---
_id: '35426'
author:
- first_name: Cedric
full_name: Richter, Cedric
id: '50003'
last_name: Richter
- first_name: Jan Frederik
full_name: Haltermann, Jan Frederik
id: '44413'
last_name: Haltermann
- first_name: Marie-Christine
full_name: Jakobs, Marie-Christine
last_name: Jakobs
- first_name: Felix
full_name: Pauck, Felix
id: '22398'
last_name: Pauck
- first_name: Stefan
full_name: Schott, Stefan
id: '54847'
last_name: Schott
- first_name: Heike
full_name: Wehrheim, Heike
id: '573'
last_name: Wehrheim
citation:
ama: 'Richter C, Haltermann JF, Jakobs M-C, Pauck F, Schott S, Wehrheim H. Are Neural
Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? In: 37th
IEEE/ACM International Conference on Automated Software Engineering. ACM;
2023. doi:10.1145/3551349.3561156'
apa: Richter, C., Haltermann, J. F., Jakobs, M.-C., Pauck, F., Schott, S., &
Wehrheim, H. (2023). Are Neural Bug Detectors Comparable to Software Developers
on Variable Misuse Bugs? 37th IEEE/ACM International Conference on Automated
Software Engineering. https://doi.org/10.1145/3551349.3561156
bibtex: '@inproceedings{Richter_Haltermann_Jakobs_Pauck_Schott_Wehrheim_2023, title={Are
Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?},
DOI={10.1145/3551349.3561156},
booktitle={37th IEEE/ACM International Conference on Automated Software Engineering},
publisher={ACM}, author={Richter, Cedric and Haltermann, Jan Frederik and Jakobs,
Marie-Christine and Pauck, Felix and Schott, Stefan and Wehrheim, Heike}, year={2023}
}'
chicago: Richter, Cedric, Jan Frederik Haltermann, Marie-Christine Jakobs, Felix
Pauck, Stefan Schott, and Heike Wehrheim. “Are Neural Bug Detectors Comparable
to Software Developers on Variable Misuse Bugs?” In 37th IEEE/ACM International
Conference on Automated Software Engineering. ACM, 2023. https://doi.org/10.1145/3551349.3561156.
ieee: 'C. Richter, J. F. Haltermann, M.-C. Jakobs, F. Pauck, S. Schott, and H. Wehrheim,
“Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse
Bugs?,” 2023, doi: 10.1145/3551349.3561156.'
mla: Richter, Cedric, et al. “Are Neural Bug Detectors Comparable to Software Developers
on Variable Misuse Bugs?” 37th IEEE/ACM International Conference on Automated
Software Engineering, ACM, 2023, doi:10.1145/3551349.3561156.
short: 'C. Richter, J.F. Haltermann, M.-C. Jakobs, F. Pauck, S. Schott, H. Wehrheim,
in: 37th IEEE/ACM International Conference on Automated Software Engineering,
ACM, 2023.'
date_created: 2023-01-09T06:28:44Z
date_updated: 2023-01-19T13:50:18Z
department:
- _id: '77'
doi: 10.1145/3551349.3561156
language:
- iso: eng
main_file_link:
- open_access: '1'
url: https://doi.org/10.1145/3551349.3561156
oa: '1'
project:
- _id: '3'
name: 'SFB 901 - B: SFB 901 - Project Area B'
- _id: '12'
name: 'SFB 901 - B4: SFB 901 - Subproject B4'
- _id: '1'
name: 'SFB 901: SFB 901'
publication: 37th IEEE/ACM International Conference on Automated Software Engineering
publication_status: published
publisher: ACM
status: public
title: Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse
Bugs?
type: conference
user_id: '477'
year: '2023'
...
