[{"type":"report","status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_name":"MarketSurvey_Techreport (1).pdf","file_id":"5534","file_size":1024328,"creator":"bahareh","date_created":"2018-11-12T19:11:20Z","date_updated":"2018-11-12T19:11:20Z"}],"department":[{"_id":"276"},{"_id":"66"},{"_id":"76"}],"user_id":"477","_id":"198","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C5","_id":"17"},{"_id":"4","name":"SFB 901 - Project Area C"}],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-12T19:11:20Z","ddc":["040"],"has_accepted_license":"1","citation":{"bibtex":"@book{Jazayeri_Platenius_Engels_Kundisch_2016, title={Features of IT Service Markets: A Systematic Literature Review (Supplementary Material)}, publisher={Universität Paderborn}, author={Jazayeri, Bahar and Platenius, Marie Christin and Engels, Gregor and Kundisch, Dennis}, year={2016} }","short":"B. Jazayeri, M.C. Platenius, G. Engels, D. Kundisch, Features of IT Service Markets: A Systematic Literature Review (Supplementary Material), Universität Paderborn, 2016.","mla":"Jazayeri, Bahar, et al. <i>Features of IT Service Markets: A Systematic Literature Review (Supplementary Material)</i>. Universität Paderborn, 2016.","apa":"Jazayeri, B., Platenius, M. C., Engels, G., &#38; Kundisch, D. (2016). <i>Features of IT Service Markets: A Systematic Literature Review (Supplementary Material)</i>. Universität Paderborn.","ieee":"B. Jazayeri, M. C. Platenius, G. Engels, and D. Kundisch, <i>Features of IT Service Markets: A Systematic Literature Review (Supplementary Material)</i>. Universität Paderborn, 2016.","chicago":"Jazayeri, Bahar, Marie Christin Platenius, Gregor Engels, and Dennis Kundisch. <i>Features of IT Service Markets: A Systematic Literature Review (Supplementary Material)</i>. Universität Paderborn, 2016.","ama":"Jazayeri B, Platenius MC, Engels G, Kundisch D. <i>Features of IT Service Markets: A Systematic Literature Review (Supplementary Material)</i>. Universität Paderborn; 2016."},"year":"2016","date_created":"2017-10-17T12:41:30Z","author":[{"full_name":"Jazayeri, Bahar","id":"36399","last_name":"Jazayeri","first_name":"Bahar"},{"last_name":"Platenius","full_name":"Platenius, Marie Christin","first_name":"Marie Christin"},{"last_name":"Engels","full_name":"Engels, Gregor","id":"107","first_name":"Gregor"},{"full_name":"Kundisch, Dennis","id":"21117","last_name":"Kundisch","first_name":"Dennis"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T06:54:13Z","title":"Features of IT Service Markets: A Systematic Literature Review (Supplementary Material)"},{"ddc":["040"],"language":[{"iso":"eng"}],"abstract":[{"text":"The provision of IT solutions over electronic marketplaces became prominent in recent years. We call such marketplaces IT service markets. IT service markets have some core architectural building blocks that impact the quality attributes of these markets. However, these building blocks and their impacts are not well-known. Thus, design choices for IT service markets have been made ad-hoc until now. Furthermore, only single aspects of such markets have been investigated until now, but a comprehensive view is missing.In this paper, we identify common features and their interrelations on the basis of a systematic literature review of 60 publications using grounded theory.This knowledge provides an empirical evidence on the interdisciplinary design choices of IT service markets and it serves as a basis to support market providers and developers to integrate market features. Thereby, we make a first step towards the creation of a reference model for IT service markets that provides a holistic integrated view that can be used to create and maintain successful markets in the future.","lang":"eng"}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-03-21T12:15:24Z","date_created":"2018-03-21T12:15:24Z","creator":"florida","file_size":765410,"file_id":"1526","access_level":"closed","file_name":"199-chp_3A10.1007_2F978-3-319-46295-0_19.pdf"}],"publication":"Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC)","title":"Features of IT Service Markets: A Systematic Literature Review","publisher":"Springer","date_created":"2017-10-17T12:41:30Z","year":"2016","file_date_updated":"2018-03-21T12:15:24Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Subprojekt C5","_id":"17"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"199","series_title":"Lecture Notes in Computer Science (LNCS)","user_id":"477","department":[{"_id":"66"},{"_id":"276"},{"_id":"76"}],"status":"public","type":"conference","doi":"10.1007/978-3-319-46295-0_19","date_updated":"2022-01-06T06:54:14Z","author":[{"first_name":"Bahar","id":"36399","full_name":"Jazayeri, Bahar","last_name":"Jazayeri"},{"full_name":"Platenius, Marie","last_name":"Platenius","first_name":"Marie"},{"last_name":"Engels","full_name":"Engels, Gregor","id":"107","first_name":"Gregor"},{"first_name":"Dennis","last_name":"Kundisch","full_name":"Kundisch, Dennis","id":"21117"}],"volume":9936,"place":"Banff, Canada","citation":{"chicago":"Jazayeri, Bahar, Marie Platenius, Gregor Engels, and Dennis Kundisch. “Features of IT Service Markets: A Systematic Literature Review.” In <i>Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC)</i>, 9936:301–16. Lecture Notes in Computer Science (LNCS). Banff, Canada: Springer, 2016. <a href=\"https://doi.org/10.1007/978-3-319-46295-0_19\">https://doi.org/10.1007/978-3-319-46295-0_19</a>.","ieee":"B. Jazayeri, M. Platenius, G. Engels, and D. Kundisch, “Features of IT Service Markets: A Systematic Literature Review,” in <i>Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC)</i>, 2016, vol. 9936, pp. 301–316.","ama":"Jazayeri B, Platenius M, Engels G, Kundisch D. Features of IT Service Markets: A Systematic Literature Review. In: <i>Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC)</i>. Vol 9936. Lecture Notes in Computer Science (LNCS). Banff, Canada: Springer; 2016:301-316. doi:<a href=\"https://doi.org/10.1007/978-3-319-46295-0_19\">10.1007/978-3-319-46295-0_19</a>","apa":"Jazayeri, B., Platenius, M., Engels, G., &#38; Kundisch, D. (2016). Features of IT Service Markets: A Systematic Literature Review. In <i>Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC)</i> (Vol. 9936, pp. 301–316). Banff, Canada: Springer. <a href=\"https://doi.org/10.1007/978-3-319-46295-0_19\">https://doi.org/10.1007/978-3-319-46295-0_19</a>","mla":"Jazayeri, Bahar, et al. “Features of IT Service Markets: A Systematic Literature Review.” <i>Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC)</i>, vol. 9936, Springer, 2016, pp. 301–16, doi:<a href=\"https://doi.org/10.1007/978-3-319-46295-0_19\">10.1007/978-3-319-46295-0_19</a>.","bibtex":"@inproceedings{Jazayeri_Platenius_Engels_Kundisch_2016, place={Banff, Canada}, series={Lecture Notes in Computer Science (LNCS)}, title={Features of IT Service Markets: A Systematic Literature Review}, volume={9936}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-46295-0_19\">10.1007/978-3-319-46295-0_19</a>}, booktitle={Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC)}, publisher={Springer}, author={Jazayeri, Bahar and Platenius, Marie and Engels, Gregor and Kundisch, Dennis}, year={2016}, pages={301–316}, collection={Lecture Notes in Computer Science (LNCS)} }","short":"B. Jazayeri, M. Platenius, G. Engels, D. Kundisch, in: Proceedings of the 14th International Conference on Service Oriented Computing (ICSOC), Springer, Banff, Canada, 2016, pp. 301–316."