---
_id: '26406'
author:
- first_name: Philipp
full_name: Schubert, Philipp
id: '60543'
last_name: Schubert
orcid: 0000-0002-8674-1859
- first_name: Ben
full_name: Hermann, Ben
id: '66173'
last_name: Hermann
orcid: 0000-0001-9848-2017
- first_name: Eric
full_name: Bodden, Eric
id: '59256'
last_name: Bodden
orcid: 0000-0003-3470-3647
- first_name: Richard
full_name: Leer, Richard
last_name: Leer
citation:
ama: 'Schubert P, Hermann B, Bodden E, Leer R. Into the Woods: Experiences from
Building a Dataflow Analysis Framework for C/C++. In: SCAM ’21: IEEE International
Working Conference on Source Code Analysis and Manipulation (Engineering Track).
; 2021.'
apa: 'Schubert, P., Hermann, B., Bodden, E., & Leer, R. (2021). Into the Woods:
Experiences from Building a Dataflow Analysis Framework for C/C++. SCAM ’21:
IEEE International Working Conference on Source Code Analysis and Manipulation
(Engineering Track).'
bibtex: '@inproceedings{Schubert_Hermann_Bodden_Leer_2021, title={Into the Woods:
Experiences from Building a Dataflow Analysis Framework for C/C++}, booktitle={SCAM
’21: IEEE International Working Conference on Source Code Analysis and Manipulation
(Engineering Track)}, author={Schubert, Philipp and Hermann, Ben and Bodden, Eric
and Leer, Richard}, year={2021} }'
chicago: 'Schubert, Philipp, Ben Hermann, Eric Bodden, and Richard Leer. “Into the
Woods: Experiences from Building a Dataflow Analysis Framework for C/C++.” In
SCAM ’21: IEEE International Working Conference on Source Code Analysis and
Manipulation (Engineering Track), 2021.'
ieee: 'P. Schubert, B. Hermann, E. Bodden, and R. Leer, “Into the Woods: Experiences
from Building a Dataflow Analysis Framework for C/C++,” 2021.'
mla: 'Schubert, Philipp, et al. “Into the Woods: Experiences from Building a Dataflow
Analysis Framework for C/C++.” SCAM ’21: IEEE International Working Conference
on Source Code Analysis and Manipulation (Engineering Track), 2021.'
short: 'P. Schubert, B. Hermann, E. Bodden, R. Leer, in: SCAM ’21: IEEE International
Working Conference on Source Code Analysis and Manipulation (Engineering Track),
2021.'
date_created: 2021-10-18T12:52:12Z
date_updated: 2023-06-15T08:39:55Z
department:
- _id: '76'
language:
- iso: eng
project:
- _id: '3'
name: 'SFB 901 - B: SFB 901 - Project Area B'
- _id: '12'
name: 'SFB 901 - B4: SFB 901 - Subproject B4'
- _id: '1'
grant_number: '160364472'
name: 'SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen
in dynamischen Märkten '
publication: 'SCAM ''21: IEEE International Working Conference on Source Code Analysis
and Manipulation (Engineering Track)'
status: public
title: 'Into the Woods: Experiences from Building a Dataflow Analysis Framework for
C/C++'
type: conference
user_id: '15249'
year: '2021'
...
---
_id: '26405'
author:
- first_name: Philipp
full_name: Schubert, Philipp
id: '60543'
last_name: Schubert
orcid: 0000-0002-8674-1859
- first_name: Florian
full_name: Sattler, Florian
last_name: Sattler
- first_name: Fabian
full_name: Schiebel, Fabian
last_name: Schiebel
- first_name: Ben
full_name: Hermann, Ben
id: '66173'
last_name: Hermann
orcid: 0000-0001-9848-2017
- first_name: Eric
full_name: Bodden, Eric
id: '59256'
last_name: Bodden
orcid: 0000-0003-3470-3647
citation:
ama: 'Schubert P, Sattler F, Schiebel F, Hermann B, Bodden E. Modeling the Effects
of Global Variables in Data-Flow Analysis for C/C++. In: 2021 IEEE 21st International
Working Conference on Source Code Analysis and Manipulation (SCAM). ; 2021.'
apa: Schubert, P., Sattler, F., Schiebel, F., Hermann, B., & Bodden, E. (2021).
Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++. 2021
IEEE 21st International Working Conference on Source Code Analysis and Manipulation
(SCAM).
bibtex: '@inproceedings{Schubert_Sattler_Schiebel_Hermann_Bodden_2021, title={Modeling
the Effects of Global Variables in Data-Flow Analysis for C/C++}, booktitle={2021
IEEE 21st International Working Conference on Source Code Analysis and Manipulation
(SCAM)}, author={Schubert, Philipp and Sattler, Florian and Schiebel, Fabian and
Hermann, Ben and Bodden, Eric}, year={2021} }'
chicago: Schubert, Philipp, Florian Sattler, Fabian Schiebel, Ben Hermann, and Eric
Bodden. “Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++.”
In 2021 IEEE 21st International Working Conference on Source Code Analysis
and Manipulation (SCAM), 2021.
ieee: P. Schubert, F. Sattler, F. Schiebel, B. Hermann, and E. Bodden, “Modeling
the Effects of Global Variables in Data-Flow Analysis for C/C++,” 2021.
mla: Schubert, Philipp, et al. “Modeling the Effects of Global Variables in Data-Flow
Analysis for C/C++.” 2021 IEEE 21st International Working Conference on Source
Code Analysis and Manipulation (SCAM), 2021.
short: 'P. Schubert, F. Sattler, F. Schiebel, B. Hermann, E. Bodden, in: 2021 IEEE
21st International Working Conference on Source Code Analysis and Manipulation
(SCAM), 2021.'
date_created: 2021-10-18T12:50:35Z
date_updated: 2023-06-15T08:57:24Z
department:
- _id: '76'
language:
- iso: eng
project:
- _id: '12'
name: 'SFB 901 - B4: SFB 901 - Subproject B4'
- _id: '3'
name: 'SFB 901 - B: SFB 901 - Project Area B'
- _id: '1'
grant_number: '160364472'
name: 'SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen
in dynamischen Märkten '
publication: 2021 IEEE 21st International Working Conference on Source Code Analysis
and Manipulation (SCAM)
status: public
title: Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++
type: conference
user_id: '15249'
year: '2021'
...
---
_id: '20507'
author:
- first_name: Johannes
full_name: Geismann, Johannes
id: '20063'
last_name: Geismann
orcid: https://orcid.org/0000-0003-2015-2047
- first_name: Eric
full_name: Bodden, Eric
id: '59256'
last_name: Bodden
orcid: 0000-0003-3470-3647
citation:
ama: Geismann J, Bodden E. A systematic literature review of model-driven security
engineering for cyber–physical systems. Journal of Systems and Software.
2020;169:110697. doi:https://doi.org/10.1016/j.jss.2020.110697
apa: Geismann, J., & Bodden, E. (2020). A systematic literature review of model-driven
security engineering for cyber–physical systems. Journal of Systems and Software,
169, 110697. https://doi.org/10.1016/j.jss.2020.110697
bibtex: '@article{Geismann_Bodden_2020, title={A systematic literature review of
model-driven security engineering for cyber–physical systems}, volume={169}, DOI={https://doi.org/10.1016/j.jss.2020.110697},
journal={Journal of Systems and Software}, author={Geismann, Johannes and Bodden,
Eric}, year={2020}, pages={110697} }'
chicago: 'Geismann, Johannes, and Eric Bodden. “A Systematic Literature Review of
Model-Driven Security Engineering for Cyber–Physical Systems.” Journal of Systems
and Software 169 (2020): 110697. https://doi.org/10.1016/j.jss.2020.110697.'
ieee: 'J. Geismann and E. Bodden, “A systematic literature review of model-driven
security engineering for cyber–physical systems,” Journal of Systems and Software,
vol. 169, p. 110697, 2020, doi: https://doi.org/10.1016/j.jss.2020.110697.'
