcus and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }","mla":"Nachtigall, Marcus, et al. “Explaining Static Analysis -- A Perspective.” <i>1st International Workshop on Explainable Software (EXPLAIN) at ASE</i>, 2019.","apa":"Nachtigall, M., Nguyen Quang Do, L., &#38; Bodden, E. (2019). Explaining Static Analysis -- A Perspective. <i>1st International Workshop on Explainable Software (EXPLAIN) at ASE</i>."}},{"_id":"20531","user_id":"5786","department":[{"_id":"76"}],"language":[{"iso":"eng"}],"type":"conference","publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)","status":"public","date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-27T10:25:40Z","author":[{"first_name":"Linghui","full_name":"Luo, Linghui","last_name":"Luo"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"}],"title":"A Qualitative Analysis of Android Taint-Analysis Results","main_file_link":[{"url":"http://www.bodden.de/pubs/ase19qualitative.pdf"}],"year":"2019","citation":{"apa":"Luo, L., Bodden, E., &#38; Späth, J. (2019). A Qualitative Analysis of Android Taint-Analysis Results. <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)</i>.","mla":"Luo, Linghui, et al. “A Qualitative Analysis of Android Taint-Analysis Results.” <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)</i>, 2019.","short":"L. Luo, E. Bodden, J. Späth, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","bibtex":"@inproceedings{Luo_Bodden_Späth_2019, title={A Qualitative Analysis of Android Taint-Analysis Results}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)}, author={Luo, Linghui and Bodden, Eric and Späth, Johannes}, year={2019} }","chicago":"Luo, Linghui, Eric Bodden, and Johannes Späth. “A Qualitative Analysis of Android Taint-Analysis Results.” In <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)</i>, 2019.","ieee":"L. Luo, E. Bodden, and J. Späth, “A Qualitative Analysis of Android Taint-Analysis Results,” 2019.","ama":"Luo L, Bodden E, Späth J. A Qualitative Analysis of Android Taint-Analysis Results. In: <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)</i>. ; 2019."}},{"status":"public","publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"76"}],"user_id":"5786","_id":"20532","citation":{"chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, Oshando Johnson, and Eric Bodden. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” In <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track</i>, 2019.","ieee":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, and E. Bodden, “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods,” 2019.","ama":"Piskachev G, Nguyen Quang Do L, Johnson O, Bodden E. SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. In: <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track</i>. ; 2019.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Johnson_Bodden_2019, title={SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Johnson, Oshando and Bodden, Eric}, year={2019} }","short":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, E. Bodden, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019.","mla":"Piskachev, Goran, et al. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track</i>, 2019.","apa":"Piskachev, G., Nguyen Quang Do, L., Johnson, O., &#38; Bodden, E. (2019). SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. <i>IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track</i>."},"year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/ase19swanAssist.pdf"}],"title":"SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods","author":[{"full_name":"Piskachev, Goran","last_name":"Piskachev","first_name":"Goran"},{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"full_name":"Johnson, Oshando","last_name":"Johnson","first_name":"Oshando"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2020-11-27T10:37:17Z","date_updated":"2022-01-06T06:54:29Z"},{"author":[{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"},{"first_name":"Mira","full_name":"Mezini, Mira","last_name":"Mezini"}],"date_created":"2020-11-27T10:48:38Z","date_updated":"2022-01-06T06:54:29Z","doi":"10.1109/TSE.2019.2948910","main_file_link":[{"url":"http://www.bodden.de/pubs/tse19CrySL.pdf"}],"title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","publication_identifier":{"issn":["2326-3881"]},"page":"1-1","citation":{"ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>. Published online 2019:1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2019, doi: <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>.","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2019). