[{"title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","main_file_link":[{"url":"http://bodden.de/pubs/ksa+18crysl.pdf"}],"date_updated":"2022-01-06T07:01:44Z","author":[{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"full_name":"Späth, Johannes","last_name":"Späth","first_name":"Johannes"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"},{"full_name":"Mezini, Mira","last_name":"Mezini","first_name":"Mira"}],"date_created":"2018-10-31T12:37:29Z","year":"2018","page":"10:1-10:27","citation":{"mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2018, pp. 10:1-10:27.","bibtex":"@inproceedings{Krüger_Späth_Ali_Bodden_Mezini_2018, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2018}, pages={10:1-10:27} }","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, in: European Conference on Object-Oriented Programming (ECOOP), 2018, pp. 10:1-10:27.","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2018). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In <i>European Conference on Object-Oriented Programming (ECOOP)</i> (pp. 10:1-10:27).","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” In <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 10:1-10:27, 2018.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” in <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2018, pp. 10:1-10:27.","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In: <i>European Conference on Object-Oriented Programming (ECOOP)</i>. ; 2018:10:1-10:27."},"has_accepted_license":"1","keyword":["ITSECWEBSITE","CROSSING"],"ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-02T13:51:05Z","_id":"5203","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"department":[{"_id":"76"}],"user_id":"477","status":"public","file":[{"file_size":747259,"file_name":"ksa+18crysl.pdf","access_level":"closed","file_id":"5255","date_updated":"2018-11-02T13:51:05Z","date_created":"2018-11-02T13:51:05Z","creator":"ups","success":1,"relation":"main_file","content_type":"application/pdf"}],"publication":"European Conference on Object-Oriented Programming (ECOOP)","type":"conference"},{"date_updated":"2022-01-06T06:50:39Z","publisher":"Universität Paderborn","date_created":"2017-12-13T07:52:01Z","author":[{"full_name":"Leer, Richard","last_name":"Leer","first_name":"Richard"}],"supervisor":[{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"title":"Measuring Performance of a Static Analysis Framework with an application to Immutability Analysis","has_accepted_license":"1","year":"2018","citation":{"ama":"Leer R. <i>Measuring Performance of a Static Analysis Framework with an Application to Immutability Analysis</i>. Universität Paderborn; 2018.","chicago":"Leer, Richard. <i>Measuring Performance of a Static Analysis Framework with an Application to Immutability Analysis</i>. Universität Paderborn, 2018.","ieee":"R. Leer, <i>Measuring Performance of a Static Analysis Framework with an application to Immutability Analysis</i>. Universität Paderborn, 2018.","bibtex":"@book{Leer_2018, title={Measuring Performance of a Static Analysis Framework with an application to Immutability Analysis}, publisher={Universität Paderborn}, author={Leer, Richard}, year={2018} }","mla":"Leer, Richard. <i>Measuring Performance of a Static Analysis Framework with an Application to Immutability Analysis</i>. Universität Paderborn, 2018.","short":"R. Leer, Measuring Performance of a Static Analysis Framework with an Application to Immutability Analysis, Universität Paderborn, 2018.","apa":"Leer, R. (2018). <i>Measuring Performance of a Static Analysis Framework with an application to Immutability Analysis</i>. Universität Paderborn."},"_id":"1044","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"department":[{"_id":"76"}],"user_id":"15504","ddc":["000"],"file_date_updated":"2018-11-21T06:15:51Z","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","file":[{"file_name":"ba_leer.pdf","access_level":"closed","file_id":"5768","file_size":1383049,"creator":"florida","date_created":"2018-11-21T06:15:51Z","date_updated":"2018-11-21T06:15:51Z","relation":"main_file","success":1,"content_type":"application/pdf"}]},{"type":"bachelorsthesis","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"5767","access_level":"closed","file_name":"ba_struewer.pdf","file_size":15839765,"creator":"florida","date_created":"2018-11-21T06:14:15Z","date_updated":"2018-11-21T06:14:15Z"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"_id":"1045","user_id":"15504","department":[{"_id":"76"}],"ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-21T06:14:15Z","has_accepted_license":"1","year":"2018","citation":{"ama":"Strüwer JN. <i>Interactive Data Visualization for Exploded Supergraphs</i>. Universität Paderborn; 2018.","ieee":"J. N. Strüwer, <i>Interactive Data Visualization for Exploded Supergraphs</i>. Universität Paderborn, 2018.","chicago":"Strüwer, Jan Niclas. <i>Interactive Data Visualization for Exploded Supergraphs</i>. Universität Paderborn, 2018.","apa":"Strüwer, J. N. (2018). <i>Interactive Data Visualization for Exploded Supergraphs</i>. Universität Paderborn.","short":"J.N. Strüwer, Interactive Data Visualization for Exploded Supergraphs, Universität Paderborn, 2018.","mla":"Strüwer, Jan Niclas. <i>Interactive Data Visualization for Exploded Supergraphs</i>. Universität Paderborn, 2018.","bibtex":"@book{Strüwer_2018, title={Interactive Data Visualization for Exploded Supergraphs}, publisher={Universität Paderborn}, author={Strüwer, Jan Niclas}, year={2018} }"},"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:50:40Z","author":[{"first_name":"Jan Niclas","last_name":"Strüwer","full_name":"Strüwer, Jan Niclas"}],"date_created":"2017-12-13T07:53:49Z","supervisor":[{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"title":"Interactive Data Visualization for Exploded Supergraphs"},{"author":[{"full_name":"Gerking, Christopher","last_name":"Gerking","first_name":"Christopher"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"first_name":"Wilhelm","full_name":"Schäfer, Wilhelm","last_name":"Schäfer"}],"date_created":"2020-11-30T09:56:23Z","publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:54:29Z","doi":"10.1007/978-3-662-52903-4_8-1","title":"Industrial