[{"user_id":"5786","title":"Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems","author":[{"full_name":"Gerking, Christopher","first_name":"Christopher","last_name":"Gerking"},{"full_name":"Schubert, David","first_name":"David","id":"9106","last_name":"Schubert"}],"publisher":"Springer","publication":"European Conference on Software Architecture (ECSA 2018)","department":[{"_id":"76"},{"_id":"241"}],"status":"public","date_created":"2020-12-17T12:02:20Z","_id":"20781","date_updated":"2022-01-06T06:54:38Z","issue":"11048","doi":"10.1007/978-3-030-00761-4_10","series_title":"Lecture Notes in Computer Science","language":[{"iso":"eng"}],"year":"2018","type":"conference","citation":{"bibtex":"@inproceedings{Gerking_Schubert_2018, series={Lecture Notes in Computer Science}, title={Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems}, DOI={10.1007/978-3-030-00761-4_10}, number={11048}, booktitle={European Conference on Software Architecture (ECSA 2018)}, publisher={Springer}, author={Gerking, Christopher and Schubert, David}, year={2018}, pages={147–155}, collection={Lecture Notes in Computer Science} }","mla":"Gerking, Christopher, and David Schubert. “Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems.” European Conference on Software Architecture (ECSA 2018), no. 11048, Springer, 2018, pp. 147–55, doi:10.1007/978-3-030-00761-4_10.","ama":"Gerking C, Schubert D. Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems. In: European Conference on Software Architecture (ECSA 2018). Lecture Notes in Computer Science. Springer; 2018:147-155. doi:10.1007/978-3-030-00761-4_10","apa":"Gerking, C., & Schubert, D. (2018). Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems. European Conference on Software Architecture (ECSA 2018), 11048, 147–155. https://doi.org/10.1007/978-3-030-00761-4_10","chicago":"Gerking, Christopher, and David Schubert. “Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems.” In European Conference on Software Architecture (ECSA 2018), 147–55. Lecture Notes in Computer Science. Springer, 2018. https://doi.org/10.1007/978-3-030-00761-4_10.","ieee":"C. Gerking and D. Schubert, “Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems,” in European Conference on Software Architecture (ECSA 2018), 2018, no. 11048, pp. 147–155, doi: 10.1007/978-3-030-00761-4_10.","short":"C. Gerking, D. Schubert, in: European Conference on Software Architecture (ECSA 2018), Springer, 2018, pp. 147–155."},"page":"147-155"},{"doi":"10.1109/ICSA-C.2018.00017","date_updated":"2022-01-06T06:54:38Z","_id":"20784","language":[{"iso":"eng"}],"type":"conference","year":"2018","citation":{"ieee":"J. Geismann, “Traceable Threat Modeling for Safety-critical Systems,” in IEEE International Conference on Software Architecture Companion (ICSA-C 2018) , 2018, pp. 41–42, doi: 10.1109/ICSA-C.2018.00017.","short":"J. Geismann, in: IEEE International Conference on Software Architecture Companion (ICSA-C 2018) , IEEE, 2018, pp. 41–42.","bibtex":"@inproceedings{Geismann_2018, title={Traceable Threat Modeling for Safety-critical Systems}, DOI={10.1109/ICSA-C.2018.00017}, booktitle={IEEE International Conference on Software Architecture Companion (ICSA-C 2018) }, publisher={IEEE}, author={Geismann, Johannes}, year={2018}, pages={41–42} }","mla":"Geismann, Johannes. “Traceable Threat Modeling for Safety-Critical Systems.” IEEE International Conference on Software Architecture Companion (ICSA-C 2018) , IEEE, 2018, pp. 41–42, doi:10.1109/ICSA-C.2018.00017.","chicago":"Geismann, Johannes. “Traceable Threat Modeling for Safety-Critical Systems.” In IEEE International Conference on Software Architecture Companion (ICSA-C 2018) , 41–42. IEEE, 2018. https://doi.org/10.1109/ICSA-C.2018.00017.","ama":"Geismann J. Traceable Threat Modeling for Safety-critical Systems. In: IEEE International Conference on Software Architecture Companion (ICSA-C 2018) . IEEE; 2018:41-42. doi:10.1109/ICSA-C.2018.00017","apa":"Geismann, J. (2018). Traceable Threat Modeling for Safety-critical Systems. IEEE International Conference on Software Architecture Companion (ICSA-C 2018) , 41–42. https://doi.org/10.1109/ICSA-C.2018.00017"},"page":"41-42","user_id":"5786","title":"Traceable Threat Modeling for Safety-critical Systems","status":"public","date_created":"2020-12-17T12:06:35Z","author":[{"id":"20063","last_name":"Geismann","full_name":"Geismann, Johannes","orcid":"https://orcid.org/0000-0003-2015-2047","first_name":"Johannes"}],"publisher":"IEEE","department":[{"_id":"76"}],"publication":"IEEE International Conference on Software Architecture Companion (ICSA-C 2018) "},{"title":"Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems","place":"Cham","editor":[{"last_name":"Pires","first_name":"Luís Ferreira","full_name":"Pires, Luís Ferreira"},{"first_name":"Slimane","full_name":"Hammoudi, Slimane","last_name":"Hammoudi"},{"first_name":"Bran","full_name":"Selic, Bran","last_name":"Selic"}],"department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"doi":"10.1007/978-3-319-94764-8_4","date_updated":"2022-01-06T06:54:38Z","language":[{"iso":"eng"}],"user_id":"5786","abstract":[{"lang":"eng","text":"Cyber-physical Systems are distributed, embedded systems that interact with their physical environment. Typically, these systems consist of several Electronic Control Units using multiple processing cores for the execution. Many systems are applied in safety-critical contexts and have to fulfill hard real-time requirements. The model-driven engineering paradigm enables system developers to consider all requirements in a systematical manner. In the software design phase, they prove the fulfillment of the requirements using model checking. When deploying the software to the executing platform, one important task is to ensure that the runtime scheduling does not violate the verified requirements by neglecting the model checking assumptions. Current model-driven approaches do not consider the problem of deriving feasible execution schedules for embedded multi-core platforms respecting hard real-time requirements. This paper extends the previous work on providing an approach for a semi-automatic synthesis of behavioral models into a deterministic real-time scheduling. We add an approach for the partitioning and mapping development tasks. This extended approach enables the utilization of parallel resources within a single ECU considering the verification assumptions by extending the open tool platform App4mc. We evaluate our approach using an example of a distributed automotive system with hard real-time requirements specified with the MechatronicUML method.\r\n"}],"volume":1,"status":"public","date_created":"2020-12-17T12:07:52Z","author":[{"first_name":"Johannes","full_name":"Geismann, Johannes","orcid":"https://orcid.org/0000-0003-2015-2047","last_name":"Geismann","id":"20063"},{"first_name":"Robert","full_name":"Höttger, Robert","last_name":"Höttger"},{"first_name":"Lukas","full_name":"Krawczyk, Lukas","last_name":"Krawczyk"},{"full_name":"Pohlmann, Uwe","first_name":"Uwe","last_name":"Pohlmann"},{"first_name":"David","full_name":"Schmelter, David","orcid":"0000-0001-7787-5380","last_name":"Schmelter","id":"40982"}],"publisher":"Springer International Publishing","publication":"Model-Driven Engineering and Software Development","_id":"20785","intvolume":" 1","type":"conference","citation":{"short":"J. Geismann, R. Höttger, L. Krawczyk, U. Pohlmann, D. Schmelter, in: L.F. Pires, S. Hammoudi, B. Selic (Eds.), Model-Driven Engineering and Software Development, Springer International Publishing, Cham, 2018, pp. 72–93.","ieee":"J. Geismann, R. Höttger, L. Krawczyk, U. Pohlmann, and D. Schmelter, “Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems,” in Model-Driven Engineering and Software Development, 2018, vol. 1, pp. 72–93, doi: 10.1007/978-3-319-94764-8_4.","chicago":"Geismann, Johannes, Robert Höttger, Lukas Krawczyk, Uwe Pohlmann, and David Schmelter. “Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” In Model-Driven Engineering and Software Development, edited by Luís Ferreira Pires, Slimane Hammoudi, and Bran Selic, 1:72–93. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-94764-8_4.","apa":"Geismann, J., Höttger, R., Krawczyk, L., Pohlmann, U., & Schmelter, D. (2018). Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems. In L. F. Pires, S. Hammoudi, & B. Selic (Eds.), Model-Driven Engineering and Software Development (Vol. 1, pp. 72–93). Springer International Publishing. https://doi.org/10.1007/978-3-319-94764-8_4","ama":"Geismann J, Höttger R, Krawczyk L, Pohlmann U, Schmelter D. Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems. In: Pires LF, Hammoudi S, Selic B, eds. Model-Driven Engineering and Software Development. Vol 1. Springer International Publishing; 2018:72-93. doi:10.1007/978-3-319-94764-8_4","mla":"Geismann, Johannes, et al. “Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” Model-Driven Engineering and Software Development, edited by Luís Ferreira Pires et al., vol. 1, Springer International Publishing, 2018, pp. 72–93, doi:10.1007/978-3-319-94764-8_4.","bibtex":"@inproceedings{Geismann_Höttger_Krawczyk_Pohlmann_Schmelter_2018, place={Cham}, title={Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-core Systems}, volume={1}, DOI={10.1007/978-3-319-94764-8_4}, booktitle={Model-Driven Engineering and Software Development}, publisher={Springer International Publishing}, author={Geismann, Johannes and Höttger, Robert and Krawczyk, Lukas and Pohlmann, Uwe and Schmelter, David}, editor={Pires, Luís Ferreira and Hammoudi, Slimane and Selic, Bran}, year={2018}, pages={72–93} }"},"year":"2018","page":"72-93"},{"language":[{"iso":"eng"}],"citation":{"ama":"Pohlmann U. A Model-Driven Software Construction Approach for Cyber-Physical Systems. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik; 2018.","apa":"Pohlmann, U. (2018). A Model-driven Software Construction Approach for Cyber-physical Systems. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik.","chicago":"Pohlmann, Uwe. A Model-Driven Software Construction Approach for Cyber-Physical Systems. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2018.","bibtex":"@book{Pohlmann_2018, title={A Model-driven Software Construction Approach for Cyber-physical Systems}, publisher={Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik}, author={Pohlmann, Uwe}, year={2018} }","mla":"Pohlmann, Uwe. A Model-Driven Software Construction Approach for Cyber-Physical Systems. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2018.","short":"U. Pohlmann, A Model-Driven Software Construction Approach for Cyber-Physical Systems, Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2018.","ieee":"U. Pohlmann, A Model-driven Software Construction Approach for Cyber-physical Systems. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2018."},"year":"2018","type":"dissertation","_id":"20789","date_updated":"2022-01-06T06:54:38Z","date_created":"2020-12-17T12:18:36Z","status":"public","department":[{"_id":"76"}],"author":[{"first_name":"Uwe","full_name":"Pohlmann, Uwe","last_name":"Pohlmann"}],"publisher":"Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik","user_id":"5786","title":"A Model-driven Software Construction Approach for Cyber-physical Systems"},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:01:34Z","doi":"10.1145/3236024.3236029","department":[{"_id":"77"},{"_id":"76"}],"project":[{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B4","_id":"12"},{"name":"SFB 901","_id":"1"}],"publication_identifier":{"isbn":["9781450355735"]},"publication_status":"published","title":"Do Android taint analysis tools keep their promises?","year":"2018","citation":{"short":"F. Pauck, E. Bodden, H. Wehrheim, in: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018, ACM Press, 2018.","ieee":"F. Pauck, E. Bodden, and H. Wehrheim, “Do Android taint analysis tools keep their promises?,” in Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018, 2018.","chicago":"Pauck, Felix, Eric Bodden, and Heike Wehrheim. “Do Android Taint Analysis Tools Keep Their Promises?” In Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018. ACM Press, 2018. https://doi.org/10.1145/3236024.3236029.","ama":"Pauck F, Bodden E, Wehrheim H. Do Android taint analysis tools keep their promises? In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018. ACM Press; 2018. doi:10.1145/3236024.3236029","apa":"Pauck, F., Bodden, E., & Wehrheim, H. (2018). Do Android taint analysis tools keep their promises? In Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018. ACM Press. https://doi.org/10.1145/3236024.3236029","mla":"Pauck, Felix, et al. “Do Android Taint Analysis Tools Keep Their Promises?” Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018, ACM Press, 2018, doi:10.1145/3236024.3236029.","bibtex":"@inproceedings{Pauck_Bodden_Wehrheim_2018, title={Do Android taint analysis tools keep their promises?}, DOI={10.1145/3236024.3236029}, booktitle={Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018}, publisher={ACM Press}, author={Pauck, Felix and Bodden, Eric and Wehrheim, Heike}, year={2018} }"},"type":"conference","_id":"4999","file":[{"file_id":"5251","creator":"ups","file_size":524169,"success":1,"relation":"main_file","content_type":"application/pdf","date_updated":"2018-11-02T13:37:38Z","file_name":"fse18main-id76-p.pdf","date_created":"2018-11-02T13:37:38Z","access_level":"closed"}],"publisher":"ACM Press","author":[{"id":"22398","last_name":"Pauck","full_name":"Pauck, Felix","first_name":"Felix"},{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"publication":"Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering - ESEC/FSE 2018","file_date_updated":"2018-11-02T13:37:38Z","has_accepted_license":"1","status":"public","date_created":"2018-10-30T08:03:17Z","user_id":"477","ddc":["004"]},{"date_updated":"2022-01-06T07:01:44Z","language":[{"iso":"eng"}],"title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"department":[{"_id":"76"}],"_id":"5203","page":"10:1-10:27","citation":{"short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, in: European Conference on Object-Oriented Programming (ECOOP), 2018, pp. 10:1-10:27.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” in European Conference on Object-Oriented Programming (ECOOP), 2018, pp. 10:1-10:27.","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” In European Conference on Object-Oriented Programming (ECOOP), 10:1-10:27, 2018.","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In: European Conference on Object-Oriented Programming (ECOOP). ; 2018:10:1-10:27.","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., & Mezini, M. (2018). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In European Conference on Object-Oriented Programming (ECOOP) (pp. 10:1-10:27).","bibtex":"@inproceedings{Krüger_Späth_Ali_Bodden_Mezini_2018, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2018}, pages={10:1-10:27} }","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” European Conference on Object-Oriented Programming (ECOOP), 2018, pp. 10:1-10:27."