---
_id: '26407'
author:
- first_name: Goran
  full_name: Piskachev, Goran
  id: '41936'
  last_name: Piskachev
  orcid: 0000-0003-4424-5838
- first_name: Ranjith
  full_name: Krishnamurthy, Ranjith
  last_name: Krishnamurthy
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Piskachev G, Krishnamurthy R, Bodden E. SecuCheck: Engineering configurable
    taint analysis for software developers. In: <i>2021 IEEE 21st International Working
    Conference on Source Code Analysis and Manipulation (SCAM)</i>. ; 2021.'
  apa: 'Piskachev, G., Krishnamurthy, R., &#38; Bodden, E. (2021). SecuCheck: Engineering
    configurable taint analysis for software developers. <i>2021 IEEE 21st International
    Working Conference on Source Code Analysis and Manipulation (SCAM)</i>.'
  bibtex: '@inproceedings{Piskachev_Krishnamurthy_Bodden_2021, title={SecuCheck: Engineering
    configurable taint analysis for software developers}, booktitle={2021 IEEE 21st
    International Working Conference on Source Code Analysis and Manipulation (SCAM)},
    author={Piskachev, Goran and Krishnamurthy, Ranjith and Bodden, Eric}, year={2021}
    }'
  chicago: 'Piskachev, Goran, Ranjith Krishnamurthy, and Eric Bodden. “SecuCheck:
    Engineering Configurable Taint Analysis for Software Developers.” In <i>2021 IEEE
    21st International Working Conference on Source Code Analysis and Manipulation
    (SCAM)</i>, 2021.'
  ieee: 'G. Piskachev, R. Krishnamurthy, and E. Bodden, “SecuCheck: Engineering configurable
    taint analysis for software developers,” 2021.'
  mla: 'Piskachev, Goran, et al. “SecuCheck: Engineering Configurable Taint Analysis
    for Software Developers.” <i>2021 IEEE 21st International Working Conference on
    Source Code Analysis and Manipulation (SCAM)</i>, 2021.'
  short: 'G. Piskachev, R. Krishnamurthy, E. Bodden, in: 2021 IEEE 21st International
    Working Conference on Source Code Analysis and Manipulation (SCAM), 2021.'
date_created: 2021-10-18T12:53:15Z
date_updated: 2022-10-20T12:44:31Z
department:
- _id: '76'
- _id: '662'
language:
- iso: eng
publication: 2021 IEEE 21st International Working Conference on Source Code Analysis
  and Manipulation (SCAM)
status: public
title: 'SecuCheck: Engineering configurable taint analysis for software developers'
type: conference
user_id: '15249'
year: '2021'
...
---
_id: '22463'
author:
- first_name: Linghui
  full_name: Luo, Linghui
  last_name: Luo
- first_name: Martin
  full_name: Schäf, Martin
  last_name: Schäf
- first_name: Daniel
  full_name: Sanchez, Daniel
  last_name: Sanchez
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Luo L, Schäf M, Sanchez D, Bodden E. IDE Support for Cloud-Based Static Analyses.
    In: <i>Proceedings of the 29th ACM Joint Meeting on European Software Engineering
    Conference and Symposium on the Foundations of Software Engineering</i>. ; 2021.'
  apa: Luo, L., Schäf, M., Sanchez, D., &#38; Bodden, E. (2021). IDE Support for Cloud-Based
    Static Analyses. <i>Proceedings of the 29th ACM Joint Meeting on European Software
    Engineering Conference and Symposium on the Foundations of Software Engineering</i>.
  bibtex: '@inproceedings{Luo_Schäf_Sanchez_Bodden_2021, title={IDE Support for Cloud-Based
    Static Analyses}, booktitle={Proceedings of the 29th ACM Joint Meeting on European
    Software Engineering Conference and Symposium on the Foundations of Software Engineering},
    author={Luo, Linghui and Schäf, Martin and Sanchez, Daniel and Bodden, Eric},
    year={2021} }'
  chicago: Luo, Linghui, Martin Schäf, Daniel Sanchez, and Eric Bodden. “IDE Support
    for Cloud-Based Static Analyses.” In <i>Proceedings of the 29th ACM Joint Meeting
    on European Software Engineering Conference and Symposium on the Foundations of
    Software Engineering</i>, 2021.
  ieee: L. Luo, M. Schäf, D. Sanchez, and E. Bodden, “IDE Support for Cloud-Based
    Static Analyses,” 2021.
  mla: Luo, Linghui, et al. “IDE Support for Cloud-Based Static Analyses.” <i>Proceedings
    of the 29th ACM Joint Meeting on European Software Engineering Conference and
    Symposium on the Foundations of Software Engineering</i>, 2021.
  short: 'L. Luo, M. Schäf, D. Sanchez, E. Bodden, in: Proceedings of the 29th ACM
    Joint Meeting on European Software Engineering Conference and Symposium on the
    Foundations of Software Engineering, 2021.'
date_created: 2021-06-17T10:18:05Z
date_updated: 2022-10-20T13:11:45Z
department:
- _id: '76'
language:
- iso: eng
publication: Proceedings of the 29th ACM Joint Meeting on European Software Engineering
  Conference and Symposium on the Foundations of Software Engineering
status: public
title: IDE Support for Cloud-Based Static Analyses
type: conference
user_id: '15249'
year: '2021'
...
---
_id: '33840'
author:
- first_name: Kadiray
  full_name: Karakaya, Kadiray
  id: '70410'
  last_name: Karakaya
  orcid: https://orcid.org/0000-0001-9266-2084
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Karakaya K, Bodden E. SootFX: A Static Code Feature Extraction Tool for Java
    and Android. In: <i>2021 IEEE 21st International Working Conference on Source
    Code Analysis and Manipulation (SCAM)</i>. ; 2021:181–186.'
  apa: 'Karakaya, K., &#38; Bodden, E. (2021). SootFX: A Static Code Feature Extraction
    Tool for Java and Android. <i>2021 IEEE 21st International Working Conference
    on Source Code Analysis and Manipulation (SCAM)</i>, 181–186.'
  bibtex: '@inproceedings{Karakaya_Bodden_2021, title={SootFX: A Static Code Feature
    Extraction Tool for Java and Android}, booktitle={2021 IEEE 21st International
    Working Conference on Source Code Analysis and Manipulation (SCAM)}, author={Karakaya,
    Kadiray and Bodden, Eric}, year={2021}, pages={181–186} }'
  chicago: 'Karakaya, Kadiray, and Eric Bodden. “SootFX: A Static Code Feature Extraction
    Tool for Java and Android.” In <i>2021 IEEE 21st International Working Conference
    on Source Code Analysis and Manipulation (SCAM)</i>, 181–186, 2021.'
  ieee: 'K. Karakaya and E. Bodden, “SootFX: A Static Code Feature Extraction Tool
    for Java and Android,” in <i>2021 IEEE 21st International Working Conference on
    Source Code Analysis and Manipulation (SCAM)</i>, 2021, pp. 181–186.'
  mla: 'Karakaya, Kadiray, and Eric Bodden. “SootFX: A Static Code Feature Extraction
    Tool for Java and Android.” <i>2021 IEEE 21st International Working Conference
    on Source Code Analysis and Manipulation (SCAM)</i>, 2021, pp. 181–186.'
  short: 'K. Karakaya, E. Bodden, in: 2021 IEEE 21st International Working Conference
    on Source Code Analysis and Manipulation (SCAM), 2021, pp. 181–186.'
date_created: 2022-10-20T13:09:08Z
date_updated: 2022-10-20T13:09:23Z
department:
- _id: '76'
language:
- iso: eng
page: 181–186
publication: 2021 IEEE 21st International Working Conference on Source Code Analysis
  and Manipulation (SCAM)
status: public
title: 'SootFX: A Static Code Feature Extraction Tool for Java and Android'
type: conference
user_id: '15249'
year: '2021'
...