Security by Design","publication_identifier":{"isbn":["978-3-662-52903-4"]},"citation":{"ama":"Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW, Engels G, Steffen E, eds. <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>. Springer Berlin Heidelberg; 2017:1-24. doi:<a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">10.1007/978-3-662-52903-4_8-1</a>","chicago":"Gerking, Christopher, Eric Bodden, and Wilhelm Schäfer. “Industrial Security by Design.” In <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>, edited by Günter W. Maier, Gregor Engels, and Eckhard Steffen, 1–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. <a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>.","ieee":"C. Gerking, E. Bodden, and W. Schäfer, “Industrial Security by Design,” in <i>Handbuch Gestaltung digitaler und vernetzter Arbeitswelten</i>, G. W. Maier, G. Engels, and E. Steffen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017, pp. 1–24.","short":"C. Gerking, E. Bodden, W. Schäfer, in: G.W. Maier, G. Engels, E. Steffen (Eds.), Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, Springer Berlin Heidelberg, Berlin, Heidelberg, 2017, pp. 1–24.","bibtex":"@inbook{Gerking_Bodden_Schäfer_2017, place={Berlin, Heidelberg}, title={Industrial Security by Design}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">10.1007/978-3-662-52903-4_8-1</a>}, booktitle={Handbuch Gestaltung digitaler und vernetzter Arbeitswelten}, publisher={Springer Berlin Heidelberg}, author={Gerking, Christopher and Bodden, Eric and Schäfer, Wilhelm}, editor={Maier, Günter W. and Engels, Gregor and Steffen, Eckhard}, year={2017}, pages={1–24} }","mla":"Gerking, Christopher, et al. “Industrial Security by Design.” <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>, edited by Günter W. Maier et al., Springer Berlin Heidelberg, 2017, pp. 1–24, doi:<a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">10.1007/978-3-662-52903-4_8-1</a>.","apa":"Gerking, C., Bodden, E., &#38; Schäfer, W. (2017). Industrial Security by Design. In G. W. Maier, G. Engels, &#38; E. Steffen (Eds.), <i>Handbuch Gestaltung digitaler und vernetzter Arbeitswelten</i> (pp. 1–24). Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>"},"page":"1-24","year":"2017","place":"Berlin, Heidelberg","user_id":"5786","department":[{"_id":"76"}],"_id":"20552","language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE"],"type":"book_chapter","publication":"Handbuch Gestaltung digitaler und vernetzter Arbeitswelten","status":"public","abstract":[{"text":"Das Zukunftsszenario der Industrie 4.0 ist gepr{\\\"a}gt durch einen massiven Anstieg der unternehmens{\\\"u}bergreifenden Vernetzung. Um einer Bedrohung durch unautorisierte Weitergabe oder Sabotage vertraulicher Daten entgegenzuwirken, muss der Informationssicherheit bereits im Entwurf der cyber-physischen Produktionssysteme ein hoher Stellenwert einger{\\\"a}umt werden. Dieses Paradigma wird als Security by Design bezeichnet. {\\\"U}ber den gesamten Entstehungsprozess hinweg muss nachverfolgt werden k{\\\"o}nnen, ob die Systeme spezifische Anforderungen an die Informationssicherheit erf{\\\"u}llen und damit die Eigenschaft der Industrial Security gew{\\\"a}hrleisten. Dieser Beitrag stellt einen Entwurfsansatz zur Nachverfolgung der Informationssicherheit vor, der durch Integration softwaretechnischer Methoden in das Systems Engineering eine Entwicklung nach dem Paradigma Security by Design erm{\\\"o}glicht.","lang":"eng"}],"editor":[{"last_name":"Maier","full_name":"Maier, Günter W.","first_name":"Günter W."},{"full_name":"Engels, Gregor","last_name":"Engels","first_name":"Gregor"},{"first_name":"Eckhard","full_name":"Steffen, Eckhard","last_name":"Steffen"}]},{"_id":"20553","department":[{"_id":"76"}],"user_id":"5786","language":[{"iso":"eng"}],"publication":"Data Science and Engineering","type":"journal_article","abstract":[{"lang":"eng","text":"Finding and fixing software vulnerabilities have become a major struggle for most software development companies. While generally without alternative, such fixing efforts are a major cost factor, which is why companies have a vital interest in focusing their secure software development activities such that they obtain an optimal return on this investment. We investigate, in this paper, quantitatively the major factors that impact the time it takes to fix a given security issue based on data collected automatically within SAP's secure development process, and we show how the issue fix time could be used to monitor the fixing process. We use three machine learning methods and evaluate their predictive power in predicting the time to fix issues. Interestingly, the models indicate that vulnerability type has less dominant impact on issue fix time than previously believed. The time it takes to fix an issue instead seems much more related to the component in which the potential vulnerability resides, the project related to the issue, the development groups that address the issue, and the closeness of the software release date. This indicates that the software structure, the fixing processes, and the development groups are the dominant factors that impact the time spent to address security issues. SAP can use the models to implement a continuous improvement of its secure software development process and to measure the impact of individual improvements. The development teams at SAP develop different types of software, adopt different internal development processes, use different programming languages and platforms, and are located in different cities and countries. Other organizations, may use the results---with precaution---and be learning organizations."}],"status":"public","date_updated":"2022-01-06T06:54:29Z","volume":2,"date_created":"2020-11-30T10:24:50Z","author":[{"first_name":"Lotfi","full_name":"Ben Othmane, Lotfi","last_name":"Ben Othmane"},{"first_name":"Golriz","full_name":"Chehrazi, Golriz","last_name":"Chehrazi"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"},{"last_name":"Tsalovski","full_name":"Tsalovski, Petar","first_name":"Petar"},{"full_name":"Brucker, Achim D.","last_name":"Brucker","first_name":"Achim D."