---
_id: '3265'
abstract:
- lang: eng
text: "We present CLARC (Cryptographic Library for Anonymous Reputation and Credentials),
an anonymous credentials system (ACS) combined with an anonymous reputation system.\r\n\r\nUsing
CLARC, users can receive attribute-based credentials from issuers. They can efficiently
prove that their credentials satisfy complex (access) policies in a privacy-preserving
way. This implements anonymous access control with complex policies.\r\n\r\nFurthermore,
CLARC is the first ACS that is combined with an anonymous reputation system where
users can anonymously rate services. A user who gets access to a service via a
credential, also anonymously receives a review token to rate the service. If a
user creates more than a single rating, this can be detected by anyone, preventing
users from spamming ratings to sway public opinion.\r\n\r\nTo evaluate feasibility
of our construction, we present an open-source prototype implementation."
author:
- first_name: Kai
full_name: Bemmann, Kai
last_name: Bemmann
- first_name: Johannes
full_name: Blömer, Johannes
id: '23'
last_name: Blömer
- first_name: Jan
full_name: Bobolz, Jan
id: '27207'
last_name: Bobolz
- first_name: Henrik
full_name: Bröcher, Henrik
id: '41047'
last_name: Bröcher
- first_name: Denis Pascal
full_name: Diemert, Denis Pascal
id: '44071'
last_name: Diemert
- first_name: Fabian
full_name: Eidens, Fabian
id: '25078'
last_name: Eidens
- first_name: Lukas
full_name: Eilers, Lukas
last_name: Eilers
- first_name: Jan Frederik
full_name: Haltermann, Jan Frederik
id: '44413'
last_name: Haltermann
- first_name: Jakob
full_name: Juhnke, Jakob
id: '48090'
last_name: Juhnke
- first_name: Burhan
full_name: Otour, Burhan
last_name: Otour
- first_name: Laurens Alexander
full_name: Porzenheim, Laurens Alexander
id: '47434'
last_name: Porzenheim
- first_name: Simon
full_name: Pukrop, Simon
last_name: Pukrop
- first_name: Erik
full_name: Schilling, Erik
last_name: Schilling
- first_name: Michael
full_name: Schlichtig, Michael
id: '32312'
last_name: Schlichtig
- first_name: Marcel
full_name: Stienemeier, Marcel
last_name: Stienemeier
citation:
ama: 'Bemmann K, Blömer J, Bobolz J, et al. Fully-Featured Anonymous Credentials
with Reputation System. In: Proceedings of the 13th International Conference
on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM.
doi:10.1145/3230833.3234517'
apa: 'Bemmann, K., Blömer, J., Bobolz, J., Bröcher, H., Diemert, D. P., Eidens,
F., … Stienemeier, M. (n.d.). Fully-Featured Anonymous Credentials with Reputation
System. In Proceedings of the 13th International Conference on Availability,
Reliability and Security - ARES ’18. New York, NY, USA: ACM. https://doi.org/10.1145/3230833.3234517'
bibtex: '@inproceedings{Bemmann_Blömer_Bobolz_Bröcher_Diemert_Eidens_Eilers_Haltermann_Juhnke_Otour_et
al., place={New York, NY, USA}, title={Fully-Featured Anonymous Credentials with
Reputation System}, DOI={10.1145/3230833.3234517},
booktitle={Proceedings of the 13th International Conference on Availability, Reliability
and Security - ARES ’18}, publisher={ACM}, author={Bemmann, Kai and Blömer, Johannes
and Bobolz, Jan and Bröcher, Henrik and Diemert, Denis Pascal and Eidens, Fabian
and Eilers, Lukas and Haltermann, Jan Frederik and Juhnke, Jakob and Otour, Burhan
and et al.} }'
chicago: 'Bemmann, Kai, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Pascal
Diemert, Fabian Eidens, Lukas Eilers, et al. “Fully-Featured Anonymous Credentials
with Reputation System.” In Proceedings of the 13th International Conference
on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM,
n.d. https://doi.org/10.1145/3230833.3234517.'
ieee: K. Bemmann et al., “Fully-Featured Anonymous Credentials with Reputation
System,” in Proceedings of the 13th International Conference on Availability,
Reliability and Security - ARES ’18, Hamburg, Germany.
mla: Bemmann, Kai, et al. “Fully-Featured Anonymous Credentials with Reputation
System.” Proceedings of the 13th International Conference on Availability,
Reliability and Security - ARES ’18, ACM, doi:10.1145/3230833.3234517.
short: 'K. Bemmann, J. Blömer, J. Bobolz, H. Bröcher, D.P. Diemert, F. Eidens, L.
