--- _id: '35426' author: - first_name: Cedric full_name: Richter, Cedric id: '50003' last_name: Richter - first_name: Jan Frederik full_name: Haltermann, Jan Frederik id: '44413' last_name: Haltermann - first_name: Marie-Christine full_name: Jakobs, Marie-Christine last_name: Jakobs - first_name: Felix full_name: Pauck, Felix id: '22398' last_name: Pauck - first_name: Stefan full_name: Schott, Stefan id: '54847' last_name: Schott - first_name: Heike full_name: Wehrheim, Heike id: '573' last_name: Wehrheim citation: ama: 'Richter C, Haltermann JF, Jakobs M-C, Pauck F, Schott S, Wehrheim H. Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? In: 37th IEEE/ACM International Conference on Automated Software Engineering. ACM; 2023. doi:10.1145/3551349.3561156' apa: Richter, C., Haltermann, J. F., Jakobs, M.-C., Pauck, F., Schott, S., & Wehrheim, H. (2023). Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? 37th IEEE/ACM International Conference on Automated Software Engineering. https://doi.org/10.1145/3551349.3561156 bibtex: '@inproceedings{Richter_Haltermann_Jakobs_Pauck_Schott_Wehrheim_2023, title={Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?}, DOI={10.1145/3551349.3561156}, booktitle={37th IEEE/ACM International Conference on Automated Software Engineering}, publisher={ACM}, author={Richter, Cedric and Haltermann, Jan Frederik and Jakobs, Marie-Christine and Pauck, Felix and Schott, Stefan and Wehrheim, Heike}, year={2023} }' chicago: Richter, Cedric, Jan Frederik Haltermann, Marie-Christine Jakobs, Felix Pauck, Stefan Schott, and Heike Wehrheim. “Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?” In 37th IEEE/ACM International Conference on Automated Software Engineering. ACM, 2023. https://doi.org/10.1145/3551349.3561156. ieee: 'C. Richter, J. F. Haltermann, M.-C. Jakobs, F. Pauck, S. Schott, and H. Wehrheim, “Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?,” 2023, doi: 10.1145/3551349.3561156.' mla: Richter, Cedric, et al. “Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?” 37th IEEE/ACM International Conference on Automated Software Engineering, ACM, 2023, doi:10.1145/3551349.3561156. short: 'C. Richter, J.F. Haltermann, M.-C. Jakobs, F. Pauck, S. Schott, H. Wehrheim, in: 37th IEEE/ACM International Conference on Automated Software Engineering, ACM, 2023.' date_created: 2023-01-09T06:28:44Z date_updated: 2023-01-19T13:50:18Z department: - _id: '77' doi: 10.1145/3551349.3561156 language: - iso: eng main_file_link: - open_access: '1' url: https://doi.org/10.1145/3551349.3561156 oa: '1' project: - _id: '3' name: 'SFB 901 - B: SFB 901 - Project Area B' - _id: '12' name: 'SFB 901 - B4: SFB 901 - Subproject B4' - _id: '1' name: 'SFB 901: SFB 901' publication: 37th IEEE/ACM International Conference on Automated Software Engineering publication_status: published publisher: ACM status: public title: Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? type: conference user_id: '477' year: '2023' ... --- _id: '3265' abstract: - lang: eng text: "We present CLARC (Cryptographic Library for Anonymous Reputation and Credentials), an anonymous credentials system (ACS) combined with an anonymous reputation system.\r\n\r\nUsing CLARC, users can receive attribute-based credentials from issuers. They can efficiently prove that their credentials satisfy complex (access) policies in a privacy-preserving way. This implements anonymous access control with complex policies.\r\n\r\nFurthermore, CLARC is the first ACS that is combined with an anonymous reputation system where users can anonymously rate services. A user who gets access to a service via a credential, also anonymously receives a review token to rate the service. If a user creates more than a single rating, this can be detected by anyone, preventing users from spamming ratings to sway public opinion.