}],"title":"Time for Addressing Software Security Issues: Prediction Models and Impacting Factors","doi":"https://doi.org/10.1007/s41019-016-0019-8","publication_identifier":{"issn":["2364-1541"]},"related_material":{"link":[{"url":"http://bodden.de/pubs/bcb17time.pdf","relation":"confirmation"}]},"issue":"2","year":"2017","page":"107-124","intvolume":"         2","citation":{"ama":"Ben Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker AD. Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. <i>Data Science and Engineering</i>. 2017;2(2):107-124. doi:<a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>","chicago":"Ben Othmane, Lotfi, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, and Achim D. Brucker. “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.” <i>Data Science and Engineering</i> 2, no. 2 (2017): 107–24. <a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>.","ieee":"L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, and A. D. Brucker, “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors,” <i>Data Science and Engineering</i>, vol. 2, no. 2, pp. 107–124, 2017, doi: <a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>.","mla":"Ben Othmane, Lotfi, et al. “Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.” <i>Data Science and Engineering</i>, vol. 2, no. 2, 2017, pp. 107–24, doi:<a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>.","bibtex":"@article{Ben Othmane_Chehrazi_Bodden_Tsalovski_Brucker_2017, title={Time for Addressing Software Security Issues: Prediction Models and Impacting Factors}, volume={2}, DOI={<a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>}, number={2}, journal={Data Science and Engineering}, author={Ben Othmane, Lotfi and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim D.}, year={2017}, pages={107–124} }","short":"L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, A.D. Brucker, Data Science and Engineering 2 (2017) 107–124.","apa":"Ben Othmane, L., Chehrazi, G., Bodden, E., Tsalovski, P., &#38; Brucker, A. D. (2017). Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. <i>Data Science and Engineering</i>, <i>2</i>(2), 107–124. <a href=\"https://doi.org/10.1007/s41019-016-0019-8\">https://doi.org/10.1007/s41019-016-0019-8</a>"}},{"title":"Self-adaptive static analysis","main_file_link":[{"url":"https://arxiv.org/abs/1710.07430"}],"date_updated":"2022-01-06T06:54:29Z","author":[{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647"}],"date_created":"2020-11-30T10:27:21Z","year":"2017","citation":{"mla":"Bodden, Eric. <i>Self-Adaptive Static Analysis</i>. 2017.","short":"E. Bodden, Self-Adaptive Static Analysis, 2017.","bibtex":"@book{Bodden_2017, title={Self-adaptive static analysis}, author={Bodden, Eric}, year={2017} }","apa":"Bodden, E. (2017). <i>Self-adaptive static analysis</i>.","ieee":"E. Bodden, <i>Self-adaptive static analysis</i>. 2017.","chicago":"Bodden, Eric. <i>Self-Adaptive Static Analysis</i>, 2017.","ama":"Bodden E. <i>Self-Adaptive Static Analysis</i>.; 2017."},"language":[{"iso":"eng"}],"_id":"20554","department":[{"_id":"76"}],"user_id":"5786","status":"public","type":"report","report_number":"arXiv:1710.07430"},{"publication":"IEEE Transactions on Software Engineering","type":"journal_article","status":"public","_id":"20557","department":[{"_id":"76"}],"user_id":"5786","keyword":["Androids","Bluetooth","Humanoid robots","Java","Software","Tools","Configuration options","Static analysis","Variability mining"],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["0098-5589"]},"issue":"99","year":"2017","page":"1-1","citation":{"ieee":"M. Lillack, C. Kästner, and E. Bodden, “Tracking Load-time Configuration Options,” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, pp. 1–1, 2017, doi: <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>.","chicago":"Lillack, Max, Christian Kästner, and Eric Bodden. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions on Software Engineering</i> PP, no. 99 (2017): 1–1. <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">https://doi.org/10.1109/TSE.2017.2756048</a>.","ama":"Lillack M, Kästner C, Bodden E. Tracking Load-time Configuration Options. <i>IEEE Transactions on Software Engineering</i>. 2017;PP(99):1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>","short":"M. Lillack, C. Kästner, E. Bodden, IEEE Transactions on Software Engineering PP (2017) 1–1.","mla":"Lillack, Max, et al. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, 2017, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>.","bibtex":"@article{Lillack_Kästner_Bodden_2017, title={Tracking Load-time Configuration Options}, volume={PP}, DOI={<a href=\"https://doi.org/10.1109/TSE.2017.2756048\">10.1109/TSE.2017.2756048</a>}, number={99}, journal={IEEE Transactions on Software Engineering}, author={Lillack, Max and Kästner, Christian and Bodden, Eric}, year={2017}, pages={1–1} }","apa":"Lillack, M., Kästner, C., &#38; Bodden, E. (2017). Tracking Load-time Configuration Options. <i>IEEE Transactions on Software Engineering</i>, <i>PP</i>(99), 1–1. <a href=\"https://doi.org/10.1109/TSE.2017.2756048\">https://doi.org/10.1109/TSE.2017.2756048</a>"},"date_updated":"2022-01-06T06:54:30Z","volume":"PP","date_created":"2020-11-30T11:06:43Z","author":[{"first_name":"Max","last_name":"Lillack","full_name":"Lillack, Max"},{"full_name":"Kästner, Christian","last_name":"Kästner","first_name":"Christian"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"title":"Tracking Load-time Configuration Options","doi":"10.1109/TSE.2017.2756048","main_file_link":[{"url":"http://bodden.de/pubs/lkb17lotrack.pdf"}]},{"year":"2017","citation":{"short":"S. Krüger, S. Nadi, M. Reif, K. Ali, M. Mezini, E. Bodden, F. Göpfert, F. Günther, C. Weinert, D. Demmler, R. Kamath, in: International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track, 2017.","bibtex":"@inproceedings{Krüger_Nadi_Reif_Ali_Mezini_Bodden_Göpfert_Günther_Weinert_Demmler_et al._2017, title={CogniCrypt: Supporting Developers in using Cryptography}, booktitle={International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track}, author={Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and et al.