},"intvolume":"      9936","page":"301-316","has_accepted_license":"1"},{"doi":"10.1007/978-3-319-47166-2_30","title":"Information Flow Analysis for Go","author":[{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"},{"last_name":"I Pun","full_name":"I Pun, Ka","first_name":"Ka"},{"full_name":"Steffen, Martin","last_name":"Steffen","first_name":"Martin"},{"full_name":"Stolz, Volker","last_name":"Stolz","first_name":"Volker"},{"first_name":"Anna-Katharina","full_name":"Wickert, Anna-Katharina","last_name":"Wickert"}],"date_created":"2020-11-30T11:02:52Z","date_updated":"2022-01-06T06:54:30Z","page":"431-445","citation":{"ama":"Bodden E, I Pun K, Steffen M, Stolz V, Wickert A-K. Information Flow Analysis for Go. In: <i>Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}</i>. ; 2016:431-445. doi:<a href=\"https://doi.org/10.1007/978-3-319-47166-2_30\">10.1007/978-3-319-47166-2_30</a>","ieee":"E. Bodden, K. I Pun, M. Steffen, V. Stolz, and A.-K. Wickert, “Information Flow Analysis for Go,” in <i>Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}</i>, 2016, pp. 431–445, doi: <a href=\"https://doi.org/10.1007/978-3-319-47166-2_30\">10.1007/978-3-319-47166-2_30</a>.","chicago":"Bodden, Eric, Ka I Pun, Martin Steffen, Volker Stolz, and Anna-Katharina Wickert. “Information Flow Analysis for Go.” In <i>Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}</i>, 431–45, 2016. <a href=\"https://doi.org/10.1007/978-3-319-47166-2_30\">https://doi.org/10.1007/978-3-319-47166-2_30</a>.","short":"E. Bodden, K. I Pun, M. Steffen, V. Stolz, A.-K. Wickert, in: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}, 2016, pp. 431–445.","bibtex":"@inproceedings{Bodden_I Pun_Steffen_Stolz_Wickert_2016, title={Information Flow Analysis for Go}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-47166-2_30\">10.1007/978-3-319-47166-2_30</a>}, booktitle={Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}}, author={Bodden, Eric and I Pun, Ka and Steffen, Martin and Stolz, Volker and Wickert, Anna-Katharina}, year={2016}, pages={431–445} }","mla":"Bodden, Eric, et al. “Information Flow Analysis for Go.” <i>Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}</i>, 2016, pp. 431–45, doi:<a href=\"https://doi.org/10.1007/978-3-319-47166-2_30\">10.1007/978-3-319-47166-2_30</a>.","apa":"Bodden, E., I Pun, K., Steffen, M., Stolz, V., &#38; Wickert, A.-K. (2016). Information Flow Analysis for Go. <i>Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}</i>, 431–445. <a href=\"https://doi.org/10.1007/978-3-319-47166-2_30\">https://doi.org/10.1007/978-3-319-47166-2_30</a>"},"year":"2016","language":[{"iso":"eng"}],"department":[{"_id":"76"}],"user_id":"5786","_id":"20556","status":"public","publication":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}","type":"conference"},{"type":"conference","publication":"Nordic Workshop on Programming Theory (NWPT'16)","year":"2016","citation":{"mla":"Bodden, Eric, et al. “Don’t Let Data Go Astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go.” <i>Nordic Workshop on Programming Theory (NWPT’16)</i>, 2016.","bibtex":"@inproceedings{Bodden_Eichberg_I Pun_Steffen_Stolz_Wickert_2016, title={Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go}, booktitle={Nordic Workshop on Programming Theory (NWPT’16)}, author={Bodden, Eric and Eichberg, Michael and I Pun, Ka and Steffen, Martin and Stolz, Volker and Wickert, Anna-Katharina}, year={2016} }","short":"E. Bodden, M. Eichberg, K. I Pun, M. Steffen, V. Stolz, A.-K. Wickert, in: Nordic Workshop on Programming Theory (NWPT’16), 2016.","apa":"Bodden, E., Eichberg, M., I Pun, K., Steffen, M., Stolz, V., &#38; Wickert, A.-K. (2016). Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go. <i>Nordic Workshop on Programming Theory (NWPT’16)</i>.","ama":"Bodden E, Eichberg M, I Pun K, Steffen M, Stolz V, Wickert A-K. Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go. In: <i>Nordic Workshop on Programming Theory (NWPT’16)</i>. ; 2016.","chicago":"Bodden, Eric, Michael Eichberg, Ka I Pun, Martin Steffen, Volker Stolz, and Anna-Katharina Wickert. “Don’t Let Data Go Astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go.” In <i>Nordic Workshop on Programming Theory (NWPT’16)</i>, 2016.","ieee":"E. Bodden, M. Eichberg, K. I Pun, M. Steffen, V. Stolz, and A.-K. Wickert, “Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go,” 2016."},"status":"public","date_updated":"2022-01-06T06:54:34Z","_id":"20716","author":[{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647"},{"first_name":"Michael","last_name":"Eichberg","full_name":"Eichberg, Michael"},{"first_name":"Ka","full_name":"I Pun, Ka","last_name":"I Pun"},{"full_name":"Steffen, Martin","last_name":"Steffen","first_name":"Martin"},{"full_name":"Stolz, Volker","last_name":"Stolz","first_name":"Volker"},{"first_name":"Anna-Katharina","last_name":"Wickert","full_name":"Wickert, Anna-Katharina"}],"user_id":"5786","date_created":"2020-12-14T11:56:15Z","department":[{"_id":"76"}],"title":"Don't let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in Go","main_file_link":[{"url":"http://bodden.de/pubs/bep16gotaint.pdf"}],"language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"user_id":"5786","department":[{"_id":"76"}],"_id":"20717","status":"public","type":"report","main_file_link":[{"url":"http://bodden.de/pubs/dal16jit-tr.pdf"}],"doi":"http://dx.doi.org/10.7939/DVN/10859","title":"Just-in-Time Static Analysis","author":[{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"full_name":"Livshits, Benjamin","last_name":"Livshits","first_name":"Benjamin"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"full_name":"Smith, Justin","last_name":"Smith","first_name":"Justin"},{"last_name":"Murphy-Hill","full_name":"Murphy-Hill, Emerson","first_name":"Emerson"}],"date_created":"2020-12-14T11:57:09Z","date_updated":"2022-01-06T06:54:34Z","citation":{"ama":"Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. <i>Just-in-Time Static Analysis</i>.; 2016. doi:<a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>","ieee":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, <i>Just-in-Time Static Analysis</i>. 