\r\n\r\nTo evaluate feasibility of our construction, we present an open-source prototype implementation." author: - first_name: Kai full_name: Bemmann, Kai last_name: Bemmann - first_name: Johannes full_name: Blömer, Johannes id: '23' last_name: Blömer - first_name: Jan full_name: Bobolz, Jan id: '27207' last_name: Bobolz - first_name: Henrik full_name: Bröcher, Henrik id: '41047' last_name: Bröcher - first_name: Denis Pascal full_name: Diemert, Denis Pascal id: '44071' last_name: Diemert - first_name: Fabian full_name: Eidens, Fabian id: '25078' last_name: Eidens - first_name: Lukas full_name: Eilers, Lukas last_name: Eilers - first_name: Jan Frederik full_name: Haltermann, Jan Frederik id: '44413' last_name: Haltermann - first_name: Jakob full_name: Juhnke, Jakob id: '48090' last_name: Juhnke - first_name: Burhan full_name: Otour, Burhan last_name: Otour - first_name: Laurens Alexander full_name: Porzenheim, Laurens Alexander id: '47434' last_name: Porzenheim - first_name: Simon full_name: Pukrop, Simon last_name: Pukrop - first_name: Erik full_name: Schilling, Erik last_name: Schilling - first_name: Michael full_name: Schlichtig, Michael id: '32312' last_name: Schlichtig - first_name: Marcel full_name: Stienemeier, Marcel last_name: Stienemeier citation: ama: 'Bemmann K, Blömer J, Bobolz J, et al. Fully-Featured Anonymous Credentials with Reputation System. In: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. doi:10.1145/3230833.3234517' apa: 'Bemmann, K., Blömer, J., Bobolz, J., Bröcher, H., Diemert, D. P., Eidens, F., … Stienemeier, M. (n.d.). Fully-Featured Anonymous Credentials with Reputation System. In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. https://doi.org/10.1145/3230833.3234517' bibtex: '@inproceedings{Bemmann_Blömer_Bobolz_Bröcher_Diemert_Eidens_Eilers_Haltermann_Juhnke_Otour_et al., place={New York, NY, USA}, title={Fully-Featured Anonymous Credentials with Reputation System}, DOI={10.1145/3230833.3234517}, booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18}, publisher={ACM}, author={Bemmann, Kai and Blömer, Johannes and Bobolz, Jan and Bröcher, Henrik and Diemert, Denis Pascal and Eidens, Fabian and Eilers, Lukas and Haltermann, Jan Frederik and Juhnke, Jakob and Otour, Burhan and et al.} }' chicago: 'Bemmann, Kai, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Pascal Diemert, Fabian Eidens, Lukas Eilers, et al. “Fully-Featured Anonymous Credentials with Reputation System.” In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3234517.' ieee: K. Bemmann et al., “Fully-Featured Anonymous Credentials with Reputation System,” in Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, Hamburg, Germany. mla: Bemmann, Kai, et al. “Fully-Featured Anonymous Credentials with Reputation System.” Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, doi:10.1145/3230833.3234517. short: 'K. Bemmann, J. Blömer, J. Bobolz, H. Bröcher, D.P. Diemert, F. Eidens, L. Eilers, J.F. Haltermann, J. Juhnke, B. Otour, L.A. Porzenheim, S. Pukrop, E. Schilling, M. Schlichtig, M. Stienemeier, in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, New York, NY, USA, n.d.' conference: end_date: 2018-08-30 location: Hamburg, Germany name: ARES 2018 - SECPID start_date: 2018-08-27 date_created: 2018-06-14T11:19:29Z date_updated: 2022-01-06T06:59:07Z ddc: - '000' department: - _id: '64' doi: 10.1145/3230833.3234517 file: - access_level: closed content_type: application/pdf creator: feidens date_created: 2018-11-08T10:17:39Z date_updated: 2018-11-08T10:17:39Z file_id: '5428' file_name: react_acs.pdf file_size: 920843 relation: main_file file_date_updated: 2018-11-08T10:17:39Z has_accepted_license: '1' language: - iso: eng main_file_link: - open_access: '1' url: https://eprint.iacr.org/2018/835 oa: '1' place: New York, NY, USA project: - _id: '1' name: SFB 901 - _id: '4' name: SFB 901 - Project Area C - _id: '13' name: SFB 901 - Subproject C1 - _id: '44' name: KogniHome - die mitdenkende Wohnung publication: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES '18 publication_identifier: isbn: - 978-1-4503-6448-5 publication_status: accepted publisher: ACM quality_controlled: '1' related_material: link: - relation: software url: https://github.com/upbcuk status: public title: Fully-Featured Anonymous Credentials with Reputation System type: conference user_id: '25078' year: '2018' ... --- _id: '3414' abstract: - lang: eng text: "Over the years, Design by Contract (DbC) has evolved as a\r\npowerful concept for program documentation, testing, and verification.