},"year":"2018","type":"conference","main_file_link":[{"url":"http://bodden.de/pubs/ksa+18crysl.pdf"}],"ddc":["000"],"user_id":"477","date_created":"2018-10-31T12:37:29Z","status":"public","has_accepted_license":"1","publication":"European Conference on Object-Oriented Programming (ECOOP)","file_date_updated":"2018-11-02T13:51:05Z","keyword":["ITSECWEBSITE","CROSSING"],"author":[{"last_name":"Krüger","first_name":"Stefan","full_name":"Krüger, Stefan"},{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"},{"last_name":"Ali","first_name":"Karim","full_name":"Ali, Karim"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"},{"full_name":"Mezini, Mira","first_name":"Mira","last_name":"Mezini"}],"file":[{"date_updated":"2018-11-02T13:51:05Z","content_type":"application/pdf","success":1,"relation":"main_file","file_size":747259,"file_id":"5255","creator":"ups","access_level":"closed","date_created":"2018-11-02T13:51:05Z","file_name":"ksa+18crysl.pdf"}]},{"_id":"1044","date_updated":"2022-01-06T06:50:39Z","supervisor":[{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"language":[{"iso":"eng"}],"year":"2018","citation":{"mla":"Leer, Richard. Measuring Performance of a Static Analysis Framework with an Application to Immutability Analysis. Universität Paderborn, 2018.","bibtex":"@book{Leer_2018, title={Measuring Performance of a Static Analysis Framework with an application to Immutability Analysis}, publisher={Universität Paderborn}, author={Leer, Richard}, year={2018} }","ama":"Leer R. Measuring Performance of a Static Analysis Framework with an Application to Immutability Analysis. Universität Paderborn; 2018.","apa":"Leer, R. (2018). Measuring Performance of a Static Analysis Framework with an application to Immutability Analysis. Universität Paderborn.","chicago":"Leer, Richard. Measuring Performance of a Static Analysis Framework with an Application to Immutability Analysis. Universität Paderborn, 2018.","ieee":"R. Leer, Measuring Performance of a Static Analysis Framework with an application to Immutability Analysis. Universität Paderborn, 2018.","short":"R. Leer, Measuring Performance of a Static Analysis Framework with an Application to Immutability Analysis, Universität Paderborn, 2018."},"type":"bachelorsthesis","user_id":"15504","ddc":["000"],"title":"Measuring Performance of a Static Analysis Framework with an application to Immutability Analysis","status":"public","has_accepted_license":"1","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"date_created":"2017-12-13T07:52:01Z","file":[{"access_level":"closed","file_name":"ba_leer.pdf","date_created":"2018-11-21T06:15:51Z","success":1,"relation":"main_file","date_updated":"2018-11-21T06:15:51Z","content_type":"application/pdf","file_id":"5768","creator":"florida","file_size":1383049}],"author":[{"first_name":"Richard","full_name":"Leer, Richard","last_name":"Leer"}],"publisher":"Universität Paderborn","file_date_updated":"2018-11-21T06:15:51Z","department":[{"_id":"76"}]},{"date_created":"2017-12-13T07:53:49Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"status":"public","has_accepted_license":"1","file_date_updated":"2018-11-21T06:14:15Z","department":[{"_id":"76"}],"publisher":"Universität Paderborn","author":[{"last_name":"Strüwer","full_name":"Strüwer, Jan Niclas","first_name":"Jan Niclas"}],"file":[{"relation":"main_file","success":1,"date_updated":"2018-11-21T06:14:15Z","content_type":"application/pdf","creator":"florida","file_id":"5767","file_size":15839765,"access_level":"closed","date_created":"2018-11-21T06:14:15Z","file_name":"ba_struewer.pdf"}],"title":"Interactive Data Visualization for Exploded Supergraphs","ddc":["000"],"user_id":"15504","citation":{"ieee":"J. N. Strüwer, Interactive Data Visualization for Exploded Supergraphs. Universität Paderborn, 2018.","short":"J.N. Strüwer, Interactive Data Visualization for Exploded Supergraphs, Universität Paderborn, 2018.","mla":"Strüwer, Jan Niclas. Interactive Data Visualization for Exploded Supergraphs. Universität Paderborn, 2018.","bibtex":"@book{Strüwer_2018, title={Interactive Data Visualization for Exploded Supergraphs}, publisher={Universität Paderborn}, author={Strüwer, Jan Niclas}, year={2018} }","chicago":"Strüwer, Jan Niclas. Interactive Data Visualization for Exploded Supergraphs. Universität Paderborn, 2018.","ama":"Strüwer JN. Interactive Data Visualization for Exploded Supergraphs. Universität Paderborn; 2018.","apa":"Strüwer, J. N. (2018). Interactive Data Visualization for Exploded Supergraphs. Universität Paderborn."},"type":"bachelorsthesis","year":"2018","supervisor":[{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"}],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:50:40Z","_id":"1045"},{"page":"1-24","year":"2017","citation":{"ama":"Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW, Engels G, Steffen E, eds. Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten. Springer Berlin Heidelberg; 2017:1-24. doi:10.1007/978-3-662-52903-4_8-1","apa":"Gerking, C., Bodden, E., & Schäfer, W. (2017). Industrial Security by Design. In G. W. Maier, G. Engels, & E. Steffen (Eds.), Handbuch Gestaltung digitaler und vernetzter Arbeitswelten (pp. 1–24). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-52903-4_8-1","chicago":"Gerking, Christopher, Eric Bodden, and Wilhelm Schäfer. “Industrial Security by Design.” In Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, edited by Günter W. Maier, Gregor Engels, and Eckhard Steffen, 1–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. https://doi.org/10.1007/978-3-662-52903-4_8-1.","bibtex":"@inbook{Gerking_Bodden_Schäfer_2017, place={Berlin, Heidelberg}, title={Industrial Security by Design}, DOI={10.1007/978-3-662-52903-4_8-1}, booktitle={Handbuch Gestaltung digitaler und vernetzter Arbeitswelten}, publisher={Springer Berlin Heidelberg}, author={Gerking, Christopher and Bodden, Eric and Schäfer, Wilhelm}, editor={Maier, Günter W. and Engels, Gregor and Steffen, Eckhard}, year={2017}, pages={1–24} }","mla":"Gerking, Christopher, et al. “Industrial Security by Design.” Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, edited by Günter W. Maier et al., Springer Berlin Heidelberg, 2017, pp. 1–24, doi:10.1007/978-3-662-52903-4_8-1.","short":"C. Gerking, E. Bodden, W. Schäfer, in: G.W. Maier, G. Engels, E. Steffen (Eds.), Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, Springer Berlin Heidelberg, Berlin, Heidelberg, 2017, pp. 1–24.","ieee":"C. Gerking, E. Bodden, and W. Schäfer, “Industrial Security by Design,” in Handbuch Gestaltung digitaler und vernetzter Arbeitswelten, G. W. Maier, G. Engels, and E. Steffen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017, pp. 1–24."},"type":"book_chapter","_id":"20552","date_created":"2020-11-30T09:56:23Z","status":"public","keyword":["ITSECWEBSITE"],"publication":"Handbuch Gestaltung digitaler und vernetzter Arbeitswelten","publisher":"Springer Berlin Heidelberg","author":[{"last_name":"Gerking","first_name":"Christopher","full_name":"Gerking, Christopher"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"},{"last_name":"Schäfer","first_name":"Wilhelm","full_name":"Schäfer, Wilhelm"}],"user_id":"5786","abstract":[{"lang":"eng","text":"Das Zukunftsszenario der Industrie 4.0 ist gepr{\\\"a}gt durch einen massiven Anstieg der unternehmens{\\\"u}bergreifenden Vernetzung. Um einer Bedrohung durch unautorisierte Weitergabe oder Sabotage vertraulicher Daten entgegenzuwirken, muss der Informationssicherheit bereits im Entwurf der cyber-physischen Produktionssysteme ein hoher Stellenwert einger{\\\"a}umt werden. Dieses Paradigma wird als Security by Design bezeichnet. {\\\"U}ber den gesamten Entstehungsprozess hinweg muss nachverfolgt werden k{\\\"o}nnen, ob die Systeme spezifische Anforderungen an die Informationssicherheit erf{\\\"u}llen und damit die Eigenschaft der Industrial Security gew{\\\"a}hrleisten. Dieser Beitrag stellt einen Entwurfsansatz zur Nachverfolgung der Informationssicherheit vor, der durch Integration softwaretechnischer Methoden in das Systems Engineering eine Entwicklung nach dem Paradigma Security by Design erm{\\\"o}glicht."}],"language":[{"iso":"eng"}],"doi":"10.1007/978-3-662-52903-4_8-1","date_updated":"2022-01-06T06:54:29Z","publication_identifier":{"isbn":["978-3-662-52903-4"]},"editor":[{"last_name":"Maier","first_name":"Günter W.","full_name":"Maier, Günter W."},{"full_name":"Engels, Gregor","first_name":"Gregor","last_name":"Engels"},{"last_name":"Steffen","first_name":"Eckhard","full_name":"Steffen, Eckhard"}],"department":[{"_id":"76"}],"title":"Industrial Security by Design","place":"Berlin, Heidelberg"},{"related_material":{"link":[{"url":"http://bodden.de/pubs/bcb17time.pdf","relation":"confirmation"}]},"title":"Time for Addressing Software Security Issues: Prediction Models and Impacting Factors","department":[{"_id":"76"}],"publication_identifier":{"issn":["2364-1541"]},"date_updated":"2022-01-06T06:54:29Z","doi":"https://doi.org/10.1007/s41019-016-0019-8","language":[{"iso":"eng"}],"abstract":[{"text":"Finding and fixing software vulnerabilities have become a major struggle for most software development companies. While generally without alternative, such fixing efforts are a major cost factor, which is why companies have a vital interest in focusing their secure software development activities such that they obtain an optimal return on this investment. We investigate, in this paper, quantitatively the major factors that impact the time it takes to fix a given security issue based on data collected automatically within SAP's secure development process, and we show how the issue fix time could be used to monitor the fixing process. We use three machine learning methods and evaluate their predictive power in predicting the time to fix issues. Interestingly, the models indicate that vulnerability type has less dominant impact on issue fix time than previously believed. The time it takes to fix an issue instead seems much more related to the component in which the potential vulnerability resides, the project related to the issue, the development groups that address the issue, and the closeness of the software release date. This indicates that the software structure, the fixing processes, and the development groups are the dominant factors that impact the time spent to address security issues. SAP can use the models to implement a continuous improvement of its secure software development process and to measure the impact of individual improvements. The development teams at SAP develop different types of software, adopt different internal development processes, use different programming languages and platforms, and are located in different cities and countries. Other organizations, may use the results---with precaution---and be learning organizations.","lang":"eng"}],"user_id":"5786","publication":"Data Science and Engineering","author":[{"first_name":"Lotfi","full_name":"Ben Othmane, Lotfi","last_name":"Ben Othmane"},{"last_name":"Chehrazi","full_name":"Chehrazi, Golriz","first_name":"Golriz"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"},{"last_name":"Tsalovski","first_name":"Petar","full_name":"Tsalovski, Petar"},{"last_name":"Brucker","first_name":"Achim D.","full_name":"Brucker, Achim D."}],"date_created":"2020-11-30T10:24:50Z","status":"public","volume":2,"_id":"20553","intvolume":" 2","issue":"2","page":"107-124","citation":{"apa":"Ben Othmane, L., Chehrazi, G., Bodden, E., Tsalovski, P., & Brucker, A. D. (2017). Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Data Science and Engineering, 2(2), 107–124. https://doi.org/10.1007/s41019-016-0019-8","ama":"Ben Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker AD. Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Data Science and Engineering. 2017;2(2):107-124. doi:https://doi.org/10.1007/s41019-016-0019-8","chicago":"Ben Othmane, Lotfi, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, and Achim D. Brucker. “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.” Data Science and Engineering 2, no. 2 (2017): 107–24. https://doi.org/10.1007/s41019-016-0019-8.","bibtex":"@article{Ben Othmane_Chehrazi_Bodden_Tsalovski_Brucker_2017, title={Time for Addressing Software Security Issues: Prediction Models and Impacting Factors}, volume={2}, DOI={https://doi.org/10.1007/s41019-016-0019-8}, number={2}, journal={Data Science and Engineering}, author={Ben Othmane, Lotfi and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim D.}, year={2017}, pages={107–124} }","mla":"Ben Othmane, Lotfi, et al. “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.” Data Science and Engineering, vol. 2, no. 2, 2017, pp. 107–24, doi:https://doi.org/10.1007/s41019-016-0019-8.","short":"L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, A.D. Brucker, Data Science and Engineering 2 (2017) 107–124.","ieee":"L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, and A. D. Brucker, “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors,” Data Science and Engineering, vol. 2, no. 2, pp. 107–124, 2017, doi: https://doi.org/10.1007/s41019-016-0019-8."},"type":"journal_article","year":"2017"},{"department":[{"_id":"76"}],"author":[{"orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric","id":"59256","last_name":"Bodden"}],"date_created":"2020-11-30T10:27:21Z","status":"public","user_id":"5786","title":"Self-adaptive static analysis","main_file_link":[{"url":"https://arxiv.org/abs/1710.07430"}],"report_number":"arXiv:1710.07430","language":[{"iso":"eng"}],"citation":{"short":"E. Bodden, Self-Adaptive Static Analysis, 2017.","ieee":"E. Bodden, Self-adaptive static analysis. 2017.","apa":"Bodden, E. (2017). Self-adaptive static analysis.","ama":"Bodden E. Self-Adaptive Static Analysis.; 2017.","chicago":"Bodden, Eric. Self-Adaptive Static Analysis, 2017.","bibtex":"@book{Bodden_2017, title={Self-adaptive static analysis}, author={Bodden, Eric}, year={2017} }","mla":"Bodden, Eric. Self-Adaptive Static Analysis. 2017."},"year":"2017","type":"report","_id":"20554","date_updated":"2022-01-06T06:54:29Z"},{"language":[{"iso":"eng"}],"type":"report","year":"2017","citation":{"chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. CrySL: Validating Correct Usage of Cryptographic APIs, 2017.","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., & Mezini, M. (2017). CrySL: Validating Correct Usage of Cryptographic APIs.","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: Validating Correct Usage of Cryptographic APIs.; 2017.","mla":"Krüger, Stefan, et al. CrySL: Validating Correct Usage of Cryptographic APIs. 2017.","bibtex":"@book{Krüger_Späth_Ali_Bodden_Mezini_2017, title={CrySL: Validating Correct Usage of Cryptographic APIs}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2017} }","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, CrySL: Validating Correct Usage of Cryptographic APIs, 2017.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, CrySL: Validating Correct Usage of Cryptographic APIs. 2017."},"page":"arXiv:1710.00564","main_file_link":[{"url":"https://arxiv.org/abs/1710.00564"}],"_id":"20555","date_updated":"2022-01-06T06:54:29Z","status":"public","date_created":"2020-11-30T10:29:41Z","author":[{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"},{"full_name":"Mezini, Mira","first_name":"Mira","last_name":"Mezini"}],"keyword":["ITSECWEBSITE"],"department":[{"_id":"76"}],"user_id":"5786","title":"CrySL: Validating Correct Usage of Cryptographic APIs"},{"user_id":"5786","title":"Tracking Load-time Configuration Options","date_created":"2020-11-30T11:06:43Z","status":"public","publication_identifier":{"issn":["0098-5589"]},"volume":"PP","publication":"IEEE Transactions on Software Engineering","keyword":["Androids","Bluetooth","Humanoid robots","Java","Software","Tools","Configuration options","Static analysis","Variability mining"],"department":[{"_id":"76"}],"author":[{"last_name":"Lillack","first_name":"Max","full_name":"Lillack, Max"},{"first_name":"Christian","full_name":"Kästner, Christian","last_name":"Kästner"},{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"issue":"99","doi":"10.1109/TSE.2017.2756048","date_updated":"2022-01-06T06:54:30Z","_id":"20557","language":[{"iso":"eng"}],"page":"1-1","type":"journal_article","citation":{"short":"M. Lillack, C. Kästner, E. Bodden, IEEE Transactions on Software Engineering PP (2017) 1–1.","ieee":"M. Lillack, C. Kästner, and E. Bodden, “Tracking Load-time Configuration Options,” IEEE Transactions on Software Engineering, vol. PP, no. 99, pp. 1–1, 2017, doi: 10.1109/TSE.2017.2756048.","chicago":"Lillack, Max, Christian Kästner, and Eric Bodden. “Tracking Load-Time Configuration Options.” IEEE Transactions on Software Engineering PP, no. 99 (2017): 1–1. https://doi.org/10.1109/TSE.2017.2756048.","ama":"Lillack M, Kästner C, Bodden E. Tracking Load-time Configuration Options. IEEE Transactions on Software Engineering. 