mla: Geismann, Johannes, and Eric Bodden. “A Systematic Literature Review of Model-Driven
Security Engineering for Cyber–Physical Systems.” Journal of Systems and Software,
vol. 169, 2020, p. 110697, doi:https://doi.org/10.1016/j.jss.2020.110697.
short: J. Geismann, E. Bodden, Journal of Systems and Software 169 (2020) 110697.
date_created: 2020-11-26T08:32:56Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: https://doi.org/10.1016/j.jss.2020.110697
intvolume: ' 169'
language:
- iso: eng
page: '110697'
publication: Journal of Systems and Software
publication_identifier:
issn:
- 0164-1212
status: public
title: A systematic literature review of model-driven security engineering for cyber–physical
systems
type: journal_article
user_id: '5786'
volume: 169
year: '2020'
...
---
_id: '20508'
author:
- first_name: Lisa
full_name: Nguyen Quang Do, Lisa
last_name: Nguyen Quang Do
- first_name: Eric
full_name: Bodden, Eric
id: '59256'
last_name: Bodden
orcid: 0000-0003-3470-3647
citation:
ama: Nguyen Quang Do L, Bodden E. Explaining Static Analysis with Rule Graphs. IEEE
Transactions on Software Engineering. Published online 2020.
apa: Nguyen Quang Do, L., & Bodden, E. (2020). Explaining Static Analysis with
Rule Graphs. IEEE Transactions on Software Engineering.
bibtex: '@article{Nguyen Quang Do_Bodden_2020, title={Explaining Static Analysis
with Rule Graphs}, journal={IEEE Transactions on Software Engineering}, author={Nguyen
Quang Do, Lisa and Bodden, Eric}, year={2020} }'
chicago: Nguyen Quang Do, Lisa, and Eric Bodden. “Explaining Static Analysis with
Rule Graphs.” IEEE Transactions on Software Engineering, 2020.
ieee: L. Nguyen Quang Do and E. Bodden, “Explaining Static Analysis with Rule Graphs,”
IEEE Transactions on Software Engineering, 2020.
mla: Nguyen Quang Do, Lisa, and Eric Bodden. “Explaining Static Analysis with Rule
Graphs.” IEEE Transactions on Software Engineering, 2020.
short: L. Nguyen Quang Do, E. Bodden, IEEE Transactions on Software Engineering
(2020).
date_created: 2020-11-26T08:38:33Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/tse20ruleGraphs.pdf
publication: IEEE Transactions on Software Engineering
status: public
title: Explaining Static Analysis with Rule Graphs
type: journal_article
user_id: '5786'
year: '2020'
...
---
_id: '20509'
author:
- first_name: Andreas
full_name: Fischer, Andreas
last_name: Fischer
- first_name: Jonas
full_name: Janneck, Jonas
last_name: Janneck
- first_name: Jörn
full_name: Kussmaul, Jörn
last_name: Kussmaul
- first_name: Nikolas
full_name: Krätzschmar, Nikolas
last_name: Krätzschmar
- first_name: Florian
full_name: Kerschbaum, Florian
last_name: Kerschbaum
- first_name: Eric
full_name: Bodden, Eric
id: '59256'
last_name: Bodden
orcid: 0000-0003-3470-3647
citation:
ama: 'Fischer A, Janneck J, Kussmaul J, Krätzschmar N, Kerschbaum F, Bodden E. PASAPTO:
Policy-aware Security and Performance Trade-off Analysis - Computation on Encrypted
Data with Restricted Leakage. In: 2020 IEEE Computer Security Foundations Symposium
(CSF). ; 2020.'
apa: 'Fischer, A., Janneck, J., Kussmaul, J., Krätzschmar, N., Kerschbaum, F., &
Bodden, E. (2020). PASAPTO: Policy-aware Security and Performance Trade-off Analysis
- Computation on Encrypted Data with Restricted Leakage. 2020 IEEE Computer
Security Foundations Symposium (CSF).'