\r\nContracts formally specify assertions on (mostly) object-oriented programs:\r\npre- and postconditions of methods, class invariants, allowed call\r\norders, etc. Missing in the long list of properties specifiable by contracts\r\nare, however, method correlations: DbC languages fall short on stating\r\nassertions relating methods.\r\nIn this paper, we propose the novel concept of inter-method contract,\r\nallowing precisely for expressing method correlations.We present JMC as\r\na language for specifying and JMCTest as a tool for dynamically checking\r\ninter-method contracts on Java programs. JMCTest fully automatically\r\ngenerates objects on which the contracted methods are called and\r\nthe validity of the contract is checked. Using JMCTest, we detected\r\nthat large Java code bases (e.g. JBoss, Java RT) frequently violate standard\r\ninter-method contracts. In comparison to other verification tools\r\ninspecting (some) inter-method contracts, JMCTest can find bugs that\r\nremain undetected by those tools." author: - first_name: Paul full_name: Börding, Paul last_name: Börding - first_name: Jan Frederik full_name: Haltermann, Jan Frederik id: '44413' last_name: Haltermann - first_name: Marie-Christine full_name: Jakobs, Marie-Christine last_name: Jakobs - first_name: Heike full_name: Wehrheim, Heike id: '573' last_name: Wehrheim citation: ama: 'Börding P, Haltermann JF, Jakobs M-C, Wehrheim H. JMCTest: Automatically Testing Inter-Method Contracts in Java. In: Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018). Vol 11146. Lecture Notes in Computer Science. Springer; 2018:39--55.' apa: 'Börding, P., Haltermann, J. F., Jakobs, M.-C., & Wehrheim, H. (2018). JMCTest: Automatically Testing Inter-Method Contracts in Java. In Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018) (Vol. 11146, pp. 39--55). Cádiz, Spain: Springer.' bibtex: '@inproceedings{Börding_Haltermann_Jakobs_Wehrheim_2018, series={Lecture Notes in Computer Science}, title={JMCTest: Automatically Testing Inter-Method Contracts in Java}, volume={11146}, booktitle={Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018)}, publisher={Springer}, author={Börding, Paul and Haltermann, Jan Frederik and Jakobs, Marie-Christine and Wehrheim, Heike}, year={2018}, pages={39--55}, collection={Lecture Notes in Computer Science} }' chicago: 'Börding, Paul, Jan Frederik Haltermann, Marie-Christine Jakobs, and Heike Wehrheim. “JMCTest: Automatically Testing Inter-Method Contracts in Java.” In Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018), 11146:39--55. Lecture Notes in Computer Science. Springer, 2018.' ieee: 'P. Börding, J. F. Haltermann, M.-C. Jakobs, and H. Wehrheim, “JMCTest: Automatically Testing Inter-Method Contracts in Java,” in Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018), Cádiz, Spain, 2018, vol. 11146, pp. 39--55.' mla: 'Börding, Paul, et al. “JMCTest: Automatically Testing Inter-Method Contracts in Java.” Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018), vol. 11146, Springer, 2018, pp. 39--55.' short: 'P. Börding, J.F. Haltermann, M.-C. Jakobs, H. Wehrheim, in: Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018), Springer, 2018, pp. 39--55.' conference: end_date: 2018-10-03 location: Cádiz, Spain name: IFIP International Conference on Testing Software and Systems start_date: 2018-10-01 date_created: 2018-07-02T09:06:56Z date_updated: 2022-01-06T06:59:15Z ddc: - '006' department: - _id: '7' - _id: '77' file: - access_level: closed content_type: application/pdf creator: schlatt date_created: 2018-11-21T09:35:35Z date_updated: 2018-11-21T09:35:35Z file_id: '5770' file_name: Börding2018_Chapter_JMCTestAutomaticallyTestingInt.pdf file_size: 574386 relation: main_file success: 1 file_date_updated: 2018-11-21T09:35:35Z has_accepted_license: '1' intvolume: ' 11146' language: - iso: eng page: 39--55 project: - _id: '1' name: SFB 901 - _id: '3' name: SFB 901 - Project Area B - _id: '11' name: SFB 901 - Subproject B3 publication: Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018) publication_status: published publisher: Springer series_title: Lecture Notes in Computer Science status: public title: 'JMCTest: Automatically Testing Inter-Method Contracts in Java' type: conference user_id: '29719' volume: 11146 year: '2018' ... --- _id: '12885' author: - first_name: Jan Frederik full_name: Haltermann, Jan Frederik id: '44413' last_name: Haltermann citation: ama: Haltermann JF. Analyzing Data Usage in Array Programs.; 2019. apa: Haltermann, J. F. (2019). Analyzing Data Usage in Array Programs. bibtex: '@book{Haltermann_2019, title={Analyzing Data Usage in Array Programs}, author={Haltermann, Jan Frederik}, year={2019} }' chicago: Haltermann, Jan Frederik. Analyzing Data Usage in Array Programs, 2019. ieee: J. F. Haltermann, Analyzing Data Usage in Array Programs. 