2017;PP(99):1-1. doi:10.1109/TSE.2017.2756048","apa":"Lillack, M., Kästner, C., & Bodden, E. (2017). Tracking Load-time Configuration Options. IEEE Transactions on Software Engineering, PP(99), 1–1. https://doi.org/10.1109/TSE.2017.2756048","bibtex":"@article{Lillack_Kästner_Bodden_2017, title={Tracking Load-time Configuration Options}, volume={PP}, DOI={10.1109/TSE.2017.2756048}, number={99}, journal={IEEE Transactions on Software Engineering}, author={Lillack, Max and Kästner, Christian and Bodden, Eric}, year={2017}, pages={1–1} }","mla":"Lillack, Max, et al. “Tracking Load-Time Configuration Options.” IEEE Transactions on Software Engineering, vol. PP, no. 99, 2017, pp. 1–1, doi:10.1109/TSE.2017.2756048."},"year":"2017","main_file_link":[{"url":"http://bodden.de/pubs/lkb17lotrack.pdf"}]},{"_id":"20558","date_updated":"2022-01-06T06:54:30Z","main_file_link":[{"url":"http://bodden.de/pubs/knr+17cognicrypt.pdf"}],"year":"2017","citation":{"short":"S. Krüger, S. Nadi, M. Reif, K. Ali, M. Mezini, E. Bodden, F. Göpfert, F. Günther, C. Weinert, D. Demmler, R. Kamath, in: International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track, 2017.","ieee":"S. Krüger et al., “CogniCrypt: Supporting Developers in using Cryptography,” 2017.","ama":"Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using Cryptography. In: International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track. ; 2017.","apa":"Krüger, S., Nadi, S., Reif, M., Ali, K., Mezini, M., Bodden, E., Göpfert, F., Günther, F., Weinert, C., Demmler, D., & Kamath, R. (2017). CogniCrypt: Supporting Developers in using Cryptography. International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track.","chicago":"Krüger, Stefan, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” In International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track, 2017.","bibtex":"@inproceedings{Krüger_Nadi_Reif_Ali_Mezini_Bodden_Göpfert_Günther_Weinert_Demmler_et al._2017, title={CogniCrypt: Supporting Developers in using Cryptography}, booktitle={International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track}, author={Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and et al.}, year={2017} }","mla":"Krüger, Stefan, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track, 2017."},"type":"conference","language":[{"iso":"eng"}],"title":"CogniCrypt: Supporting Developers in using Cryptography","user_id":"5786","author":[{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"},{"last_name":"Nadi","full_name":"Nadi, Sarah","first_name":"Sarah"},{"full_name":"Reif, Michael","first_name":"Michael","last_name":"Reif"},{"last_name":"Ali","first_name":"Karim","full_name":"Ali, Karim"},{"full_name":"Mezini, Mira","first_name":"Mira","last_name":"Mezini"},{"first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256"},{"last_name":"Göpfert","first_name":"Florian","full_name":"Göpfert, Florian"},{"first_name":"Felix","full_name":"Günther, Felix","last_name":"Günther"},{"last_name":"Weinert","first_name":"Christian","full_name":"Weinert, Christian"},{"last_name":"Demmler","first_name":"Daniel","full_name":"Demmler, Daniel"},{"last_name":"Kamath","full_name":"Kamath, Ram","first_name":"Ram"}],"publication":"International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track","keyword":["ITSECWEBSITE","CROSSING"],"department":[{"_id":"76"}],"status":"public","date_created":"2020-11-30T11:08:26Z"},{"department":[{"_id":"76"}],"publication_identifier":{"isbn":["978-1-4503-5076-1"]},"place":"New York, NY, USA","title":"Just-in-time Static Analysis","series_title":"ISSTA 2017","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:30Z","doi":"10.1145/3092703.3092705","publisher":"ACM","author":[{"full_name":"Do, Lisa Nguyen Quang","first_name":"Lisa Nguyen Quang","last_name":"Do"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"last_name":"Livshits","first_name":"Benjamin","full_name":"Livshits, Benjamin"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"},{"full_name":"Smith, Justin","first_name":"Justin","last_name":"Smith"},{"last_name":"Murphy-Hill","first_name":"Emerson","full_name":"Murphy-Hill, Emerson"}],"keyword":["Just-in-Time","Layered analysis","Static analysis"],"publication":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis","status":"public","date_created":"2020-11-30T11:10:01Z","user_id":"5786","main_file_link":[{"url":"http://bodden.de/pubs/nal+17jit.pdf"}],"type":"conference","citation":{"mla":"Do, Lisa Nguyen Quang, et al. “Just-in-Time Static Analysis.” Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, 2017, pp. 307–17, doi:10.1145/3092703.3092705.","bibtex":"@inproceedings{Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, place={New York, NY, USA}, series={ISSTA 2017}, title={Just-in-time Static Analysis}, DOI={10.1145/3092703.3092705}, booktitle={Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis}, publisher={ACM}, author={Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017}, pages={307–317}, collection={ISSTA 2017} }","ama":"Do LNQ, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Just-in-time Static Analysis. In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis. ISSTA 2017. ACM; 2017:307-317. doi:10.1145/3092703.3092705","apa":"Do, L. N. Q., Ali, K., Livshits, B., Bodden, E., Smith, J., & Murphy-Hill, E. (2017). Just-in-time Static Analysis. Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, 307–317. https://doi.org/10.1145/3092703.3092705","chicago":"Do, Lisa Nguyen Quang, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Just-in-Time Static Analysis.” In Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, 307–17. ISSTA 2017. New York, NY, USA: ACM, 2017. https://doi.org/10.1145/3092703.3092705.","ieee":"L. N. Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, “Just-in-time Static Analysis,” in Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2017, pp. 307–317, doi: 10.1145/3092703.3092705.","short":"L.N.Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, New York, NY, USA, 2017, pp. 307–317."},"year":"2017","page":"307-317","_id":"20559"},{"department":[{"_id":"76"}],"keyword":["ATTRACT","ITSECWEBSITE"],"publication":"International Conference for Software Engineering (ICSE), Tool Demonstrations Track","author":[{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"last_name":"Ali","first_name":"Karim","full_name":"Ali, Karim"},{"first_name":"Benjamin","full_name":"Livshits, Benjamin","last_name":"Livshits"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"},{"full_name":"Smith, Justin","first_name":"Justin","last_name":"Smith"},{"last_name":"Murphy-Hill","full_name":"Murphy-Hill, Emerson","first_name":"Emerson"}],"date_created":"2020-12-14T11:51:44Z","status":"public","user_id":"5786","title":"Cheetah: Just-in-Time Taint Analysis for Android Apps","main_file_link":[{"url":"http://bodden.de/pubs/dal17cheetah.pdf"}],"language":[{"iso":"eng"}],"citation":{"apa":"Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., & Murphy-Hill, E. (2017). Cheetah: Just-in-Time Taint Analysis for Android Apps. International Conference for Software Engineering (ICSE), Tool Demonstrations Track.","ama":"Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Cheetah: Just-in-Time Taint Analysis for Android Apps. In: International Conference for Software Engineering (ICSE), Tool Demonstrations Track. ; 2017.","chicago":"Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” In International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2017.","mla":"Nguyen Quang Do, Lisa, et al. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2017.","bibtex":"@inproceedings{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, title={Cheetah: Just-in-Time Taint Analysis for Android Apps}, booktitle={International Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017} }","short":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in: International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2017.","ieee":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, “Cheetah: Just-in-Time Taint Analysis for Android Apps,” 2017."},"year":"2017","type":"conference","date_updated":"2022-01-06T06:54:34Z","_id":"20715"},{"place":"Changsha","title":"How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach","user_id":"5786","publisher":"Springer","author":[{"last_name":"Schivo","full_name":"Schivo, Stefano","first_name":"Stefano"},{"last_name":"Yildiz.","full_name":"Yildiz., Bugra M.","first_name":"Bugra M."},{"last_name":"Ruijters","full_name":"Ruijters, Enno","first_name":"Enno"},{"last_name":"Gerking","full_name":"Gerking, Christopher","first_name":"Christopher"},{"first_name":"Rajesh","full_name":"Kumar, Rajesh","last_name":"Kumar"},{"last_name":"Dziwok","id":"3901","first_name":"Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","full_name":"Dziwok, Stefan"},{"last_name":"Rensink","full_name":"Rensink, Arend","first_name":"Arend"},{"first_name":"Mariëlle","full_name":"Stoelinga, Mariëlle","last_name":"Stoelinga"}],"publication":"Dependable Software Engineering, 3rd International Symposium (SETTA 2017)","department":[{"_id":"76"},{"_id":"241"}],"editor":[{"full_name":"Larsen, Kim G.","first_name":"Kim G.","last_name":"Larsen"},{"last_name":"Sokolsky","full_name":"Sokolsky, Oleg","first_name":"Oleg"},{"full_name":"Wang, Ji","first_name":"Ji","last_name":"Wang"}],"status":"public","date_created":"2020-12-17T13:30:15Z","_id":"20792","date_updated":"2022-01-06T06:54:38Z","doi":"10.1007/978-3-319-69483-2_19","issue":"10606","series_title":"Lecture Notes in Computer Science","type":"conference","citation":{"ama":"Schivo S, Yildiz. BM, Ruijters E, et al. How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In: Larsen KG, Sokolsky O, Wang J, eds. Dependable Software Engineering, 3rd International Symposium (SETTA 2017). Lecture Notes in Computer Science. Springer; 2017:319-336. doi:10.1007/978-3-319-69483-2_19","apa":"Schivo, S., Yildiz., B. M., Ruijters, E., Gerking, C., Kumar, R., Dziwok, S., Rensink, A., & Stoelinga, M. (2017). How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In K. G. Larsen, O. Sokolsky, & J. Wang (Eds.), Dependable Software Engineering, 3rd International Symposium (SETTA 2017) (Issue 10606, pp. 319–336). Springer. https://doi.org/10.1007/978-3-319-69483-2_19","chicago":"Schivo, Stefano, Bugra M. Yildiz., Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, and Mariëlle Stoelinga. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” In Dependable Software Engineering, 3rd International Symposium (SETTA 2017), edited by Kim G. Larsen, Oleg Sokolsky, and Ji Wang, 319–36. Lecture Notes in Computer Science. Changsha: Springer, 2017. https://doi.org/10.1007/978-3-319-69483-2_19.","bibtex":"@inproceedings{Schivo_Yildiz._Ruijters_Gerking_Kumar_Dziwok_Rensink_Stoelinga_2017, place={Changsha}, series={Lecture Notes in Computer Science}, title={How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach}, DOI={10.1007/978-3-319-69483-2_19}, number={10606}, booktitle={Dependable Software Engineering, 3rd International Symposium (SETTA 2017)}, publisher={Springer}, author={Schivo, Stefano and Yildiz., Bugra M. and Ruijters, Enno and Gerking, Christopher and Kumar, Rajesh and Dziwok, Stefan and Rensink, Arend and Stoelinga, Mariëlle}, editor={Larsen, Kim G. and Sokolsky, Oleg and Wang, Ji}, year={2017}, pages={319–336}, collection={Lecture Notes in Computer Science} }","mla":"Schivo, Stefano, et al. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” Dependable Software Engineering, 3rd International Symposium (SETTA 2017), edited by Kim G. Larsen et al., no. 10606, Springer, 2017, pp. 319–36, doi:10.1007/978-3-319-69483-2_19.","short":"S. Schivo, B.M. Yildiz., E. Ruijters, C. Gerking, R. Kumar, S. Dziwok, A. Rensink, M. Stoelinga, in: K.G. Larsen, O. Sokolsky, J. Wang (Eds.), Dependable Software Engineering, 3rd International Symposium (SETTA 2017), Springer, Changsha, 2017, pp. 319–336.","ieee":"S. Schivo et al., “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach,” in Dependable Software Engineering, 3rd International Symposium (SETTA 2017), 2017, no. 10606, pp. 319–336, doi: 10.1007/978-3-319-69483-2_19."},"year":"2017","page":"319-336","language":[{"iso":"eng"}]},{"title":"Specification and Verification for Real-Time Coordination Protocols of Cyber-physical Systems","user_id":"5786","abstract":[{"text":"Cyber-physische Systeme (CPSs) sind die nächste Generation von eingebetteten Systemen, die fortwährend ihre Zusammenarbeit koordinieren, um anspruchsvolle Funktionen zu erfüllen. Die Koordination zwischen ihnen kann in Software mittels asynchroner Nachrichtenkommunikation realisiert werden. Um die funktionale Korrektheit der Software zu gewährleisten, ist aufgrund der Kritikalität dieser Systeme eine formale Verifikation wie z.B. Model Checking notwendig. Die Eingabesprache eines Model Checkers unterstützt jedoch domänenspezifische Aspekte wie asynchrone Kommunikation nicht direkt, wodurch diese vom Softwareingenieur mittels zahlreicher Modellelemente spezifiziert werden müssen. Dies ist hochgradig komplex und somit fehleranfällig. Im Rahmen dieser Arbeit wird eine modellgetriebene Methode zur domänenspezifischen Spezifikation und vollautomatischen Verifikation der nachrichtenbasierten Koordination von CPSs präsentiert. Mit Hilfe dieser Methode kann der Softwareingenieur die Koordination kompakt modellieren und muss nicht länger verstehen, wie seine Spezifikation auf der Ebene des Model Checkers ausgedrückt wird. Insgesamt wird die Komplexität für den Softwareingenieur somit deutlich handhabbarer. Bezüglich der Spezifikation einer solchen Koordination definiert die Arbeit eine domänenspezifische Sprache namens Real-Time Coordination Protocols (RTCPs). Darüber hinaus wird eine domänenspezifische Sprache zur Spezifikation von Verifikationseigenschaften eingeführt und Entwurfsmuster für RTCPs präsentiert, um die Anzahl der Modellierungsfehler zu senken.","lang":"eng"}],"status":"public","date_created":"2020-12-17T13:32:52Z","publisher":"Paderborn University","author":[{"id":"3901","last_name":"Dziwok","orcid":"http://orcid.org/0000-0002-8679-6673","full_name":"Dziwok, Stefan","first_name":"Stefan"}],"department":[{"_id":"76"},{"_id":"241"}],"_id":"20794","date_updated":"2022-01-06T06:54:38Z","citation":{"chicago":"Dziwok, Stefan. Specification and Verification for Real-Time Coordination Protocols of Cyber-Physical Systems. Paderborn University, 2017.","apa":"Dziwok, S. (2017). Specification and Verification for Real-Time Coordination Protocols of Cyber-physical Systems. Paderborn University.","ama":"Dziwok S. Specification and Verification for Real-Time Coordination Protocols of Cyber-Physical Systems. Paderborn University; 2017.","mla":"Dziwok, Stefan. Specification and Verification for Real-Time Coordination Protocols of Cyber-Physical Systems. Paderborn University, 2017.","bibtex":"@book{Dziwok_2017, title={Specification and Verification for Real-Time Coordination Protocols of Cyber-physical Systems}, publisher={Paderborn University}, author={Dziwok, Stefan}, year={2017} }","short":"S. Dziwok, Specification and Verification for Real-Time Coordination Protocols of Cyber-Physical Systems, Paderborn University, 2017.","ieee":"S. Dziwok, Specification and Verification for Real-Time Coordination Protocols of Cyber-physical Systems. Paderborn University, 2017."},"year":"2017","type":"dissertation","language":[{"iso":"eng"}]},{"user_id":"5786","title":"Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities","place":"Marburg","date_created":"2020-12-17T13:36:44Z","status":"public","editor":[{"first_name":"Esther","full_name":"Guerra, Esther","last_name":"Guerra"},{"full_name":"van den Brand, Mark","first_name":"Mark","last_name":"van den Brand"}],"department":[{"_id":"76"},{"_id":"241"}],"publication":"Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017)","publisher":"Springer","author":[{"full_name":"Gerking, Christopher","first_name":"Christopher","last_name":"Gerking"},{"full_name":"Schubert, David","first_name":"David","id":"9106","last_name":"Schubert"},{"first_name":"Ingo","orcid":"https://orcid.org/0000-0003-0124-6291","full_name":"Budde, Ingo","last_name":"Budde","id":"13693"}],"issue":"10374","date_updated":"2022-01-06T06:54:39Z","_id":"20797","language":[{"iso":"eng"}],"page":"19-34","year":"2017","citation":{"mla":"Gerking, Christopher, et al. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017), edited by Esther Guerra and Mark van den Brand, no. 10374, Springer, 2017, pp. 19–34.","bibtex":"@inproceedings{Gerking_Schubert_Budde_2017, place={Marburg}, series={Lecture Notes in Computer Science}, title={Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities}, number={10374}, booktitle={Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017)}, publisher={Springer}, author={Gerking, Christopher and Schubert, David and Budde, Ingo}, editor={Guerra, Esther and van den Brand, Mark}, year={2017}, pages={19–34}, collection={Lecture Notes in Computer Science} }","chicago":"Gerking, Christopher, David Schubert, and Ingo Budde. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” In Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017), edited by Esther Guerra and Mark van den Brand, 19–34. Lecture Notes in Computer Science. Marburg: Springer, 2017.","ama":"Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities. In: Guerra E, van den Brand M, eds. Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017). Lecture Notes in Computer Science. Springer; 2017:19-34.","apa":"Gerking, C., Schubert, D., & Budde, I. (2017). Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities. In E. Guerra & M. van den Brand (Eds.), Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017) (Issue 10374, pp. 19–34). Springer.","ieee":"C. Gerking, D. Schubert, and I. Budde, “Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities,” in Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017), 2017, no. 10374, pp. 19–34.","short":"C. Gerking, D. Schubert, I. Budde, in: E. Guerra, M. van den Brand (Eds.), Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017), Springer, Marburg, 2017, pp. 19–34."},"type":"conference","series_title":"Lecture Notes in Computer Science","main_file_link":[{"url":"https://link.springer.com/chapter/10.1007/978-3-319-61473-1_2"}]},{"title":"Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems","user_id":"5786","abstract":[{"text":"Modern Cyber-physical Systems are executed in physical environments and distributed over several Electronic Control Units using multiple cores for execution. These systems perform safety-critical tasks and, therefore, have to fulfill hard real-time requirements. To face these requirements systematically, system engineers de- velop these systems model-driven and prove the fulfillment of these requirements via model checking. It is important to ensure that the runtime scheduling does not violate the verified requirements by neglecting the model checking assumptions. Currently, there is a gap in the process for model-driven approaches to derive a feasible runtime scheduling that respects these assumptions. In this paper, we present an approach for a semi- automatic synthesis of behavioral models into a deterministic scheduling that respects real-time requirements at runtime. We evaluate our approach using an example of a distributed automotive system with hard real-time requirements specified with the MechatronicUML method.","lang":"eng"}],"date_created":"2020-12-17T13:59:04Z","status":"public","publication":"Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"author":[{"first_name":"Johannes","full_name":"Geismann, Johannes","orcid":"https://orcid.org/0000-0003-2015-2047","last_name":"Geismann","id":"20063"},{"last_name":"Pohlmann","first_name":"Uwe","full_name":"Pohlmann, Uwe"},{"first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David","last_name":"Schmelter","id":"40982"}],"_id":"20804","date_updated":"2022-01-06T06:54:39Z","citation":{"short":"J. Geismann, U. Pohlmann, D. Schmelter, in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017.","ieee":"J. Geismann, U. Pohlmann, and D. Schmelter, “Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems,” 2017.","apa":"Geismann, J., Pohlmann, U., & Schmelter, D. (2017). Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems. Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development.","ama":"Geismann J, Pohlmann U, Schmelter D. Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems. In: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development. ; 2017.","chicago":"Geismann, Johannes, Uwe Pohlmann, and David Schmelter. “Towards an Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” In Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017.","bibtex":"@inproceedings{Geismann_Pohlmann_Schmelter_2017, title={Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems}, booktitle={Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development}, author={Geismann, Johannes and Pohlmann, Uwe and Schmelter, David}, year={2017} }","mla":"Geismann, Johannes, et al. “Towards an Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017."},"year":"2017","type":"conference","language":[{"iso":"eng"}]},{"title":"Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction","user_id":"5786","department":[{"_id":"76"}],"author":[{"last_name":"Becker","full_name":"Becker, Matthias","first_name":"Matthias"}],"publisher":"Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik","date_created":"2020-12-17T14:00:21Z","status":"public","date_updated":"2022-01-06T06:54:39Z","_id":"20805","type":"dissertation","citation":{"ama":"Becker M. Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik; 2017.","apa":"Becker, M. (2017). Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik.","chicago":"Becker, Matthias. Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2017.","bibtex":"@book{Becker_2017, title={Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction}, publisher={Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik}, author={Becker, Matthias}, year={2017} }","mla":"Becker, Matthias. Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2017.","short":"M. Becker, Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction, Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2017.","ieee":"M. Becker, Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2017."},"year":"2017","language":[{"iso":"eng"}]},{"date_created":"2018-10-31T12:46:50Z","has_accepted_license":"1","status":"public","file_date_updated":"2018-11-02T14:28:13Z","publication":"2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)","keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"publisher":"ACM Press","author":[{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"full_name":"Ali, Karim","first_name":"Karim","last_name":"Ali"},{"last_name":"Bodden","id":"59256","first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647"}],"file":[{"access_level":"closed","date_created":"2018-11-02T14:28:13Z","file_name":"sab17ideal.pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T14:28:13Z","content_type":"application/pdf","creator":"ups","file_id":"5273","file_size":1021251}],"ddc":["000"],"user_id":"477","type":"conference","year":"2017","citation":{"ieee":"J. Späth, K. Ali, and E. Bodden, “IDEal: Efficient and Precise Alias-aware Dataflow Analysis,” in 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), 2017.","short":"J. Späth, K. Ali, E. Bodden, in: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017.","bibtex":"@inproceedings{Späth_Ali_Bodden_2017, title={IDEal: Efficient and Precise Alias-aware Dataflow Analysis}, booktitle={2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)}, publisher={ACM Press}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2017} }","mla":"Späth, Johannes, et al. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017.","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” In 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH). ACM Press, 2017.","ama":"Späth J, Ali K, Bodden E. IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH). ACM Press; 2017.","apa":"Späth, J., Ali, K., & Bodden, E. (2017). IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH). ACM Press."},"main_file_link":[{"url":" http://bodden.de/pubs/sab17ideal.pdf"}],"_id":"5204","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"department":[{"_id":"76"}],"title":"IDEal: Efficient and Precise Alias-aware Dataflow Analysis","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:01:44Z"},{"_id":"5209","date_updated":"2022-01-06T07:01:46Z","year":"2017","type":"journal_article","citation":{"ieee":"A. Fischer, B. Fuhry, F. Kerschbaum, and E. Bodden, “Computation on Encrypted Data using Data Flow Authentication,” CoRR, vol. abs/1710.00390, 2017.","short":"A. Fischer, B. Fuhry, F. Kerschbaum, E. Bodden, CoRR abs/1710.00390 (2017).","bibtex":"@article{Fischer_Fuhry_Kerschbaum_Bodden_2017, title={Computation on Encrypted Data using Data Flow Authentication}, volume={abs/1710.00390}, journal={CoRR}, author={Fischer, Andreas and Fuhry, Benny and Kerschbaum, Florian and Bodden, Eric}, year={2017} }","mla":"Fischer, Andreas, et al. “Computation on Encrypted Data Using Data Flow Authentication.” CoRR, vol. abs/1710.00390, 2017.","chicago":"Fischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. “Computation on Encrypted Data Using Data Flow Authentication.” CoRR abs/1710.00390 (2017).","ama":"Fischer A, Fuhry B, Kerschbaum F, Bodden E. Computation on Encrypted Data using Data Flow Authentication. CoRR. 2017;abs/1710.00390.","apa":"Fischer, A., Fuhry, B., Kerschbaum, F., & Bodden, E. (2017). Computation on Encrypted Data using Data Flow Authentication. CoRR, abs/1710.00390."},"language":[{"iso":"eng"}],"main_file_link":[{"url":"https://arxiv.org/pdf/1710.00390.pdf"}],"ddc":["000"],"title":"Computation on Encrypted Data using Data Flow Authentication","user_id":"477","volume":"abs/1710.00390","has_accepted_license":"1","status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"date_created":"2018-10-31T13:12:32Z","author":[{"last_name":"Fischer","first_name":"Andreas","full_name":"Fischer, Andreas"},{"full_name":"Fuhry, Benny","first_name":"Benny","last_name":"Fuhry"},{"first_name":"Florian","full_name":"Kerschbaum, Florian","last_name":"Kerschbaum"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"}],"file_date_updated":"2018-11-02T16:03:01Z","publication":"CoRR","department":[{"_id":"76"}],"file":[{"file_name":"1710.00390.pdf","date_created":"2018-11-02T16:03:01Z","access_level":"closed","file_size":2339380,"file_id":"5321","creator":"ups","date_updated":"2018-11-02T16:03:01Z","content_type":"application/pdf","success":1,"relation":"main_file"}]},{"doi":"10.17619/UNIPB/1-133","_id":"102","date_updated":"2022-01-06T06:50:31Z","type":"dissertation","year":"2017","citation":{"bibtex":"@book{Becker_2017, title={Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction}, DOI={10.17619/UNIPB/1-133}, publisher={Universität Paderborn}, author={Becker, Matthias}, year={2017} }","mla":"Becker, Matthias. Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction. Universität Paderborn, 2017, doi:10.17619/UNIPB/1-133.","chicago":"Becker, Matthias. Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction. Universität Paderborn, 2017. https://doi.org/10.17619/UNIPB/1-133.","ama":"Becker M. Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction. Universität Paderborn; 2017. doi:10.17619/UNIPB/1-133","apa":"Becker, M. (2017). Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction. Universität Paderborn. https://doi.org/10.17619/UNIPB/1-133","ieee":"M. Becker, Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction. Universität Paderborn, 2017.","short":"M. Becker, Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction, Universität Paderborn, 2017."},"supervisor":[{"full_name":"Becker, Steffen","first_name":"Steffen","last_name":"Becker"}],"title":"Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction","user_id":"477","status":"public","date_created":"2017-10-17T12:41:11Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"11","name":"SFB 901 - Subprojekt B3"},{"name":"SFB 901 - Project Area B","_id":"3"}],"publisher":"Universität Paderborn","author":[{"last_name":"Becker","full_name":"Becker, Matthias","first_name":"Matthias"}],"department":[{"_id":"76"}]},{"date_updated":"2022-01-06T06:54:06Z","_id":"195","type":"dissertation","citation":{"chicago":"Platenius, Marie Christin. Fuzzy Matching of Comprehensive Service Specifications. Universität Paderborn, 2016.","ama":"Platenius MC. Fuzzy Matching of Comprehensive Service Specifications. Universität Paderborn; 2016.","apa":"Platenius, M. C. (2016). Fuzzy Matching of Comprehensive Service Specifications. Universität Paderborn.","mla":"Platenius, Marie Christin. Fuzzy Matching of Comprehensive Service Specifications. Universität Paderborn, 2016.","bibtex":"@book{Platenius_2016, title={Fuzzy Matching of Comprehensive Service Specifications}, publisher={Universität Paderborn}, author={Platenius, Marie Christin}, year={2016} }","short":"M.C. Platenius, Fuzzy Matching of Comprehensive Service Specifications, Universität Paderborn, 2016.","ieee":"M. C. Platenius, Fuzzy Matching of Comprehensive Service Specifications. Universität Paderborn, 2016."},"year":"2016","supervisor":[{"full_name":"Schäfer, Wilhelm","first_name":"Wilhelm","last_name":"Schäfer"}],"ddc":["040"],"title":"Fuzzy Matching of Comprehensive Service Specifications","user_id":"14052","has_accepted_license":"1","status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"name":"SFB 901 - Project Area B","_id":"3"}],"date_created":"2017-10-17T12:41:30Z","publisher":"Universität Paderborn","author":[{"full_name":"Platenius, Marie Christin","first_name":"Marie Christin","last_name":"Platenius"}],"file_date_updated":"2018-03-21T12:15:58Z","department":[{"_id":"76"}],"file":[{"file_size":18246710,"file_id":"1527","creator":"florida","content_type":"application/pdf","date_updated":"2018-03-21T12:15:58Z","relation":"main_file","success":1,"date_created":"2018-03-21T12:15:58Z","file_name":"195-Dissertation_-_Marie_Christin_Platenius.pdf","access_level":"closed"}]},{"citation":{"ieee":"B. Jazayeri, M. C. Platenius, G. Engels, and D. Kundisch, Features of IT Service Markets: A Systematic Literature Review (Supplementary Material). Universität Paderborn, 2016.","short":"B. Jazayeri, M.C. Platenius, G. Engels, D. Kundisch, Features of IT Service Markets: A Systematic Literature Review (Supplementary Material), Universität Paderborn, 2016.","mla":"Jazayeri, Bahar, et al. Features of IT Service Markets: A Systematic Literature Review (Supplementary Material). Universität Paderborn, 2016.","bibtex":"@book{Jazayeri_Platenius_Engels_Kundisch_2016, title={Features of IT Service Markets: A Systematic Literature Review (Supplementary Material)}, publisher={Universität Paderborn}, author={Jazayeri, Bahar and Platenius, Marie Christin and Engels, Gregor and Kundisch, Dennis}, year={2016} }","ama":"Jazayeri B, Platenius MC, Engels G, Kundisch D. Features of IT Service Markets: A Systematic Literature Review (Supplementary Material). Universität Paderborn; 2016.","apa":"Jazayeri, B., Platenius, M. C., Engels, G., & Kundisch, D. (2016). Features of IT Service Markets: A Systematic Literature Review (Supplementary Material). Universität Paderborn.","chicago":"Jazayeri, Bahar, Marie Christin Platenius, Gregor Engels, and Dennis Kundisch. Features of IT Service Markets: A Systematic Literature Review (Supplementary Material). Universität Paderborn, 2016."