[{"date_updated":"2022-01-06T06:54:29Z","_id":"20529","main_file_link":[{"url":"http://www.bodden.de/pubs/nachtigall19explaining.pdf"}],"language":[{"iso":"eng"}],"type":"conference","year":"2019","citation":{"short":"M. Nachtigall, L. Nguyen Quang Do, E. Bodden, in: 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","ieee":"M. Nachtigall, L. Nguyen Quang Do, and E. Bodden, “Explaining Static Analysis -- A Perspective,” 2019.","chicago":"Nachtigall, Marcus, Lisa Nguyen Quang Do, and Eric Bodden. “Explaining Static Analysis -- A Perspective.” In 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","apa":"Nachtigall, M., Nguyen Quang Do, L., & Bodden, E. (2019). Explaining Static Analysis -- A Perspective. 1st International Workshop on Explainable Software (EXPLAIN) at ASE.","ama":"Nachtigall M, Nguyen Quang Do L, Bodden E. Explaining Static Analysis -- A Perspective. In: 1st International Workshop on Explainable Software (EXPLAIN) at ASE. ; 2019.","mla":"Nachtigall, Marcus, et al. “Explaining Static Analysis -- A Perspective.” 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","bibtex":"@inproceedings{Nachtigall_Nguyen Quang Do_Bodden_2019, title={Explaining Static Analysis -- A Perspective}, booktitle={1st International Workshop on Explainable Software (EXPLAIN) at ASE}, author={Nachtigall, Marcus and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }"},"user_id":"5786","title":"Explaining Static Analysis -- A Perspective","publication":"1st International Workshop on Explainable Software (EXPLAIN) at ASE","department":[{"_id":"76"}],"author":[{"first_name":"Marcus","full_name":"Nachtigall, Marcus","last_name":"Nachtigall","id":"41213"},{"first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do"},{"last_name":"Bodden","id":"59256","first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647"}],"date_created":"2020-11-27T10:22:38Z","status":"public"},{"user_id":"5786","title":"A Qualitative Analysis of Android Taint-Analysis Results","date_created":"2020-11-27T10:25:40Z","status":"public","department":[{"_id":"76"}],"publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)","author":[{"last_name":"Luo","full_name":"Luo, Linghui","first_name":"Linghui"},{"first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256"},{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"}],"_id":"20531","date_updated":"2022-01-06T06:54:29Z","language":[{"iso":"eng"}],"citation":{"ieee":"L. Luo, E. Bodden, and J. Späth, “A Qualitative Analysis of Android Taint-Analysis Results,” 2019.","short":"L. Luo, E. Bodden, J. Späth, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","mla":"Luo, Linghui, et al. “A Qualitative Analysis of Android Taint-Analysis Results.” IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","bibtex":"@inproceedings{Luo_Bodden_Späth_2019, title={A Qualitative Analysis of Android Taint-Analysis Results}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)}, author={Luo, Linghui and Bodden, Eric and Späth, Johannes}, year={2019} }","chicago":"Luo, Linghui, Eric Bodden, and Johannes Späth. “A Qualitative Analysis of Android Taint-Analysis Results.” In IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","ama":"Luo L, Bodden E, Späth J. A Qualitative Analysis of Android Taint-Analysis Results. In: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019). ; 2019.","apa":"Luo, L., Bodden, E., & Späth, J. (2019). A Qualitative Analysis of Android Taint-Analysis Results. IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)."},"type":"conference","year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/ase19qualitative.pdf"}]},{"year":"2019","type":"conference","citation":{"bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Johnson_Bodden_2019, title={SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Johnson, Oshando and Bodden, Eric}, year={2019} }","mla":"Piskachev, Goran, et al. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019.","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, Oshando Johnson, and Eric Bodden. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” In IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019.","ama":"Piskachev G, Nguyen Quang Do L, Johnson O, Bodden E. SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. In: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track. ; 2019.","apa":"Piskachev, G., Nguyen Quang Do, L., Johnson, O., & Bodden, E. (2019). SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track.","ieee":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, and E. Bodden, “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods,” 2019.","short":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, E. Bodden, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019."