---
_id: '26406'
author:
- first_name: Philipp
  full_name: Schubert, Philipp
  id: '60543'
  last_name: Schubert
  orcid: 0000-0002-8674-1859
- first_name: Ben
  full_name: Hermann, Ben
  id: '66173'
  last_name: Hermann
  orcid: 0000-0001-9848-2017
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Richard
  full_name: Leer, Richard
  last_name: Leer
citation:
  ama: 'Schubert P, Hermann B, Bodden E, Leer R. Into the Woods: Experiences from
    Building a Dataflow Analysis Framework for C/C++. In: <i>SCAM ’21: IEEE International
    Working Conference on Source Code Analysis and Manipulation (Engineering Track)</i>.
    ; 2021.'
  apa: 'Schubert, P., Hermann, B., Bodden, E., &#38; Leer, R. (2021). Into the Woods:
    Experiences from Building a Dataflow Analysis Framework for C/C++. <i>SCAM ’21:
    IEEE International Working Conference on Source Code Analysis and Manipulation
    (Engineering Track)</i>.'
  bibtex: '@inproceedings{Schubert_Hermann_Bodden_Leer_2021, title={Into the Woods:
    Experiences from Building a Dataflow Analysis Framework for C/C++}, booktitle={SCAM
    ’21: IEEE International Working Conference on Source Code Analysis and Manipulation
    (Engineering Track)}, author={Schubert, Philipp and Hermann, Ben and Bodden, Eric
    and Leer, Richard}, year={2021} }'
  chicago: 'Schubert, Philipp, Ben Hermann, Eric Bodden, and Richard Leer. “Into the
    Woods: Experiences from Building a Dataflow Analysis Framework for C/C++.” In
    <i>SCAM ’21: IEEE International Working Conference on Source Code Analysis and
    Manipulation (Engineering Track)</i>, 2021.'
  ieee: 'P. Schubert, B. Hermann, E. Bodden, and R. Leer, “Into the Woods: Experiences
    from Building a Dataflow Analysis Framework for C/C++,” 2021.'
  mla: 'Schubert, Philipp, et al. “Into the Woods: Experiences from Building a Dataflow
    Analysis Framework for C/C++.” <i>SCAM ’21: IEEE International Working Conference
    on Source Code Analysis and Manipulation (Engineering Track)</i>, 2021.'
  short: 'P. Schubert, B. Hermann, E. Bodden, R. Leer, in: SCAM ’21: IEEE International
    Working Conference on Source Code Analysis and Manipulation (Engineering Track),
    2021.'
date_created: 2021-10-18T12:52:12Z
date_updated: 2023-06-15T08:39:55Z
department:
- _id: '76'
language:
- iso: eng
project:
- _id: '3'
  name: 'SFB 901 - B: SFB 901 - Project Area B'
- _id: '12'
  name: 'SFB 901 - B4: SFB 901 - Subproject B4'
- _id: '1'
  grant_number: '160364472'
  name: 'SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen
    in dynamischen Märkten '
publication: 'SCAM ''21: IEEE International Working Conference on Source Code Analysis
  and Manipulation (Engineering Track)'
status: public
title: 'Into the Woods: Experiences from Building a Dataflow Analysis Framework for
  C/C++'
type: conference
user_id: '15249'
year: '2021'
...
---
_id: '22462'
author:
- first_name: Ashwin Prasad
  full_name: Shivarpatna Venkatesh, Ashwin Prasad
  id: '66637'
  last_name: Shivarpatna Venkatesh
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Shivarpatna Venkatesh AP, Bodden E. Automated Cell Header Generator for Jupyter
    Notebooks. In: <i>International Workshop on AI and Software Testing/Analysis (AISTA)</i>.
    ; 2021. doi:<a href="https://doi.org/10.1145/3464968.3468410">10.1145/3464968.3468410</a>'
  apa: Shivarpatna Venkatesh, A. P., &#38; Bodden, E. (2021). Automated Cell Header
    Generator for Jupyter Notebooks. <i>International Workshop on AI and Software
    Testing/Analysis (AISTA)</i>. <a href="https://doi.org/10.1145/3464968.3468410">https://doi.org/10.1145/3464968.3468410</a>
  bibtex: '@inproceedings{Shivarpatna Venkatesh_Bodden_2021, title={Automated Cell
    Header Generator for Jupyter Notebooks}, DOI={<a href="https://doi.org/10.1145/3464968.3468410">10.1145/3464968.3468410</a>},
    booktitle={International Workshop on AI and Software Testing/Analysis (AISTA)},
    author={Shivarpatna Venkatesh, Ashwin Prasad and Bodden, Eric}, year={2021} }'
  chicago: Shivarpatna Venkatesh, Ashwin Prasad, and Eric Bodden. “Automated Cell
    Header Generator for Jupyter Notebooks.” In <i>International Workshop on AI and
    Software Testing/Analysis (AISTA)</i>, 2021. <a href="https://doi.org/10.1145/3464968.3468410">https://doi.org/10.1145/3464968.3468410</a>.
  ieee: 'A. P. Shivarpatna Venkatesh and E. Bodden, “Automated Cell Header Generator
    for Jupyter Notebooks,” 2021, doi: <a href="https://doi.org/10.1145/3464968.3468410">10.1145/3464968.3468410</a>.'
  mla: Shivarpatna Venkatesh, Ashwin Prasad, and Eric Bodden. “Automated Cell Header
    Generator for Jupyter Notebooks.” <i>International Workshop on AI and Software
    Testing/Analysis (AISTA)</i>, 2021, doi:<a href="https://doi.org/10.1145/3464968.3468410">10.1145/3464968.3468410</a>.
  short: 'A.P. Shivarpatna Venkatesh, E. Bodden, in: International Workshop on AI
    and Software Testing/Analysis (AISTA), 2021.'
date_created: 2021-06-17T10:14:48Z
date_updated: 2025-04-07T10:21:29Z
department:
- _id: '76'
doi: 10.1145/3464968.3468410
language:
- iso: eng
publication: International Workshop on AI and Software Testing/Analysis (AISTA)
status: public
title: Automated Cell Header Generator for Jupyter Notebooks
type: conference
user_id: '15249'
year: '2021'
...
---
_id: '31132'
author:
- first_name: Andreas Peter
  full_name: Dann, Andreas Peter
  id: '26886'
  last_name: Dann
- first_name: Henrik
  full_name: Plate, Henrik
  last_name: Plate
- first_name: Ben
  full_name: Hermann, Ben
  id: '66173'
  last_name: Hermann
  orcid: 0000-0001-9848-2017
- first_name: Serena Elisa
  full_name: Ponta, Serena Elisa
  last_name: Ponta
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Dann AP, Plate H, Hermann B, Ponta SE, Bodden E. Identifying Challenges for
    OSS Vulnerability Scanners - A Study &#38;amp; Test Suite. <i>IEEE Transactions
    on Software Engineering</i>. Published online 2021:1-1. doi:<a href="https://doi.org/10.1109/tse.2021.3101739">10.1109/tse.2021.3101739</a>
  apa: Dann, A. P., Plate, H., Hermann, B., Ponta, S. E., &#38; Bodden, E. (2021).
    Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test
    Suite. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href="https://doi.org/10.1109/tse.2021.3101739">https://doi.org/10.1109/tse.2021.3101739</a>
  bibtex: '@article{Dann_Plate_Hermann_Ponta_Bodden_2021, title={Identifying Challenges
    for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite}, DOI={<a href="https://doi.org/10.1109/tse.2021.3101739">10.1109/tse.2021.3101739</a>},
    journal={IEEE Transactions on Software Engineering}, publisher={Institute of Electrical
    and Electronics Engineers (IEEE)}, author={Dann, Andreas Peter and Plate, Henrik
    and Hermann, Ben and Ponta, Serena Elisa and Bodden, Eric}, year={2021}, pages={1–1}
    }'
  chicago: Dann, Andreas Peter, Henrik Plate, Ben Hermann, Serena Elisa Ponta, and
    Eric Bodden. “Identifying Challenges for OSS Vulnerability Scanners - A Study
    &#38;amp; Test Suite.” <i>IEEE Transactions on Software Engineering</i>, 2021,
    1–1. <a href="https://doi.org/10.1109/tse.2021.3101739">https://doi.org/10.1109/tse.2021.3101739</a>.
  ieee: 'A. P. Dann, H. Plate, B. Hermann, S. E. Ponta, and E. Bodden, “Identifying
    Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite,” <i>IEEE
    Transactions on Software Engineering</i>, pp. 1–1, 2021, doi: <a href="https://doi.org/10.1109/tse.2021.3101739">10.1109/tse.2021.3101739</a>.'
  mla: Dann, Andreas Peter, et al. “Identifying Challenges for OSS Vulnerability Scanners
    - A Study &#38;amp; Test Suite.” <i>IEEE Transactions on Software Engineering</i>,
    Institute of Electrical and Electronics Engineers (IEEE), 2021, pp. 1–1, doi:<a
    href="https://doi.org/10.1109/tse.2021.3101739">10.1109/tse.2021.3101739</a>.
  short: A.P. Dann, H. Plate, B. Hermann, S.E. Ponta, E. Bodden, IEEE Transactions
    on Software Engineering (2021) 1–1.
date_created: 2022-05-09T13:02:35Z
date_updated: 2025-11-11T14:28:46Z
department:
- _id: '76'
doi: 10.1109/tse.2021.3101739
keyword:
- Software
language:
- iso: eng
page: 1-1
project:
- _id: '107'
  name: 'Reaktor: SFB 901 - Automatisierte Risikoanalyse in Bezug auf Open-Source-Abhängigkeiten
    (Hektor) (Transferproject T3)'
- _id: '1'
  name: 'SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in
    dynamischen Märkten'
- _id: '82'
  name: 'SFB 901; Projektbereich T: Transferprojekte des Sonderforschungsbereichs'
- _id: '107'
  name: 'SFB 901; TP T3: Automatisierte Risikoanalyse in Bezug auf Open-Source-Abhängigkeiten
    (Hektor)'
publication: IEEE Transactions on Software Engineering
publication_identifier:
  issn:
  - 0098-5589
  - 1939-3520
  - 2326-3881
publication_status: published
publisher: Institute of Electrical and Electronics Engineers (IEEE)
status: public
title: Identifying Challenges for OSS Vulnerability Scanners - A Study &amp; Test
  Suite
type: journal_article
user_id: '477'
year: '2021'
...
---
_id: '26405'
author:
- first_name: Philipp
  full_name: Schubert, Philipp
  id: '60543'
  last_name: Schubert
  orcid: 0000-0002-8674-1859
- first_name: Florian
  full_name: Sattler, Florian
  last_name: Sattler
- first_name: Fabian Benedikt
  full_name: Schiebel, Fabian Benedikt
  id: '55745'
  last_name: Schiebel
  orcid: 0009-0008-6867-9802
- first_name: Ben
  full_name: Hermann, Ben
  id: '66173'
  last_name: Hermann
  orcid: 0000-0001-9848-2017
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Schubert P, Sattler F, Schiebel FB, Hermann B, Bodden E. Modeling the Effects
    of Global Variables in Data-Flow Analysis for C/C++. In: <i>2021 IEEE 21st International
    Working Conference on Source Code Analysis and Manipulation (SCAM)</i>. ; 2021.'
  apa: Schubert, P., Sattler, F., Schiebel, F. B., Hermann, B., &#38; Bodden, E. (2021).
    Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++. <i>2021
    IEEE 21st International Working Conference on Source Code Analysis and Manipulation
    (SCAM)</i>.
  bibtex: '@inproceedings{Schubert_Sattler_Schiebel_Hermann_Bodden_2021, title={Modeling
    the Effects of Global Variables in Data-Flow Analysis for C/C++}, booktitle={2021
    IEEE 21st International Working Conference on Source Code Analysis and Manipulation
    (SCAM)}, author={Schubert, Philipp and Sattler, Florian and Schiebel, Fabian Benedikt
    and Hermann, Ben and Bodden, Eric}, year={2021} }'
  chicago: Schubert, Philipp, Florian Sattler, Fabian Benedikt Schiebel, Ben Hermann,
    and Eric Bodden. “Modeling the Effects of Global Variables in Data-Flow Analysis
    for C/C++.” In <i>2021 IEEE 21st International Working Conference on Source Code
    Analysis and Manipulation (SCAM)</i>, 2021.
  ieee: P. Schubert, F. Sattler, F. B. Schiebel, B. Hermann, and E. Bodden, “Modeling
    the Effects of Global Variables in Data-Flow Analysis for C/C++,” 2021.
  mla: Schubert, Philipp, et al. “Modeling the Effects of Global Variables in Data-Flow
    Analysis for C/C++.” <i>2021 IEEE 21st International Working Conference on Source
    Code Analysis and Manipulation (SCAM)</i>, 2021.
  short: 'P. Schubert, F. Sattler, F.B. Schiebel, B. Hermann, E. Bodden, in: 2021
    IEEE 21st International Working Conference on Source Code Analysis and Manipulation
    (SCAM), 2021.'
date_created: 2021-10-18T12:50:35Z
date_updated: 2025-12-04T10:43:01Z
department:
- _id: '76'
language:
- iso: eng
project:
- _id: '12'
  name: 'SFB 901 - B4: SFB 901 - Subproject B4'
- _id: '3'
  name: 'SFB 901 - B: SFB 901 - Project Area B'
- _id: '1'
  name: 'SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen
    in dynamischen Märkten '
publication: 2021 IEEE 21st International Working Conference on Source Code Analysis
  and Manipulation (SCAM)
status: public
title: Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++
type: conference
user_id: '15249'
year: '2021'
...
---
_id: '20507'
author:
- first_name: Johannes
  full_name: Geismann, Johannes
  id: '20063'
  last_name: Geismann
  orcid: https://orcid.org/0000-0003-2015-2047
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Geismann J, Bodden E. A systematic literature review of model-driven security
    engineering for cyber–physical systems. <i>Journal of Systems and Software</i>.