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, IEEE Transactions on Software Engineering (2019) 1–1.","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>.","bibtex":"@article{Krüger_Späth_Ali_Bodden_Mezini_2019, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>}, journal={IEEE Transactions on Software Engineering}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2019}, pages={1–1} }"},"year":"2019","department":[{"_id":"76"}],"user_id":"5786","_id":"20533","language":[{"iso":"eng"}],"keyword":["Java","Encryption","Static analysis","Tools","Ciphers","Semantics","cryptography","domain-specific language","static analysis"],"publication":"IEEE Transactions on Software Engineering","type":"journal_article","status":"public"},{"department":[{"_id":"76"}],"user_id":"5786","_id":"20534","language":[{"iso":"eng"}],"publication":"ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)","type":"conference","status":"public","date_created":"2020-11-27T10:49:33Z","author":[{"full_name":"Piskachev, Goran","last_name":"Piskachev","first_name":"Goran"},{"first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"date_updated":"2022-01-06T06:54:29Z","main_file_link":[{"url":"http://www.bodden.de/pubs/issta19swan.pdf"}],"title":"Codebase-Adaptive Detection of Security-Relevant Methods","citation":{"mla":"Piskachev, Goran, et al. “Codebase-Adaptive Detection of Security-Relevant Methods.” <i>ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)</i>, 2019.","short":"G. Piskachev, L. Nguyen Quang Do, E. Bodden, in: ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Bodden_2019, title={Codebase-Adaptive Detection of Security-Relevant Methods}, booktitle={ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }","apa":"Piskachev, G., Nguyen Quang Do, L., &#38; Bodden, E. (2019). Codebase-Adaptive Detection of Security-Relevant Methods. <i>ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)</i>.","ama":"Piskachev G, Nguyen Quang Do L, Bodden E. Codebase-Adaptive Detection of Security-Relevant Methods. In: <i>ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)</i>. ; 2019.","ieee":"G. Piskachev, L. Nguyen Quang Do, and E. Bodden, “Codebase-Adaptive Detection of Security-Relevant Methods,” 2019.","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, and Eric Bodden. “Codebase-Adaptive Detection of Security-Relevant Methods.” In <i>ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)</i>, 2019."},"year":"2019"},{"department":[{"_id":"76"}],"user_id":"5786","_id":"20535","language":[{"iso":"eng"}],"publication":"European Conference on Object-Oriented Programming (ECOOP)","type":"conference","status":"public","date_created":"2020-11-27T10:50:07Z","author":[{"first_name":"Linghui","full_name":"Luo, Linghui","last_name":"Luo"},{"first_name":"Julian","last_name":"Dolby","full_name":"Dolby, Julian"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"date_updated":"2022-01-06T06:54:29Z","main_file_link":[{"url":"http://www.bodden.de/pubs/ldb19magpiebridge.pdf"}],"title":"MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors","citation":{"mla":"Luo, Linghui, et al. “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors.” <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2019.","bibtex":"@inproceedings{Luo_Dolby_Bodden_2019, title={MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Luo, Linghui and Dolby, Julian and Bodden, Eric}, year={2019} }","short":"L. Luo, J. Dolby, E. Bodden, in: European Conference on Object-Oriented Programming (ECOOP), 2019.","apa":"Luo, L., Dolby, J., &#38; Bodden, E. (2019). MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors. <i>European Conference on Object-Oriented Programming (ECOOP)</i>.","chicago":"Luo, Linghui, Julian Dolby, and Eric Bodden. “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors.” In <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2019.","ieee":"L. Luo, J. Dolby, and E. Bodden, “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors,” 2019.","ama":"Luo L, Dolby J, Bodden E. MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors. In: <i>European Conference on Object-Oriented Programming (ECOOP)</i>. ; 2019."