},"language":[{"iso":"eng"}],"main_file_link":[{"url":"http://www.bodden.de/pubs/ase19swanAssist.pdf"}],"date_updated":"2022-01-06T06:54:29Z","_id":"20532","status":"public","date_created":"2020-11-27T10:37:17Z","author":[{"last_name":"Piskachev","full_name":"Piskachev, Goran","first_name":"Goran"},{"last_name":"Nguyen Quang Do","first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa"},{"last_name":"Johnson","full_name":"Johnson, Oshando","first_name":"Oshando"},{"first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256"}],"department":[{"_id":"76"}],"publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track","title":"SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods","user_id":"5786"},{"status":"public","date_created":"2020-11-27T10:48:38Z","publication_identifier":{"issn":["2326-3881"]},"author":[{"full_name":"Krüger, Stefan","first_name":"Stefan","last_name":"Krüger"},{"last_name":"Späth","first_name":"Johannes","full_name":"Späth, Johannes"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"}],"department":[{"_id":"76"}],"publication":"IEEE Transactions on Software Engineering","keyword":["Java","Encryption","Static analysis","Tools","Ciphers","Semantics","cryptography","domain-specific language","static analysis"],"user_id":"5786","title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","language":[{"iso":"eng"}],"year":"2019","type":"journal_article","citation":{"short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, IEEE Transactions on Software Engineering (2019) 1–1.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” IEEE Transactions on Software Engineering, pp. 1–1, 2019, doi: 10.1109/TSE.2019.2948910.","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. IEEE Transactions on Software Engineering. Published online 2019:1-1. doi:10.1109/TSE.2019.2948910","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., & Mezini, M. (2019). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. IEEE Transactions on Software Engineering, 1–1. https://doi.org/10.1109/TSE.2019.2948910","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” IEEE Transactions on Software Engineering, 2019, 1–1. https://doi.org/10.1109/TSE.2019.2948910.","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” IEEE Transactions on Software Engineering, 2019, pp. 1–1, doi:10.1109/TSE.2019.2948910.","bibtex":"@article{Krüger_Späth_Ali_Bodden_Mezini_2019, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, DOI={10.1109/TSE.2019.2948910}, journal={IEEE Transactions on Software Engineering}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2019}, pages={1–1} }"},"page":"1-1","main_file_link":[{"url":"http://www.bodden.de/pubs/tse19CrySL.pdf"}],"doi":"10.1109/TSE.2019.2948910","date_updated":"2022-01-06T06:54:29Z","_id":"20533"},{"title":"Codebase-Adaptive Detection of Security-Relevant Methods","user_id":"5786","publication":"ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)","department":[{"_id":"76"}],"author":[{"full_name":"Piskachev, Goran","first_name":"Goran","last_name":"Piskachev"},{"full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa","last_name":"Nguyen Quang Do"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"}],"date_created":"2020-11-27T10:49:33Z","status":"public","date_updated":"2022-01-06T06:54:29Z","_id":"20534","main_file_link":[{"url":"http://www.bodden.de/pubs/issta19swan.pdf"}],"year":"2019","type":"conference","citation":{"short":"G. Piskachev, L. Nguyen Quang Do, E. Bodden, in: ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019.","ieee":"G. Piskachev, L. Nguyen Quang Do, and E. Bodden, “Codebase-Adaptive Detection of Security-Relevant Methods,” 2019.","ama":"Piskachev G, Nguyen Quang Do L, Bodden E. Codebase-Adaptive Detection of Security-Relevant Methods. In: ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). ; 2019.","apa":"Piskachev, G., Nguyen Quang Do, L., & Bodden, E. (2019). Codebase-Adaptive Detection of Security-Relevant Methods. ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA).","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, and Eric Bodden. “Codebase-Adaptive Detection of Security-Relevant Methods.” In ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Bodden_2019, title={Codebase-Adaptive Detection of Security-Relevant Methods}, booktitle={ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }","mla":"Piskachev, Goran, et al. “Codebase-Adaptive Detection of Security-Relevant Methods.” ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019."},"language":[{"iso":"eng"}]},{"date_updated":"2022-01-06T06:54:29Z","_id":"20535","main_file_link":[{"url":"http://www.bodden.de/pubs/ldb19magpiebridge.pdf"}],"language":[{"iso":"eng"}],"type":"conference","year":"2019","citation":{"bibtex":"@inproceedings{Luo_Dolby_Bodden_2019, title={MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Luo, Linghui and Dolby, Julian and Bodden, Eric}, year={2019} }","mla":"Luo, Linghui, et al. “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors.” European Conference on Object-Oriented Programming (ECOOP), 2019.","chicago":"Luo, Linghui, Julian Dolby, and Eric Bodden. “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors.” In European Conference on Object-Oriented Programming (ECOOP), 2019.","ama":"Luo L, Dolby J, Bodden E. MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors. In: European Conference on Object-Oriented Programming (ECOOP). ; 2019.","apa":"Luo, L., Dolby, J., & Bodden, E. (2019). MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors. European Conference on Object-Oriented Programming (ECOOP).","ieee":"L. Luo, J. Dolby, and E. Bodden, “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors,” 2019.","short":"L. Luo, J. Dolby, E. Bodden, in: European Conference on Object-Oriented Programming (ECOOP), 2019."},"user_id":"5786","title":"MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors","publication":"European Conference on Object-Oriented Programming (ECOOP)","department":[{"_id":"76"}],"author":[{"first_name":"Linghui","full_name":"Luo, Linghui","last_name":"Luo"},{"last_name":"Dolby","first_name":"Julian","full_name":"Dolby, Julian"},{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2020-11-27T10:50:07Z","status":"public"},{"publisher":"Universität Paderborn","author":[{"full_name":"Späth, Johannes","first_name":"Johannes","last_name":"Späth"}],"department":[{"_id":"76"}],"status":"public","date_created":"2020-11-27T10:50:55Z","title":"Synchronized Pushdown Systems for Pointer and Data-Flow Analysis","user_id":"5786","main_file_link":[{"url":"http://www.bodden.de/pubs/phdSpaeth.pdf"}],"citation":{"ieee":"J. Späth, Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn, 2019.","short":"J. Späth, Synchronized Pushdown Systems for Pointer and Data-Flow Analysis, Universität Paderborn, 2019.","mla":"Späth, Johannes. Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn, 2019.","bibtex":"@book{Späth_2019, title={Synchronized Pushdown Systems for Pointer and Data-Flow Analysis}, publisher={Universität Paderborn}, author={Späth, Johannes}, year={2019} }","ama":"Späth J. Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn; 2019.","apa":"Späth, J. (2019). Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn.","chicago":"Späth, Johannes. Synchronized Pushdown Systems for Pointer and Data-Flow Analysis. Universität Paderborn, 2019."},"type":"dissertation","year":"2019","supervisor":[{"first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256"}],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:29Z","_id":"20536"},{"date_created":"2020-11-27T10:51:53Z","status":"public","department":[{"_id":"76"}],"author":[{"last_name":"Piskachev","first_name":"Goran","full_name":"Piskachev, Goran"},{"full_name":"Nguyen, Lisa","first_name":"Lisa","last_name":"Nguyen"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"}],"user_id":"5786","title":"Codebase-Adaptive Detection of Security-Relevant Methods","language":[{"iso":"eng"}],"type":"report","citation":{"mla":"Piskachev, Goran, et al. Codebase-Adaptive Detection of Security-Relevant Methods. 2019.","bibtex":"@book{Piskachev_Nguyen_Bodden_2019, title={Codebase-Adaptive Detection of Security-Relevant Methods}, author={Piskachev, Goran and Nguyen, Lisa and Bodden, Eric}, year={2019} }","chicago":"Piskachev, Goran, Lisa Nguyen, and Eric Bodden. Codebase-Adaptive Detection of Security-Relevant Methods, 2019.","apa":"Piskachev, G., Nguyen, L., & Bodden, E. (2019). Codebase-Adaptive Detection of Security-Relevant Methods.","ama":"Piskachev G, Nguyen L, Bodden E. Codebase-Adaptive Detection of Security-Relevant Methods.; 2019.","ieee":"G. Piskachev, L. Nguyen, and E. Bodden, Codebase-Adaptive Detection of Security-Relevant Methods. 2019.","short":"G. Piskachev, L. Nguyen, E. Bodden, Codebase-Adaptive Detection of Security-Relevant Methods, 2019."