    2020;169:110697. doi:<a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>
  apa: Geismann, J., &#38; Bodden, E. (2020). A systematic literature review of model-driven
    security engineering for cyber–physical systems. <i>Journal of Systems and Software</i>,
    <i>169</i>, 110697. <a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>
  bibtex: '@article{Geismann_Bodden_2020, title={A systematic literature review of
    model-driven security engineering for cyber–physical systems}, volume={169}, DOI={<a
    href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>},
    journal={Journal of Systems and Software}, author={Geismann, Johannes and Bodden,
    Eric}, year={2020}, pages={110697} }'
  chicago: 'Geismann, Johannes, and Eric Bodden. “A Systematic Literature Review of
    Model-Driven Security Engineering for Cyber–Physical Systems.” <i>Journal of Systems
    and Software</i> 169 (2020): 110697. <a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>.'
  ieee: 'J. Geismann and E. Bodden, “A systematic literature review of model-driven
    security engineering for cyber–physical systems,” <i>Journal of Systems and Software</i>,
    vol. 169, p. 110697, 2020, doi: <a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>.'
  mla: Geismann, Johannes, and Eric Bodden. “A Systematic Literature Review of Model-Driven
    Security Engineering for Cyber–Physical Systems.” <i>Journal of Systems and Software</i>,
    vol. 169, 2020, p. 110697, doi:<a href="https://doi.org/10.1016/j.jss.2020.110697">https://doi.org/10.1016/j.jss.2020.110697</a>.
  short: J. Geismann, E. Bodden, Journal of Systems and Software 169 (2020) 110697.
date_created: 2020-11-26T08:32:56Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: https://doi.org/10.1016/j.jss.2020.110697
intvolume: '       169'
language:
- iso: eng
page: '110697'
publication: Journal of Systems and Software
publication_identifier:
  issn:
  - 0164-1212
status: public
title: A systematic literature review of model-driven security engineering for cyber–physical
  systems
type: journal_article
user_id: '5786'
volume: 169
year: '2020'
...
---
_id: '20509'
author:
- first_name: Andreas
  full_name: Fischer, Andreas
  last_name: Fischer
- first_name: Jonas
  full_name: Janneck, Jonas
  last_name: Janneck
- first_name: Jörn
  full_name: Kussmaul, Jörn
  last_name: Kussmaul
- first_name: Nikolas
  full_name: Krätzschmar, Nikolas
  last_name: Krätzschmar
- first_name: Florian
  full_name: Kerschbaum, Florian
  last_name: Kerschbaum
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Fischer A, Janneck J, Kussmaul J, Krätzschmar N, Kerschbaum F, Bodden E. PASAPTO:
    Policy-aware Security and Performance Trade-off Analysis - Computation on Encrypted
    Data with Restricted Leakage. In: <i>2020 IEEE Computer Security Foundations Symposium
    (CSF)</i>. ; 2020.'
  apa: 'Fischer, A., Janneck, J., Kussmaul, J., Krätzschmar, N., Kerschbaum, F., &#38;
    Bodden, E. (2020). PASAPTO: Policy-aware Security and Performance Trade-off Analysis
    - Computation on Encrypted Data with Restricted Leakage. <i>2020 IEEE Computer
    Security Foundations Symposium (CSF)</i>.'
  bibtex: '@inproceedings{Fischer_Janneck_Kussmaul_Krätzschmar_Kerschbaum_Bodden_2020,
    title={PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation
    on Encrypted Data with Restricted Leakage}, booktitle={2020 IEEE Computer Security
    Foundations Symposium (CSF)}, author={Fischer, Andreas and Janneck, Jonas and
    Kussmaul, Jörn and Krätzschmar, Nikolas and Kerschbaum, Florian and Bodden, Eric},
    year={2020} }'
  chicago: 'Fischer, Andreas, Jonas Janneck, Jörn Kussmaul, Nikolas Krätzschmar, Florian
    Kerschbaum, and Eric Bodden. “PASAPTO: Policy-Aware Security and Performance Trade-off
    Analysis - Computation on Encrypted Data with Restricted Leakage.” In <i>2020
    IEEE Computer Security Foundations Symposium (CSF)</i>, 2020.'
  ieee: 'A. Fischer, J. Janneck, J. Kussmaul, N. Krätzschmar, F. Kerschbaum, and E.
    Bodden, “PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation
    on Encrypted Data with Restricted Leakage,” 2020.'
  mla: 'Fischer, Andreas, et al. “PASAPTO: Policy-Aware Security and Performance Trade-off
    Analysis - Computation on Encrypted Data with Restricted Leakage.” <i>2020 IEEE
    Computer Security Foundations Symposium (CSF)</i>, 2020.'
  short: 'A. Fischer, J. Janneck, J. Kussmaul, N. Krätzschmar, F. Kerschbaum, E. Bodden,
    in: 2020 IEEE Computer Security Foundations Symposium (CSF), 2020.'
date_created: 2020-11-26T08:40:08Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/fjk+20pasapto.pdf
publication: 2020 IEEE Computer Security Foundations Symposium (CSF)
status: public
title: 'PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation
  on Encrypted Data with Restricted Leakage'
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20511'
author:
- first_name: Andreas
  full_name: Fischer, Andreas
  last_name: Fischer
- first_name: Benny
  full_name: Fuhry, Benny
  last_name: Fuhry
- first_name: Florian
  full_name: Kerschbaum, Florian
  last_name: Kerschbaum
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Fischer A, Fuhry B, Kerschbaum F, Bodden E. Computation on Encrypted Data
    using Dataflow Authentication. In: <i>Privacy Enhancing Technologies Symposium
    (PETS/PoPETS)</i>. ; 2020.'
  apa: Fischer, A., Fuhry, B., Kerschbaum, F., &#38; Bodden, E. (2020). Computation
    on Encrypted Data using Dataflow Authentication. <i>Privacy Enhancing Technologies
    Symposium (PETS/PoPETS)</i>.
  bibtex: '@inproceedings{Fischer_Fuhry_Kerschbaum_Bodden_2020, title={Computation
    on Encrypted Data using Dataflow Authentication}, booktitle={Privacy Enhancing
    Technologies Symposium (PETS/PoPETS)}, author={Fischer, Andreas and Fuhry, Benny
    and Kerschbaum, Florian and Bodden, Eric}, year={2020} }'
  chicago: Fischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. “Computation
    on Encrypted Data Using Dataflow Authentication.” In <i>Privacy Enhancing Technologies
    Symposium (PETS/PoPETS)</i>, 2020.
  ieee: A. Fischer, B. Fuhry, F. Kerschbaum, and E. Bodden, “Computation on Encrypted
    Data using Dataflow Authentication,” 2020.
  mla: Fischer, Andreas, et al. “Computation on Encrypted Data Using Dataflow Authentication.”