},"year":"2019"},{"type":"dissertation","status":"public","_id":"20536","user_id":"5786","department":[{"_id":"76"}],"language":[{"iso":"eng"}],"year":"2019","citation":{"apa":"Späth, J. (2019). <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn.","bibtex":"@book{Späth_2019, title={Synchronized Pushdown Systems for Pointer and Data-Flow Analysis}, publisher={Universität Paderborn}, author={Späth, Johannes}, year={2019} }","short":"J. Späth, Synchronized Pushdown Systems for Pointer and Data-Flow Analysis, Universität Paderborn, 2019.","mla":"Späth, Johannes. <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn, 2019.","ieee":"J. Späth, <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn, 2019.","chicago":"Späth, Johannes. <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn, 2019.","ama":"Späth J. <i>Synchronized Pushdown Systems for Pointer and Data-Flow Analysis</i>. Universität Paderborn; 2019."},"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-27T10:50:55Z","author":[{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"}],"supervisor":[{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"title":"Synchronized Pushdown Systems for Pointer and Data-Flow Analysis","main_file_link":[{"url":"http://www.bodden.de/pubs/phdSpaeth.pdf"}]},{"department":[{"_id":"76"}],"date_created":"2020-11-27T10:51:53Z","author":[{"full_name":"Piskachev, Goran","last_name":"Piskachev","first_name":"Goran"},{"first_name":"Lisa","full_name":"Nguyen, Lisa","last_name":"Nguyen"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"}],"user_id":"5786","_id":"20537","date_updated":"2022-01-06T06:54:29Z","language":[{"iso":"eng"}],"title":"Codebase-Adaptive Detection of Security-Relevant Methods","type":"report","status":"public","citation":{"apa":"Piskachev, G., Nguyen, L., &#38; Bodden, E. (2019). <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>.","short":"G. Piskachev, L. Nguyen, E. Bodden, Codebase-Adaptive Detection of Security-Relevant Methods, 2019.","mla":"Piskachev, Goran, et al. <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>. 2019.","bibtex":"@book{Piskachev_Nguyen_Bodden_2019, title={Codebase-Adaptive Detection of Security-Relevant Methods}, author={Piskachev, Goran and Nguyen, Lisa and Bodden, Eric}, year={2019} }","ieee":"G. Piskachev, L. Nguyen, and E. Bodden, <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>. 2019.","chicago":"Piskachev, Goran, Lisa Nguyen, and Eric Bodden. <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>, 2019.","ama":"Piskachev G, Nguyen L, Bodden E. <i>Codebase-Adaptive Detection of Security-Relevant Methods</i>.; 2019."},"year":"2019"},{"keyword":["ITSECWEBSITE","CROSSING"],"language":[{"iso":"eng"}],"_id":"20538","department":[{"_id":"76"}],"user_id":"5786","status":"public","publication":"ACM Conference on Data and Application Security and Privacy (CODASPY 2019)","type":"conference","title":"ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware","main_file_link":[{"url":"http://www.bodden.de/pubs/gan19acminer.pdf"}],"date_updated":"2022-01-06T06:54:29Z","author":[{"first_name":"Sigmund","full_name":"Albert Gorski Iii, Sigmund","last_name":"Albert Gorski Iii"},{"full_name":"Andow, Benjamin","last_name":"Andow","first_name":"Benjamin"},{"first_name":"Adwait","last_name":"Nadkarni","full_name":"Nadkarni, Adwait"},{"first_name":"Sunil","last_name":"Manandhar","full_name":"Manandhar, Sunil"},{"first_name":"William","last_name":"Enck","full_name":"Enck, William"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647"},{"first_name":"Alexandre","full_name":"Bartel, Alexandre","last_name":"Bartel"}],"date_created":"2020-11-27T10:52:59Z","year":"2019","citation":{"chicago":"Albert Gorski Iii, Sigmund, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, and Alexandre Bartel. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” In <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>, 2019.","ieee":"S. Albert Gorski Iii <i>et al.</i>, “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware,” 2019.","ama":"Albert Gorski Iii S, Andow B, Nadkarni A, et al. ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. In: <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>. ; 2019.","bibtex":"@inproceedings{Albert Gorski Iii_Andow_Nadkarni_Manandhar_Enck_Bodden_Bartel_2019, title={ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware}, booktitle={ACM Conference on Data and Application Security and Privacy (CODASPY 2019)}, author={Albert Gorski Iii, Sigmund and Andow, Benjamin and Nadkarni, Adwait and Manandhar, Sunil and Enck, William and Bodden, Eric and Bartel, Alexandre}, year={2019} }","mla":"Albert Gorski Iii, Sigmund, et al. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>, 2019.","short":"S. Albert Gorski Iii, B. Andow, A. Nadkarni, S. Manandhar, W. Enck, E. Bodden, A. Bartel, in: ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019.","apa":"Albert Gorski Iii, S., Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden, E., &#38; Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>."}},{"user_id":"5786","department":[{"_id":"76"}],"_id":"20539","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"type":"journal_article","publication":"Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages","status":"public","date_created":"2020-11-27T10:53:57Z","author":[{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"volume":3,"date_updated":"2022-01-06T06:54:29Z","publisher":"ACM","main_file_link":[{"url":"http://www.bodden.de/pubs/sab19context.pdf"}],"doi":"10.1145/3290361","title":"Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems","issue":"POPL","publication_identifier":{"issn":["2475-1421"]},"citation":{"short":"J. Späth, K. Ali, E. Bodden, Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages 3 (2019) 48:1-48:29.","mla":"Späth, Johannes, et al. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, ACM, 2019, p. 48:1-48:29, doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","bibtex":"@article{Späth_Ali_Bodden_2019, title={Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems}, volume={3}, DOI={<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>}, number={POPL}, journal={Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages}, publisher={ACM}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2019}, pages={48:1-48:29} }","apa":"Späth, J., Ali, K., &#38; Bodden, E. (2019). Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, <i>3</i>(POPL), 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>","ieee":"J. Späth, K. Ali, and E. Bodden, “Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems,” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, p. 48:1-48:29, 2019, doi: <a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i> 3, no. POPL (2019): 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>.","ama":"Späth J, Ali K, Bodden E. Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>. 2019;3(POPL):48:1-48:29. doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>"},"intvolume":"         3","page":"48:1-48:29","year":"2019"},{"publication":"International Conference on Software Architecture (ICSA 2019)","type":"conference","status":"public","_id":"20759","department":[{"_id":"76"},{"_id":"241"}],"user_id":"5786","language":[{"iso":"eng"}],"year":"2019","citation":{"ama":"Gerking C, Schubert D. Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures. In: <i>International Conference on Software Architecture (ICSA 2019)</i>. ; 2019.","ieee":"C. Gerking and D. Schubert, “Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures,” 2019.","chicago":"Gerking, Christopher, and David Schubert. “Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures.” In <i>International Conference on Software Architecture (ICSA 2019)</i>, 2019.","bibtex":"@inproceedings{Gerking_Schubert_2019, title={Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures}, booktitle={International Conference on Software Architecture (ICSA 2019)}, author={Gerking, Christopher and Schubert, David}, year={2019} }","mla":"Gerking, Christopher, and David Schubert. “Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures.” <i>International Conference on Software Architecture (ICSA 2019)</i>, 2019.","short":"C. Gerking, D. Schubert, in: International Conference on Software Architecture (ICSA 2019), 2019.","apa":"Gerking, C., &#38; Schubert, D. (2019). Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures. <i>International Conference on Software Architecture (ICSA 2019)</i>."