},"year":"2016","type":"report","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:13Z","_id":"198","publisher":"Universität Paderborn","author":[{"full_name":"Jazayeri, Bahar","first_name":"Bahar","id":"36399","last_name":"Jazayeri"},{"last_name":"Platenius","full_name":"Platenius, Marie Christin","first_name":"Marie Christin"},{"full_name":"Engels, Gregor","first_name":"Gregor","id":"107","last_name":"Engels"},{"first_name":"Dennis","full_name":"Kundisch, Dennis","last_name":"Kundisch","id":"21117"}],"file_date_updated":"2018-11-12T19:11:20Z","department":[{"_id":"276"},{"_id":"66"},{"_id":"76"}],"file":[{"success":1,"relation":"main_file","date_updated":"2018-11-12T19:11:20Z","content_type":"application/pdf","creator":"bahareh","file_id":"5534","file_size":1024328,"access_level":"closed","file_name":"MarketSurvey_Techreport (1).pdf","date_created":"2018-11-12T19:11:20Z"}],"has_accepted_license":"1","status":"public","date_created":"2017-10-17T12:41:30Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"17","name":"SFB 901 - Subprojekt C5"},{"_id":"4","name":"SFB 901 - Project Area C"}],"ddc":["040"],"title":"Features of IT Service Markets: A Systematic Literature Review (Supplementary Material)","user_id":"477"},{"title":"Features of IT Service Markets: A Systematic Literature Review","place":"Banff, Canada","project":[{"name":"SFB 901","_id":"1"},{"_id":"17","name":"SFB 901 - Subprojekt C5"},{"name":"SFB 901 - Project Area C","_id":"4"}],"department":[{"_id":"66"},{"_id":"276"},{"_id":"76"}],"doi":"10.1007/978-3-319-46295-0_19","date_updated":"2022-01-06T06:54:14Z","language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science (LNCS)","user_id":"477","ddc":["040"],"abstract":[{"text":"The provision of IT solutions over electronic marketplaces became prominent in recent years. We call such marketplaces IT service markets. IT service markets have some core architectural building blocks that impact the quality attributes of these markets. However, these building blocks and their impacts are not well-known. Thus, design choices for IT service markets have been made ad-hoc until now. Furthermore, only single aspects of such markets have been investigated until now, but a comprehensive view is missing.In this paper, we identify common features and their interrelations on the basis of a systematic literature review of 60 publications using grounded theory.This knowledge provides an empirical evidence on the interdisciplinary design choices of IT service markets and it serves as a basis to support market providers and developers to integrate market features. Thereby, we make a first step towards the creation of a reference model for IT service markets that provides a holistic integrated view that can be used to create and maintain successful markets in the future.","lang":"eng"}],"status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:41:30Z","volume":9936,"file":[{"date_created":"2018-03-21T12:15:24Z","file_name":"199-chp_3A10.1007_2F978-3-319-46295-0_19.pdf","access_level":"closed","file_size":765410,"file_id":"1526","creator":"florida","content_type":"application/pdf","date_updated":"2018-03-21T12:15:24Z","relation":"main_file","success":1}],"author":[{"first_name":"Bahar","full_name":"Jazayeri, Bahar","last_name":"Jazayeri","id":"36399"},{"first_name":"Marie","full_name":"Platenius, Marie","last_name":"Platenius"},{"full_name":"Engels, Gregor","first_name":"Gregor","id":"107","last_name":"Engels"},{"first_name":"Dennis","full_name":"Kundisch, Dennis","last_name":"Kundisch","id":"21117"}],"publisher":"Springer","file_date_updated":"2018-03-21T12:15:24Z","publication":"Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC)","intvolume":" 9936","_id":"199","citation":{"apa":"Jazayeri, B., Platenius, M., Engels, G., & Kundisch, D. (2016). Features of IT Service Markets: A Systematic Literature Review. In Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC) (Vol. 9936, pp. 301–316). Banff, Canada: Springer. https://doi.org/10.1007/978-3-319-46295-0_19","ama":"Jazayeri B, Platenius M, Engels G, Kundisch D. Features of IT Service Markets: A Systematic Literature Review. In: Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC). Vol 9936. Lecture Notes in Computer Science (LNCS). Banff, Canada: Springer; 2016:301-316. doi:10.1007/978-3-319-46295-0_19","chicago":"Jazayeri, Bahar, Marie Platenius, Gregor Engels, and Dennis Kundisch. “Features of IT Service Markets: A Systematic Literature Review.” In Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC), 9936:301–16. Lecture Notes in Computer Science (LNCS). Banff, Canada: Springer, 2016. https://doi.org/10.1007/978-3-319-46295-0_19.","bibtex":"@inproceedings{Jazayeri_Platenius_Engels_Kundisch_2016, place={Banff, Canada}, series={Lecture Notes in Computer Science (LNCS)}, title={Features of IT Service Markets: A Systematic Literature Review}, volume={9936}, DOI={10.1007/978-3-319-46295-0_19}, booktitle={Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC)}, publisher={Springer}, author={Jazayeri, Bahar and Platenius, Marie and Engels, Gregor and Kundisch, Dennis}, year={2016}, pages={301–316}, collection={Lecture Notes in Computer Science (LNCS)} }","mla":"Jazayeri, Bahar, et al. “Features of IT Service Markets: A Systematic Literature Review.” Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC), vol. 9936, Springer, 2016, pp. 301–16, doi:10.1007/978-3-319-46295-0_19.","short":"B. Jazayeri, M. Platenius, G. Engels, D. Kundisch, in: Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC), Springer, Banff, Canada, 2016, pp. 301–316.","ieee":"B. Jazayeri, M. Platenius, G. Engels, and D. Kundisch, “Features of IT Service Markets: A Systematic Literature Review,” in Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC), 2016, vol. 9936, pp. 301–316."},"type":"conference","year":"2016","page":"301-316"},{"_id":"20556","date_updated":"2022-01-06T06:54:30Z","doi":"10.1007/978-3-319-47166-2_30","language":[{"iso":"eng"}],"page":"431-445","citation":{"mla":"Bodden, Eric, et al. “Information Flow Analysis for Go.” Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 2016, pp. 431–45, doi:10.1007/978-3-319-47166-2_30.","bibtex":"@inproceedings{Bodden_I Pun_Steffen_Stolz_Wickert_2016, title={Information Flow Analysis for Go}, DOI={10.1007/978-3-319-47166-2_30}, booktitle={Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}}, author={Bodden, Eric and I Pun, Ka and Steffen, Martin and Stolz, Volker and Wickert, Anna-Katharina}, year={2016}, pages={431–445} }","ama":"Bodden E, I Pun K, Steffen M, Stolz V, Wickert A-K. Information Flow Analysis for Go. In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}. ; 2016:431-445. doi:10.1007/978-3-319-47166-2_30","apa":"Bodden, E., I Pun, K., Steffen, M., Stolz, V., & Wickert, A.-K. (2016). Information Flow Analysis for Go. Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 431–445. https://doi.org/10.1007/978-3-319-47166-2_30","chicago":"Bodden, Eric, Ka I Pun, Martin Steffen, Volker Stolz, and Anna-Katharina Wickert. “Information Flow Analysis for Go.” In Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 431–45, 2016. https://doi.org/10.1007/978-3-319-47166-2_30.","ieee":"E. Bodden, K. I Pun, M. Steffen, V. Stolz, and A.-K. Wickert, “Information Flow Analysis for Go,” in Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 2016, pp. 431–445, doi: 10.1007/978-3-319-47166-2_30.","short":"E. Bodden, K. I Pun, M. Steffen, V. Stolz, A.-K. Wickert, in: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 2016, pp. 431–445."},"year":"2016","type":"conference","user_id":"5786","title":"Information Flow Analysis for Go","department":[{"_id":"76"}],"publication":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}","author":[{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"},{"full_name":"I Pun, Ka","first_name":"Ka","last_name":"I Pun"},{"last_name":"Steffen","full_name":"Steffen, Martin","first_name":"Martin"},{"full_name":"Stolz, Volker","first_name":"Volker","last_name":"Stolz"},{"last_name":"Wickert","full_name":"Wickert, Anna-Katharina","first_name":"Anna-Katharina"}],"date_created":"2020-11-30T11:02:52Z","status":"public"},{"publication":"Nordic Workshop on Programming Theory (NWPT'16)","department":[{"_id":"76"}],"author":[{"first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256"},{"last_name":"Eichberg","full_name":"Eichberg, Michael","first_name":"Michael"},{"first_name":"Ka","full_name":"I Pun, Ka","last_name":"I Pun"},{"last_name":"Steffen","full_name":"Steffen, Martin","first_name":"Martin"},{"full_name":"Stolz, Volker","first_name":"Volker","last_name":"Stolz"},{"full_name":"Wickert, Anna-Katharina","first_name":"Anna-Katharina","last_name":"Wickert"}],"date_created":"2020-12-14T11:56:15Z","status":"public","user_id":"5786","title":"Don't let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go","main_file_link":[{"url":"http://bodden.de/pubs/bep16gotaint.pdf"}],"language":[{"iso":"eng"}],"citation":{"bibtex":"@inproceedings{Bodden_Eichberg_I Pun_Steffen_Stolz_Wickert_2016, title={Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go}, booktitle={Nordic Workshop on Programming Theory (NWPT’16)}, author={Bodden, Eric and Eichberg, Michael and I Pun, Ka and Steffen, Martin and Stolz, Volker and Wickert, Anna-Katharina}, year={2016} }","mla":"Bodden, Eric, et al. “Don’t Let Data Go Astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go.” Nordic Workshop on Programming Theory (NWPT’16), 2016.","chicago":"Bodden, Eric, Michael Eichberg, Ka I Pun, Martin Steffen, Volker Stolz, and Anna-Katharina Wickert. “Don’t Let Data Go Astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go.” In Nordic Workshop on Programming Theory (NWPT’16), 2016.","apa":"Bodden, E., Eichberg, M., I Pun, K., Steffen, M., Stolz, V., & Wickert, A.-K. (2016). Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go. Nordic Workshop on Programming Theory (NWPT’16).","ama":"Bodden E, Eichberg M, I Pun K, Steffen M, Stolz V, Wickert A-K. Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go. In: Nordic Workshop on Programming Theory (NWPT’16). ; 2016.","ieee":"E. Bodden, M. Eichberg, K. I Pun, M. Steffen, V. Stolz, and A.-K. Wickert, “Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go,” 2016.","short":"E. Bodden, M. Eichberg, K. I Pun, M. Steffen, V. Stolz, A.-K. Wickert, in: Nordic Workshop on Programming Theory (NWPT’16), 2016."},"type":"conference","year":"2016","_id":"20716","date_updated":"2022-01-06T06:54:34Z"},{"doi":"http://dx.doi.org/10.7939/DVN/10859","date_updated":"2022-01-06T06:54:34Z","_id":"20717","year":"2016","type":"report","citation":{"ieee":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, Just-in-Time Static Analysis. 2016.","short":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, Just-in-Time Static Analysis, 2016.","bibtex":"@book{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2016, title={Just-in-Time Static Analysis}, DOI={http://dx.doi.org/10.7939/DVN/10859}, author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2016} }","mla":"Nguyen Quang Do, Lisa, et al. Just-in-Time Static Analysis. 2016, doi:http://dx.doi.org/10.7939/DVN/10859.","ama":"Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Just-in-Time Static Analysis.; 2016. doi:http://dx.doi.org/10.7939/DVN/10859","apa":"Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., & Murphy-Hill, E. (2016). Just-in-Time Static Analysis. http://dx.doi.org/10.7939/DVN/10859","chicago":"Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. Just-in-Time Static Analysis, 2016. http://dx.doi.org/10.7939/DVN/10859."},"language":[{"iso":"eng"}],"main_file_link":[{"url":"http://bodden.de/pubs/dal16jit-tr.pdf"}],"title":"Just-in-Time Static Analysis","user_id":"5786","date_created":"2020-12-14T11:57:09Z","status":"public","keyword":["ATTRACT","ITSECWEBSITE"],"department":[{"_id":"76"}],"author":[{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"last_name":"Livshits","full_name":"Livshits, Benjamin","first_name":"Benjamin"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"},{"first_name":"Justin","full_name":"Smith, Justin","last_name":"Smith"},{"first_name":"Emerson","full_name":"Murphy-Hill, Emerson","last_name":"Murphy-Hill"}]},{"date_created":"2020-12-14T11:57:48Z","status":"public","department":[{"_id":"76"}],"publication":"Datenschutz und Datensicherheit","keyword":["ATTRACT","ITSECWEBSITE"],"author":[{"last_name":"Rasthofer","full_name":"Rasthofer, Siegfried","first_name":"Siegfried"},{"first_name":"Steven","full_name":"Arzt, Steven","last_name":"Arzt"},{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"first_name":"Marc","full_name":"Miltenberger, Marc","last_name":"Miltenberger"}],"title":"Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen","user_id":"5786","page":"718-722","year":"2016","citation":{"short":"S. Rasthofer, S. Arzt, E. Bodden, M. Miltenberger, Datenschutz Und Datensicherheit (2016) 718–722.","ieee":"S. Rasthofer, S. Arzt, E. Bodden, and M. Miltenberger, “Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen,” Datenschutz und Datensicherheit, pp. 718–722, 2016, doi: https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536.","ama":"Rasthofer S, Arzt S, Bodden E, Miltenberger M. Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. Datenschutz und Datensicherheit. Published online 2016:718-722. doi:https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536","apa":"Rasthofer, S., Arzt, S., Bodden, E., & Miltenberger, M. (2016). Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. Datenschutz Und Datensicherheit, 718–722. https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536","chicago":"Rasthofer, Siegfried, Steven Arzt, Eric Bodden, and Marc Miltenberger. “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.” Datenschutz Und Datensicherheit, 2016, 718–22. https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536.","mla":"Rasthofer, Siegfried, et al. “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.” Datenschutz Und Datensicherheit, 2016, pp. 718–22, doi:https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536.","bibtex":"@article{Rasthofer_Arzt_Bodden_Miltenberger_2016, title={Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen}, DOI={https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536}, journal={Datenschutz und Datensicherheit}, author={Rasthofer, Siegfried and Arzt, Steven and Bodden, Eric and Miltenberger, Marc}, year={2016}, pages={718–722} }"},"type":"journal_article","language":[{"iso":"eng"}],"main_file_link":[{"url":"http://bodden.de/pubs/rabm16harvester.pdf"}],"doi":"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536","date_updated":"2022-01-06T06:54:34Z","_id":"20718"},{"title":"An In-Depth Study of More Than Ten Years of Java Exploitation","user_id":"5786","publication_identifier":{"isbn":["978-1-4503-4139-4"]},"status":"public","date_created":"2020-12-14T11:58:33Z","author":[{"last_name":"Holzinger","first_name":"Philipp","full_name":"Holzinger, Philipp"},{"last_name":"Triller","first_name":"Stefan","full_name":"Triller, Stefan"},{"last_name":"Bartel","first_name":"Alexandre","full_name":"Bartel, Alexandre"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"}],"department":[{"_id":"76"}],"publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"],"doi":"http://doi.acm.org/10.1145/2976749.2978361","date_updated":"2022-01-06T06:54:34Z","_id":"20719","citation":{"ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790, doi: http://doi.acm.org/10.1145/2976749.2978361.","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.","bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={http://doi.acm.org/10.1145/2976749.2978361}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }","mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–90, doi:http://doi.acm.org/10.1145/2976749.2978361.","chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–90. CCS ’16, 2016. http://doi.acm.org/10.1145/2976749.2978361.","apa":"Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–790. http://doi.acm.org/10.1145/2976749.2978361","ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS ’16. ; 2016:779-790. doi:http://doi.acm.org/10.1145/2976749.2978361"},"type":"conference","year":"2016","page":"779-790","language":[{"iso":"eng"}],"series_title":"CCS '16"},{"date_updated":"2022-01-06T06:54:34Z","_id":"20720","main_file_link":[{"url":"http://bodden.de/pubs/fbt+16pshape.pdf"}],"year":"2016","citation":{"ieee":"A. Follner et al., “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution,” in International Workshop on Security and Trust Management (STM), 2016, pp. 212–228.","short":"A. Follner, A. Bartel, H. Peng, Y.