}, year={2017} }","mla":"Krüger, Stefan, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>, 2017.","apa":"Krüger, S., Nadi, S., Reif, M., Ali, K., Mezini, M., Bodden, E., Göpfert, F., Günther, F., Weinert, C., Demmler, D., &#38; Kamath, R. (2017). CogniCrypt: Supporting Developers in using Cryptography. <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>.","chicago":"Krüger, Stefan, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” In <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>, 2017.","ieee":"S. Krüger <i>et al.</i>, “CogniCrypt: Supporting Developers in using Cryptography,” 2017.","ama":"Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using Cryptography. In: <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>. ; 2017."},"title":"CogniCrypt: Supporting Developers in using Cryptography","main_file_link":[{"url":"http://bodden.de/pubs/knr+17cognicrypt.pdf"}],"date_updated":"2022-01-06T06:54:30Z","date_created":"2020-11-30T11:08:26Z","author":[{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"last_name":"Nadi","full_name":"Nadi, Sarah","first_name":"Sarah"},{"last_name":"Reif","full_name":"Reif, Michael","first_name":"Michael"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"first_name":"Mira","full_name":"Mezini, Mira","last_name":"Mezini"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"},{"full_name":"Göpfert, Florian","last_name":"Göpfert","first_name":"Florian"},{"full_name":"Günther, Felix","last_name":"Günther","first_name":"Felix"},{"first_name":"Christian","full_name":"Weinert, Christian","last_name":"Weinert"},{"full_name":"Demmler, Daniel","last_name":"Demmler","first_name":"Daniel"},{"first_name":"Ram","last_name":"Kamath","full_name":"Kamath, Ram"}],"status":"public","type":"conference","publication":"International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track","keyword":["ITSECWEBSITE","CROSSING"],"language":[{"iso":"eng"}],"_id":"20558","user_id":"5786","department":[{"_id":"76"}]},{"publisher":"ACM","date_updated":"2022-01-06T06:54:30Z","date_created":"2020-11-30T11:10:01Z","author":[{"full_name":"Do, Lisa Nguyen Quang","last_name":"Do","first_name":"Lisa Nguyen Quang"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"first_name":"Benjamin","last_name":"Livshits","full_name":"Livshits, Benjamin"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"first_name":"Justin","full_name":"Smith, Justin","last_name":"Smith"},{"last_name":"Murphy-Hill","full_name":"Murphy-Hill, Emerson","first_name":"Emerson"}],"title":"Just-in-time Static Analysis","main_file_link":[{"url":"http://bodden.de/pubs/nal+17jit.pdf"}],"doi":"10.1145/3092703.3092705","publication_identifier":{"isbn":["978-1-4503-5076-1"]},"year":"2017","place":"New York, NY, USA","citation":{"apa":"Do, L. N. Q., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill, E. (2017). Just-in-time Static Analysis. <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 307–317. <a href=\"https://doi.org/10.1145/3092703.3092705\">https://doi.org/10.1145/3092703.3092705</a>","bibtex":"@inproceedings{Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, place={New York, NY, USA}, series={ISSTA 2017}, title={Just-in-time Static Analysis}, DOI={<a href=\"https://doi.org/10.1145/3092703.3092705\">10.1145/3092703.3092705</a>}, booktitle={Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis}, publisher={ACM}, author={Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017}, pages={307–317}, collection={ISSTA 2017} }","short":"L.N.Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, New York, NY, USA, 2017, pp. 307–317.","mla":"Do, Lisa Nguyen Quang, et al. “Just-in-Time Static Analysis.” <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, ACM, 2017, pp. 307–17, doi:<a href=\"https://doi.org/10.1145/3092703.3092705\">10.1145/3092703.3092705</a>.","chicago":"Do, Lisa Nguyen Quang, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Just-in-Time Static Analysis.” In <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 307–17. ISSTA 2017. New York, NY, USA: ACM, 2017. <a href=\"https://doi.org/10.1145/3092703.3092705\">https://doi.org/10.1145/3092703.3092705</a>.","ieee":"L. N. Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, “Just-in-time Static Analysis,” in <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>, 2017, pp. 307–317, doi: <a href=\"https://doi.org/10.1145/3092703.3092705\">10.1145/3092703.3092705</a>.","ama":"Do LNQ, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Just-in-time Static Analysis. In: <i>Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>. ISSTA 2017. ACM; 2017:307-317. doi:<a href=\"https://doi.org/10.1145/3092703.3092705\">10.1145/3092703.3092705</a>"},"page":"307-317","_id":"20559","user_id":"5786","series_title":"ISSTA 2017","department":[{"_id":"76"}],"keyword":["Just-in-Time","Layered analysis","Static analysis"],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis","status":"public"},{"language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"user_id":"5786","department":[{"_id":"76"}],"_id":"20715","status":"public","type":"conference","publication":"International Conference for Software Engineering (ICSE), Tool Demonstrations Track","main_file_link":[{"url":"http://bodden.de/pubs/dal17cheetah.pdf"}],"title":"Cheetah: Just-in-Time Taint Analysis for Android Apps","date_created":"2020-12-14T11:51:44Z","author":[{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"last_name":"Livshits","full_name":"Livshits, Benjamin","first_name":"Benjamin"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"},{"full_name":"Smith, Justin","last_name":"Smith","first_name":"Justin"},{"full_name":"Murphy-Hill, Emerson","last_name":"Murphy-Hill","first_name":"Emerson"}],"date_updated":"2022-01-06T06:54:34Z","citation":{"ama":"Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Cheetah: Just-in-Time Taint Analysis for Android Apps. In: <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>. ; 2017.","chicago":"Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” In <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2017.","ieee":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, “Cheetah: Just-in-Time Taint Analysis for Android Apps,” 2017.","bibtex":"@inproceedings{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, title={Cheetah: Just-in-Time Taint Analysis for Android Apps}, booktitle={International Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017} }","mla":"Nguyen Quang Do, Lisa, et al. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2017.","short":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in: International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2017.","apa":"Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill, E. (2017). Cheetah: Just-in-Time Taint Analysis for Android Apps. <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>."},"year":"2017"},{"date_created":"2020-12-17T13:30:15Z","author":[{"full_name":"Schivo, Stefano","last_name":"Schivo","first_name":"Stefano"},{"full_name":"Yildiz., Bugra M.","last_name":"Yildiz.","first_name":"Bugra M."},{"first_name":"Enno","full_name":"Ruijters, Enno","last_name":"Ruijters"},{"first_name":"Christopher","last_name":"Gerking","full_name":"Gerking, Christopher"},{"full_name":"Kumar, Rajesh","last_name":"Kumar","first_name":"Rajesh"},{"full_name":"Dziwok, Stefan","id":"3901","orcid":"http://orcid.org/0000-0002-8679-6673","last_name":"Dziwok","first_name":"Stefan"},{"first_name":"Arend","full_name":"Rensink, Arend","last_name":"Rensink"},{"full_name":"Stoelinga, Mariëlle","last_name":"Stoelinga","first_name":"Mariëlle"}],"publisher":"Springer","date_updated":"2022-01-06T06:54:38Z","doi":"10.1007/978-3-319-69483-2_19","title":"How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach","issue":"10606","citation":{"ama":"Schivo S, Yildiz. BM, Ruijters E, et al. How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In: Larsen KG, Sokolsky O, Wang J, eds. <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>. Lecture Notes in Computer Science. Springer; 2017:319-336. doi:<a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">10.1007/978-3-319-69483-2_19</a>","chicago":"Schivo, Stefano, Bugra M. Yildiz., Enno Ruijters, Christopher Gerking, Rajesh Kumar, Stefan Dziwok, Arend Rensink, and Mariëlle Stoelinga. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” In <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>, edited by Kim G. Larsen, Oleg Sokolsky, and Ji Wang, 319–36. Lecture Notes in Computer Science. Changsha: Springer, 2017. <a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">https://doi.org/10.1007/978-3-319-69483-2_19</a>.","ieee":"S. Schivo <i>et al.</i>, “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach,” in <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>, 2017, no. 10606, pp. 319–336, doi: <a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">10.1007/978-3-319-69483-2_19</a>.","short":"S. Schivo, B.M. Yildiz., E. Ruijters, C. Gerking, R. Kumar, S. Dziwok, A. Rensink, M. Stoelinga, in: K.G. Larsen, O. Sokolsky, J. Wang (Eds.), Dependable Software Engineering, 3rd International Symposium (SETTA 2017), Springer, Changsha, 2017, pp. 319–336.","bibtex":"@inproceedings{Schivo_Yildiz._Ruijters_Gerking_Kumar_Dziwok_Rensink_Stoelinga_2017, place={Changsha}, series={Lecture Notes in Computer Science}, title={How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">10.1007/978-3-319-69483-2_19</a>}, number={10606}, booktitle={Dependable Software Engineering, 3rd International Symposium (SETTA 2017)}, publisher={Springer}, author={Schivo, Stefano and Yildiz., Bugra M. and Ruijters, Enno and Gerking, Christopher and Kumar, Rajesh and Dziwok, Stefan and Rensink, Arend and Stoelinga, Mariëlle}, editor={Larsen, Kim G. and Sokolsky, Oleg and Wang, Ji}, year={2017}, pages={319–336}, collection={Lecture Notes in Computer Science} }","mla":"Schivo, Stefano, et al. “How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>, edited by Kim G. Larsen et al., no. 10606, Springer, 2017, pp. 319–36, doi:<a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">10.1007/978-3-319-69483-2_19</a>.","apa":"Schivo, S., Yildiz., B. M., Ruijters, E., Gerking, C., Kumar, R., Dziwok, S., Rensink, A., &#38; Stoelinga, M. (2017). How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach. In K. G. Larsen, O. Sokolsky, &#38; J. Wang (Eds.), <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i> (Issue 10606, pp. 319–336). Springer. <a href=\"https://doi.org/10.1007/978-3-319-69483-2_19\">https://doi.org/10.1007/978-3-319-69483-2_19</a>"},"page":"319-336","place":"Changsha","year":"2017","user_id":"5786","series_title":"Lecture Notes in Computer Science","department":[{"_id":"76"},{"_id":"241"}],"_id":"20792","language":[{"iso":"eng"}],"type":"conference","publication":"Dependable Software Engineering, 3rd International Symposium (SETTA 2017)","status":"public","editor":[{"full_name":"Larsen, Kim G.","last_name":"Larsen","first_name":"Kim G."},{"first_name":"Oleg","full_name":"Sokolsky, Oleg","last_name":"Sokolsky"},{"first_name":"Ji","last_name":"Wang","full_name":"Wang, Ji"}]},{"title":"Specification and Verification for Real-Time Coordination Protocols of Cyber-physical Systems","publisher":"Paderborn University","date_updated":"2022-01-06T06:54:38Z","author":[{"first_name":"Stefan","orcid":"http://orcid.org/0000-0002-8679-6673","last_name":"Dziwok","full_name":"Dziwok, Stefan","id":"3901"}],"date_created":"2020-12-17T13:32:52Z","year":"2017","citation":{"apa":"Dziwok, S. (2017). <i>Specification and Verification for Real-Time Coordination Protocols of Cyber-physical Systems</i>. Paderborn University.","mla":"Dziwok, Stefan. <i>Specification and Verification for Real-Time Coordination Protocols of Cyber-Physical Systems</i>. Paderborn University, 2017.","bibtex":"@book{Dziwok_2017, title={Specification and Verification for Real-Time Coordination Protocols of Cyber-physical Systems}, publisher={Paderborn University}, author={Dziwok, Stefan}, year={2017} }","short":"S. Dziwok, Specification and Verification for Real-Time Coordination Protocols of Cyber-Physical Systems, Paderborn University, 2017.","ama":"Dziwok S. <i>Specification and Verification for Real-Time Coordination Protocols of Cyber-Physical Systems</i>. Paderborn University; 2017.","ieee":"S. Dziwok, <i>Specification and Verification for Real-Time Coordination Protocols of Cyber-physical Systems</i>. Paderborn University, 2017.","chicago":"Dziwok, Stefan. <i>Specification and Verification for Real-Time Coordination Protocols of Cyber-Physical Systems</i>. Paderborn University, 2017."