2016.","chicago":"Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. <i>Just-in-Time Static Analysis</i>, 2016. <a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>.","short":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, Just-in-Time Static Analysis, 2016.","bibtex":"@book{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2016, title={Just-in-Time Static Analysis}, DOI={<a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>}, author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2016} }","mla":"Nguyen Quang Do, Lisa, et al. <i>Just-in-Time Static Analysis</i>. 2016, doi:<a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>.","apa":"Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill, E. (2016). <i>Just-in-Time Static Analysis</i>. <a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>"},"year":"2016"},{"publication":"Datenschutz und Datensicherheit","type":"journal_article","status":"public","_id":"20718","department":[{"_id":"76"}],"user_id":"5786","keyword":["ATTRACT","ITSECWEBSITE"],"language":[{"iso":"eng"}],"year":"2016","page":"718-722","citation":{"ama":"Rasthofer S, Arzt S, Bodden E, Miltenberger M. Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. <i>Datenschutz und Datensicherheit</i>. Published online 2016:718-722. doi:<a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>","chicago":"Rasthofer, Siegfried, Steven Arzt, Eric Bodden, and Marc Miltenberger. “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.” <i>Datenschutz Und Datensicherheit</i>, 2016, 718–22. <a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.","ieee":"S. Rasthofer, S. Arzt, E. Bodden, and M. Miltenberger, “Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen,” <i>Datenschutz und Datensicherheit</i>, pp. 718–722, 2016, doi: <a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.","bibtex":"@article{Rasthofer_Arzt_Bodden_Miltenberger_2016, title={Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen}, DOI={<a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>}, journal={Datenschutz und Datensicherheit}, author={Rasthofer, Siegfried and Arzt, Steven and Bodden, Eric and Miltenberger, Marc}, year={2016}, pages={718–722} }","short":"S. Rasthofer, S. Arzt, E. Bodden, M. Miltenberger, Datenschutz Und Datensicherheit (2016) 718–722.","mla":"Rasthofer, Siegfried, et al. “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.” <i>Datenschutz Und Datensicherheit</i>, 2016, pp. 718–22, doi:<a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.","apa":"Rasthofer, S., Arzt, S., Bodden, E., &#38; Miltenberger, M. (2016). Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. <i>Datenschutz Und Datensicherheit</i>, 718–722. <a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>"},"date_updated":"2022-01-06T06:54:34Z","date_created":"2020-12-14T11:57:48Z","author":[{"first_name":"Siegfried","last_name":"Rasthofer","full_name":"Rasthofer, Siegfried"},{"last_name":"Arzt","full_name":"Arzt, Steven","first_name":"Steven"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"},{"first_name":"Marc","last_name":"Miltenberger","full_name":"Miltenberger, Marc"}],"title":"Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen","doi":"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536","main_file_link":[{"url":"http://bodden.de/pubs/rabm16harvester.pdf"}]},{"publication_identifier":{"isbn":["978-1-4503-4139-4"]},"citation":{"mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–90, doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.","apa":"Holzinger, P., Triller, S., Bartel, A., &#38; Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–790. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>","chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–90. CCS ’16, 2016. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–790, doi: <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>. CCS ’16. ; 2016:779-790. doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>"},"page":"779-790","year":"2016","author":[{"full_name":"Holzinger, Philipp","last_name":"Holzinger","first_name":"Philipp"},{"first_name":"Stefan","full_name":"Triller, Stefan","last_name":"Triller"},{"first_name":"Alexandre","full_name":"Bartel, Alexandre","last_name":"Bartel"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-12-14T11:58:33Z","date_updated":"2022-01-06T06:54:34Z","doi":"http://doi.acm.org/10.1145/2976749.2978361","title":"An In-Depth Study of More Than Ten Years of Java Exploitation","type":"conference","publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","status":"public","series_title":"CCS '16","user_id":"5786","department":[{"_id":"76"}],"_id":"20719","language":[{"iso":"eng"}],"keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"]},{"page":"212-228","citation":{"mla":"Follner, Andreas, et al. “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.” <i>International Workshop on Security and Trust Management (STM)</i>, 2016, pp. 212–28.","bibtex":"@inproceedings{Follner_Bartel_Peng_Chang_Ispoglou_Payer_Bodden_2016, title={PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution}, booktitle={International Workshop on Security and Trust Management (STM)}, author={Follner, Andreas and Bartel, Alexandre and Peng, Hui and Chang, Yu-Chen and Ispoglou, Kyriakos and Payer, Mathias and Bodden, Eric}, year={2016}, pages={212–228} }","short":"A. Follner, A. Bartel, H. Peng, Y.-C. Chang, K. Ispoglou, M. Payer, E. Bodden, in: International Workshop on Security and Trust Management (STM), 2016, pp. 212–228.","apa":"Follner, A., Bartel, A., Peng, H., Chang, Y.-C., Ispoglou, K., Payer, M., &#38; Bodden, E. (2016). PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. <i>International Workshop on Security and Trust Management (STM)</i>, 212–228.","chicago":"Follner, Andreas, Alexandre Bartel, Hui Peng, Yu-Chen Chang, Kyriakos Ispoglou, Mathias Payer, and Eric Bodden. “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.” In <i>International Workshop on Security and Trust Management (STM)</i>, 212–28, 2016.","ieee":"A. Follner <i>et al.