Eilers, J.F. Haltermann, J. Juhnke, B. Otour, L.A. Porzenheim, S. Pukrop, E. Schilling,
M. Schlichtig, M. Stienemeier, in: Proceedings of the 13th International Conference
on Availability, Reliability and Security - ARES ’18, ACM, New York, NY, USA,
n.d.'
conference:
end_date: 2018-08-30
location: Hamburg, Germany
name: ARES 2018 - SECPID
start_date: 2018-08-27
date_created: 2018-06-14T11:19:29Z
date_updated: 2022-01-06T06:59:07Z
ddc:
- '000'
department:
- _id: '64'
doi: 10.1145/3230833.3234517
file:
- access_level: closed
content_type: application/pdf
creator: feidens
date_created: 2018-11-08T10:17:39Z
date_updated: 2018-11-08T10:17:39Z
file_id: '5428'
file_name: react_acs.pdf
file_size: 920843
relation: main_file
file_date_updated: 2018-11-08T10:17:39Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- open_access: '1'
url: https://eprint.iacr.org/2018/835
oa: '1'
place: New York, NY, USA
project:
- _id: '1'
name: SFB 901
- _id: '4'
name: SFB 901 - Project Area C
- _id: '13'
name: SFB 901 - Subproject C1
- _id: '44'
name: KogniHome - die mitdenkende Wohnung
publication: Proceedings of the 13th International Conference on Availability, Reliability
and Security - ARES '18
publication_identifier:
isbn:
- 978-1-4503-6448-5
publication_status: accepted
publisher: ACM
quality_controlled: '1'
related_material:
link:
- relation: software
url: https://github.com/upbcuk
status: public
title: Fully-Featured Anonymous Credentials with Reputation System
type: conference
user_id: '25078'
year: '2018'
...
---
_id: '3414'
abstract:
- lang: eng
text: "Over the years, Design by Contract (DbC) has evolved as a\r\npowerful concept
for program documentation, testing, and verification.\r\nContracts formally specify
assertions on (mostly) object-oriented programs:\r\npre- and postconditions of
methods, class invariants, allowed call\r\norders, etc. Missing in the long list
of properties specifiable by contracts\r\nare, however, method correlations: DbC
languages fall short on stating\r\nassertions relating methods.\r\nIn this paper,
we propose the novel concept of inter-method contract,\r\nallowing precisely for
expressing method correlations.We present JMC as\r\na language for specifying
and JMCTest as a tool for dynamically checking\r\ninter-method contracts on Java
programs. JMCTest fully automatically\r\ngenerates objects on which the contracted
methods are called and\r\nthe validity of the contract is checked. Using JMCTest,
we detected\r\nthat large Java code bases (e.g. JBoss, Java RT) frequently violate
standard\r\ninter-method contracts. In comparison to other verification tools\r\ninspecting
(some) inter-method contracts, JMCTest can find bugs that\r\nremain undetected
by those tools."
author:
- first_name: Paul
full_name: Börding, Paul
last_name: Börding
- first_name: Jan Frederik
full_name: Haltermann, Jan Frederik
id: '44413'
last_name: Haltermann
- first_name: Marie-Christine
full_name: Jakobs, Marie-Christine
last_name: Jakobs
- first_name: Heike
full_name: Wehrheim, Heike
id: '573'
last_name: Wehrheim
citation:
ama: 'Börding P, Haltermann JF, Jakobs M-C, Wehrheim H. JMCTest: Automatically Testing
Inter-Method Contracts in Java. In: Proceedings of the IFIP International Conference
on Testing Software and Systems (ICTSS 2018). Vol 11146. Lecture Notes in
Computer Science. Springer; 2018:39--55.'
apa: 'Börding, P., Haltermann, J. F., Jakobs, M.-C., & Wehrheim, H. (2018).