},"date_updated":"2022-01-06T06:54:36Z","author":[{"first_name":"Christopher","full_name":"Gerking, Christopher","last_name":"Gerking"},{"last_name":"Schubert","id":"9106","full_name":"Schubert, David","first_name":"David"}],"date_created":"2020-12-16T14:03:44Z","title":"Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures"},{"publication_status":"published","citation":{"apa":"Piskachev, G., Do, L. N. Q., &#38; Bodden, E. (2019). Codebase-adaptive detection of security-relevant methods. <i>Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>. <a href=\"https://doi.org/10.1145/3293882.3330556\">https://doi.org/10.1145/3293882.3330556</a>","bibtex":"@inproceedings{Piskachev_Do_Bodden_2019, title={Codebase-adaptive detection of security-relevant methods}, DOI={<a href=\"https://doi.org/10.1145/3293882.3330556\">10.1145/3293882.3330556</a>}, booktitle={Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis}, author={Piskachev, Goran and Do, Lisa Nguyen Quang and Bodden, Eric}, year={2019} }","short":"G. Piskachev, L.N.Q. Do, E. Bodden, in: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019.","mla":"Piskachev, Goran, et al. “Codebase-Adaptive Detection of Security-Relevant Methods.” <i>Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 2019, doi:<a href=\"https://doi.org/10.1145/3293882.3330556\">10.1145/3293882.3330556</a>.","ama":"Piskachev G, Do LNQ, Bodden E. Codebase-adaptive detection of security-relevant methods. In: <i>Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>. ; 2019. doi:<a href=\"https://doi.org/10.1145/3293882.3330556\">10.1145/3293882.3330556</a>","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, and Eric Bodden. “Codebase-Adaptive Detection of Security-Relevant Methods.” In <i>Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 2019. <a href=\"https://doi.org/10.1145/3293882.3330556\">https://doi.org/10.1145/3293882.3330556</a>.","ieee":"G. Piskachev, L. N. Q. Do, and E. Bodden, “Codebase-adaptive detection of security-relevant methods,” 2019, doi: <a href=\"https://doi.org/10.1145/3293882.3330556\">10.1145/3293882.3330556</a>."},"year":"2019","date_created":"2021-08-09T12:06:52Z","author":[{"full_name":"Piskachev, Goran","last_name":"Piskachev","first_name":"Goran"},{"first_name":"Lisa Nguyen Quang","last_name":"Do","full_name":"Do, Lisa Nguyen Quang"},{"last_name":"Bodden","full_name":"Bodden, Eric","first_name":"Eric"}],"date_updated":"2022-01-06T06:55:50Z","doi":"10.1145/3293882.3330556","title":"Codebase-adaptive detection of security-relevant methods","publication":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis","type":"conference","status":"public","department":[{"_id":"241"},{"_id":"662"},{"_id":"76"}],"user_id":"5786","_id":"23378","language":[{"iso":"eng"}]},{"type":"bachelorsthesis","status":"public","_id":"7628","project":[{"name":"SFB 901 - Subproject B4","_id":"12"},{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"76"}],"user_id":"477","language":[{"iso":"eng"}],"year":"2019","citation":{"short":"N. Selbach, Modeling Crypto API Usages in OpenSSL’s EVP Library, Universität Paderborn, 2019.","bibtex":"@book{Selbach_2019, title={Modeling Crypto API usages in OpenSSL’s EVP library}, publisher={Universität Paderborn}, author={Selbach, Nils}, year={2019} }","mla":"Selbach, Nils. <i>Modeling Crypto API Usages in OpenSSL’s EVP Library</i>. Universität Paderborn, 2019.","apa":"Selbach, N. (2019). <i>Modeling Crypto API usages in OpenSSL’s EVP library</i>. Universität Paderborn.","chicago":"Selbach, Nils. <i>Modeling Crypto API Usages in OpenSSL’s EVP Library</i>. Universität Paderborn, 2019.","ieee":"N. Selbach, <i>Modeling Crypto API usages in OpenSSL’s EVP library</i>. Universität Paderborn, 2019.","ama":"Selbach N. <i>Modeling Crypto API Usages in OpenSSL’s EVP Library</i>. Universität Paderborn; 2019."},"date_updated":"2022-01-06T07:03:41Z","publisher":"Universität Paderborn","author":[{"first_name":"Nils","full_name":"Selbach, Nils","last_name":"Selbach"}],"supervisor":[{"last_name":"Schubert","orcid":"0000-0002-8674-1859","id":"60543","full_name":"Schubert, Philipp","first_name":"Philipp"}],"date_created":"2019-02-12T07:28:12Z","title":"Modeling Crypto API usages in OpenSSL's EVP library"},{"publication_status":"published","publication_identifier":{"issn":["0098-5589","1939-3520","2326-3881"]},"year":"2019","citation":{"chicago":"Dann, Andreas, Ben Hermann, and Eric Bodden. “ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules.” <i>IEEE Transactions on Software Engineering</i>, 2019, 1–1. <a href=\"https://doi.org/10.1109/tse.2019.2931331\">https://doi.org/10.1109/tse.2019.2931331</a>.","ieee":"A. Dann, B. Hermann, and E. Bodden, “ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2019, doi: <a href=\"https://doi.org/10.1109/tse.2019.2931331\">10.1109/tse.2019.2931331</a>.","ama":"Dann A, Hermann B, Bodden E. ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules. <i>IEEE Transactions on Software Engineering</i>. Published online 2019:1-1. doi:<a href=\"https://doi.org/10.1109/tse.2019.2931331\">10.1109/tse.2019.2931331</a>","apa":"Dann, A., Hermann, B., &#38; Bodden, E. (2019). ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/tse.2019.2931331\">https://doi.org/10.1109/tse.2019.2931331</a>","bibtex":"@article{Dann_Hermann_Bodden_2019, title={ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules}, DOI={<a href=\"https://doi.org/10.1109/tse.2019.2931331\">10.1109/tse.2019.2931331</a>}, journal={IEEE Transactions on Software Engineering}, author={Dann, Andreas and Hermann, Ben and Bodden, Eric}, year={2019}, pages={1–1} }","short":"A. Dann, B. Hermann, E. Bodden, IEEE Transactions on Software Engineering (2019) 1–1.","mla":"Dann, Andreas, et al. “ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules.” <i>IEEE Transactions on Software Engineering</i>, 2019, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/tse.2019.2931331\">10.1109/tse.2019.2931331</a>."},"page":"1-1","date_updated":"2022-01-06T06:52:10Z","author":[{"first_name":"Andreas","last_name":"Dann","full_name":"Dann, Andreas"},{"first_name":"Ben","orcid":"0000-0001-9848-2017","last_name":"Hermann","id":"66173","full_name":"Hermann, Ben"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_created":"2019-11-12T12:20:56Z","title":"ModGuard: Identifying Integrity &Confidentiality Violations in Java Modules","doi":"10.1109/tse.2019.2931331","type":"journal_article","publication":"IEEE Transactions on Software Engineering","status":"public","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"_id":"14896","user_id":"5786","department":[{"_id":"76"},{"_id":"34"},{"_id":"26"}],"language":[{"iso":"eng"}]},{"year":"2019","citation":{"ama":"Dann A, Hermann B, Bodden E. SootDiff: bytecode comparison across different Java compilers. In: <i>Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis  - SOAP 2019</i>. ; 2019. doi:<a href=\"https://doi.org/10.1145/3315568.3329966\">10.1145/3315568.3329966</a>","ieee":"A. Dann, B. Hermann, and E. Bodden, “SootDiff: bytecode comparison across different Java compilers,” 2019, doi: <a href=\"https://doi.org/10.1145/3315568.3329966\">10.1145/3315568.3329966</a>.","chicago":"Dann, Andreas, Ben Hermann, and Eric Bodden. “SootDiff: Bytecode Comparison across Different Java Compilers.” In <i>Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis  - SOAP 2019</i>, 2019. <a href=\"https://doi.org/10.1145/3315568.3329966\">https://doi.org/10.1145/3315568.3329966</a>.","apa":"Dann, A., Hermann, B., &#38; Bodden, E. (2019). SootDiff: bytecode comparison across different Java compilers. <i>Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis  - SOAP 2019</i>. <a href=\"https://doi.org/10.1145/3315568.3329966\">https://doi.org/10.1145/3315568.3329966</a>","mla":"Dann, Andreas, et al. “SootDiff: Bytecode Comparison across Different Java Compilers.” <i>Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis  - SOAP 2019</i>, 2019, doi:<a href=\"https://doi.org/10.1145/3315568.3329966\">10.1145/3315568.3329966</a>.","bibtex":"@inproceedings{Dann_Hermann_Bodden_2019, title={SootDiff: bytecode comparison across different Java compilers}, DOI={<a href=\"https://doi.org/10.1145/3315568.3329966\">10.1145/3315568.3329966</a>}, booktitle={Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis  - SOAP 2019}, author={Dann, Andreas and Hermann, Ben and Bodden, Eric}, year={2019} }","short":"A. Dann, B. Hermann, E. Bodden, in: Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis  - SOAP 2019, 2019."},"publication_status":"published","publication_identifier":{"isbn":["9781450367202"]},"title":"SootDiff: bytecode comparison across different Java compilers","main_file_link":[{"url":"https://thewhitespace.de/publications/dhb19-sootdiff.pdf"}],"doi":"10.1145/3315568.3329966","date_updated":"2022-01-06T06:52:10Z","date_created":"2019-11-12T12:21:11Z","author":[{"first_name":"Andreas","full_name":"Dann, Andreas","last_name":"Dann"},{"first_name":"Ben","id":"66173","full_name":"Hermann, Ben","last_name":"Hermann","orcid":"0000-0001-9848-2017"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"status":"public","type":"conference","publication":"Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis  - SOAP 2019","language":[{"iso":"eng"}],"_id":"14897","user_id":"5786","department":[{"_id":"76"},{"_id":"34"},{"_id":"26"}]}]