</i>, “PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution,” in <i>International Workshop on Security and Trust Management (STM)</i>, 2016, pp. 212–228.","ama":"Follner A, Bartel A, Peng H, et al. PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. In: <i>International Workshop on Security and Trust Management (STM)</i>. ; 2016:212-228."},"year":"2016","main_file_link":[{"url":"http://bodden.de/pubs/fbt+16pshape.pdf"}],"title":"PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution","author":[{"first_name":"Andreas","full_name":"Follner, Andreas","last_name":"Follner"},{"last_name":"Bartel","full_name":"Bartel, Alexandre","first_name":"Alexandre"},{"last_name":"Peng","full_name":"Peng, Hui","first_name":"Hui"},{"full_name":"Chang, Yu-Chen","last_name":"Chang","first_name":"Yu-Chen"},{"first_name":"Kyriakos","full_name":"Ispoglou, Kyriakos","last_name":"Ispoglou"},{"full_name":"Payer, Mathias","last_name":"Payer","first_name":"Mathias"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256"}],"date_created":"2020-12-14T11:59:04Z","date_updated":"2022-01-06T06:54:34Z","status":"public","publication":"International Workshop on Security and Trust Management (STM)","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"76"}],"user_id":"5786","_id":"20720"},{"publication":"Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis","type":"conference","status":"public","department":[{"_id":"76"}],"series_title":"SOAP 2016","user_id":"5786","_id":"20721","language":[{"iso":"eng"}],"keyword":["ATTRACT"],"page":"13-17","citation":{"ama":"Nguyen Quang Do L, Eichberg M, Bodden E. Toward an Automated Benchmark Management System. In: <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>. SOAP 2016. ; 2016:13-17.","ieee":"L. Nguyen Quang Do, M. Eichberg, and E. Bodden, “Toward an Automated Benchmark Management System,” in <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 2016, pp. 13–17.","chicago":"Nguyen Quang Do, Lisa, Michael Eichberg, and Eric Bodden. “Toward an Automated Benchmark Management System.” In <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 13–17. SOAP 2016, 2016.","short":"L. Nguyen Quang Do, M. Eichberg, E. Bodden, in: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 13–17.","bibtex":"@inproceedings{Nguyen Quang Do_Eichberg_Bodden_2016, series={SOAP 2016}, title={Toward an Automated Benchmark Management System}, booktitle={Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis}, author={Nguyen Quang Do, Lisa and Eichberg, Michael and Bodden, Eric}, year={2016}, pages={13–17}, collection={SOAP 2016} }","mla":"Nguyen Quang Do, Lisa, et al. “Toward an Automated Benchmark Management System.” <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 2016, pp. 13–17.","apa":"Nguyen Quang Do, L., Eichberg, M., &#38; Bodden, E. (2016). Toward an Automated Benchmark Management System. <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 13–17."},"year":"2016","date_created":"2020-12-14T12:00:32Z","author":[{"first_name":"Lisa","last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa"},{"full_name":"Eichberg, Michael","last_name":"Eichberg","first_name":"Michael"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"date_updated":"2022-01-06T06:54:34Z","main_file_link":[{"url":"http://bodden.de/pubs/neb16toward.pdf"}],"title":"Toward an Automated Benchmark Management System"},{"language":[{"iso":"eng"}],"_id":"20722","series_title":"SOAP 2016","user_id":"5786","department":[{"_id":"76"}],"status":"public","type":"conference","publication":"Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis","title":"Towards Cross-Platform Cross-Language Analysis with Soot","main_file_link":[{"url":"http://www.bodden.de/pubs/akb16towards.pdf"}],"date_updated":"2022-01-06T06:54:34Z","author":[{"first_name":"Steven","full_name":"Arzt, Steven","last_name":"Arzt"},{"first_name":"Tobias","full_name":"Kussmaul, Tobias","last_name":"Kussmaul"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"}],"date_created":"2020-12-14T12:02:21Z","year":"2016","citation":{"ama":"Arzt S, Kussmaul T, Bodden E. Towards Cross-Platform Cross-Language Analysis with Soot. In: <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>. SOAP 2016. ; 2016:1-6.","ieee":"S. Arzt, T. Kussmaul, and E. Bodden, “Towards Cross-Platform Cross-Language Analysis with Soot,” in <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 2016, pp. 1–6.","chicago":"Arzt, Steven, Tobias Kussmaul, and Eric Bodden. “Towards Cross-Platform Cross-Language Analysis with Soot.” In <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 1–6. SOAP 2016, 2016.","apa":"Arzt, S., Kussmaul, T., &#38; Bodden, E. (2016). Towards Cross-Platform Cross-Language Analysis with Soot. <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 1–6.","bibtex":"@inproceedings{Arzt_Kussmaul_Bodden_2016, series={SOAP 2016}, title={Towards Cross-Platform Cross-Language Analysis with Soot}, booktitle={Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis}, author={Arzt, Steven and Kussmaul, Tobias and Bodden, Eric}, year={2016}, pages={1–6}, collection={SOAP 2016} }","mla":"Arzt, Steven, et al. “Towards Cross-Platform Cross-Language Analysis with Soot.” <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 2016, pp. 1–6.","short":"S. Arzt, T. Kussmaul, E. Bodden, in: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 1–6."},"page":"1-6"},{"user_id":"5786","department":[{"_id":"76"}],"_id":"20724","language":[{"iso":"eng"}],"type":"journal_article","publication":"Journal of Information Security and Applications ","status":"public","author":[{"last_name":"Follner","full_name":"Follner, Andreas","first_name":"Andreas"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"}],"date_created":"2020-12-14T14:11:40Z","volume":29,"date_updated":"2022-01-06T06:54:34Z","main_file_link":[{"url":"http://www.bodden.de/pubs/fb2016ropocop.pdf"}],"doi":"http://dx.doi.org/10.1016/j.jisa.2016.01.002","title":"ROPocop — Dynamic mitigation of code-reuse attacks","publication_identifier":{"issn":["2214-2126"]},"citation":{"chicago":"Follner, Andreas, and Eric Bodden. “ROPocop — Dynamic Mitigation of Code-Reuse Attacks.” <i>Journal of Information Security and Applications </i> 29 (2016): 16–26. <a href=\"http://dx.doi.org/10.1016/j.jisa.2016.01.002\">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>.","ieee":"A. Follner and E. Bodden, “ROPocop — Dynamic mitigation of code-reuse attacks,” <i>Journal of Information Security and Applications </i>, vol. 29, pp. 16–26, 2016, doi: <a href=\"http://dx.doi.org/10.1016/j.jisa.2016.01.002\">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>.","ama":"Follner A, Bodden E. ROPocop — Dynamic mitigation of code-reuse attacks. <i>Journal of Information Security and Applications </i>. 