JMCTest: Automatically Testing Inter-Method Contracts in Java. In Proceedings
of the IFIP International Conference on Testing Software and Systems (ICTSS 2018)
(Vol. 11146, pp. 39--55). Cádiz, Spain: Springer.'
bibtex: '@inproceedings{Börding_Haltermann_Jakobs_Wehrheim_2018, series={Lecture
Notes in Computer Science}, title={JMCTest: Automatically Testing Inter-Method
Contracts in Java}, volume={11146}, booktitle={Proceedings of the IFIP International
Conference on Testing Software and Systems (ICTSS 2018)}, publisher={Springer},
author={Börding, Paul and Haltermann, Jan Frederik and Jakobs, Marie-Christine
and Wehrheim, Heike}, year={2018}, pages={39--55}, collection={Lecture Notes in
Computer Science} }'
chicago: 'Börding, Paul, Jan Frederik Haltermann, Marie-Christine Jakobs, and Heike
Wehrheim. “JMCTest: Automatically Testing Inter-Method Contracts in Java.” In
Proceedings of the IFIP International Conference on Testing Software and Systems
(ICTSS 2018), 11146:39--55. Lecture Notes in Computer Science. Springer, 2018.'
ieee: 'P. Börding, J. F. Haltermann, M.-C. Jakobs, and H. Wehrheim, “JMCTest: Automatically
Testing Inter-Method Contracts in Java,” in Proceedings of the IFIP International
Conference on Testing Software and Systems (ICTSS 2018), Cádiz, Spain, 2018,
vol. 11146, pp. 39--55.'
mla: 'Börding, Paul, et al. “JMCTest: Automatically Testing Inter-Method Contracts
in Java.” Proceedings of the IFIP International Conference on Testing Software
and Systems (ICTSS 2018), vol. 11146, Springer, 2018, pp. 39--55.'
short: 'P. Börding, J.F. Haltermann, M.-C. Jakobs, H. Wehrheim, in: Proceedings
of the IFIP International Conference on Testing Software and Systems (ICTSS 2018),
Springer, 2018, pp. 39--55.'
conference:
end_date: 2018-10-03
location: Cádiz, Spain
name: IFIP International Conference on Testing Software and Systems
start_date: 2018-10-01
date_created: 2018-07-02T09:06:56Z
date_updated: 2022-01-06T06:59:15Z
ddc:
- '006'
department:
- _id: '7'
- _id: '77'
file:
- access_level: closed
content_type: application/pdf
creator: schlatt
date_created: 2018-11-21T09:35:35Z
date_updated: 2018-11-21T09:35:35Z
file_id: '5770'
file_name: Börding2018_Chapter_JMCTestAutomaticallyTestingInt.pdf
file_size: 574386
relation: main_file
success: 1
file_date_updated: 2018-11-21T09:35:35Z
has_accepted_license: '1'
intvolume: ' 11146'
language:
- iso: eng
page: 39--55
project:
- _id: '1'
name: SFB 901
- _id: '3'
name: SFB 901 - Project Area B
- _id: '11'
name: SFB 901 - Subproject B3
publication: Proceedings of the IFIP International Conference on Testing Software
and Systems (ICTSS 2018)
publication_status: published
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: 'JMCTest: Automatically Testing Inter-Method Contracts in Java'
type: conference
user_id: '29719'
volume: 11146
year: '2018'
...
---
_id: '12885'
author:
- first_name: Jan Frederik
full_name: Haltermann, Jan Frederik
id: '44413'
last_name: Haltermann
citation:
ama: Haltermann JF. Analyzing Data Usage in Array Programs.; 2019.
apa: Haltermann, J. F. (2019). Analyzing Data Usage in Array Programs.
bibtex: '@book{Haltermann_2019, title={Analyzing Data Usage in Array Programs},
author={Haltermann, Jan Frederik}, year={2019} }'
chicago: Haltermann, Jan Frederik. Analyzing Data Usage in Array Programs,
2019.
ieee: J. F. Haltermann, Analyzing Data Usage in Array Programs. 2019.
mla: Haltermann, Jan Frederik. Analyzing Data Usage in Array Programs. 2019.