},"language":[{"iso":"eng"}],"_id":"20794","department":[{"_id":"76"},{"_id":"241"}],"user_id":"5786","abstract":[{"lang":"eng","text":"Cyber-physische Systeme (CPSs) sind die nächste Generation von eingebetteten Systemen, die fortwährend ihre Zusammenarbeit koordinieren, um anspruchsvolle Funktionen zu erfüllen. Die Koordination zwischen ihnen kann in Software mittels asynchroner Nachrichtenkommunikation realisiert werden. Um die funktionale Korrektheit der Software zu gewährleisten, ist aufgrund der Kritikalität dieser Systeme eine formale Verifikation wie z.B. Model Checking notwendig. Die Eingabesprache eines Model Checkers unterstützt jedoch domänenspezifische Aspekte wie asynchrone Kommunikation nicht direkt, wodurch diese vom Softwareingenieur mittels zahlreicher Modellelemente spezifiziert werden müssen. Dies ist hochgradig komplex und somit fehleranfällig. Im Rahmen dieser Arbeit wird eine modellgetriebene Methode zur domänenspezifischen Spezifikation und vollautomatischen Verifikation der nachrichtenbasierten Koordination von CPSs präsentiert. Mit Hilfe dieser Methode kann der Softwareingenieur die Koordination kompakt modellieren und muss nicht länger verstehen, wie seine Spezifikation auf der Ebene des Model Checkers ausgedrückt wird. Insgesamt wird die Komplexität für den Softwareingenieur somit deutlich handhabbarer. Bezüglich der Spezifikation einer solchen Koordination definiert die Arbeit eine domänenspezifische Sprache namens Real-Time Coordination Protocols (RTCPs). Darüber hinaus wird eine domänenspezifische Sprache zur Spezifikation von Verifikationseigenschaften eingeführt und Entwurfsmuster für RTCPs präsentiert, um die Anzahl der Modellierungsfehler zu senken."}],"status":"public","type":"dissertation"},{"type":"conference","publication":"Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017)","status":"public","editor":[{"last_name":"Guerra","full_name":"Guerra, Esther","first_name":"Esther"},{"last_name":"van den Brand","full_name":"van den Brand, Mark","first_name":"Mark"}],"user_id":"5786","series_title":"Lecture Notes in Computer Science","department":[{"_id":"76"},{"_id":"241"}],"_id":"20797","language":[{"iso":"eng"}],"issue":"10374","citation":{"ama":"Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities. In: Guerra E, van den Brand M, eds. <i>Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017)</i>. Lecture Notes in Computer Science. Springer; 2017:19-34.","chicago":"Gerking, Christopher, David Schubert, and Ingo Budde. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” In <i>Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017)</i>, edited by Esther Guerra and Mark van den Brand, 19–34. Lecture Notes in Computer Science. Marburg: Springer, 2017.","ieee":"C. Gerking, D. Schubert, and I. Budde, “Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities,” in <i>Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017)</i>, 2017, no. 10374, pp. 19–34.","mla":"Gerking, Christopher, et al. “Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities.” <i>Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017)</i>, edited by Esther Guerra and Mark van den Brand, no. 10374, Springer, 2017, pp. 19–34.","bibtex":"@inproceedings{Gerking_Schubert_Budde_2017, place={Marburg}, series={Lecture Notes in Computer Science}, title={Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities}, number={10374}, booktitle={Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017)}, publisher={Springer}, author={Gerking, Christopher and Schubert, David and Budde, Ingo}, editor={Guerra, Esther and van den Brand, Mark}, year={2017}, pages={19–34}, collection={Lecture Notes in Computer Science} }","short":"C. Gerking, D. Schubert, I. Budde, in: E. Guerra, M. van den Brand (Eds.), Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017), Springer, Marburg, 2017, pp. 19–34.","apa":"Gerking, C., Schubert, D., &#38; Budde, I. (2017). Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities. In E. Guerra &#38; M. van den Brand (Eds.), <i>Theory and Practice of Model Transformation, 10th International Conference (ICMT 2017)</i> (Issue 10374, pp. 19–34). Springer."},"page":"19-34","place":"Marburg","year":"2017","author":[{"first_name":"Christopher","full_name":"Gerking, Christopher","last_name":"Gerking"},{"first_name":"David","full_name":"Schubert, David","id":"9106","last_name":"Schubert"},{"first_name":"Ingo","orcid":"https://orcid.org/0000-0003-0124-6291","last_name":"Budde","id":"13693","full_name":"Budde, Ingo"}],"date_created":"2020-12-17T13:36:44Z","date_updated":"2022-01-06T06:54:39Z","publisher":"Springer","main_file_link":[{"url":"https://link.springer.com/chapter/10.1007/978-3-319-61473-1_2"}],"title":"Reducing the Verbosity of Imperative Model Refinements by using General-Purpose Language Facilities"},{"abstract":[{"lang":"eng","text":"Modern Cyber-physical Systems are executed in physical environments and distributed over several Electronic Control Units using multiple cores for execution. These systems perform safety-critical tasks and, therefore, have to fulfill hard real-time requirements. To face these requirements systematically, system engineers de- velop these systems model-driven and prove the fulfillment of these requirements via model checking. It is important to ensure that the runtime scheduling does not violate the verified requirements by neglecting the model checking assumptions. Currently, there is a gap in the process for model-driven approaches to derive a feasible runtime scheduling that respects these assumptions. In this paper, we present an approach for a semi- automatic synthesis of behavioral models into a deterministic scheduling that respects real-time requirements at runtime. We evaluate our approach using an example of a distributed automotive system with hard real-time requirements specified with the MechatronicUML method."