},"year":"2019","date_updated":"2022-01-06T06:54:29Z","_id":"20537"},{"language":[{"iso":"eng"}],"type":"conference","year":"2019","citation":{"short":"S. Albert Gorski Iii, B. Andow, A. Nadkarni, S. Manandhar, W. Enck, E. Bodden, A. Bartel, in: ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019.","ieee":"S. Albert Gorski Iii et al., “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware,” 2019.","apa":"Albert Gorski Iii, S., Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden, E., & Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. ACM Conference on Data and Application Security and Privacy (CODASPY 2019).","ama":"Albert Gorski Iii S, Andow B, Nadkarni A, et al. ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. In: ACM Conference on Data and Application Security and Privacy (CODASPY 2019). ; 2019.","chicago":"Albert Gorski Iii, Sigmund, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, and Alexandre Bartel. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” In ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019.","mla":"Albert Gorski Iii, Sigmund, et al. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019.","bibtex":"@inproceedings{Albert Gorski Iii_Andow_Nadkarni_Manandhar_Enck_Bodden_Bartel_2019, title={ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware}, booktitle={ACM Conference on Data and Application Security and Privacy (CODASPY 2019)}, author={Albert Gorski Iii, Sigmund and Andow, Benjamin and Nadkarni, Adwait and Manandhar, Sunil and Enck, William and Bodden, Eric and Bartel, Alexandre}, year={2019} }"},"main_file_link":[{"url":"http://www.bodden.de/pubs/gan19acminer.pdf"}],"_id":"20538","date_updated":"2022-01-06T06:54:29Z","status":"public","date_created":"2020-11-27T10:52:59Z","author":[{"last_name":"Albert Gorski Iii","full_name":"Albert Gorski Iii, Sigmund","first_name":"Sigmund"},{"last_name":"Andow","full_name":"Andow, Benjamin","first_name":"Benjamin"},{"last_name":"Nadkarni","first_name":"Adwait","full_name":"Nadkarni, Adwait"},{"first_name":"Sunil","full_name":"Manandhar, Sunil","last_name":"Manandhar"},{"first_name":"William","full_name":"Enck, William","last_name":"Enck"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"},{"first_name":"Alexandre","full_name":"Bartel, Alexandre","last_name":"Bartel"}],"department":[{"_id":"76"}],"keyword":["ITSECWEBSITE","CROSSING"],"publication":"ACM Conference on Data and Application Security and Privacy (CODASPY 2019)","user_id":"5786","title":"ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware"},{"user_id":"5786","publication":"Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages","keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"author":[{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"last_name":"Ali","first_name":"Karim","full_name":"Ali, Karim"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"}],"publisher":"ACM","volume":3,"date_created":"2020-11-27T10:53:57Z","status":"public","_id":"20539","intvolume":" 3","issue":"POPL","main_file_link":[{"url":"http://www.bodden.de/pubs/sab19context.pdf"}],"page":"48:1-48:29","type":"journal_article","citation":{"chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages 3, no. POPL (2019): 48:1-48:29. https://doi.org/10.1145/3290361.","ama":"Späth J, Ali K, Bodden E. Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages. 2019;3(POPL):48:1-48:29. doi:10.1145/3290361","apa":"Späth, J., Ali, K., & Bodden, E. (2019). Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages, 3(POPL), 48:1-48:29. https://doi.org/10.1145/3290361","mla":"Späth, Johannes, et al. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages, vol. 3, no. POPL, ACM, 2019, p. 48:1-48:29, doi:10.1145/3290361.","bibtex":"@article{Späth_Ali_Bodden_2019, title={Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems}, volume={3}, DOI={10.1145/3290361}, number={POPL}, journal={Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages}, publisher={ACM}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2019}, pages={48:1-48:29} }","short":"J. Späth, K. Ali, E. Bodden, Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages 3 (2019) 48:1-48:29.","ieee":"J. Späth, K. Ali, and E. Bodden, “Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems,” Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages, vol. 3, no. POPL, p. 48:1-48:29, 2019, doi: 10.1145/3290361."},"year":"2019","title":"Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems","department":[{"_id":"76"}],"publication_identifier":{"issn":["2475-1421"]},"date_updated":"2022-01-06T06:54:29Z","doi":"10.1145/3290361","language":[{"iso":"eng"}]}]