---
_id: '5203'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
citation:
  ama: 'Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach
    to Validating the Correct Usage of Cryptographic APIs. In: <i>European Conference
    on Object-Oriented Programming (ECOOP)</i>. ; 2018:10:1-10:27.'
  apa: 'Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2018). CrySL:
    An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
    In <i>European Conference on Object-Oriented Programming (ECOOP)</i> (pp. 10:1-10:27).'
  bibtex: '@inproceedings{Krüger_Späth_Ali_Bodden_Mezini_2018, title={CrySL: An Extensible
    Approach to Validating the Correct Usage of Cryptographic APIs}, booktitle={European
    Conference on Object-Oriented Programming (ECOOP)}, author={Krüger, Stefan and
    Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2018},
    pages={10:1-10:27} }'
  chicago: 'Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini.
    “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic
    APIs.” In <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 10:1-10:27,
    2018.'
  ieee: 'S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible
    Approach to Validating the Correct Usage of Cryptographic APIs,” in <i>European
    Conference on Object-Oriented Programming (ECOOP)</i>, 2018, pp. 10:1-10:27.'
  mla: 'Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct
    Usage of Cryptographic APIs.” <i>European Conference on Object-Oriented Programming
    (ECOOP)</i>, 2018, pp. 10:1-10:27.'
  short: 'S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, in: European Conference
    on Object-Oriented Programming (ECOOP), 2018, pp. 10:1-10:27.'
date_created: 2018-10-31T12:37:29Z
date_updated: 2022-01-06T07:01:44Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T13:51:05Z
  date_updated: 2018-11-02T13:51:05Z
  file_id: '5255'
  file_name: ksa+18crysl.pdf
  file_size: 747259
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T13:51:05Z
has_accepted_license: '1'
keyword:
- ITSECWEBSITE
- CROSSING
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/ksa+18crysl.pdf
page: 10:1-10:27
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publication: European Conference on Object-Oriented Programming (ECOOP)
status: public
title: 'CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic
  APIs'
type: conference
user_id: '477'
year: '2018'
...
---
_id: '1044'
author:
- first_name: Richard
  full_name: Leer, Richard
  last_name: Leer
citation:
  ama: Leer R. <i>Measuring Performance of a Static Analysis Framework with an Application
    to Immutability Analysis</i>. Universität Paderborn; 2018.
  apa: Leer, R. (2018). <i>Measuring Performance of a Static Analysis Framework with
    an application to Immutability Analysis</i>. Universität Paderborn.
  bibtex: '@book{Leer_2018, title={Measuring Performance of a Static Analysis Framework
    with an application to Immutability Analysis}, publisher={Universität Paderborn},
    author={Leer, Richard}, year={2018} }'
  chicago: Leer, Richard. <i>Measuring Performance of a Static Analysis Framework
    with an Application to Immutability Analysis</i>. Universität Paderborn, 2018.
  ieee: R. Leer, <i>Measuring Performance of a Static Analysis Framework with an application
    to Immutability Analysis</i>. Universität Paderborn, 2018.
  mla: Leer, Richard. <i>Measuring Performance of a Static Analysis Framework with
    an Application to Immutability Analysis</i>. Universität Paderborn, 2018.
  short: R. Leer, Measuring Performance of a Static Analysis Framework with an Application
    to Immutability Analysis, Universität Paderborn, 2018.
date_created: 2017-12-13T07:52:01Z
date_updated: 2022-01-06T06:50:39Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-11-21T06:15:51Z
  date_updated: 2018-11-21T06:15:51Z
  file_id: '5768'
  file_name: ba_leer.pdf
  file_size: 1383049
  relation: main_file
  success: 1
file_date_updated: 2018-11-21T06:15:51Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
title: Measuring Performance of a Static Analysis Framework with an application to
  Immutability Analysis
type: bachelorsthesis
user_id: '15504'
year: '2018'
...
---
_id: '1045'
author:
- first_name: Jan Niclas
  full_name: Strüwer, Jan Niclas
  last_name: Strüwer
citation:
  ama: Strüwer JN. <i>Interactive Data Visualization for Exploded Supergraphs</i>.
    Universität Paderborn; 2018.
  apa: Strüwer, J. N. (2018). <i>Interactive Data Visualization for Exploded Supergraphs</i>.