2016;29:16-26. doi:<a href=\"http://dx.doi.org/10.1016/j.jisa.2016.01.002\">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>","apa":"Follner, A., &#38; Bodden, E. (2016). ROPocop — Dynamic mitigation of code-reuse attacks. <i>Journal of Information Security and Applications </i>, <i>29</i>, 16–26. <a href=\"http://dx.doi.org/10.1016/j.jisa.2016.01.002\">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>","bibtex":"@article{Follner_Bodden_2016, title={ROPocop — Dynamic mitigation of code-reuse attacks}, volume={29}, DOI={<a href=\"http://dx.doi.org/10.1016/j.jisa.2016.01.002\">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>}, journal={Journal of Information Security and Applications }, author={Follner, Andreas and Bodden, Eric}, year={2016}, pages={16–26} }","mla":"Follner, Andreas, and Eric Bodden. “ROPocop — Dynamic Mitigation of Code-Reuse Attacks.” <i>Journal of Information Security and Applications </i>, vol. 29, 2016, pp. 16–26, doi:<a href=\"http://dx.doi.org/10.1016/j.jisa.2016.01.002\">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>.","short":"A. Follner, E. Bodden, Journal of Information Security and Applications  29 (2016) 16–26."},"intvolume":"        29","page":"16-26","year":"2016"},{"main_file_link":[{"url":"http://www.bodden.de/pubs/fbb16analyzing.pdf"}],"title":"Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality","author":[{"first_name":"Andreas","last_name":"Follner","full_name":"Follner, Andreas"},{"last_name":"Bartel","full_name":"Bartel, Alexandre","first_name":"Alexandre"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric"}],"date_created":"2020-12-14T14:12:36Z","date_updated":"2022-01-06T06:54:34Z","citation":{"bibtex":"@inproceedings{Follner_Bartel_Bodden_2016, title={Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality}, booktitle={International Symposium on Engineering Secure Software and Systems (ESSoS)}, author={Follner, Andreas and Bartel, Alexandre and Bodden, Eric}, year={2016} }","short":"A. Follner, A. Bartel, E. Bodden, in: International Symposium on Engineering Secure Software and Systems (ESSoS), 2016.","mla":"Follner, Andreas, et al. “Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality.” <i>International Symposium on Engineering Secure Software and Systems (ESSoS)</i>, 2016.","apa":"Follner, A., Bartel, A., &#38; Bodden, E. (2016). Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. <i>International Symposium on Engineering Secure Software and Systems (ESSoS)</i>.","ieee":"A. Follner, A. Bartel, and E. Bodden, “Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality,” 2016.","chicago":"Follner, Andreas, Alexandre Bartel, and Eric Bodden. “Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality.” In <i>International Symposium on Engineering Secure Software and Systems (ESSoS)</i>, 2016.","ama":"Follner A, Bartel A, Bodden E. Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. In: <i>International Symposium on Engineering Secure Software and Systems (ESSoS)</i>. ; 2016."},"year":"2016","language":[{"iso":"eng"}],"department":[{"_id":"76"}],"user_id":"5786","_id":"20725","status":"public","publication":"International Symposium on Engineering Secure Software and Systems (ESSoS)","type":"conference"},{"year":"2016","place":"Berlin, Heidelberg","page":"116-138","citation":{"apa":"Falzon, K., &#38; Bodden, E. (2016). Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. In F. Piessens &#38; L. Vigan’o (Eds.), <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i> (pp. 116–138). Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">https://doi.org/10.1007/978-3-662-49635-0_7</a>","mla":"Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.” <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i>, edited by Frank Piessens and Luca Vigan’o, Springer Berlin Heidelberg, 2016, pp. 116–38, doi:<a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">10.1007/978-3-662-49635-0_7</a>.","short":"K. Falzon, E. Bodden, in: F. Piessens, L. Vigan’o (Eds.), Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg, 2016, pp. 116–138.","bibtex":"@inproceedings{Falzon_Bodden_2016, place={Berlin, Heidelberg}, title={Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">10.1007/978-3-662-49635-0_7</a>}, booktitle={Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings}, publisher={Springer Berlin Heidelberg}, author={Falzon, Kevin and Bodden, Eric}, editor={Piessens, Frank and Vigan’o, Luca}, year={2016}, pages={116–138} }","ieee":"K. Falzon and E. Bodden, “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels,” in <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i>, 2016, pp. 116–138, doi: <a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">10.1007/978-3-662-49635-0_7</a>.","chicago":"Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.” In <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i>, edited by Frank Piessens and Luca Vigan’o, 116–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">https://doi.org/10.1007/978-3-662-49635-0_7</a>.","ama":"Falzon K, Bodden E. Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. In: Piessens F, Vigan’o L, eds. <i>Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i>. Springer Berlin Heidelberg; 2016:116-138. doi:<a href=\"https://doi.org/10.1007/978-3-662-49635-0_7\">10.1007/978-3-662-49635-0_7</a>"},"publication_identifier":{"isbn":["978-3-662-49635-0"]},"title":"Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels","doi":"10.1007/978-3-662-49635-0_7","main_file_link":[{"url":"http://www.bodden.de/pubs/fb16mitigating.pdf"}],"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:54:34Z","author":[{"last_name":"Falzon","full_name":"Falzon, Kevin","first_name":"Kevin"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2020-12-14T14:20:20Z","editor":[{"last_name":"Piessens","full_name":"Piessens, Frank","first_name":"Frank"},{"first_name":"Luca","full_name":"Vigan'o, Luca","last_name":"Vigan'o"}],"status":"public","publication":"Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings","type":"conference","language":[{"iso":"eng"}],"_id":"20726","department":[{"_id":"76"}],"user_id":"5786"},{"department":[{"_id":"76"}],"user_id":"5786","_id":"20727","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"publication":"Network and Distributed System Security Symposium (NDSS)","type":"conference","status":"public","author":[{"first_name":"Siegfried","full_name":"Rasthofer, Siegfried","last_name":"Rasthofer"},{"first_name":"Steven","last_name":"Arzt","full_name":"Arzt, Steven"},{"full_name":"Miltenberger, Marc","last_name":"Miltenberger","first_name":"Marc"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_created":"2020-12-14T14:21:41Z","date_updated":"2022-01-06T06:54:34Z","main_file_link":[{"url":"http://www.bodden.de/pubs/ssme16harvesting.pdf"}],"title":"Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques","citation":{"ieee":"S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden, “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques,” 2016.","chicago":"Rasthofer, Siegfried, Steven Arzt, Marc Miltenberger, and Eric Bodden. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” In <i>Network and Distributed System Security Symposium (NDSS)</i>, 2016.","ama":"Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In: <i>Network and Distributed System Security Symposium (NDSS)</i>. ; 2016.","short":"S. Rasthofer, S. Arzt, M. Miltenberger, E. Bodden, in: Network and Distributed System Security Symposium (NDSS), 2016.","bibtex":"@inproceedings{Rasthofer_Arzt_Miltenberger_Bodden_2016, title={Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques}, booktitle={Network and Distributed System Security Symposium (NDSS)}, author={Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric}, year={2016} }","mla":"Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” <i>Network and Distributed System Security Symposium (NDSS)</i>, 2016.","apa":"Rasthofer, S., Arzt, S., Miltenberger, M., &#38; Bodden, E. (2016). Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. <i>Network and Distributed System Security Symposium (NDSS)</i>."},"year":"2016"},{"page":"935-946","citation":{"ama":"Nadi S, Krüger S, Mezini M, Bodden E. Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? In: <i>International Conference for Software Engineering (ICSE)</i>. ; 2016:935-946.","chicago":"Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” In <i>International Conference for Software Engineering (ICSE)</i>, 935–46, 2016.","ieee":"S. Nadi, S. Krüger, M. Mezini, and E. Bodden, “Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?,” in <i>International Conference for Software Engineering (ICSE)</i>, 2016, pp. 935–946.","apa":"Nadi, S., Krüger, S., Mezini, M., &#38; Bodden, E. (2016). Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? <i>International Conference for Software Engineering (ICSE)</i>, 935–946.","mla":"Nadi, Sarah, et al. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” <i>International Conference for Software Engineering (ICSE)</i>, 2016, pp. 935–46.","short":"S. Nadi, S. Krüger, M. Mezini, E. Bodden, in: International Conference for Software Engineering (ICSE), 2016, pp. 935–946.","bibtex":"@inproceedings{Nadi_Krüger_Mezini_Bodden_2016, title={Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?}, booktitle={International Conference for Software Engineering (ICSE)}, author={Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric}, year={2016}, pages={935–946} }"},"year":"2016","date_created":"2020-12-14T14:22:36Z","author":[{"first_name":"Sarah","full_name":"Nadi, Sarah","last_name":"Nadi"},{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"full_name":"Mezini, Mira","last_name":"Mezini","first_name":"Mira"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"}],"date_updated":"2022-01-06T06:54:34Z","main_file_link":[{"url":"http://www.bodden.de/pubs/nkm+16jumping.pdf"}],"title":"Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?","publication":"International Conference for Software Engineering (ICSE)","type":"conference","status":"public","department":[{"_id":"76"}],"user_id":"5786","_id":"20728","language":[{"iso":"eng"}],"keyword":["CROSSING","ITSECWEBSITE"]},{"year":"2016","citation":{"apa":"Arzt, S., &#38; Bodden, E. (2016). StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. <i>International Conference for Software Engineering (ICSE)</i>.","short":"S. Arzt, E. Bodden, in: International Conference for Software Engineering (ICSE), 2016.","bibtex":"@inproceedings{Arzt_Bodden_2016, title={StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework}, booktitle={International Conference for Software Engineering (ICSE)}, author={Arzt, Steven and Bodden, Eric}, year={2016} }","mla":"Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework.” <i>International Conference for Software Engineering (ICSE)</i>, 2016.","ama":"Arzt S, Bodden E. StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. In: <i>International Conference for Software Engineering (ICSE)</i>. ; 2016.","ieee":"S. Arzt and E. Bodden, “StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework,” 2016.","chicago":"Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework.” In <i>International Conference for Software Engineering (ICSE)</i>, 2016."},"date_updated":"2022-01-06T06:54:34Z","author":[{"last_name":"Arzt","full_name":"Arzt, Steven","first_name":"Steven"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2020-12-14T14:23:29Z","title":"StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework","main_file_link":[{"url":"http://www.bodden.de/pubs/ab16stubdroid.pdf"}],"publication":"International Conference for Software Engineering (ICSE)","type":"conference","status":"public","_id":"20729","department":[{"_id":"76"}],"user_id":"5786","keyword":["ITSECWEBSITE"],"language":[{"iso":"eng"}]},{"user_id":"5786","department":[{"_id":"76"}],"_id":"20730","language":[{"iso":"eng"}],"type":"conference","publication":"2016 49th Hawaii International Conference on System Sciences (HICSS)","status":"public","author":[{"first_name":"N.","full_name":"Eling, N.","last_name":"Eling"},{"first_name":"S.","full_name":"Rasthofer, S.","last_name":"Rasthofer"},{"last_name":"Kolhagen","full_name":"Kolhagen, M.","first_name":"M."},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"},{"first_name":"P.","last_name":"Buxmann","full_name":"Buxmann, P."}],"date_created":"2020-12-14T14:24:12Z","date_updated":"2022-01-06T06:54:34Z","main_file_link":[{"url":"http://www.bodden.de/pubs/erk+15investigating.pdf"}],"doi":"10.1109/HICSS.2016.458","title":"Investigating Users' Reaction to Fine-Grained Data Requests: A Market Experiment","publication_identifier":{"issn":["1530-1605"]},"citation":{"bibtex":"@inproceedings{Eling_Rasthofer_Kolhagen_Bodden_Buxmann_2016, title={Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment}, DOI={<a href=\"https://doi.org/10.1109/HICSS.2016.458\">10.1109/HICSS.2016.458</a>}, booktitle={2016 49th Hawaii International Conference on System Sciences (HICSS)}, author={Eling, N. and Rasthofer, S. and Kolhagen, M. and Bodden, Eric and Buxmann, P.