    <i>Privacy Enhancing Technologies Symposium (PETS/PoPETS)</i>, 2020.
  short: 'A. Fischer, B. Fuhry, F. Kerschbaum, E. Bodden, in: Privacy Enhancing Technologies
    Symposium (PETS/PoPETS), 2020.'
date_created: 2020-11-26T08:50:59Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/ffk+20computation.pdf
publication: Privacy Enhancing Technologies Symposium (PETS/PoPETS)
status: public
title: Computation on Encrypted Data using Dataflow Authentication
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20512'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  last_name: Bodden
citation:
  ama: 'Krüger S, Ali K, Bodden E. CogniCrypt_GEN - Generating Code for the Secure
    Usage of Crypto APIs. In: <i>International Symposium on Code Generation and Optimization
    (CGO)</i>. ; 2020:185-198.'
  apa: Krüger, S., Ali, K., &#38; Bodden, E. (2020). CogniCrypt_GEN - Generating Code
    for the Secure Usage of Crypto APIs. <i>International Symposium on Code Generation
    and Optimization (CGO)</i>, 185–198.
  bibtex: '@inproceedings{Krüger_Ali_Bodden_2020, title={CogniCrypt_GEN - Generating
    Code for the Secure Usage of Crypto APIs}, booktitle={International Symposium
    on Code Generation and Optimization (CGO)}, author={Krüger, Stefan and Ali, Karim
    and Bodden, Eric}, year={2020}, pages={185–198} }'
  chicago: Krüger, Stefan, Karim Ali, and Eric Bodden. “CogniCrypt_GEN - Generating
    Code for the Secure Usage of Crypto APIs.” In <i>International Symposium on Code
    Generation and Optimization (CGO)</i>, 185–98, 2020.
  ieee: S. Krüger, K. Ali, and E. Bodden, “CogniCrypt_GEN - Generating Code for the
    Secure Usage of Crypto APIs,” in <i>International Symposium on Code Generation
    and Optimization (CGO)</i>, 2020, pp. 185–198.
  mla: Krüger, Stefan, et al. “CogniCrypt_GEN - Generating Code for the Secure Usage
    of Crypto APIs.” <i>International Symposium on Code Generation and Optimization
    (CGO)</i>, 2020, pp. 185–98.
  short: 'S. Krüger, K. Ali, E. Bodden, in: International Symposium on Code Generation
    and Optimization (CGO), 2020, pp. 185–198.'
date_created: 2020-11-26T08:51:01Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
page: 185-198
publication: International Symposium on Code Generation and Optimization (CGO)
related_material:
  link:
  - relation: confirmation
    url: http://www.bodden.de/pubs/krueger20cognicryptgen.pdf
status: public
title: CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20513'
abstract:
- lang: ger
  text: "Frühere Studien haben empirisch offenbart, dass Fehlbenutzungen von kryptographischen
    APIs in Softwareanwendungen weitverbreitet sind. Dies geschieht vor allem, weil
    Software-Entwickler_innen aufgrund schlechten API-Designs und fehlenden Kryptographiewissens
    Probleme bekommen, wenn sie versuchen kryptographische Features zu implementieren.
    Die Literatur liefert mehrere Ansätze und Vorschläge diese Probleme zu lösen,
    aber alle scheitern schlussendlich auf die eine oder andere Weise daran die Anforderungen
    der Entwickler_innenzu erfüllen. Das Resultat ist eine insgesamt lückenhafte Landschaft
    verschiedener nur wenigkomplementärer Ansätze.In dieser Arbeit adressieren wir
    das Problem kryptographischer Fehlbenutzungen systematischer durch CogniCrypt.
    CogniCrypt integriert verschiedene Arten von Tool Supportin einen gemeinsamen
    Ansatz, der Entwickler_innen davon befreit wissen zu müssen, wie diese APIs benutzt
    werden müssen. Zentral für unseren Ansatz ist CrySL, eine Beschreibungssprache,die
    die kognitive Lücke zwischen Kryptographie-Expert_innen und Software-Entwickler_innenüberbrückt.
    CrySL ermöglicht es Kryptographie-Expert_innen zu spezifizeren, wie die APIs,die
    sie bereitstellen, richtig benutzt werden. Wir haben einen Compiler für CrySL
    implementiert, der es erlaubt auf CrySL-Spezifikationen aufbauenden Tool Support
    zu entwickeln. Wir haben weiterhin die statische Analyse CogniCrypt_SAST und den
    Code-Generator CogniCrypt_GEN entwickelt. Schlussendlich haben wir CogniCrypt
    prototypisch implementiert und diesen Prototyp in einem kontrollierten Experiment
    evaluiert.\r\n"
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
citation:
  ama: Krüger S. <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>.
    Universitaetsbibliothek Paderborn; 2020.
  apa: Krüger, S. (2020). <i>CogniCrypt -- The Secure Integration of Cryptographic
    Software</i>. Universitaetsbibliothek Paderborn.
  bibtex: '@book{Krüger_2020, title={CogniCrypt -- The Secure Integration of Cryptographic
    Software}, publisher={Universitaetsbibliothek Paderborn}, author={Krüger, Stefan},
    year={2020} }'
  chicago: Krüger, Stefan. <i>CogniCrypt -- The Secure Integration of Cryptographic
    Software</i>. Universitaetsbibliothek Paderborn, 2020.
  ieee: S. Krüger, <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>.
    Universitaetsbibliothek Paderborn, 2020.
  mla: Krüger, Stefan. <i>CogniCrypt -- The Secure Integration of Cryptographic Software</i>.
    Universitaetsbibliothek Paderborn, 2020.
  short: S. Krüger, CogniCrypt -- The Secure Integration of Cryptographic Software,
    Universitaetsbibliothek Paderborn, 2020.
date_created: 2020-11-26T09:02:19Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: https://digital.ub.uni-paderborn.de/hs/document/preview/3500836
publisher: Universitaetsbibliothek Paderborn
status: public
supervisor:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
title: CogniCrypt -- The Secure Integration of Cryptographic Software
type: dissertation
user_id: '5786'
year: '2020'
...
---
_id: '20518'
author:
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Koch T, Dziwok S, Holtmann J, Bodden E. Scenario-based Specification of Security
    Protocols and Transformation to Security Model Checkers. In: <i>ACM/IEEE 23rd
    International Conference on Model Driven Engineering Languages and Systems (MODELS
    ’20)</i>. ACM; 2020. doi:<a href="https://doi.org/10.1145/3365438.3410946">10.1145/3365438.3410946</a>'
  apa: Koch, T., Dziwok, S., Holtmann, J., &#38; Bodden, E. (2020). Scenario-based
    Specification of Security Protocols and Transformation to Security Model Checkers.
    <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages
    and Systems (MODELS ’20)</i>. <a href="https://doi.org/10.1145/3365438.3410946">https://doi.org/10.1145/3365438.3410946</a>
  bibtex: '@inproceedings{Koch_Dziwok_Holtmann_Bodden_2020, title={Scenario-based
    Specification of Security Protocols and Transformation to Security Model Checkers},
    DOI={<a href="https://doi.org/10.1145/3365438.3410946">10.1145/3365438.3410946</a>},
    booktitle={ACM/IEEE 23rd International Conference on Model Driven Engineering
    Languages and Systems (MODELS ’20)}, publisher={ACM}, author={Koch, Thorsten and
    Dziwok, Stefan and Holtmann, Jörg and Bodden, Eric}, year={2020} }'
  chicago: Koch, Thorsten, Stefan Dziwok, Jörg Holtmann, and Eric Bodden. “Scenario-Based
    Specification of Security Protocols and Transformation to Security Model Checkers.”