    Universität Paderborn.
  bibtex: '@book{Strüwer_2018, title={Interactive Data Visualization for Exploded
    Supergraphs}, publisher={Universität Paderborn}, author={Strüwer, Jan Niclas},
    year={2018} }'
  chicago: Strüwer, Jan Niclas. <i>Interactive Data Visualization for Exploded Supergraphs</i>.
    Universität Paderborn, 2018.
  ieee: J. N. Strüwer, <i>Interactive Data Visualization for Exploded Supergraphs</i>.
    Universität Paderborn, 2018.
  mla: Strüwer, Jan Niclas. <i>Interactive Data Visualization for Exploded Supergraphs</i>.
    Universität Paderborn, 2018.
  short: J.N. Strüwer, Interactive Data Visualization for Exploded Supergraphs, Universität
    Paderborn, 2018.
date_created: 2017-12-13T07:53:49Z
date_updated: 2022-01-06T06:50:40Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-11-21T06:14:15Z
  date_updated: 2018-11-21T06:14:15Z
  file_id: '5767'
  file_name: ba_struewer.pdf
  file_size: 15839765
  relation: main_file
  success: 1
file_date_updated: 2018-11-21T06:14:15Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
title: Interactive Data Visualization for Exploded Supergraphs
type: bachelorsthesis
user_id: '15504'
year: '2018'
...
---
_id: '20552'
abstract:
- lang: eng
  text: Das Zukunftsszenario der Industrie 4.0 ist gepr{\"a}gt durch einen massiven
    Anstieg der unternehmens{\"u}bergreifenden Vernetzung. Um einer Bedrohung durch
    unautorisierte Weitergabe oder Sabotage vertraulicher Daten entgegenzuwirken,
    muss der Informationssicherheit bereits im Entwurf der cyber-physischen Produktionssysteme
    ein hoher Stellenwert einger{\"a}umt werden. Dieses Paradigma wird als Security
    by Design bezeichnet. {\"U}ber den gesamten Entstehungsprozess hinweg muss nachverfolgt
    werden k{\"o}nnen, ob die Systeme spezifische Anforderungen an die Informationssicherheit
    erf{\"u}llen und damit die Eigenschaft der Industrial Security gew{\"a}hrleisten.
    Dieser Beitrag stellt einen Entwurfsansatz zur Nachverfolgung der Informationssicherheit
    vor, der durch Integration softwaretechnischer Methoden in das Systems Engineering
    eine Entwicklung nach dem Paradigma Security by Design erm{\"o}glicht.
author:
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Wilhelm
  full_name: Schäfer, Wilhelm
  last_name: Schäfer
citation:
  ama: 'Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW,
    Engels G, Steffen E, eds. <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>.
    Springer Berlin Heidelberg; 2017:1-24. doi:<a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">10.1007/978-3-662-52903-4_8-1</a>'
  apa: Gerking, C., Bodden, E., &#38; Schäfer, W. (2017). Industrial Security by Design.
    In G. W. Maier, G. Engels, &#38; E. Steffen (Eds.), <i>Handbuch Gestaltung digitaler
    und vernetzter Arbeitswelten</i> (pp. 1–24). Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>
  bibtex: '@inbook{Gerking_Bodden_Schäfer_2017, place={Berlin, Heidelberg}, title={Industrial
    Security by Design}, DOI={<a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">10.1007/978-3-662-52903-4_8-1</a>},
    booktitle={Handbuch Gestaltung digitaler und vernetzter Arbeitswelten}, publisher={Springer
    Berlin Heidelberg}, author={Gerking, Christopher and Bodden, Eric and Schäfer,
    Wilhelm}, editor={Maier, Günter W. and Engels, Gregor and Steffen, Eckhard}, year={2017},
    pages={1–24} }'
  chicago: 'Gerking, Christopher, Eric Bodden, and Wilhelm Schäfer. “Industrial Security
    by Design.” In <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>,
    edited by Günter W. Maier, Gregor Engels, and Eckhard Steffen, 1–24. Berlin, Heidelberg:
    Springer Berlin Heidelberg, 2017. <a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>.'
  ieee: 'C. Gerking, E. Bodden, and W. Schäfer, “Industrial Security by Design,” in
    <i>Handbuch Gestaltung digitaler und vernetzter Arbeitswelten</i>, G. W. Maier,
    G. Engels, and E. Steffen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg,
    2017, pp. 1–24.'