-C. Chang, K. Ispoglou, M. Payer, E. Bodden, in: International Workshop on Security and Trust Management (STM), 2016, pp. 212–228.","mla":"Follner, Andreas, et al. “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.” International Workshop on Security and Trust Management (STM), 2016, pp. 212–28.","bibtex":"@inproceedings{Follner_Bartel_Peng_Chang_Ispoglou_Payer_Bodden_2016, title={PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution}, booktitle={International Workshop on Security and Trust Management (STM)}, author={Follner, Andreas and Bartel, Alexandre and Peng, Hui and Chang, Yu-Chen and Ispoglou, Kyriakos and Payer, Mathias and Bodden, Eric}, year={2016}, pages={212–228} }","apa":"Follner, A., Bartel, A., Peng, H., Chang, Y.-C., Ispoglou, K., Payer, M., & Bodden, E. (2016). PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. International Workshop on Security and Trust Management (STM), 212–228.","ama":"Follner A, Bartel A, Peng H, et al. PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. In: International Workshop on Security and Trust Management (STM). ; 2016:212-228.","chicago":"Follner, Andreas, Alexandre Bartel, Hui Peng, Yu-Chen Chang, Kyriakos Ispoglou, Mathias Payer, and Eric Bodden. “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.” In International Workshop on Security and Trust Management (STM), 212–28, 2016."},"type":"conference","page":"212-228","language":[{"iso":"eng"}],"title":"PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution","user_id":"5786","author":[{"first_name":"Andreas","full_name":"Follner, Andreas","last_name":"Follner"},{"last_name":"Bartel","first_name":"Alexandre","full_name":"Bartel, Alexandre"},{"first_name":"Hui","full_name":"Peng, Hui","last_name":"Peng"},{"last_name":"Chang","first_name":"Yu-Chen","full_name":"Chang, Yu-Chen"},{"first_name":"Kyriakos","full_name":"Ispoglou, Kyriakos","last_name":"Ispoglou"},{"first_name":"Mathias","full_name":"Payer, Mathias","last_name":"Payer"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"}],"department":[{"_id":"76"}],"publication":"International Workshop on Security and Trust Management (STM)","status":"public","date_created":"2020-12-14T11:59:04Z"},{"title":"Toward an Automated Benchmark Management System","user_id":"5786","date_created":"2020-12-14T12:00:32Z","status":"public","department":[{"_id":"76"}],"publication":"Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis","keyword":["ATTRACT"],"author":[{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"last_name":"Eichberg","full_name":"Eichberg, Michael","first_name":"Michael"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"}],"_id":"20721","date_updated":"2022-01-06T06:54:34Z","page":"13-17","type":"conference","year":"2016","citation":{"ieee":"L. Nguyen Quang Do, M. Eichberg, and E. Bodden, “Toward an Automated Benchmark Management System,” in Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 13–17.","short":"L. Nguyen Quang Do, M. Eichberg, E. Bodden, in: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 13–17.","mla":"Nguyen Quang Do, Lisa, et al. “Toward an Automated Benchmark Management System.” Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 13–17.","bibtex":"@inproceedings{Nguyen Quang Do_Eichberg_Bodden_2016, series={SOAP 2016}, title={Toward an Automated Benchmark Management System}, booktitle={Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis}, author={Nguyen Quang Do, Lisa and Eichberg, Michael and Bodden, Eric}, year={2016}, pages={13–17}, collection={SOAP 2016} }","chicago":"Nguyen Quang Do, Lisa, Michael Eichberg, and Eric Bodden. “Toward an Automated Benchmark Management System.” In Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 13–17. SOAP 2016, 2016.","apa":"Nguyen Quang Do, L., Eichberg, M., & Bodden, E. (2016). Toward an Automated Benchmark Management System. Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 13–17.","ama":"Nguyen Quang Do L, Eichberg M, Bodden E. Toward an Automated Benchmark Management System. In: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. SOAP 2016. ; 2016:13-17."},"language":[{"iso":"eng"}],"main_file_link":[{"url":"http://bodden.de/pubs/neb16toward.pdf"}],"series_title":"SOAP 2016"},{"_id":"20722","date_updated":"2022-01-06T06:54:34Z","language":[{"iso":"eng"}],"page":"1-6","year":"2016","type":"conference","citation":{"ama":"Arzt S, Kussmaul T, Bodden E. Towards Cross-Platform Cross-Language Analysis with Soot. In: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. SOAP 2016. ; 2016:1-6.","apa":"Arzt, S., Kussmaul, T., & Bodden, E. (2016). Towards Cross-Platform Cross-Language Analysis with Soot. Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 1–6.","chicago":"Arzt, Steven, Tobias Kussmaul, and Eric Bodden. “Towards Cross-Platform Cross-Language Analysis with Soot.” In Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 1–6. SOAP 2016, 2016.","mla":"Arzt, Steven, et al. “Towards Cross-Platform Cross-Language Analysis with Soot.” Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 1–6.","bibtex":"@inproceedings{Arzt_Kussmaul_Bodden_2016, series={SOAP 2016}, title={Towards Cross-Platform Cross-Language Analysis with Soot}, booktitle={Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis}, author={Arzt, Steven and Kussmaul, Tobias and Bodden, Eric}, year={2016}, pages={1–6}, collection={SOAP 2016} }","short":"S. Arzt, T. Kussmaul, E. Bodden, in: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 1–6.","ieee":"S. Arzt, T. Kussmaul, and E. Bodden, “Towards Cross-Platform Cross-Language Analysis with Soot,” in Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 1–6."},"series_title":"SOAP 2016","main_file_link":[{"url":"http://www.bodden.de/pubs/akb16towards.pdf"}],"user_id":"5786","title":"Towards Cross-Platform Cross-Language Analysis with Soot","date_created":"2020-12-14T12:02:21Z","status":"public","department":[{"_id":"76"}],"publication":"Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis","author":[{"first_name":"Steven","full_name":"Arzt, Steven","last_name":"Arzt"},{"first_name":"Tobias","full_name":"Kussmaul, Tobias","last_name":"Kussmaul"},{"orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric","id":"59256","last_name":"Bodden"}]},{"title":"ROPocop — Dynamic mitigation of code-reuse attacks","user_id":"5786","author":[{"first_name":"Andreas","full_name":"Follner, Andreas","last_name":"Follner"},{"first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256"}],"publication":"Journal of Information Security and Applications ","department":[{"_id":"76"}],"publication_identifier":{"issn":["2214-2126"]},"volume":29,"status":"public","date_created":"2020-12-14T14:11:40Z","_id":"20724","date_updated":"2022-01-06T06:54:34Z","intvolume":" 29","doi":"http://dx.doi.org/10.1016/j.jisa.2016.01.002","main_file_link":[{"url":"http://www.bodden.de/pubs/fb2016ropocop.pdf"}],"year":"2016","type":"journal_article","citation":{"ieee":"A. Follner and E. Bodden, “ROPocop — Dynamic mitigation of code-reuse attacks,” Journal of Information Security and Applications , vol. 29, pp. 16–26, 2016, doi: http://dx.doi.org/10.1016/j.jisa.2016.01.002.","short":"A. Follner, E. Bodden, Journal of Information Security and Applications 29 (2016) 16–26.","mla":"Follner, Andreas, and Eric Bodden. “ROPocop — Dynamic Mitigation of Code-Reuse Attacks.” Journal of Information Security and Applications , vol. 29, 2016, pp. 16–26, doi:http://dx.doi.org/10.1016/j.jisa.2016.01.002.","bibtex":"@article{Follner_Bodden_2016, title={ROPocop — Dynamic mitigation of code-reuse attacks}, volume={29}, DOI={http://dx.doi.org/10.1016/j.jisa.2016.01.002}, journal={Journal of Information Security and Applications }, author={Follner, Andreas and Bodden, Eric}, year={2016}, pages={16–26} }","ama":"Follner A, Bodden E. ROPocop — Dynamic mitigation of code-reuse attacks. Journal of Information Security and Applications . 2016;29:16-26. doi:http://dx.doi.org/10.1016/j.jisa.2016.01.002","apa":"Follner, A., & Bodden, E. (2016). ROPocop — Dynamic mitigation of code-reuse attacks. Journal of Information Security and Applications , 29, 16–26. http://dx.doi.org/10.1016/j.jisa.2016.01.002","chicago":"Follner, Andreas, and Eric Bodden. “ROPocop — Dynamic Mitigation of Code-Reuse Attacks.” Journal of Information Security and Applications 29 (2016): 16–26. http://dx.doi.org/10.1016/j.jisa.2016.01.002."},"page":"16-26","language":[{"iso":"eng"}]},{"author":[{"full_name":"Follner, Andreas","first_name":"Andreas","last_name":"Follner"},{"full_name":"Bartel, Alexandre","first_name":"Alexandre","last_name":"Bartel"},{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"department":[{"_id":"76"}],"publication":"International Symposium on Engineering Secure Software and Systems (ESSoS)","status":"public","date_created":"2020-12-14T14:12:36Z","user_id":"5786","title":"Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality","main_file_link":[{"url":"http://www.bodden.de/pubs/fbb16analyzing.pdf"}],"language":[{"iso":"eng"}],"year":"2016","type":"conference","citation":{"bibtex":"@inproceedings{Follner_Bartel_Bodden_2016, title={Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality}, booktitle={International Symposium on Engineering Secure Software and Systems (ESSoS)}, author={Follner, Andreas and Bartel, Alexandre and Bodden, Eric}, year={2016} }","mla":"Follner, Andreas, et al. “Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality.” International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.","ama":"Follner A, Bartel A, Bodden E. Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. In: International Symposium on Engineering Secure Software and Systems (ESSoS). ; 2016.","apa":"Follner, A., Bartel, A., & Bodden, E. (2016). Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. International Symposium on Engineering Secure Software and Systems (ESSoS).","chicago":"Follner, Andreas, Alexandre Bartel, and Eric Bodden. “Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality.” In International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.","ieee":"A. Follner, A. Bartel, and E. Bodden, “Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality,” 2016.","short":"A. Follner, A. Bartel, E. Bodden, in: International Symposium on Engineering Secure Software and Systems (ESSoS), 2016."},"date_updated":"2022-01-06T06:54:34Z","_id":"20725"},{"editor":[{"last_name":"Piessens","full_name":"Piessens, Frank","first_name":"Frank"},{"last_name":"Vigan'o","full_name":"Vigan'o, Luca","first_name":"Luca"}],"publication_identifier":{"isbn":["978-3-662-49635-0"]},"status":"public","date_created":"2020-12-14T14:20:20Z","author":[{"last_name":"Falzon","first_name":"Kevin","full_name":"Falzon, Kevin"},{"first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256"}],"publisher":"Springer Berlin Heidelberg","department":[{"_id":"76"}],"publication":"Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings","title":"Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels","user_id":"5786","place":"Berlin, Heidelberg","year":"2016","citation":{"short":"K. Falzon, E. Bodden, in: F. Piessens, L. Vigan’o (Eds.), Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg, 2016, pp. 116–138.","ieee":"K. Falzon and E. Bodden, “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels,” in Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings, 2016, pp. 116–138, doi: 10.1007/978-3-662-49635-0_7.","chicago":"Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.” In Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings, edited by Frank Piessens and Luca Vigan’o, 116–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. https://doi.org/10.1007/978-3-662-49635-0_7.","ama":"Falzon K, Bodden E. Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. In: Piessens F, Vigan’o L, eds. Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings. Springer Berlin Heidelberg; 2016:116-138. doi:10.1007/978-3-662-49635-0_7","apa":"Falzon, K., & Bodden, E. (2016). Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. In F. Piessens & L. Vigan’o (Eds.), Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings (pp. 116–138). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-49635-0_7","mla":"Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.” Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings, edited by Frank Piessens and Luca Vigan’o, Springer Berlin Heidelberg, 2016, pp. 116–38, doi:10.1007/978-3-662-49635-0_7.","bibtex":"@inproceedings{Falzon_Bodden_2016, place={Berlin, Heidelberg}, title={Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels}, DOI={10.1007/978-3-662-49635-0_7}, booktitle={Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings}, publisher={Springer Berlin Heidelberg}, author={Falzon, Kevin and Bodden, Eric}, editor={Piessens, Frank and Vigan’o, Luca}, year={2016}, pages={116–138} }"},"type":"conference","page":"116-138","language":[{"iso":"eng"}],"main_file_link":[{"url":"http://www.bodden.de/pubs/fb16mitigating.pdf"}],"doi":"10.1007/978-3-662-49635-0_7","_id":"20726","date_updated":"2022-01-06T06:54:34Z"},{"status":"public","date_created":"2020-12-14T14:21:41Z","author":[{"last_name":"Rasthofer","full_name":"Rasthofer, Siegfried","first_name":"Siegfried"},{"full_name":"Arzt, Steven","first_name":"Steven","last_name":"Arzt"},{"first_name":"Marc","full_name":"Miltenberger, Marc","last_name":"Miltenberger"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"}],"keyword":["ATTRACT","ITSECWEBSITE"],"publication":"Network and Distributed System Security Symposium (NDSS)","department":[{"_id":"76"}],"title":"Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques","user_id":"5786","year":"2016","citation":{"mla":"Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” Network and Distributed System Security Symposium (NDSS), 2016.","bibtex":"@inproceedings{Rasthofer_Arzt_Miltenberger_Bodden_2016, title={Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques}, booktitle={Network and Distributed System Security Symposium (NDSS)}, author={Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric}, year={2016} }","chicago":"Rasthofer, Siegfried, Steven Arzt, Marc Miltenberger, and Eric Bodden. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” In Network and Distributed System Security Symposium (NDSS), 2016.","apa":"Rasthofer, S., Arzt, S., Miltenberger, M., & Bodden, E. (2016). Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. Network and Distributed System Security Symposium (NDSS).","ama":"Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In: Network and Distributed System Security Symposium (NDSS). ; 2016.","ieee":"S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden, “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques,” 2016.","short":"S. Rasthofer, S. Arzt, M. Miltenberger, E. Bodden, in: Network and Distributed System Security Symposium (NDSS), 2016."},"type":"conference","language":[{"iso":"eng"}],"main_file_link":[{"url":"http://www.bodden.de/pubs/ssme16harvesting.pdf"}],"date_updated":"2022-01-06T06:54:34Z","_id":"20727"},{"main_file_link":[{"url":"http://www.bodden.de/pubs/nkm+16jumping.pdf"}],"page":"935-946","citation":{"ieee":"S. Nadi, S. Krüger, M. Mezini, and E. Bodden, “Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?,” in International Conference for Software Engineering (ICSE), 2016, pp. 935–946.","short":"S. Nadi, S. Krüger, M. Mezini, E. Bodden, in: International Conference for Software Engineering (ICSE), 2016, pp. 935–946.","mla":"Nadi, Sarah, et al. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” International Conference for Software Engineering (ICSE), 2016, pp. 935–46.","bibtex":"@inproceedings{Nadi_Krüger_Mezini_Bodden_2016, title={Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?}, booktitle={International Conference for Software Engineering (ICSE)}, author={Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric}, year={2016}, pages={935–946} }","apa":"Nadi, S., Krüger, S., Mezini, M., & Bodden, E. (2016). Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? International Conference for Software Engineering (ICSE), 935–946.","ama":"Nadi S, Krüger S, Mezini M, Bodden E. Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? In: International Conference for Software Engineering (ICSE). ; 2016:935-946.","chicago":"Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” In International Conference for Software Engineering (ICSE), 935–46, 2016."},"type":"conference","year":"2016","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:34Z","_id":"20728","publication":"International Conference for Software Engineering (ICSE)","department":[{"_id":"76"}],"keyword":["CROSSING","ITSECWEBSITE"],"author":[{"full_name":"Nadi, Sarah","first_name":"Sarah","last_name":"Nadi"},{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"last_name":"Mezini","first_name":"Mira","full_name":"Mezini, Mira"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"}],"date_created":"2020-12-14T14:22:36Z","status":"public","title":"Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?","user_id":"5786"},{"date_created":"2020-12-14T14:23:29Z","status":"public","keyword":["ITSECWEBSITE"],"publication":"International Conference for Software Engineering (ICSE)","department":[{"_id":"76"}],"author":[{"full_name":"Arzt, Steven","first_name":"Steven","last_name":"Arzt"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"}],"user_id":"5786","title":"StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework","language":[{"iso":"eng"}],"citation":{"chicago":"Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework.” In International Conference for Software Engineering (ICSE), 2016.","ama":"Arzt S, Bodden E. StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. In: International Conference for Software Engineering (ICSE). ; 2016.","apa":"Arzt, S., & Bodden, E. (2016). StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. International Conference for Software Engineering (ICSE).","mla":"Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework.” International Conference for Software Engineering (ICSE), 2016.","bibtex":"@inproceedings{Arzt_Bodden_2016, title={StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework}, booktitle={International Conference for Software Engineering (ICSE)}, author={Arzt, Steven and Bodden, Eric}, year={2016} }","short":"S. Arzt, E. Bodden, in: International Conference for Software Engineering (ICSE), 2016.","ieee":"S. Arzt and E. Bodden, “StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework,” 2016."},"type":"conference","year":"2016","main_file_link":[{"url":"http://www.bodden.de/pubs/ab16stubdroid.pdf"}],"_id":"20729","date_updated":"2022-01-06T06:54:34Z"},{"author":[{"last_name":"Eling","first_name":"N.","full_name":"Eling, N."},{"last_name":"Rasthofer","first_name":"S.","full_name":"Rasthofer, S."},{"last_name":"Kolhagen","first_name":"M.","full_name":"Kolhagen, M."},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"},{"last_name":"Buxmann","full_name":"Buxmann, P.","first_name":"P."}],"publication":"2016 49th Hawaii International Conference on System Sciences (HICSS)","department":[{"_id":"76"}],"status":"public","date_created":"2020-12-14T14:24:12Z","publication_identifier":{"issn":["1530-1605"]},"user_id":"5786","title":"Investigating Users' Reaction to Fine-Grained Data Requests: A Market Experiment","main_file_link":[{"url":"http://www.bodden.de/pubs/erk+15investigating.pdf"}],"language":[{"iso":"eng"}],"citation":{"chicago":"Eling, N., S. Rasthofer, M. Kolhagen, Eric Bodden, and P. Buxmann. “Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.” In 2016 49th Hawaii International Conference on System Sciences (HICSS), 3666–75, 2016. https://doi.org/10.1109/HICSS.2016.458.","ama":"Eling N, Rasthofer S, Kolhagen M, Bodden E, Buxmann P. Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment. In: 2016 49th Hawaii International Conference on System Sciences (HICSS). ; 2016:3666-3675. doi:10.1109/HICSS.2016.458","apa":"Eling, N., Rasthofer, S., Kolhagen, M., Bodden, E., & Buxmann, P. (2016). Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment. 2016 49th Hawaii International Conference on System Sciences (HICSS), 3666–3675. https://doi.org/10.1109/HICSS.2016.458","mla":"Eling, N., et al. “Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.” 2016 49th Hawaii International Conference on System Sciences (HICSS), 2016, pp. 3666–75, doi:10.1109/HICSS.2016.458.","bibtex":"@inproceedings{Eling_Rasthofer_Kolhagen_Bodden_Buxmann_2016, title={Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment}, DOI={10.1109/HICSS.2016.458}, booktitle={2016 49th Hawaii International Conference on System Sciences (HICSS)}, author={Eling, N. and Rasthofer, S. and Kolhagen, M. and Bodden, Eric and Buxmann, P.}, year={2016}, pages={3666–3675} }","short":"N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, P. Buxmann, in: 2016 49th Hawaii International Conference on System Sciences (HICSS), 2016, pp. 3666–3675.","ieee":"N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, and P. Buxmann, “Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment,” in 2016 49th Hawaii International Conference on System Sciences (HICSS), 2016, pp. 3666–3675, doi: 10.1109/HICSS.2016.458."},"type":"conference","year":"2016","page":"3666-3675","_id":"20730","date_updated":"2022-01-06T06:54:34Z","doi":"10.1109/HICSS.2016.458"},{"_id":"20822","date_updated":"2022-01-06T06:54:40Z","year":"2016","type":"report","citation":{"bibtex":"@book{Dziwok_Pohlmann_Piskachev_Schubert_Thiele_Gerking_2016, place={Zukunftsmeile 1, 33102 Paderborn, Germany}, title={The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling}, author={Dziwok, Stefan and Pohlmann, Uwe and Piskachev, Goran and Schubert, David and Thiele, Sebastian and Gerking, Christopher}, year={2016} }","mla":"Dziwok, Stefan, et al. The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling. 2016.","ama":"Dziwok S, Pohlmann U, Piskachev G, Schubert D, Thiele S, Gerking C. The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling.; 2016.","apa":"Dziwok, S., Pohlmann, U., Piskachev, G., Schubert, D., Thiele, S., & Gerking, C. (2016). The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling.","chicago":"Dziwok, Stefan, Uwe Pohlmann, Goran Piskachev, David Schubert, Sebastian Thiele, and Christopher Gerking. The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling. Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.","ieee":"S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, and C. Gerking, The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling. Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.","short":"S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, C. Gerking, The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling, Zukunftsmeile 1, 33102 Paderborn, Germany, 2016."},"language":[{"iso":"eng"}],"title":"The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling","user_id":"5786","abstract":[{"text":"Several examples of mechatronic systems can be found nowadays in modern cars, production systems, and medical technology. Day by day, the number of innovative functionalities in such mechatronic systems is increasing. These functionalities are realized with complex software. Such software exhibits hard real-time, safety requirements. The adherence to these requirements must be thoroughly analyzed and verified. Moreover, to obtain a significant increment in the reliability, performance, and efficiency of such software, it needs to maintain the self-adaptation of its properties. In order to develop such systems with a high quality and within a short time, we need a systematic and consistent design method. For this purpose, the software engineering group at the University of Paderborn and the Fraunhofer IEM in Paderborn propose the MechatronicUML method. This method provides a comprehensive model-driven process support, that starts from requirements and reaches the executable software after passing through several design and analysis steps. This process improves the comprehension during development and makes complex systems manageable. MechatronicUML emphasizes mainly on: (1) modeling and (formal) verification of reconfigurable software architectures, (2) the coordination among system components in such architectures, and (3) the integration of discrete software events with the continuous behavior of control devices.","lang":"eng"}],"place":"Zukunftsmeile 1, 33102 Paderborn, Germany","date_created":"2020-12-22T09:24:42Z","status":"public","department":[{"_id":"76"},{"_id":"241"}],"author":[{"orcid":"http://orcid.org/0000-0002-8679-6673","full_name":"Dziwok, Stefan","first_name":"Stefan","id":"3901","last_name":"Dziwok"},{"full_name":"Pohlmann, Uwe","first_name":"Uwe","last_name":"Pohlmann"},{"id":"41936","last_name":"Piskachev","orcid":"0000-0003-4424-5838","full_name":"Piskachev, Goran","first_name":"Goran"},{"full_name":"Schubert, David","first_name":"David","id":"9106","last_name":"Schubert"},{"full_name":"Thiele, Sebastian","first_name":"Sebastian","last_name":"Thiele"},{"first_name":"Christopher","full_name":"Gerking, Christopher","last_name":"Gerking"}]},{"abstract":[{"text":"In this technical report, we present the MechatronicUML requirements engineering method. The method encompasses a process and a scenario-based modeling language for the documentation and analysis of requirements on the message-based interaction behavior of software-intensive systems. The modeling language uses a scenario notation based on Modal Sequence Diagrams (MSDs), which borrows concepts of UML Interactions as well as of Live Sequence Charts. Furthermore, we introduce the so-called Emergency Braking & Evasion System (EBEAS) as a running example, which is based on current and upcoming real-world driver assistance systems. ","lang":"eng"}],"title":"The MechatronicUML Requirements Engineering Method: Process and Language","user_id":"5786","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"author":[{"id":"3875","last_name":"Holtmann","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571","first_name":"Jörg"},{"first_name":"Markus","full_name":"Fockel, Markus","orcid":"0000-0002-1269-0702","last_name":"Fockel","id":"8472"},{"id":"13616","last_name":"Koch","full_name":"Koch, Thorsten","first_name":"Thorsten"},{"last_name":"Schmelter","id":"40982","first_name":"David","orcid":"0000-0001-7787-5380","full_name":"Schmelter, David"},{"first_name":"Christian","full_name":"Brenner, Christian","last_name":"Brenner"},{"first_name":"Ruslan","full_name":"Bernijazov, Ruslan","last_name":"Bernijazov"},{"first_name":"Marcel","full_name":"Sander, Marcel","last_name":"Sander"}],"date_created":"2020-12-22T09:28:23Z","status":"public","date_updated":"2022-01-06T06:54:40Z","_id":"20823","doi":"10.13140/RG.2.2.33223.29606","type":"report","citation":{"ama":"Holtmann J, Fockel M, Koch T, et al. The MechatronicUML Requirements Engineering Method: Process and Language.; 2016. doi:10.13140/RG.2.2.33223.29606","apa":"Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov, R., & Sander, M. (2016). The MechatronicUML Requirements Engineering Method: Process and Language. https://doi.org/10.13140/RG.2.2.33223.29606","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, David Schmelter, Christian Brenner, Ruslan Bernijazov, and Marcel Sander. The MechatronicUML Requirements Engineering Method: Process and Language, 2016. https://doi.org/10.13140/RG.2.2.33223.29606.","bibtex":"@book{Holtmann_Fockel_Koch_Schmelter_Brenner_Bernijazov_Sander_2016, title={The MechatronicUML Requirements Engineering Method: Process and Language}, DOI={10.13140/RG.2.2.33223.29606}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David and Brenner, Christian and Bernijazov, Ruslan and Sander, Marcel}, year={2016} }","mla":"Holtmann, Jörg, et al. The MechatronicUML Requirements Engineering Method: Process and Language. 2016, doi:10.13140/RG.2.2.33223.29606.","short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, C. Brenner, R. Bernijazov, M. Sander, The MechatronicUML Requirements Engineering Method: Process and Language, 2016.","ieee":"J. Holtmann et al., The MechatronicUML Requirements Engineering Method: Process and Language. 2016."},"year":"2016","language":[{"iso":"eng"}]},{"_id":"20825","date_updated":"2022-01-06T06:54:40Z","doi":"10.3139/9783446451414.008","page":"77-86","type":"conference","year":"2016","citation":{"ieee":"M. Greinert, C. Tschirner, and J. Holtmann, “Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme,” in Tag des Systems Engineering 2016, 2016, pp. 77–86, doi: 10.3139/9783446451414.008.","short":"M. Greinert, C. Tschirner, J. Holtmann, in: Tag Des Systems Engineering 2016, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2016, pp. 77–86.","mla":"Greinert, Matthias, et al. “Anwendung von Methoden Der Produktentstehung Auf Basis Des Systemmodells Mechatronischer Systeme.” Tag Des Systems Engineering 2016, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2016, pp. 77–86, doi:10.3139/9783446451414.008.","bibtex":"@inproceedings{Greinert_Tschirner_Holtmann_2016, title={Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme}, DOI={10.3139/9783446451414.008}, booktitle={Tag des Systems Engineering 2016}, publisher={Gesellschaft f{\\\"u}r Systems Engineering e.V.}, author={Greinert, Matthias and Tschirner, Christian and Holtmann, Jörg}, year={2016}, pages={77–86} }","apa":"Greinert, M., Tschirner, C., & Holtmann, J. (2016). Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. Tag Des Systems Engineering 2016, 77–86. https://doi.org/10.3139/9783446451414.008","ama":"Greinert M, Tschirner C, Holtmann J. Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. In: Tag Des Systems Engineering 2016. Gesellschaft f{\\\"u}r Systems Engineering e.V.; 2016:77-86. doi:10.3139/9783446451414.008","chicago":"Greinert, Matthias, Christian Tschirner, and Jörg Holtmann. “Anwendung von Methoden Der Produktentstehung Auf Basis Des Systemmodells Mechatronischer Systeme.” In Tag Des Systems Engineering 2016, 77–86. Gesellschaft f{\\\"u}r Systems Engineering e.V., 2016. https://doi.org/10.3139/9783446451414.008."},"language":[{"iso":"eng"}],"abstract":[{"lang":"ger","text":"Das Systemmodell ist der Kern des Model-Based Systems Engineering (MBSE). Während jedoch im Systems Engineering dem Zusammenspiel von Produkt und Projekt ein hoher Stellenwert beigemessen wird, liegt der Fokus im MBSE noch sehr stark auf technischen Prozessen. Im Hinblick auf die Idee des Systemmodells als zentrale Datenquelle sollten auch Stakeholder jenseits der direkten Entwicklungsaktivitäten das Systemmodell entsprechend nutzen können und davon profitieren. Dazu wird ein Demonstrator vorgestellt, welcher die Anwendung einer Komplexitätsanalyse auf Basis des Systemmodells mechatronischer Systeme stellvertretend für Methoden in Sinne der technischen Managementprozesse der ISO/IEC 15288 aufzeigt. Grundlage des Demonstrators bildet das Systemmodell eines Pedelecs. Die darin modellierten Strukturen dienen als Input für die Komplexitätsanalyse. Über die automatisierte Anwendung der Komplexitätsanalyse ergibt sich als Output ein Portfolio, das die Komplexität der funktionserfüllenden Komponenten mit der Bewertung der Funktionalität in Beziehung setzt und somit eine Beurteilung und entsprechende Handlungsempfehlungen der Komponenten ermöglicht."