}],"status":"public","type":"conference","publication":"Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development","language":[{"iso":"eng"}],"_id":"20804","user_id":"5786","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"year":"2017","citation":{"short":"J. Geismann, U. Pohlmann, D. Schmelter, in: Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017.","mla":"Geismann, Johannes, et al. “Towards an Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” <i>Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development</i>, 2017.","bibtex":"@inproceedings{Geismann_Pohlmann_Schmelter_2017, title={Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems}, booktitle={Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development}, author={Geismann, Johannes and Pohlmann, Uwe and Schmelter, David}, year={2017} }","apa":"Geismann, J., Pohlmann, U., &#38; Schmelter, D. (2017). Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems. <i>Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development</i>.","chicago":"Geismann, Johannes, Uwe Pohlmann, and David Schmelter. “Towards an Automated Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” In <i>Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development</i>, 2017.","ieee":"J. Geismann, U. Pohlmann, and D. Schmelter, “Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems,” 2017.","ama":"Geismann J, Pohlmann U, Schmelter D. Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems. In: <i>Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development</i>. ; 2017."},"title":"Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems","date_updated":"2022-01-06T06:54:39Z","date_created":"2020-12-17T13:59:04Z","author":[{"first_name":"Johannes","orcid":"https://orcid.org/0000-0003-2015-2047","last_name":"Geismann","id":"20063","full_name":"Geismann, Johannes"},{"first_name":"Uwe","full_name":"Pohlmann, Uwe","last_name":"Pohlmann"},{"id":"40982","full_name":"Schmelter, David","last_name":"Schmelter","orcid":"0000-0001-7787-5380","first_name":"David"}]},{"language":[{"iso":"eng"}],"_id":"20805","user_id":"5786","department":[{"_id":"76"}],"status":"public","type":"dissertation","title":"Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction","publisher":"Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik","date_updated":"2022-01-06T06:54:39Z","date_created":"2020-12-17T14:00:21Z","author":[{"last_name":"Becker","full_name":"Becker, Matthias","first_name":"Matthias"}],"year":"2017","citation":{"ama":"Becker M. <i>Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik; 2017.","chicago":"Becker, Matthias. <i>Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2017.","ieee":"M. Becker, <i>Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2017.","apa":"Becker, M. (2017). <i>Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik.","mla":"Becker, Matthias. <i>Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2017.","bibtex":"@book{Becker_2017, title={Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction}, publisher={Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik}, author={Becker, Matthias}, year={2017} }","short":"M. Becker, Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction, Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2017."}},{"date_updated":"2022-01-06T07:01:44Z","publisher":"ACM Press","author":[{"full_name":"Späth, Johannes","last_name":"Späth","first_name":"Johannes"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647"}],"date_created":"2018-10-31T12:46:50Z","title":"IDEal: Efficient and Precise Alias-aware Dataflow Analysis","main_file_link":[{"url":" http://bodden.de/pubs/sab17ideal.pdf"}],"has_accepted_license":"1","year":"2017","citation":{"short":"J. Späth, K. Ali, E. Bodden, in: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017.","mla":"Späth, Johannes, et al. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, ACM Press, 2017.","bibtex":"@inproceedings{Späth_Ali_Bodden_2017, title={IDEal: Efficient and Precise Alias-aware Dataflow Analysis}, booktitle={2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)}, publisher={ACM Press}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2017} }","apa":"Späth, J., Ali, K., &#38; Bodden, E. (2017). IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press.","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press, 2017.","ieee":"J. Späth, K. Ali, and E. Bodden, “IDEal: Efficient and Precise Alias-aware Dataflow Analysis,” in <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, 2017.","ama":"Späth J, Ali K, Bodden E. IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In: <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press; 2017."},"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"_id":"5204","user_id":"477","department":[{"_id":"76"}],"ddc":["000"],"keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"file_date_updated":"2018-11-02T14:28:13Z","language":[{"iso":"eng"}],"type":"conference","publication":"2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)","file":[{"file_size":1021251,"access_level":"closed","file_id":"5273","file_name":"sab17ideal.pdf","date_updated":"2018-11-02T14:28:13Z","date_created":"2018-11-02T14:28:13Z","creator":"ups","success":1,"relation":"main_file","content_type":"application/pdf"}],"status":"public"},{"file_date_updated":"2018-11-02T16:03:01Z","language":[{"iso":"eng"}],"ddc":["000"],"user_id":"477","department":[{"_id":"76"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"_id":"5209","file":[{"content_type":"application/pdf","relation":"main_file","success":1,"date_created":"2018-11-02T16:03:01Z","creator":"ups","date_updated":"2018-11-02T16:03:01Z","access_level":"closed","file_id":"5321","file_name":"1710.00390.pdf","file_size":2339380}],"status":"public","type":"journal_article","publication":"CoRR","main_file_link":[{"url":"https://arxiv.org/pdf/1710.00390.pdf"}],"title":"Computation on Encrypted Data using Data Flow Authentication","date_created":"2018-10-31T13:12:32Z","author":[{"last_name":"Fischer","full_name":"Fischer, Andreas","first_name":"Andreas"},{"last_name":"Fuhry","full_name":"Fuhry, Benny","first_name":"Benny"},{"full_name":"Kerschbaum, Florian","last_name":"Kerschbaum","first_name":"Florian"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric"}],"volume":"abs/1710.00390","date_updated":"2022-01-06T07:01:46Z","citation":{"ieee":"A. Fischer, B. Fuhry, F. Kerschbaum, and E. Bodden, “Computation on Encrypted Data using Data Flow Authentication,” <i>CoRR</i>, vol. abs/1710.00390, 2017.","chicago":"Fischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. “Computation on Encrypted Data Using Data Flow Authentication.” <i>CoRR</i> abs/1710.00390 (2017).","ama":"Fischer A, Fuhry B, Kerschbaum F, Bodden E. Computation on Encrypted Data using Data Flow Authentication. <i>CoRR</i>. 