bibtex: '@inproceedings{Fischer_Janneck_Kussmaul_Krätzschmar_Kerschbaum_Bodden_2020,
title={PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation
on Encrypted Data with Restricted Leakage}, booktitle={2020 IEEE Computer Security
Foundations Symposium (CSF)}, author={Fischer, Andreas and Janneck, Jonas and
Kussmaul, Jörn and Krätzschmar, Nikolas and Kerschbaum, Florian and Bodden, Eric},
year={2020} }'
chicago: 'Fischer, Andreas, Jonas Janneck, Jörn Kussmaul, Nikolas Krätzschmar, Florian
Kerschbaum, and Eric Bodden. “PASAPTO: Policy-Aware Security and Performance Trade-off
Analysis - Computation on Encrypted Data with Restricted Leakage.” In 2020
IEEE Computer Security Foundations Symposium (CSF), 2020.'
ieee: 'A. Fischer, J. Janneck, J. Kussmaul, N. Krätzschmar, F. Kerschbaum, and E.
Bodden, “PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation
on Encrypted Data with Restricted Leakage,” 2020.'
mla: 'Fischer, Andreas, et al. “PASAPTO: Policy-Aware Security and Performance Trade-off
Analysis - Computation on Encrypted Data with Restricted Leakage.” 2020 IEEE
Computer Security Foundations Symposium (CSF), 2020.'
short: 'A. Fischer, J. Janneck, J. Kussmaul, N. Krätzschmar, F. Kerschbaum, E. Bodden,
in: 2020 IEEE Computer Security Foundations Symposium (CSF), 2020.'
date_created: 2020-11-26T08:40:08Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/fjk+20pasapto.pdf
publication: 2020 IEEE Computer Security Foundations Symposium (CSF)
status: public
title: 'PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation
on Encrypted Data with Restricted Leakage'
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20510'
author:
- first_name: Manuel
full_name: Benz, Manuel
last_name: Benz
- first_name: Erik
full_name: Krogh Kristensen, Erik
last_name: Krogh Kristensen
- first_name: Linghui
full_name: Luo, Linghui
last_name: Luo
- first_name: Nataniel
full_name: P. Borges Jr., Nataniel
last_name: P. Borges Jr.
- first_name: Eric
full_name: Bodden, Eric
id: '59256'
last_name: Bodden
orcid: 0000-0003-3470-3647
- first_name: Andreas
full_name: Zeller, Andreas
last_name: Zeller
citation:
ama: 'Benz M, Krogh Kristensen E, Luo L, P. Borges Jr. N, Bodden E, Zeller A. Heaps’n
Leaks: How Heap Snapshots Improve Android Taint Analysis. In: International
Conference for Software Engineering (ICSE). ; 2020.'
apa: 'Benz, M., Krogh Kristensen, E., Luo, L., P. Borges Jr., N., Bodden, E., &
Zeller, A. (2020). Heaps’n Leaks: How Heap Snapshots Improve Android Taint Analysis.
International Conference for Software Engineering (ICSE).'
bibtex: '@inproceedings{Benz_Krogh Kristensen_Luo_P. Borges Jr._Bodden_Zeller_2020,
title={Heaps’n Leaks: How Heap Snapshots Improve Android Taint Analysis}, booktitle={International
Conference for Software Engineering (ICSE)}, author={Benz, Manuel and Krogh Kristensen,
Erik and Luo, Linghui and P. Borges Jr., Nataniel and Bodden, Eric and Zeller,
Andreas}, year={2020} }'
chicago: 'Benz, Manuel, Erik Krogh Kristensen, Linghui Luo, Nataniel P. Borges Jr.,
Eric Bodden, and Andreas Zeller. “Heaps’n Leaks: How Heap Snapshots Improve Android
Taint Analysis.” In International Conference for Software Engineering (ICSE),
2020.'
ieee: 'M. Benz, E. Krogh Kristensen, L. Luo, N. P. Borges Jr., E. Bodden, and A.