short: J.F. Haltermann, Analyzing Data Usage in Array Programs, 2019.
date_created: 2019-07-24T08:06:11Z
date_updated: 2022-01-06T06:51:23Z
ddc:
- '000'
department:
- _id: '77'
file:
- access_level: closed
content_type: application/pdf
creator: jfh
date_created: 2019-07-24T07:44:29Z
date_updated: 2019-07-24T07:44:29Z
file_id: '12886'
file_name: Thesis_Haltermann.pdf
file_size: 1344093
relation: main_file
success: 1
file_date_updated: 2019-07-24T07:44:29Z
has_accepted_license: '1'
language:
- iso: eng
status: public
supervisor:
- first_name: Heike
full_name: Wehrheim, Heike
id: '573'
last_name: Wehrheim
title: Analyzing Data Usage in Array Programs
type: mastersthesis
user_id: '44413'
year: '2019'
...
---
_id: '17825'
abstract:
- lang: eng
text: "Software verification has recently made enormous progress due to the\r\ndevelopment
of novel verification methods and the speed-up of supporting\r\ntechnologies like
SMT solving. To keep software verification tools up to date\r\nwith these advances,
tool developers keep on integrating newly designed methods\r\ninto their tools,
almost exclusively by re-implementing the method within their\r\nown framework.
While this allows for a conceptual re-use of methods, it\r\nrequires novel implementations
for every new technique.\r\n In this paper, we employ cooperative verification
in order to avoid\r\nreimplementation and enable usage of novel tools as black-box
components in\r\nverification. Specifically, cooperation is employed for the core
ingredient of\r\nsoftware verification which is invariant generation. Finding
an adequate loop\r\ninvariant is key to the success of a verification run. Our
framework named\r\nCoVerCIG allows a master verification tool to delegate the
task of invariant\r\ngeneration to one or several specialized helper invariant
generators. Their\r\nresults are then utilized within the verification run of
the master verifier,\r\nallowing in particular for crosschecking the validity
of the invariant. We\r\nexperimentally evaluate our framework on an instance with
two masters and three\r\ndifferent invariant generators using a number of benchmarks
from SV-COMP 2020.\r\nThe experiments show that the use of CoVerCIG can increase
the number of\r\ncorrectly verified tasks without increasing the used resources"
author:
- first_name: Jan Frederik
full_name: Haltermann, Jan Frederik
id: '44413'
last_name: Haltermann
- first_name: Heike
full_name: Wehrheim, Heike
id: '573'
last_name: Wehrheim
citation:
ama: Haltermann JF, Wehrheim H. Cooperative Verification via Collective Invariant
Generation. arXiv:200804551. 2020.
apa: Haltermann, J. F., & Wehrheim, H. (2020). Cooperative Verification via
Collective Invariant Generation. ArXiv:2008.04551.
bibtex: '@article{Haltermann_Wehrheim_2020, title={Cooperative Verification via
Collective Invariant Generation}, journal={arXiv:2008.04551}, author={Haltermann,
Jan Frederik and Wehrheim, Heike}, year={2020} }'
chicago: Haltermann, Jan Frederik, and Heike Wehrheim. “Cooperative Verification
via Collective Invariant Generation.” ArXiv:2008.04551, 2020.
ieee: J. F. Haltermann and H. Wehrheim, “Cooperative Verification via Collective
Invariant Generation,” arXiv:2008.04551. 2020.
mla: Haltermann, Jan Frederik, and Heike Wehrheim. “Cooperative Verification via
Collective Invariant Generation.” ArXiv:2008.04551, 2020.
short: J.F. Haltermann, H. Wehrheim, ArXiv:2008.04551 (2020).
date_created: 2020-08-12T06:49:18Z
date_updated: 2022-01-06T06:53:20Z
department:
- _id: '77'
language:
- iso: eng
project:
- _id: '85'
name: Kooperative Softwareverifikation
publication: arXiv:2008.04551
status: public
title: Cooperative Verification via Collective Invariant Generation
type: preprint
user_id: '44413'
year: '2020'
...