  mla: Gerking, Christopher, et al. “Industrial Security by Design.” <i>Handbuch Gestaltung
    Digitaler Und Vernetzter Arbeitswelten</i>, edited by Günter W. Maier et al.,
    Springer Berlin Heidelberg, 2017, pp. 1–24, doi:<a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">10.1007/978-3-662-52903-4_8-1</a>.
  short: 'C. Gerking, E. Bodden, W. Schäfer, in: G.W. Maier, G. Engels, E. Steffen
    (Eds.), Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, Springer Berlin
    Heidelberg, Berlin, Heidelberg, 2017, pp. 1–24.'
date_created: 2020-11-30T09:56:23Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: 10.1007/978-3-662-52903-4_8-1
editor:
- first_name: Günter W.
  full_name: Maier, Günter W.
  last_name: Maier
- first_name: Gregor
  full_name: Engels, Gregor
  last_name: Engels
- first_name: Eckhard
  full_name: Steffen, Eckhard
  last_name: Steffen
keyword:
- ITSECWEBSITE
language:
- iso: eng
page: 1-24
place: Berlin, Heidelberg
publication: Handbuch Gestaltung digitaler und vernetzter Arbeitswelten
publication_identifier:
  isbn:
  - 978-3-662-52903-4
publisher: Springer Berlin Heidelberg
status: public
title: Industrial Security by Design
type: book_chapter
user_id: '5786'
year: '2017'
...
---
_id: '20553'
abstract:
- lang: eng
  text: Finding and fixing software vulnerabilities have become a major struggle for
    most software development companies. While generally without alternative, such
    fixing efforts are a major cost factor, which is why companies have a vital interest
    in focusing their secure software development activities such that they obtain
    an optimal return on this investment. We investigate, in this paper, quantitatively
    the major factors that impact the time it takes to fix a given security issue
    based on data collected automatically within SAP's secure development process,
    and we show how the issue fix time could be used to monitor the fixing process.
    We use three machine learning methods and evaluate their predictive power in predicting
    the time to fix issues. Interestingly, the models indicate that vulnerability
    type has less dominant impact on issue fix time than previously believed. The
    time it takes to fix an issue instead seems much more related to the component
    in which the potential vulnerability resides, the project related to the issue,
    the development groups that address the issue, and the closeness of the software
    release date. This indicates that the software structure, the fixing processes,
    and the development groups are the dominant factors that impact the time spent
    to address security issues. SAP can use the models to implement a continuous improvement
    of its secure software development process and to measure the impact of individual
    improvements. The development teams at SAP develop different types of software,
    adopt different internal development processes, use different programming languages
    and platforms, and are located in different cities and countries. Other organizations,
    may use the results---with precaution---and be learning organizations.
author:
- first_name: Lotfi
  full_name: Ben Othmane, Lotfi
  last_name: Ben Othmane
- first_name: Golriz
  full_name: Chehrazi, Golriz
  last_name: Chehrazi
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Petar
  full_name: Tsalovski, Petar
  last_name: Tsalovski
- first_name: Achim D.
  full_name: Brucker, Achim D.
  last_name: Brucker
citation:
  ama: 'Ben Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker AD. Time for Addressing
    Software Security Issues: Prediction Models and Impacting Factors. <i>Data Science
    and Engineering</i>. 2017;2(2):107-124. doi:<a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>'
  apa: 'Ben Othmane, L., Chehrazi, G., Bodden, E., Tsalovski, P., &#38; Brucker, A.
    D. (2017). Time for Addressing Software Security Issues: Prediction Models and
    Impacting Factors. <i>Data Science and Engineering</i>, <i>2</i>(2), 107–124.
    <a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>'
  bibtex: '@article{Ben Othmane_Chehrazi_Bodden_Tsalovski_Brucker_2017, title={Time
    for Addressing Software Security Issues: Prediction Models and Impacting Factors},
    volume={2}, DOI={<a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>},
    number={2}, journal={Data Science and Engineering}, author={Ben Othmane, Lotfi
    and Chehrazi, Golriz and Bodden, Eric and Tsalovski, Petar and Brucker, Achim
    D.}, year={2017}, pages={107–124} }'
  chicago: 'Ben Othmane, Lotfi, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, and
    Achim D. Brucker. “Time for Addressing Software Security Issues: Prediction Models
    and Impacting Factors.” <i>Data Science and Engineering</i> 2, no. 2 (2017): 107–24.