    In <i>ACM/IEEE 23rd International Conference on Model Driven Engineering Languages
    and Systems (MODELS ’20)</i>. ACM, 2020. <a href="https://doi.org/10.1145/3365438.3410946">https://doi.org/10.1145/3365438.3410946</a>.
  ieee: 'T. Koch, S. Dziwok, J. Holtmann, and E. Bodden, “Scenario-based Specification
    of Security Protocols and Transformation to Security Model Checkers,” 2020, doi:
    <a href="https://doi.org/10.1145/3365438.3410946">10.1145/3365438.3410946</a>.'
  mla: Koch, Thorsten, et al. “Scenario-Based Specification of Security Protocols
    and Transformation to Security Model Checkers.” <i>ACM/IEEE 23rd International
    Conference on Model Driven Engineering Languages and Systems (MODELS ’20)</i>,
    ACM, 2020, doi:<a href="https://doi.org/10.1145/3365438.3410946">10.1145/3365438.3410946</a>.
  short: 'T. Koch, S. Dziwok, J. Holtmann, E. Bodden, in: ACM/IEEE 23rd International
    Conference on Model Driven Engineering Languages and Systems (MODELS ’20), ACM,
    2020.'
date_created: 2020-11-26T10:19:54Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
- _id: '241'
- _id: '662'
doi: 10.1145/3365438.3410946
language:
- iso: eng
publication: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages
  and Systems (MODELS ’20)
publisher: ACM
status: public
title: Scenario-based Specification of Security Protocols and Transformation to Security
  Model Checkers
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20521'
author:
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
citation:
  ama: Gerking C. <i>Model-Driven Information Flow Security Engineering for Cyber-Physical
    Systems</i>. Paderborn University; 2020. doi:<a href="https://doi.org/10.17619/UNIPB/1-1033">10.17619/UNIPB/1-1033</a>
  apa: Gerking, C. (2020). <i>Model-Driven Information Flow Security Engineering for
    Cyber-Physical Systems</i>. Paderborn University. <a href="https://doi.org/10.17619/UNIPB/1-1033">https://doi.org/10.17619/UNIPB/1-1033</a>
  bibtex: '@book{Gerking_2020, title={Model-Driven Information Flow Security Engineering
    for Cyber-Physical Systems}, DOI={<a href="https://doi.org/10.17619/UNIPB/1-1033">10.17619/UNIPB/1-1033</a>},
    publisher={Paderborn University}, author={Gerking, Christopher}, year={2020} }'
  chicago: Gerking, Christopher. <i>Model-Driven Information Flow Security Engineering
    for Cyber-Physical Systems</i>. Paderborn University, 2020. <a href="https://doi.org/10.17619/UNIPB/1-1033">https://doi.org/10.17619/UNIPB/1-1033</a>.
  ieee: C. Gerking, <i>Model-Driven Information Flow Security Engineering for Cyber-Physical
    Systems</i>. Paderborn University, 2020.
  mla: Gerking, Christopher. <i>Model-Driven Information Flow Security Engineering
    for Cyber-Physical Systems</i>. Paderborn University, 2020, doi:<a href="https://doi.org/10.17619/UNIPB/1-1033">10.17619/UNIPB/1-1033</a>.
  short: C. Gerking, Model-Driven Information Flow Security Engineering for Cyber-Physical
    Systems, Paderborn University, 2020.
date_created: 2020-11-26T10:37:17Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: 10.17619/UNIPB/1-1033
language:
- iso: eng
publisher: Paderborn University
status: public
supervisor:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
title: Model-Driven Information Flow Security Engineering for Cyber-Physical Systems
type: dissertation
user_id: '5786'
year: '2020'
...
---
_id: '20712'
author:
- first_name: Philipp
  full_name: Schubert, Philipp
  id: '60543'
  last_name: Schubert
  orcid: 0000-0002-8674-1859
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Ben
  full_name: Hermann, Ben
  id: '66173'
  last_name: Hermann
  orcid: 0000-0001-9848-2017
citation:
  ama: Schubert P, Bodden E, Hermann B. <i>Accelerating Static Call-Graph, Points-to
    and Data-Flow Analysis Through Persisted Summaries</i>.; 2020.
  apa: Schubert, P., Bodden, E., &#38; Hermann, B. (2020). <i>Accelerating Static
    Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries</i>.
  bibtex: '@book{Schubert_Bodden_Hermann_2020, title={Accelerating Static Call-Graph,
    Points-to and Data-Flow Analysis Through Persisted Summaries}, author={Schubert,
    Philipp and Bodden, Eric and Hermann, Ben}, year={2020} }'
  chicago: Schubert, Philipp, Eric Bodden, and Ben Hermann. <i>Accelerating Static
    Call-Graph, Points-to and Data-Flow Analysis Through Persisted Summaries</i>,
    2020.
  ieee: P. Schubert, E. Bodden, and B. Hermann, <i>Accelerating Static Call-Graph,
    Points-to and Data-Flow Analysis Through Persisted Summaries</i>. 2020.
  mla: Schubert, Philipp, et al. <i>Accelerating Static Call-Graph, Points-to and
    Data-Flow Analysis Through Persisted Summaries</i>. 2020.
  short: P. Schubert, E. Bodden, B. Hermann, Accelerating Static Call-Graph, Points-to
    and Data-Flow Analysis Through Persisted Summaries, 2020.
date_created: 2020-12-14T07:44:11Z
date_updated: 2022-01-06T06:54:34Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: pdschbrt
  date_created: 2020-12-14T07:39:07Z
  date_updated: 2020-12-14T07:39:07Z
  file_id: '20713'
  file_name: main.pdf
  file_size: 683576
  relation: main_file
  success: 1
file_date_updated: 2020-12-14T07:39:07Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
status: public
title: Accelerating Static Call-Graph, Points-to and Data-Flow Analysis Through Persisted
  Summaries
type: report
user_id: '477'
year: '2020'
...
---
_id: '20891'
abstract:
- lang: eng
  text: "Today, software systems are rarely developed monolithically, but may be composed
    of numerous individually developed features. Their modularization facilitates
    independent development and verification. While feature-based strategies to verify
    features in isolation have existed for years, they cannot address interactions
    between features. The problem with feature interactions is that they are typically
    unknown and may involve any subset of the features. Contrary, a family-based verification
    strategy captures feature interactions, but does not scale well when features
    evolve frequently. To the best of our knowledge, there currently exists no approach
    with focus on evolving features that combines both strategies and aims at eliminating
    their respective drawbacks. To fill this gap, we introduce Fefalution, a feature-family-based
    verification approach based on abstract contracts to verify evolving features
    and their interactions. Fefalution builds partial proofs for each evolving feature
    and then reuses the resulting partial proofs in verifying feature interactions,
    yielding a full verification of the complete software system. Moreover, to investigate
    whether a combination of both strategies is fruitful, we present the first empirical
    study for the verification of evolving features implemented by means of feature-oriented
    programming and by comparing Fefalution with another five family-based approaches
    varying in a set of optimizations. Our results indicate that partial proofs based
    on abstract contracts exhibit huge reuse potential, but also come with a substantial
    overhead for smaller evolution scenarios.\r\n"
author:
- first_name: Alexander
  full_name: Knüppel, Alexander
  last_name: Knüppel
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Thomas
  full_name: Thüm, Thomas
  last_name: Thüm
- first_name: Richard
  full_name: Bubel, Richard
  last_name: Bubel
- first_name: Sebastian
  full_name: Krieter, Sebastian
  last_name: Krieter
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Ina
  full_name: Schaefer, Ina
  last_name: Schaefer
citation:
  ama: 'Knüppel A, Krüger S, Thüm T, et al. Using Abstract Contracts for Verifying
    Evolving Features and Their Interactions. In: <i>Lecture Notes in Computer Science</i>.