Zeller, “Heaps’n Leaks: How Heap Snapshots Improve Android Taint Analysis,” 2020.'
mla: 'Benz, Manuel, et al. “Heaps’n Leaks: How Heap Snapshots Improve Android Taint
Analysis.” International Conference for Software Engineering (ICSE), 2020.'
short: 'M. Benz, E. Krogh Kristensen, L. Luo, N. P. Borges Jr., E. Bodden, A. Zeller,
in: International Conference for Software Engineering (ICSE), 2020.'
date_created: 2020-11-26T08:47:56Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
publication: International Conference for Software Engineering (ICSE)
status: public
title: 'Heaps''n Leaks: How Heap Snapshots Improve Android Taint Analysis'
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20511'
author:
- first_name: Andreas
full_name: Fischer, Andreas
last_name: Fischer
- first_name: Benny
full_name: Fuhry, Benny
last_name: Fuhry
- first_name: Florian
full_name: Kerschbaum, Florian
last_name: Kerschbaum
- first_name: Eric
full_name: Bodden, Eric
id: '59256'
last_name: Bodden
orcid: 0000-0003-3470-3647
citation:
ama: 'Fischer A, Fuhry B, Kerschbaum F, Bodden E. Computation on Encrypted Data
using Dataflow Authentication. In: Privacy Enhancing Technologies Symposium
(PETS/PoPETS). ; 2020.'
apa: Fischer, A., Fuhry, B., Kerschbaum, F., & Bodden, E. (2020). Computation
on Encrypted Data using Dataflow Authentication. Privacy Enhancing Technologies
Symposium (PETS/PoPETS).
bibtex: '@inproceedings{Fischer_Fuhry_Kerschbaum_Bodden_2020, title={Computation
on Encrypted Data using Dataflow Authentication}, booktitle={Privacy Enhancing
Technologies Symposium (PETS/PoPETS)}, author={Fischer, Andreas and Fuhry, Benny
and Kerschbaum, Florian and Bodden, Eric}, year={2020} }'
chicago: Fischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. “Computation
on Encrypted Data Using Dataflow Authentication.” In Privacy Enhancing Technologies
Symposium (PETS/PoPETS), 2020.
ieee: A. Fischer, B. Fuhry, F. Kerschbaum, and E. Bodden, “Computation on Encrypted
Data using Dataflow Authentication,” 2020.
mla: Fischer, Andreas, et al. “Computation on Encrypted Data Using Dataflow Authentication.”
Privacy Enhancing Technologies Symposium (PETS/PoPETS), 2020.
short: 'A. Fischer, B. Fuhry, F. Kerschbaum, E. Bodden, in: Privacy Enhancing Technologies
Symposium (PETS/PoPETS), 2020.'
date_created: 2020-11-26T08:50:59Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/ffk+20computation.pdf
publication: Privacy Enhancing Technologies Symposium (PETS/PoPETS)
status: public
title: Computation on Encrypted Data using Dataflow Authentication
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20512'
author:
- first_name: Stefan
full_name: Krüger, Stefan
last_name: Krüger
- first_name: Karim
full_name: Ali, Karim
last_name: Ali
- first_name: Eric
full_name: Bodden, Eric
last_name: Bodden
citation:
ama: 'Krüger S, Ali K, Bodden E. CogniCrypt_GEN - Generating Code for the Secure
Usage of Crypto APIs. In: International Symposium on Code Generation and Optimization
(CGO). ; 2020:185-198.'
apa: Krüger, S., Ali, K., & Bodden, E. (2020). CogniCrypt_GEN - Generating Code
for the Secure Usage of Crypto APIs. International Symposium on Code Generation
and Optimization (CGO), 185–198.
bibtex: '@inproceedings{Krüger_Ali_Bodden_2020, title={CogniCrypt_GEN - Generating
Code for the Secure Usage of Crypto APIs}, booktitle={International Symposium
on Code Generation and Optimization (CGO)}, author={Krüger, Stefan and Ali, Karim
and Bodden, Eric}, year={2020}, pages={185–198} }'
chicago: Krüger, Stefan, Karim Ali, and Eric Bodden. “CogniCrypt_GEN - Generating
Code for the Secure Usage of Crypto APIs.” In International Symposium on Code
Generation and Optimization (CGO), 185–98, 2020.