    <a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>.'
  ieee: 'L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, and A. D. Brucker,
    “Time for Addressing Software Security Issues: Prediction Models and Impacting
    Factors,” <i>Data Science and Engineering</i>, vol. 2, no. 2, pp. 107–124, 2017,
    doi: <a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>.'
  mla: 'Ben Othmane, Lotfi, et al. “Time for Addressing Software Security Issues:
    Prediction Models and Impacting Factors.” <i>Data Science and Engineering</i>,
    vol. 2, no. 2, 2017, pp. 107–24, doi:<a href="https://doi.org/10.1007/s41019-016-0019-8">https://doi.org/10.1007/s41019-016-0019-8</a>.'
  short: L. Ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, A.D. Brucker, Data
    Science and Engineering 2 (2017) 107–124.
date_created: 2020-11-30T10:24:50Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: https://doi.org/10.1007/s41019-016-0019-8
intvolume: '         2'
issue: '2'
language:
- iso: eng
page: 107-124
publication: Data Science and Engineering
publication_identifier:
  issn:
  - 2364-1541
related_material:
  link:
  - relation: confirmation
    url: http://bodden.de/pubs/bcb17time.pdf
status: public
title: 'Time for Addressing Software Security Issues: Prediction Models and Impacting
  Factors'
type: journal_article
user_id: '5786'
volume: 2
year: '2017'
...
---
_id: '20554'
author:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Bodden E. <i>Self-Adaptive Static Analysis</i>.; 2017.
  apa: Bodden, E. (2017). <i>Self-adaptive static analysis</i>.
  bibtex: '@book{Bodden_2017, title={Self-adaptive static analysis}, author={Bodden,
    Eric}, year={2017} }'
  chicago: Bodden, Eric. <i>Self-Adaptive Static Analysis</i>, 2017.
  ieee: E. Bodden, <i>Self-adaptive static analysis</i>. 2017.
  mla: Bodden, Eric. <i>Self-Adaptive Static Analysis</i>. 2017.
  short: E. Bodden, Self-Adaptive Static Analysis, 2017.
date_created: 2020-11-30T10:27:21Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: https://arxiv.org/abs/1710.07430
report_number: arXiv:1710.07430
status: public
title: Self-adaptive static analysis
type: report
user_id: '5786'
year: '2017'
...
---
_id: '20557'
author:
- first_name: Max
  full_name: Lillack, Max
  last_name: Lillack
- first_name: Christian
  full_name: Kästner, Christian
  last_name: Kästner
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Lillack M, Kästner C, Bodden E. Tracking Load-time Configuration Options. <i>IEEE
    Transactions on Software Engineering</i>. 2017;PP(99):1-1. doi:<a href="https://doi.org/10.1109/TSE.2017.2756048">10.1109/TSE.2017.2756048</a>
  apa: Lillack, M., Kästner, C., &#38; Bodden, E. (2017). Tracking Load-time Configuration
    Options. <i>IEEE Transactions on Software Engineering</i>, <i>PP</i>(99), 1–1.
    <a href="https://doi.org/10.1109/TSE.2017.2756048">https://doi.org/10.1109/TSE.2017.2756048</a>
  bibtex: '@article{Lillack_Kästner_Bodden_2017, title={Tracking Load-time Configuration
    Options}, volume={PP}, DOI={<a href="https://doi.org/10.1109/TSE.2017.2756048">10.1109/TSE.2017.2756048</a>},
    number={99}, journal={IEEE Transactions on Software Engineering}, author={Lillack,
    Max and Kästner, Christian and Bodden, Eric}, year={2017}, pages={1–1} }'
  chicago: 'Lillack, Max, Christian Kästner, and Eric Bodden. “Tracking Load-Time
    Configuration Options.” <i>IEEE Transactions on Software Engineering</i> PP, no.
    99 (2017): 1–1. <a href="https://doi.org/10.1109/TSE.2017.2756048">https://doi.org/10.1109/TSE.2017.2756048</a>.'
  ieee: 'M. Lillack, C. Kästner, and E. Bodden, “Tracking Load-time Configuration
    Options,” <i>IEEE Transactions on Software Engineering</i>, vol. PP, no. 99, pp.