    ; 2020. doi:<a href="https://doi.org/10.1007/978-3-030-64354-6_5">10.1007/978-3-030-64354-6_5</a>'
  apa: Knüppel, A., Krüger, S., Thüm, T., Bubel, R., Krieter, S., Bodden, E., &#38;
    Schaefer, I. (2020). Using Abstract Contracts for Verifying Evolving Features
    and Their Interactions. In <i>Lecture Notes in Computer Science</i>. <a href="https://doi.org/10.1007/978-3-030-64354-6_5">https://doi.org/10.1007/978-3-030-64354-6_5</a>
  bibtex: '@inbook{Knüppel_Krüger_Thüm_Bubel_Krieter_Bodden_Schaefer_2020, place={Cham},
    title={Using Abstract Contracts for Verifying Evolving Features and Their Interactions},
    DOI={<a href="https://doi.org/10.1007/978-3-030-64354-6_5">10.1007/978-3-030-64354-6_5</a>},
    booktitle={Lecture Notes in Computer Science}, author={Knüppel, Alexander and
    Krüger, Stefan and Thüm, Thomas and Bubel, Richard and Krieter, Sebastian and
    Bodden, Eric and Schaefer, Ina}, year={2020} }'
  chicago: Knüppel, Alexander, Stefan Krüger, Thomas Thüm, Richard Bubel, Sebastian
    Krieter, Eric Bodden, and Ina Schaefer. “Using Abstract Contracts for Verifying
    Evolving Features and Their Interactions.” In <i>Lecture Notes in Computer Science</i>.
    Cham, 2020. <a href="https://doi.org/10.1007/978-3-030-64354-6_5">https://doi.org/10.1007/978-3-030-64354-6_5</a>.
  ieee: A. Knüppel <i>et al.</i>, “Using Abstract Contracts for Verifying Evolving
    Features and Their Interactions,” in <i>Lecture Notes in Computer Science</i>,
    Cham, 2020.
  mla: Knüppel, Alexander, et al. “Using Abstract Contracts for Verifying Evolving
    Features and Their Interactions.” <i>Lecture Notes in Computer Science</i>, 2020,
    doi:<a href="https://doi.org/10.1007/978-3-030-64354-6_5">10.1007/978-3-030-64354-6_5</a>.
  short: 'A. Knüppel, S. Krüger, T. Thüm, R. Bubel, S. Krieter, E. Bodden, I. Schaefer,
    in: Lecture Notes in Computer Science, Cham, 2020.'
date_created: 2021-01-11T09:15:41Z
date_updated: 2022-01-06T06:54:41Z
department:
- _id: '76'
doi: 10.1007/978-3-030-64354-6_5
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
  isbn:
  - '9783030643539'
  - '9783030643546'
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: Using Abstract Contracts for Verifying Evolving Features and Their Interactions
type: book_chapter
user_id: '5786'
year: '2020'
...
---
_id: '23376'
author:
- first_name: Goran
  full_name: Piskachev, Goran
  last_name: Piskachev
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Oshando
  full_name: Johnson, Oshando
  last_name: Johnson
- first_name: Eric
  full_name: Bodden, Eric
  last_name: Bodden
citation:
  ama: 'Piskachev G, Nguyen Quang Do L, Johnson O, Bodden E. SWAN_ASSIST: Semi-Automated
    Detection of Code-Specific, Security-Relevant Methods. In: <i>2019 34th IEEE/ACM
    International Conference on Automated Software Engineering (ASE)</i>. ; 2020.
    doi:<a href="https://doi.org/10.1109/ase.2019.00110">10.1109/ase.2019.00110</a>'
  apa: 'Piskachev, G., Nguyen Quang Do, L., Johnson, O., &#38; Bodden, E. (2020).
    SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.
    <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering
    (ASE)</i>. <a href="https://doi.org/10.1109/ase.2019.00110">https://doi.org/10.1109/ase.2019.00110</a>'
  bibtex: '@inproceedings{Piskachev_Nguyen Quang Do_Johnson_Bodden_2020, title={SWAN_ASSIST:
    Semi-Automated Detection of Code-Specific, Security-Relevant Methods}, DOI={<a
    href="https://doi.org/10.1109/ase.2019.00110">10.1109/ase.2019.00110</a>}, booktitle={2019
    34th IEEE/ACM International Conference on Automated Software Engineering (ASE)},
    author={Piskachev, Goran and Nguyen Quang Do, Lisa and Johnson, Oshando and Bodden,
    Eric}, year={2020} }'
  chicago: 'Piskachev, Goran, Lisa Nguyen Quang Do, Oshando Johnson, and Eric Bodden.
    “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.”
    In <i>2019 34th IEEE/ACM International Conference on Automated Software Engineering
    (ASE)</i>, 2020. <a href="https://doi.org/10.1109/ase.2019.00110">https://doi.org/10.1109/ase.2019.00110</a>.'
  ieee: 'G. Piskachev, L. Nguyen Quang Do, O. Johnson, and E. Bodden, “SWAN_ASSIST:
    Semi-Automated Detection of Code-Specific, Security-Relevant Methods,” 2020, doi:
    <a href="https://doi.org/10.1109/ase.2019.00110">10.1109/ase.2019.00110</a>.'
  mla: 'Piskachev, Goran, et al. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific,
    Security-Relevant Methods.” <i>2019 34th IEEE/ACM International Conference on
    Automated Software Engineering (ASE)</i>, 2020, doi:<a href="https://doi.org/10.1109/ase.2019.00110">10.1109/ase.2019.00110</a>.'
  short: 'G. Piskachev, L. Nguyen Quang Do, O. Johnson, E. Bodden, in: 2019 34th IEEE/ACM
    International Conference on Automated Software Engineering (ASE), 2020.'
date_created: 2021-08-09T12:03:30Z
date_updated: 2022-01-06T06:55:50Z
department:
- _id: '241'
- _id: '662'
- _id: '76'
doi: 10.1109/ase.2019.00110
language:
- iso: eng
publication: 2019 34th IEEE/ACM International Conference on Automated Software Engineering
  (ASE)
publication_status: published
status: public
title: 'SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant
  Methods'
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '23377'
author:
- first_name: Goran
  full_name: Piskachev, Goran
  last_name: Piskachev
- first_name: Tobias
  full_name: Petrasch, Tobias
  last_name: Petrasch
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Eric
  full_name: Bodden, Eric
  last_name: Bodden
citation:
  ama: 'Piskachev G, Petrasch T, Späth J, Bodden E. AuthCheck: Program-State Analysis
    for Access-Control Vulnerabilities. In: <i>Lecture Notes in Computer Science</i>.