2019. mla: Haltermann, Jan Frederik. Analyzing Data Usage in Array Programs. 2019. short: J.F. Haltermann, Analyzing Data Usage in Array Programs, 2019. date_created: 2019-07-24T08:06:11Z date_updated: 2022-01-06T06:51:23Z ddc: - '000' department: - _id: '77' file: - access_level: closed content_type: application/pdf creator: jfh date_created: 2019-07-24T07:44:29Z date_updated: 2019-07-24T07:44:29Z file_id: '12886' file_name: Thesis_Haltermann.pdf file_size: 1344093 relation: main_file success: 1 file_date_updated: 2019-07-24T07:44:29Z has_accepted_license: '1' language: - iso: eng status: public supervisor: - first_name: Heike full_name: Wehrheim, Heike id: '573' last_name: Wehrheim title: Analyzing Data Usage in Array Programs type: mastersthesis user_id: '44413' year: '2019' ... --- _id: '17825' abstract: - lang: eng text: "Software verification has recently made enormous progress due to the\r\ndevelopment of novel verification methods and the speed-up of supporting\r\ntechnologies like SMT solving. To keep software verification tools up to date\r\nwith these advances, tool developers keep on integrating newly designed methods\r\ninto their tools, almost exclusively by re-implementing the method within their\r\nown framework. While this allows for a conceptual re-use of methods, it\r\nrequires novel implementations for every new technique.\r\n In this paper, we employ cooperative verification in order to avoid\r\nreimplementation and enable usage of novel tools as black-box components in\r\nverification. Specifically, cooperation is employed for the core ingredient of\r\nsoftware verification which is invariant generation. Finding an adequate loop\r\ninvariant is key to the success of a verification run. Our framework named\r\nCoVerCIG allows a master verification tool to delegate the task of invariant\r\ngeneration to one or several specialized helper invariant generators. Their\r\nresults are then utilized within the verification run of the master verifier,\r\nallowing in particular for crosschecking the validity of the invariant. We\r\nexperimentally evaluate our framework on an instance with two masters and three\r\ndifferent invariant generators using a number of benchmarks from SV-COMP 2020.\r\nThe experiments show that the use of CoVerCIG can increase the number of\r\ncorrectly verified tasks without increasing the used resources" author: - first_name: Jan Frederik full_name: Haltermann, Jan Frederik id: '44413' last_name: Haltermann - first_name: Heike full_name: Wehrheim, Heike id: '573' last_name: Wehrheim citation: ama: Haltermann JF, Wehrheim H. Cooperative Verification via Collective Invariant Generation. arXiv:200804551. 2020. apa: Haltermann, J. F., & Wehrheim, H. (2020). Cooperative Verification via Collective Invariant Generation. ArXiv:2008.04551. bibtex: '@article{Haltermann_Wehrheim_2020, title={Cooperative Verification via Collective Invariant Generation}, journal={arXiv:2008.04551}, author={Haltermann, Jan Frederik and Wehrheim, Heike}, year={2020} }' chicago: Haltermann, Jan Frederik, and Heike Wehrheim. “Cooperative Verification via Collective Invariant Generation.” ArXiv:2008.04551, 2020. ieee: J. F. Haltermann and H. Wehrheim, “Cooperative Verification via Collective Invariant Generation,” arXiv:2008.04551. 2020. mla: Haltermann, Jan Frederik, and Heike Wehrheim. “Cooperative Verification via Collective Invariant Generation.” ArXiv:2008.04551, 2020. short: J.F. Haltermann, H. Wehrheim, ArXiv:2008.04551 (2020). date_created: 2020-08-12T06:49:18Z date_updated: 2022-01-06T06:53:20Z department: - _id: '77' language: - iso: eng project: - _id: '85' name: Kooperative Softwareverifikation publication: arXiv:2008.04551 status: public title: Cooperative Verification via Collective Invariant Generation type: preprint user_id: '44413' year: '2020' ...