}],"title":"Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme","user_id":"5786","publication":"Tag des Systems Engineering 2016","department":[{"_id":"76"}],"publisher":"Gesellschaft f{\\\"u}r Systems Engineering e.V.","author":[{"first_name":"Matthias","full_name":"Greinert, Matthias","last_name":"Greinert"},{"last_name":"Tschirner","first_name":"Christian","full_name":"Tschirner, Christian"},{"first_name":"Jörg","full_name":"Holtmann, Jörg","orcid":"0000-0001-6141-4571","last_name":"Holtmann","id":"3875"}],"date_created":"2020-12-22T09:32:08Z","status":"public"},{"date_updated":"2022-01-06T06:54:40Z","_id":"20830","language":[{"iso":"eng"}],"citation":{"short":"D. Schubert, C. Heinzemann, C. Gerking, in: Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering, ACM, 2016.","ieee":"D. Schubert, C. Heinzemann, and C. Gerking, “Towards Safe Execution of Reconfigurations in Cyber-Physical Systems,” 2016.","chicago":"Schubert, David, Christian Heinzemann, and Christopher Gerking. “Towards Safe Execution of Reconfigurations in Cyber-Physical Systems.” In Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering. ACM, 2016.","ama":"Schubert D, Heinzemann C, Gerking C. Towards Safe Execution of Reconfigurations in Cyber-Physical Systems. In: Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering. ACM; 2016.","apa":"Schubert, D., Heinzemann, C., & Gerking, C. (2016). Towards Safe Execution of Reconfigurations in Cyber-Physical Systems. Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering.","bibtex":"@inproceedings{Schubert_Heinzemann_Gerking_2016, title={Towards Safe Execution of Reconfigurations in Cyber-Physical Systems}, booktitle={Proceedings of the 19th international ACM Sigsoft symposium on component-based software engineering}, publisher={ACM}, author={Schubert, David and Heinzemann, Christian and Gerking, Christopher}, year={2016} }","mla":"Schubert, David, et al. “Towards Safe Execution of Reconfigurations in Cyber-Physical Systems.” Proceedings of the 19th International ACM Sigsoft Symposium on Component-Based Software Engineering, ACM, 2016."},"year":"2016","type":"conference","user_id":"5786","title":"Towards Safe Execution of Reconfigurations in Cyber-Physical Systems","publisher":"ACM","author":[{"first_name":"David","full_name":"Schubert, David","last_name":"Schubert","id":"9106"},{"first_name":"Christian","full_name":"Heinzemann, Christian","last_name":"Heinzemann"},{"first_name":"Christopher","full_name":"Gerking, Christopher","last_name":"Gerking"}],"publication":"Proceedings of the 19th international ACM Sigsoft symposium on component-based software engineering","department":[{"_id":"76"},{"_id":"241"}],"status":"public","date_created":"2020-12-22T09:41:56Z"},{"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"name":"SFB 901 - Subproject B3","_id":"11"},{"name":"SFB 901 - Project Area B","_id":"3"}],"date_created":"2017-10-17T12:41:35Z","has_accepted_license":"1","status":"public","department":[{"_id":"66"},{"_id":"76"}],"file_date_updated":"2018-03-21T10:36:37Z","publisher":"Universität Paderborn","author":[{"last_name":"Platenius","first_name":"Marie Christin","full_name":"Platenius, Marie Christin"},{"last_name":"Josifovska","full_name":"Josifovska, Klementina","first_name":"Klementina"},{"first_name":"Lorijn","full_name":"van Rooijen, Lorijn","last_name":"van Rooijen","id":"58843"},{"full_name":"Arifulina, Svetlana","first_name":"Svetlana","last_name":"Arifulina"},{"last_name":"Becker","first_name":"Matthias","full_name":"Becker, Matthias"},{"id":"107","last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"full_name":"Schäfer, Wilhelm","first_name":"Wilhelm","last_name":"Schäfer"}],"file":[{"file_name":"221-SFB_SSL_Techreport.pdf","date_created":"2018-03-21T10:36:37Z","access_level":"closed","creator":"florida","file_id":"1512","file_size":6498677,"relation":"main_file","success":1,"date_updated":"2018-03-21T10:36:37Z","content_type":"application/pdf"}],"title":"An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3)","ddc":["040"],"user_id":"477","citation":{"ieee":"M. C. Platenius et al., An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3). Universität Paderborn, 2016.","short":"M.C. Platenius, K. Josifovska, L. van Rooijen, S. Arifulina, M. Becker, G. Engels, W. Schäfer, An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3), Universität Paderborn, 2016.","bibtex":"@book{Platenius_Josifovska_van Rooijen_Arifulina_Becker_Engels_Schäfer_2016, title={An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3)}, publisher={Universität Paderborn}, author={Platenius, Marie Christin and Josifovska, Klementina and van Rooijen, Lorijn and Arifulina, Svetlana and Becker, Matthias and Engels, Gregor and Schäfer, Wilhelm}, year={2016} }","mla":"Platenius, Marie Christin, et al. An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3). Universität Paderborn, 2016.","chicago":"Platenius, Marie Christin, Klementina Josifovska, Lorijn van Rooijen, Svetlana Arifulina, Matthias Becker, Gregor Engels, and Wilhelm Schäfer. An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3). Universität Paderborn, 2016.","apa":"Platenius, M. C., Josifovska, K., van Rooijen, L., Arifulina, S., Becker, M., Engels, G., & Schäfer, W. (2016). An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3). Universität Paderborn.","ama":"Platenius MC, Josifovska K, van Rooijen L, et al. An Overview of Service Specification Language and Matching in On-The-Fly Computing (v0.3). Universität Paderborn; 2016."},"type":"report","year":"2016","language":[{"iso":"eng"}],"_id":"221","date_updated":"2022-01-06T06:55:25Z"},{"main_file_link":[{"url":"http://www.bodden.de/pubs/sna+16boomerang.pdf"}],"type":"conference","citation":{"chicago":"Späth, Johannes, Lisa Nguyen Quang Do, Karim Ali, and Eric Bodden. “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.” In European Conference on Object-Oriented Programming (ECOOP), 2016.","ama":"Späth J, Nguyen Quang Do L, Ali K, Bodden E. Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java. In: European Conference on Object-Oriented Programming (ECOOP). ; 2016.","apa":"Späth, J., Nguyen Quang Do, L., Ali, K., & Bodden, E. (2016). Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java. In European Conference on Object-Oriented Programming (ECOOP).","bibtex":"@inproceedings{Späth_Nguyen Quang Do_Ali_Bodden_2016, title={Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Späth, Johannes and Nguyen Quang Do, Lisa and Ali, Karim and Bodden, Eric}, year={2016} }","mla":"Späth, Johannes, et al. “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.” European Conference on Object-Oriented Programming (ECOOP), 2016.","short":"J. Späth, L. Nguyen Quang Do, K. Ali, E. Bodden, in: European Conference on Object-Oriented Programming (ECOOP), 2016.","ieee":"J. Späth, L. Nguyen Quang Do, K. Ali, and E. Bodden, “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java,” in European Conference on Object-Oriented Programming (ECOOP), 2016."},"year":"2016","language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:01:45Z","_id":"5205","author":[{"full_name":"Späth, Johannes","first_name":"Johannes","last_name":"Späth"},{"first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"last_name":"Bodden","id":"59256","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric"}],"keyword":["ATTRACT","ITSECWEBSITE"],"publication":"European Conference on Object-Oriented Programming (ECOOP)","file_date_updated":"2018-11-02T14:13:19Z","department":[{"_id":"76"}],"file":[{"file_size":1921617,"creator":"ups","file_id":"5265","date_updated":"2018-11-02T14:13:19Z","content_type":"application/pdf","success":1,"relation":"main_file","date_created":"2018-11-02T14:13:19Z","file_name":"sna+16boomerang.pdf","access_level":"closed"}],"status":"public","has_accepted_license":"1","date_created":"2018-10-31T12:51:26Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"title":"Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java","ddc":["000"],"user_id":"477"},{"title":"Market-Specific Service Compositions: Specification and Matching","department":[{"_id":"66"},{"_id":"76"},{"_id":"355"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"_id":"10","name":"SFB 901 - Subproject B2"},{"_id":"3","name":"SFB 901 - Project Area B"}],"date_updated":"2022-01-06T06:57:49Z","doi":"10.1109/SERVICES.2015.58","language":[{"iso":"eng"}],"abstract":[{"text":"The Collaborative Research Centre \"On-The-Fly Computing\" works on foundations and principles for the vision of the Future Internet. It proposes the paradigm of On-The-Fly Computing, which tackles emerging worldwide service markets. In these markets, service providers trade software, platform, and infrastructure as a service. Service requesters state requirements on services. To satisfy these requirements, the new role of brokers, who are (human) actors building service compositions on the fly, is introduced. Brokers have to specify service compositions formally and comprehensively using a domain-specific language (DSL), and to use service matching for the discovery of the constituent services available in the market. The broker's choice of the DSL and matching approaches influences her success of building compositions as distinctive properties of different service markets play a significant role. In this paper, we propose a new approach of engineering a situation-specific DSL by customizing a comprehensive, modular DSL and its matching for given service market properties. This enables the broker to create market-specific composition specifications and to perform market-specific service matching. As a result, the broker builds service compositions satisfying the requester's requirements more accurately. We evaluated the presented concepts using case studies in service markets for tourism and university management.","lang":"eng"}],"user_id":"477","ddc":["040"],"file":[{"creator":"florida","file_id":"1470","file_size":234260,"relation":"main_file","success":1,"date_updated":"2018-03-21T09:26:04Z","content_type":"application/pdf","file_name":"280-07196546.pdf","date_created":"2018-03-21T09:26:04Z","access_level":"closed"}],"author":[{"full_name":"Arifulina, Svetlana","first_name":"Svetlana","last_name":"Arifulina"},{"last_name":"Platenius","first_name":"Marie Christin","full_name":"Platenius, Marie Christin"},{"last_name":"Mohr","first_name":"Felix","full_name":"Mohr, Felix"},{"id":"107","last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"first_name":"Wilhelm","full_name":"Schäfer, Wilhelm","last_name":"Schäfer"}],"file_date_updated":"2018-03-21T09:26:04Z","publication":"Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet","status":"public","has_accepted_license":"1","date_created":"2017-10-17T12:41:46Z","_id":"280","citation":{"bibtex":"@inproceedings{Arifulina_Platenius_Mohr_Engels_Schäfer_2015, title={Market-Specific Service Compositions: Specification and Matching}, DOI={10.1109/SERVICES.2015.58}, booktitle={Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet}, author={Arifulina, Svetlana and Platenius, Marie Christin and Mohr, Felix and Engels, Gregor and Schäfer, Wilhelm}, year={2015}, pages={333--340} }","mla":"Arifulina, Svetlana, et al. “Market-Specific Service Compositions: Specification and Matching.” Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet, 2015, pp. 333--340, doi:10.1109/SERVICES.2015.58.","apa":"Arifulina, S., Platenius, M. C., Mohr, F., Engels, G., & Schäfer, W. (2015). Market-Specific Service Compositions: Specification and Matching. In Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet (pp. 333--340). https://doi.org/10.1109/SERVICES.2015.58","ama":"Arifulina S, Platenius MC, Mohr F, Engels G, Schäfer W. Market-Specific Service Compositions: Specification and Matching. In: Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet. ; 2015:333--340. doi:10.1109/SERVICES.2015.58","chicago":"Arifulina, Svetlana, Marie Christin Platenius, Felix Mohr, Gregor Engels, and Wilhelm Schäfer. “Market-Specific Service Compositions: Specification and Matching.” In Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet, 333--340, 2015. https://doi.org/10.1109/SERVICES.2015.58.","ieee":"S. Arifulina, M. C. Platenius, F. Mohr, G. Engels, and W. Schäfer, “Market-Specific Service Compositions: Specification and Matching,” in Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet, 2015, pp. 333--340.","short":"S. Arifulina, M.C. Platenius, F. Mohr, G. Engels, W. Schäfer, in: Proceedings of the IEEE 11th World Congress on Services (SERVICES), Visionary Track: Service Composition for the Future Internet, 2015, pp. 333--340."},"year":"2015","type":"conference","page":"333--340"},{"language":[{"iso":"eng"}],"doi":"10.1145/2786805.2803181","date_updated":"2022-01-06T06:58:58Z","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"name":"SFB 901 - Project Area B","_id":"3"}],"department":[{"_id":"76"}],"title":"Comprehensive Service Matching with MatchBox","year":"2015","type":"conference","citation":{"apa":"Börding, P., Bruns, M., & Platenius, M. C. (2015). Comprehensive Service Matching with MatchBox. In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15) (pp. 974--977). https://doi.org/10.1145/2786805.2803181","ama":"Börding P, Bruns M, Platenius MC. Comprehensive Service Matching with MatchBox. In: 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15). ; 2015:974--977. doi:10.1145/2786805.2803181","chicago":"Börding, Paul, Melanie Bruns, and Marie Christin Platenius. “Comprehensive Service Matching with MatchBox.” In 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 974--977, 2015. https://doi.org/10.1145/2786805.2803181.","bibtex":"@inproceedings{Börding_Bruns_Platenius_2015, title={Comprehensive Service Matching with MatchBox}, DOI={10.1145/2786805.2803181}, booktitle={10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15)}, author={Börding, Paul and Bruns, Melanie and Platenius, Marie Christin}, year={2015}, pages={974--977} }","mla":"Börding, Paul, et al. “Comprehensive Service Matching with MatchBox.” 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977, doi:10.1145/2786805.2803181.","short":"P. Börding, M. Bruns, M.C. Platenius, in: 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977.","ieee":"P. Börding, M. Bruns, and M. C. Platenius, “Comprehensive Service Matching with MatchBox,” in 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE’15), 2015, pp. 974--977."},"page":"974--977","_id":"313","has_accepted_license":"1","status":"public","date_created":"2017-10-17T12:41:53Z","author":[{"last_name":"Börding","full_name":"Börding, Paul","first_name":"Paul"},{"last_name":"Bruns","full_name":"Bruns, Melanie","first_name":"Melanie"},{"last_name":"Platenius","full_name":"Platenius, Marie Christin","first_name":"Marie Christin"}],"file_date_updated":"2018-03-20T07:44:26Z","publication":"10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15)","file":[{"date_updated":"2018-03-20T07:44:26Z","content_type":"application/pdf","success":1,"relation":"main_file","file_size":875687,"file_id":"1438","creator":"florida","access_level":"closed","file_name":"313-p974-boerding.pdf","date_created":"2018-03-20T07:44:26Z"}],"ddc":["040"],"user_id":"477","abstract":[{"text":"Nowadays, many service providers offer software components in the form of Software as a Service. Requesters that want to discover those services in order to use or to integrate them, need to find out which service satisfies their requirements best. For this purpose, service matching approaches determine how well the specifications of provided services satisfy their requirements (including structural, behavioral, and non-functional requirements). In this paper, we describe the tool-suite MatchBox that allows the integration of existing service matchers and their combination as part of flexibly configurable matching processes. Taking requirements and service specifications as an input, MatchBox is able to execute such matching processes and deliver rich matching results. In contrast to related tools, MatchBox allows users to take into account many different kinds of requirements, while it also provides the flexibility to control the matching process in many different ways. ","lang":"eng"}]}]