ieee: S. Krüger, K. Ali, and E. Bodden, “CogniCrypt_GEN - Generating Code for the
Secure Usage of Crypto APIs,” in International Symposium on Code Generation
and Optimization (CGO), 2020, pp. 185–198.
mla: Krüger, Stefan, et al. “CogniCrypt_GEN - Generating Code for the Secure Usage
of Crypto APIs.” International Symposium on Code Generation and Optimization
(CGO), 2020, pp. 185–98.
short: 'S. Krüger, K. Ali, E. Bodden, in: International Symposium on Code Generation
and Optimization (CGO), 2020, pp. 185–198.'
date_created: 2020-11-26T08:51:01Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
page: 185-198
publication: International Symposium on Code Generation and Optimization (CGO)
related_material:
link:
- relation: confirmation
url: http://www.bodden.de/pubs/krueger20cognicryptgen.pdf
status: public
title: CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs
type: conference
user_id: '5786'
year: '2020'
...
---
_id: '20513'
abstract:
- lang: ger
text: "Frühere Studien haben empirisch offenbart, dass Fehlbenutzungen von kryptographischen
APIs in Softwareanwendungen weitverbreitet sind. Dies geschieht vor allem, weil
Software-Entwickler_innen aufgrund schlechten API-Designs und fehlenden Kryptographiewissens
Probleme bekommen, wenn sie versuchen kryptographische Features zu implementieren.
Die Literatur liefert mehrere Ansätze und Vorschläge diese Probleme zu lösen,
aber alle scheitern schlussendlich auf die eine oder andere Weise daran die Anforderungen
der Entwickler_innenzu erfüllen. Das Resultat ist eine insgesamt lückenhafte Landschaft
verschiedener nur wenigkomplementärer Ansätze.In dieser Arbeit adressieren wir
das Problem kryptographischer Fehlbenutzungen systematischer durch CogniCrypt.
CogniCrypt integriert verschiedene Arten von Tool Supportin einen gemeinsamen
Ansatz, der Entwickler_innen davon befreit wissen zu müssen, wie diese APIs benutzt
werden müssen. Zentral für unseren Ansatz ist CrySL, eine Beschreibungssprache,die
die kognitive Lücke zwischen Kryptographie-Expert_innen und Software-Entwickler_innenüberbrückt.
CrySL ermöglicht es Kryptographie-Expert_innen zu spezifizeren, wie die APIs,die
sie bereitstellen, richtig benutzt werden. Wir haben einen Compiler für CrySL
implementiert, der es erlaubt auf CrySL-Spezifikationen aufbauenden Tool Support
zu entwickeln. Wir haben weiterhin die statische Analyse CogniCrypt_SAST und den
Code-Generator CogniCrypt_GEN entwickelt. Schlussendlich haben wir CogniCrypt
prototypisch implementiert und diesen Prototyp in einem kontrollierten Experiment
evaluiert.\r\n"
author:
- first_name: Stefan
full_name: Krüger, Stefan
last_name: Krüger
citation:
ama: Krüger S. CogniCrypt -- The Secure Integration of Cryptographic Software.
Universitaetsbibliothek Paderborn; 2020.
apa: Krüger, S. (2020). CogniCrypt -- The Secure Integration of Cryptographic
Software. Universitaetsbibliothek Paderborn.
bibtex: '@book{Krüger_2020, title={CogniCrypt -- The Secure Integration of Cryptographic
Software}, publisher={Universitaetsbibliothek Paderborn}, author={Krüger, Stefan},
year={2020} }'
chicago: Krüger, Stefan. CogniCrypt -- The Secure Integration of Cryptographic
Software. Universitaetsbibliothek Paderborn, 2020.
ieee: S. Krüger, CogniCrypt -- The Secure Integration of Cryptographic Software.