}, year={2016}, pages={3666–3675} }","mla":"Eling, N., et al. “Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.” <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 2016, pp. 3666–75, doi:<a href=\"https://doi.org/10.1109/HICSS.2016.458\">10.1109/HICSS.2016.458</a>.","short":"N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, P. Buxmann, in: 2016 49th Hawaii International Conference on System Sciences (HICSS), 2016, pp. 3666–3675.","apa":"Eling, N., Rasthofer, S., Kolhagen, M., Bodden, E., &#38; Buxmann, P. (2016). Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment. <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 3666–3675. <a href=\"https://doi.org/10.1109/HICSS.2016.458\">https://doi.org/10.1109/HICSS.2016.458</a>","ieee":"N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, and P. Buxmann, “Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment,” in <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 2016, pp. 3666–3675, doi: <a href=\"https://doi.org/10.1109/HICSS.2016.458\">10.1109/HICSS.2016.458</a>.","chicago":"Eling, N., S. Rasthofer, M. Kolhagen, Eric Bodden, and P. Buxmann. “Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.” In <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 3666–75, 2016. <a href=\"https://doi.org/10.1109/HICSS.2016.458\">https://doi.org/10.1109/HICSS.2016.458</a>.","ama":"Eling N, Rasthofer S, Kolhagen M, Bodden E, Buxmann P. Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment. In: <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>. ; 2016:3666-3675. doi:<a href=\"https://doi.org/10.1109/HICSS.2016.458\">10.1109/HICSS.2016.458</a>"},"page":"3666-3675","year":"2016"},{"department":[{"_id":"76"},{"_id":"241"}],"user_id":"5786","_id":"20822","language":[{"iso":"eng"}],"type":"report","status":"public","abstract":[{"lang":"eng","text":"Several examples of mechatronic systems can be found nowadays in modern cars, production systems, and medical technology. Day by day, the number of innovative functionalities in such mechatronic systems is increasing. These functionalities are realized with complex software. Such software exhibits hard real-time, safety requirements. The adherence to these requirements must be thoroughly analyzed and verified. Moreover, to obtain a significant increment in the reliability, performance, and efficiency of such software, it needs to maintain the self-adaptation of its properties. In order to develop such systems with a high quality and within a short time, we need a systematic and consistent design method. For this purpose, the software engineering group at the University of Paderborn and the Fraunhofer IEM in Paderborn propose the MechatronicUML method. This method provides a comprehensive model-driven process support, that starts from requirements and reaches the executable software after passing through several design and analysis steps. This process improves the comprehension during development and makes complex systems manageable. MechatronicUML emphasizes mainly on: (1) modeling and (formal) verification of reconfigurable software architectures, (2) the coordination among system components in such architectures, and (3) the integration of discrete software events with the continuous behavior of control devices."}],"author":[{"orcid":"http://orcid.org/0000-0002-8679-6673","last_name":"Dziwok","full_name":"Dziwok, Stefan","id":"3901","first_name":"Stefan"},{"first_name":"Uwe","full_name":"Pohlmann, Uwe","last_name":"Pohlmann"},{"first_name":"Goran","last_name":"Piskachev","orcid":"0000-0003-4424-5838","id":"41936","full_name":"Piskachev, Goran"},{"first_name":"David","last_name":"Schubert","full_name":"Schubert, David","id":"9106"},{"first_name":"Sebastian","last_name":"Thiele","full_name":"Thiele, Sebastian"},{"first_name":"Christopher","last_name":"Gerking","full_name":"Gerking, Christopher"}],"date_created":"2020-12-22T09:24:42Z","date_updated":"2022-01-06T06:54:40Z","title":"The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling","citation":{"ama":"Dziwok S, Pohlmann U, Piskachev G, Schubert D, Thiele S, Gerking C. <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>.; 2016.","chicago":"Dziwok, Stefan, Uwe Pohlmann, Goran Piskachev, David Schubert, Sebastian Thiele, and Christopher Gerking. <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>. Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.","ieee":"S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, and C. Gerking, <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>. Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.","apa":"Dziwok, S., Pohlmann, U., Piskachev, G., Schubert, D., Thiele, S., &#38; Gerking, C. (2016). <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>.","bibtex":"@book{Dziwok_Pohlmann_Piskachev_Schubert_Thiele_Gerking_2016, place={Zukunftsmeile 1, 33102 Paderborn, Germany}, title={The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling}, author={Dziwok, Stefan and Pohlmann, Uwe and Piskachev, Goran and Schubert, David and Thiele, Sebastian and Gerking, Christopher}, year={2016} }","short":"S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, C. Gerking, The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling, Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.","mla":"Dziwok, Stefan, et al. <i>The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>. 2016."},"place":"Zukunftsmeile 1, 33102 Paderborn, Germany","year":"2016"},{"abstract":[{"lang":"eng","text":"In this technical report, we present the MechatronicUML requirements engineering method. The method encompasses a process and a scenario-based modeling language for the documentation and analysis of requirements on the message-based interaction behavior of software-intensive systems. The modeling language uses a scenario notation based on Modal Sequence Diagrams (MSDs), which borrows concepts of UML Interactions as well as of Live Sequence Charts. Furthermore, we introduce the so-called Emergency Braking & Evasion System (EBEAS) as a running example, which is based on current and upcoming real-world driver assistance systems. "}],"status":"public","type":"report","language":[{"iso":"eng"}],"_id":"20823","user_id":"5786","department":[{"_id":"76"},{"_id":"241"},{"_id":"662"}],"year":"2016","citation":{"mla":"Holtmann, Jörg, et al. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. 2016, doi:<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>.","short":"J. Holtmann, M. Fockel, T. Koch, D. Schmelter, C. Brenner, R. Bernijazov, M. Sander, The MechatronicUML Requirements Engineering Method: Process and Language, 2016.","bibtex":"@book{Holtmann_Fockel_Koch_Schmelter_Brenner_Bernijazov_Sander_2016, title={The MechatronicUML Requirements Engineering Method: Process and Language}, DOI={<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>}, author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David and Brenner, Christian and Bernijazov, Ruslan and Sander, Marcel}, year={2016} }","apa":"Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov, R., &#38; Sander, M. (2016). <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. <a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">https://doi.org/10.13140/RG.2.2.33223.29606</a>","ieee":"J. Holtmann <i>et al.</i>, <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>. 2016.","chicago":"Holtmann, Jörg, Markus Fockel, Thorsten Koch, David Schmelter, Christian Brenner, Ruslan Bernijazov, and Marcel Sander. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>, 2016. <a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">https://doi.org/10.13140/RG.2.2.33223.29606</a>.","ama":"Holtmann J, Fockel M, Koch T, et al. <i>The MechatronicUML Requirements Engineering Method: Process and Language</i>.; 2016. doi:<a href=\"https://doi.org/10.13140/RG.2.2.33223.29606\">10.13140/RG.2.2.33223.29606</a>"},"title":"The MechatronicUML Requirements Engineering Method: Process and Language","doi":"10.13140/RG.2.2.33223.29606","date_updated":"2022-01-06T06:54:40Z","author":[{"full_name":"Holtmann, Jörg","id":"3875","last_name":"Holtmann","orcid":"0000-0001-6141-4571","first_name":"Jörg"},{"last_name":"Fockel","orcid":"0000-0002-1269-0702","id":"8472","full_name":"Fockel, Markus","first_name":"Markus"},{"last_name":"Koch","full_name":"Koch, Thorsten","id":"13616","first_name":"Thorsten"},{"id":"40982","full_name":"Schmelter, David","orcid":"0000-0001-7787-5380","last_name":"Schmelter","first_name":"David"},{"last_name":"Brenner","full_name":"Brenner, Christian","first_name":"Christian"},{"first_name":"Ruslan","full_name":"Bernijazov, Ruslan","last_name":"Bernijazov"},{"last_name":"Sander","full_name":"Sander, Marcel","first_name":"Marcel"}],"date_created":"2020-12-22T09:28:23Z"},{"year":"2016","page":"77-86","citation":{"ama":"Greinert M, Tschirner C, Holtmann J. Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. In: <i>Tag Des Systems Engineering 2016</i>. Gesellschaft f{\\\"u}r Systems Engineering e.V.; 2016:77-86. doi:<a href=\"https://doi.org/10.3139/9783446451414.008\">10.3139/9783446451414.008</a>","chicago":"Greinert, Matthias, Christian Tschirner, and Jörg Holtmann. “Anwendung von Methoden Der Produktentstehung Auf Basis Des Systemmodells Mechatronischer Systeme.” In <i>Tag Des Systems Engineering 2016</i>, 77–86. Gesellschaft f{\\\"u}r Systems Engineering e.V., 2016. <a href=\"https://doi.org/10.3139/9783446451414.008\">https://doi.org/10.3139/9783446451414.008</a>.","ieee":"M. Greinert, C. Tschirner, and J. Holtmann, “Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme,” in <i>Tag des Systems Engineering 2016</i>, 2016, pp. 77–86, doi: <a href=\"https://doi.org/10.3139/9783446451414.008\">10.3139/9783446451414.008</a>.","apa":"Greinert, M., Tschirner, C., &#38; Holtmann, J. (2016). Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. <i>Tag Des Systems Engineering 2016</i>, 77–86. <a href=\"https://doi.org/10.3139/9783446451414.008\">https://doi.org/10.3139/9783446451414.008</a>","bibtex":"@inproceedings{Greinert_Tschirner_Holtmann_2016, title={Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme}, DOI={<a href=\"https://doi.org/10.3139/9783446451414.008\">10.3139/9783446451414.008</a>}, booktitle={Tag des Systems Engineering 2016}, publisher={Gesellschaft f{\\\"u}r Systems Engineering e.V.}, author={Greinert, Matthias and Tschirner, Christian and Holtmann, Jörg}, year={2016}, pages={77–86} }","short":"M. Greinert, C. Tschirner, J. Holtmann, in: Tag Des Systems Engineering 2016, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2016, pp. 77–86.","mla":"Greinert, Matthias, et al. “Anwendung von Methoden Der Produktentstehung Auf Basis Des Systemmodells Mechatronischer Systeme.” <i>Tag Des Systems Engineering 2016</i>, Gesellschaft f{\\\"u}r Systems Engineering e.V., 2016, pp. 77–86, doi:<a href=\"https://doi.org/10.3139/9783446451414.008\">10.3139/9783446451414.008</a>."},"publisher":"Gesellschaft f{\\\"u}r Systems Engineering e.V.","date_updated":"2022-01-06T06:54:40Z","date_created":"2020-12-22T09:32:08Z","author":[{"full_name":"Greinert, Matthias","last_name":"Greinert","first_name":"Matthias"},{"last_name":"Tschirner","full_name":"Tschirner, Christian","first_name":"Christian"},{"last_name":"Holtmann","orcid":"0000-0001-6141-4571","full_name":"Holtmann, Jörg","id":"3875","first_name":"Jörg"}],"title":"Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme","doi":"10.3139/9783446451414.008","publication":"Tag des Systems Engineering 2016","type":"conference","abstract":[{"text":"Das Systemmodell ist der Kern des Model-Based Systems Engineering (MBSE). Während jedoch im Systems Engineering dem Zusammenspiel von Produkt und Projekt ein hoher Stellenwert beigemessen wird, liegt der Fokus im MBSE noch sehr stark auf technischen Prozessen. Im Hinblick auf die Idee des Systemmodells als zentrale Datenquelle sollten auch Stakeholder jenseits der direkten Entwicklungsaktivitäten das Systemmodell entsprechend nutzen können und davon profitieren. Dazu wird ein Demonstrator vorgestellt, welcher die Anwendung einer Komplexitätsanalyse auf Basis des Systemmodells mechatronischer Systeme stellvertretend für Methoden in Sinne der technischen Managementprozesse der ISO/IEC 15288 aufzeigt. Grundlage des Demonstrators bildet das Systemmodell eines Pedelecs. Die darin modellierten Strukturen dienen als Input für die Komplexitätsanalyse. Über die automatisierte Anwendung der Komplexitätsanalyse ergibt sich als Output ein Portfolio, das die Komplexität der funktionserfüllenden Komponenten mit der Bewertung der Funktionalität in Beziehung setzt und somit eine Beurteilung und entsprechende Handlungsempfehlungen der Komponenten ermöglicht.","lang":"ger"}],"status":"public","_id":"20825","department":[{"_id":"76"}],"user_id":"5786","language":[{"iso":"eng"}]}]