    ; 2020. doi:<a href="https://doi.org/10.1007/978-3-030-54997-8_34">10.1007/978-3-030-54997-8_34</a>'
  apa: 'Piskachev, G., Petrasch, T., Späth, J., &#38; Bodden, E. (2020). AuthCheck:
    Program-State Analysis for Access-Control Vulnerabilities. In <i>Lecture Notes
    in Computer Science</i>. <a href="https://doi.org/10.1007/978-3-030-54997-8_34">https://doi.org/10.1007/978-3-030-54997-8_34</a>'
  bibtex: '@inbook{Piskachev_Petrasch_Späth_Bodden_2020, place={Cham}, title={AuthCheck:
    Program-State Analysis for Access-Control Vulnerabilities}, DOI={<a href="https://doi.org/10.1007/978-3-030-54997-8_34">10.1007/978-3-030-54997-8_34</a>},
    booktitle={Lecture Notes in Computer Science}, author={Piskachev, Goran and Petrasch,
    Tobias and Späth, Johannes and Bodden, Eric}, year={2020} }'
  chicago: 'Piskachev, Goran, Tobias Petrasch, Johannes Späth, and Eric Bodden. “AuthCheck:
    Program-State Analysis for Access-Control Vulnerabilities.” In <i>Lecture Notes
    in Computer Science</i>. Cham, 2020. <a href="https://doi.org/10.1007/978-3-030-54997-8_34">https://doi.org/10.1007/978-3-030-54997-8_34</a>.'
  ieee: 'G. Piskachev, T. Petrasch, J. Späth, and E. Bodden, “AuthCheck: Program-State
    Analysis for Access-Control Vulnerabilities,” in <i>Lecture Notes in Computer
    Science</i>, Cham, 2020.'
  mla: 'Piskachev, Goran, et al. “AuthCheck: Program-State Analysis for Access-Control
    Vulnerabilities.” <i>Lecture Notes in Computer Science</i>, 2020, doi:<a href="https://doi.org/10.1007/978-3-030-54997-8_34">10.1007/978-3-030-54997-8_34</a>.'
  short: 'G. Piskachev, T. Petrasch, J. Späth, E. Bodden, in: Lecture Notes in Computer
    Science, Cham, 2020.'
date_created: 2021-08-09T12:05:09Z
date_updated: 2022-01-06T06:55:50Z
department:
- _id: '241'
- _id: '662'
- _id: '76'
doi: 10.1007/978-3-030-54997-8_34
language:
- iso: eng
place: Cham
publication: Lecture Notes in Computer Science
publication_identifier:
  issn:
  - 0302-9743
  - 1611-3349
publication_status: published
status: public
title: 'AuthCheck: Program-State Analysis for Access-Control Vulnerabilities'
type: book_chapter
user_id: '5786'
year: '2020'
...
---
_id: '20510'
author:
- first_name: Manuel
  full_name: Benz, Manuel
  last_name: Benz
- first_name: Erik
  full_name: Krogh Kristensen, Erik
  last_name: Krogh Kristensen
- first_name: Linghui
  full_name: Luo, Linghui
  last_name: Luo
- first_name: Nataniel
  full_name: P. Borges Jr., Nataniel
  last_name: P. Borges Jr.
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Andreas
  full_name: Zeller, Andreas
  last_name: Zeller
citation:
  ama: 'Benz M, Krogh Kristensen E, Luo L, P. Borges Jr. N, Bodden E, Zeller A. Heaps’n
    Leaks: How Heap Snapshots Improve Android Taint Analysis. In: <i>International
    Conference for Software Engineering (ICSE)</i>. ; 2020.'
  apa: 'Benz, M., Krogh Kristensen, E., Luo, L., P. Borges Jr., N., Bodden, E., &#38;
    Zeller, A. (2020). Heaps’n Leaks: How Heap Snapshots Improve Android Taint Analysis.
    <i>International Conference for Software Engineering (ICSE)</i>.'
  bibtex: '@inproceedings{Benz_Krogh Kristensen_Luo_P. Borges Jr._Bodden_Zeller_2020,
    title={Heaps’n Leaks: How Heap Snapshots Improve Android Taint Analysis}, booktitle={International
    Conference for Software Engineering (ICSE)}, author={Benz, Manuel and Krogh Kristensen,
    Erik and Luo, Linghui and P. Borges Jr., Nataniel and Bodden, Eric and Zeller,
    Andreas}, year={2020} }'
  chicago: 'Benz, Manuel, Erik Krogh Kristensen, Linghui Luo, Nataniel P. Borges Jr.,
    Eric Bodden, and Andreas Zeller. “Heaps’n Leaks: How Heap Snapshots Improve Android
    Taint Analysis.” In <i>International Conference for Software Engineering (ICSE)</i>,
    2020.'
  ieee: 'M. Benz, E. Krogh Kristensen, L. Luo, N. P. Borges Jr., E. Bodden, and A.
    Zeller, “Heaps’n Leaks: How Heap Snapshots Improve Android Taint Analysis,” 2020.'
  mla: 'Benz, Manuel, et al. “Heaps’n Leaks: How Heap Snapshots Improve Android Taint
    Analysis.” <i>International Conference for Software Engineering (ICSE)</i>, 2020.'
  short: 'M. Benz, E. Krogh Kristensen, L. Luo, N. P. Borges Jr., E. Bodden, A. Zeller,
    in: International Conference for Software Engineering (ICSE), 2020.'
date_created: 2020-11-26T08:47:56Z
date_updated: 2025-04-07T10:24:14Z
department:
- _id: '76'
language:
- iso: eng
publication: International Conference for Software Engineering (ICSE)
status: public
title: 'Heaps''n Leaks: How Heap Snapshots Improve Android Taint Analysis'
type: conference
user_id: '15249'
year: '2020'
...
---
_id: '20508'
author:
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Nguyen Quang Do L, Bodden E. Explaining Static Analysis with Rule Graphs. <i>IEEE
    Transactions on Software Engineering</i>. Published online 2020.
  apa: Nguyen Quang Do, L., &#38; Bodden, E. (2020). Explaining Static Analysis with
    Rule Graphs. <i>IEEE Transactions on Software Engineering</i>.
  bibtex: '@article{Nguyen Quang Do_Bodden_2020, title={Explaining Static Analysis
    with Rule Graphs}, journal={IEEE Transactions on Software Engineering}, author={Nguyen
    Quang Do, Lisa and Bodden, Eric}, year={2020} }'
  chicago: Nguyen Quang Do, Lisa, and Eric Bodden. “Explaining Static Analysis with
    Rule Graphs.” <i>IEEE Transactions on Software Engineering</i>, 2020.
  ieee: L. Nguyen Quang Do and E. Bodden, “Explaining Static Analysis with Rule Graphs,”
    <i>IEEE Transactions on Software Engineering</i>, 2020.
  mla: Nguyen Quang Do, Lisa, and Eric Bodden. “Explaining Static Analysis with Rule
    Graphs.” <i>IEEE Transactions on Software Engineering</i>, 2020.
  short: L. Nguyen Quang Do, E. Bodden, IEEE Transactions on Software Engineering
    (2020).
date_created: 2020-11-26T08:38:33Z
date_updated: 2025-04-07T10:22:44Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/tse20ruleGraphs.pdf
publication: IEEE Transactions on Software Engineering
status: public
title: Explaining Static Analysis with Rule Graphs
type: journal_article
user_id: '15249'
year: '2020'
...