Universitaetsbibliothek Paderborn, 2020.
mla: Krüger, Stefan. CogniCrypt -- The Secure Integration of Cryptographic Software.
Universitaetsbibliothek Paderborn, 2020.
short: S. Krüger, CogniCrypt -- The Secure Integration of Cryptographic Software,
Universitaetsbibliothek Paderborn, 2020.
date_created: 2020-11-26T09:02:19Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: https://digital.ub.uni-paderborn.de/hs/document/preview/3500836
publisher: Universitaetsbibliothek Paderborn
status: public
supervisor:
- first_name: Eric
full_name: Bodden, Eric
id: '59256'
last_name: Bodden
orcid: 0000-0003-3470-3647
title: CogniCrypt -- The Secure Integration of Cryptographic Software
type: dissertation
user_id: '5786'
year: '2020'
...
---
_id: '20518'
author:
- first_name: Thorsten
full_name: Koch, Thorsten
id: '13616'
last_name: Koch
- first_name: Stefan
full_name: Dziwok, Stefan
id: '3901'
last_name: Dziwok
orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Jörg
full_name: Holtmann, Jörg
id: '3875'
last_name: Holtmann
orcid: 0000-0001-6141-4571
- first_name: Eric
full_name: Bodden, Eric
id: '59256'
last_name: Bodden
orcid: 0000-0003-3470-3647
citation:
ama: 'Koch T, Dziwok S, Holtmann J, Bodden E. Scenario-based Specification of Security
Protocols and Transformation to Security Model Checkers. In: ACM/IEEE 23rd
International Conference on Model Driven Engineering Languages and Systems (MODELS
’20). ACM; 2020. doi:10.1145/3365438.3410946'
apa: Koch, T., Dziwok, S., Holtmann, J., & Bodden, E. (2020). Scenario-based
Specification of Security Protocols and Transformation to Security Model Checkers.
ACM/IEEE 23rd International Conference on Model Driven Engineering Languages
and Systems (MODELS ’20). https://doi.org/10.1145/3365438.3410946
bibtex: '@inproceedings{Koch_Dziwok_Holtmann_Bodden_2020, title={Scenario-based
Specification of Security Protocols and Transformation to Security Model Checkers},
DOI={10.1145/3365438.3410946},
booktitle={ACM/IEEE 23rd International Conference on Model Driven Engineering
Languages and Systems (MODELS ’20)}, publisher={ACM}, author={Koch, Thorsten and
Dziwok, Stefan and Holtmann, Jörg and Bodden, Eric}, year={2020} }'
chicago: Koch, Thorsten, Stefan Dziwok, Jörg Holtmann, and Eric Bodden. “Scenario-Based
Specification of Security Protocols and Transformation to Security Model Checkers.”
In ACM/IEEE 23rd International Conference on Model Driven Engineering Languages
and Systems (MODELS ’20). ACM, 2020. https://doi.org/10.1145/3365438.3410946.
ieee: 'T. Koch, S. Dziwok, J. Holtmann, and E. Bodden, “Scenario-based Specification
of Security Protocols and Transformation to Security Model Checkers,” 2020, doi:
10.1145/3365438.3410946.'
mla: Koch, Thorsten, et al. “Scenario-Based Specification of Security Protocols
and Transformation to Security Model Checkers.” ACM/IEEE 23rd International
Conference on Model Driven Engineering Languages and Systems (MODELS ’20),
ACM, 2020, doi:10.1145/3365438.3410946.
short: 'T. Koch, S. Dziwok, J. Holtmann, E. Bodden, in: ACM/IEEE 23rd International
Conference on Model Driven Engineering Languages and Systems (MODELS ’20), ACM,
2020.'
date_created: 2020-11-26T10:19:54Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
- _id: '241'
- _id: '662'
doi: 10.1145/3365438.3410946
language:
- iso: eng
publication: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages
and Systems (MODELS ’20)
publisher: ACM
status: public
title: Scenario-based Specification of Security Protocols and Transformation to Security
Model Checkers
type: conference
user_id: '5786'
year: '2020'
...