2017;abs/1710.00390.","mla":"Fischer, Andreas, et al. “Computation on Encrypted Data Using Data Flow Authentication.” <i>CoRR</i>, vol. abs/1710.00390, 2017.","bibtex":"@article{Fischer_Fuhry_Kerschbaum_Bodden_2017, title={Computation on Encrypted Data using Data Flow Authentication}, volume={abs/1710.00390}, journal={CoRR}, author={Fischer, Andreas and Fuhry, Benny and Kerschbaum, Florian and Bodden, Eric}, year={2017} }","short":"A. Fischer, B. Fuhry, F. Kerschbaum, E. Bodden, CoRR abs/1710.00390 (2017).","apa":"Fischer, A., Fuhry, B., Kerschbaum, F., &#38; Bodden, E. (2017). Computation on Encrypted Data using Data Flow Authentication. <i>CoRR</i>, <i>abs/1710.00390</i>."},"year":"2017","has_accepted_license":"1"},{"citation":{"ieee":"M. Becker, <i>Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction</i>. Universität Paderborn, 2017.","chicago":"Becker, Matthias. <i>Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction</i>. Universität Paderborn, 2017. <a href=\"https://doi.org/10.17619/UNIPB/1-133\">https://doi.org/10.17619/UNIPB/1-133</a>.","ama":"Becker M. <i>Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction</i>. Universität Paderborn; 2017. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-133\">10.17619/UNIPB/1-133</a>","apa":"Becker, M. (2017). <i>Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction</i>. Universität Paderborn. <a href=\"https://doi.org/10.17619/UNIPB/1-133\">https://doi.org/10.17619/UNIPB/1-133</a>","bibtex":"@book{Becker_2017, title={Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-133\">10.17619/UNIPB/1-133</a>}, publisher={Universität Paderborn}, author={Becker, Matthias}, year={2017} }","mla":"Becker, Matthias. <i>Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction</i>. Universität Paderborn, 2017, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-133\">10.17619/UNIPB/1-133</a>.","short":"M. Becker, Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction, Universität Paderborn, 2017."},"year":"2017","author":[{"first_name":"Matthias","full_name":"Becker, Matthias","last_name":"Becker"}],"date_created":"2017-10-17T12:41:11Z","supervisor":[{"first_name":"Steffen","last_name":"Becker","full_name":"Becker, Steffen"}],"date_updated":"2022-01-06T06:50:31Z","publisher":"Universität Paderborn","doi":"10.17619/UNIPB/1-133","title":"Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction","type":"dissertation","status":"public","department":[{"_id":"76"}],"user_id":"477","_id":"102","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt B3","_id":"11"},{"name":"SFB 901 - Project Area B","_id":"3"}]},{"title":"CrySL: Validating Correct Usage of Cryptographic APIs","main_file_link":[{"url":"https://arxiv.org/abs/1710.00564"}],"date_updated":"2026-02-19T14:39:50Z","date_created":"2020-11-30T10:29:41Z","author":[{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"}],"year":"2017","citation":{"mla":"Krüger, Stefan, et al. <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>. 2017.","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, CrySL: Validating Correct Usage of Cryptographic APIs, 2017.","bibtex":"@book{Krüger_Späth_Ali_Bodden_Mezini_2017, title={CrySL: Validating Correct Usage of Cryptographic APIs}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2017} }","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2017). <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>.","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>.; 2017.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>. 2017.","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>, 2017."},"keyword":["ITSECWEBSITE"],"language":[{"iso":"eng"}],"external_id":{"arxiv":["1710.00564"]},"_id":"20555","user_id":"14972","department":[{"_id":"76"}],"status":"public","type":"report"},{"type":"dissertation","file":[{"file_name":"195-Dissertation_-_Marie_Christin_Platenius.pdf","access_level":"closed","file_id":"1527","file_size":18246710,"creator":"florida","date_created":"2018-03-21T12:15:58Z","date_updated":"2018-03-21T12:15:58Z","relation":"main_file","success":1,"content_type":"application/pdf"}],"status":"public","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt B1","_id":"9"},{"_id":"3","name":"SFB 901 - Project Area B"}],"_id":"195","user_id":"14052","department":[{"_id":"76"}],"ddc":["040"],"file_date_updated":"2018-03-21T12:15:58Z","has_accepted_license":"1","year":"2016","citation":{"apa":"Platenius, M. C. (2016). <i>Fuzzy Matching of Comprehensive Service Specifications</i>. Universität Paderborn.","bibtex":"@book{Platenius_2016, title={Fuzzy Matching of Comprehensive Service Specifications}, publisher={Universität Paderborn}, author={Platenius, Marie Christin}, year={2016} }","short":"M.C. Platenius, Fuzzy Matching of Comprehensive Service Specifications, Universität Paderborn, 2016.","mla":"Platenius, Marie Christin. <i>Fuzzy Matching of Comprehensive Service Specifications</i>. Universität Paderborn, 2016.","chicago":"Platenius, Marie Christin. <i>Fuzzy Matching of Comprehensive Service Specifications</i>. Universität Paderborn, 2016.","ieee":"M. C. Platenius, <i>Fuzzy Matching of Comprehensive Service Specifications</i>. Universität Paderborn, 2016.","ama":"Platenius MC. <i>Fuzzy Matching of Comprehensive Service Specifications</i>. Universität Paderborn; 2016."},"date_updated":"2022-01-06T06:54:06Z","publisher":"Universität Paderborn","supervisor":[{"last_name":"Schäfer","full_name":"Schäfer, Wilhelm","first_name":"Wilhelm"}],"date_created":"2017-10-17T12:41:30Z","author":[{"first_name":"Marie Christin","last_name":"Platenius","full_name":"Platenius, Marie Christin"}],"title":"Fuzzy Matching of Comprehensive Service Specifications"}]