    1–1, 2017, doi: <a href="https://doi.org/10.1109/TSE.2017.2756048">10.1109/TSE.2017.2756048</a>.'
  mla: Lillack, Max, et al. “Tracking Load-Time Configuration Options.” <i>IEEE Transactions
    on Software Engineering</i>, vol. PP, no. 99, 2017, pp. 1–1, doi:<a href="https://doi.org/10.1109/TSE.2017.2756048">10.1109/TSE.2017.2756048</a>.
  short: M. Lillack, C. Kästner, E. Bodden, IEEE Transactions on Software Engineering
    PP (2017) 1–1.
date_created: 2020-11-30T11:06:43Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '76'
doi: 10.1109/TSE.2017.2756048
issue: '99'
keyword:
- Androids
- Bluetooth
- Humanoid robots
- Java
- Software
- Tools
- Configuration options
- Static analysis
- Variability mining
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/lkb17lotrack.pdf
page: 1-1
publication: IEEE Transactions on Software Engineering
publication_identifier:
  issn:
  - 0098-5589
status: public
title: Tracking Load-time Configuration Options
type: journal_article
user_id: '5786'
volume: PP
year: '2017'
...
---
_id: '20558'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Sarah
  full_name: Nadi, Sarah
  last_name: Nadi
- first_name: Michael
  full_name: Reif, Michael
  last_name: Reif
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Florian
  full_name: Göpfert, Florian
  last_name: Göpfert
- first_name: Felix
  full_name: Günther, Felix
  last_name: Günther
- first_name: Christian
  full_name: Weinert, Christian
  last_name: Weinert
- first_name: Daniel
  full_name: Demmler, Daniel
  last_name: Demmler
- first_name: Ram
  full_name: Kamath, Ram
  last_name: Kamath
citation:
  ama: 'Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using
    Cryptography. In: <i>International Conference on Automated Software Engineering
    (ASE 2017), Tool Demo Track</i>. ; 2017.'
  apa: 'Krüger, S., Nadi, S., Reif, M., Ali, K., Mezini, M., Bodden, E., Göpfert,
    F., Günther, F., Weinert, C., Demmler, D., &#38; Kamath, R. (2017). CogniCrypt:
    Supporting Developers in using Cryptography. <i>International Conference on Automated
    Software Engineering (ASE 2017), Tool Demo Track</i>.'
  bibtex: '@inproceedings{Krüger_Nadi_Reif_Ali_Mezini_Bodden_Göpfert_Günther_Weinert_Demmler_et
    al._2017, title={CogniCrypt: Supporting Developers in using Cryptography}, booktitle={International
    Conference on Automated Software Engineering (ASE 2017), Tool Demo Track}, author={Krüger,
    Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden,
    Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler,
    Daniel and et al.}, year={2017} }'
  chicago: 'Krüger, Stefan, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric
    Bodden, Florian Göpfert, et al. “CogniCrypt: Supporting Developers in Using Cryptography.”
    In <i>International Conference on Automated Software Engineering (ASE 2017), Tool
    Demo Track</i>, 2017.'
  ieee: 'S. Krüger <i>et al.</i>, “CogniCrypt: Supporting Developers in using Cryptography,”
    2017.'
  mla: 'Krüger, Stefan, et al. “CogniCrypt: Supporting Developers in Using Cryptography.”
    <i>International Conference on Automated Software Engineering (ASE 2017), Tool
    Demo Track</i>, 2017.'
  short: 'S. Krüger, S. Nadi, M. Reif, K. Ali, M. Mezini, E. Bodden, F. Göpfert, F.
    Günther, C. Weinert, D. Demmler, R. Kamath, in: International Conference on Automated
    Software Engineering (ASE 2017), Tool Demo Track, 2017.'
date_created: 2020-11-30T11:08:26Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '76'
keyword:
- ITSECWEBSITE
- CROSSING
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/knr+17cognicrypt.pdf
publication: International Conference on Automated Software Engineering (ASE 2017),
  Tool Demo Track
status: public
title: 'CogniCrypt: Supporting Developers in using Cryptography'
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20559'
author:
- first_name: Lisa Nguyen Quang
  full_name: Do, Lisa Nguyen Quang
  last_name: Do
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Benjamin
  full_name: Livshits, Benjamin
  last_name: Livshits
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Justin
  full_name: Smith, Justin
  last_name: Smith
- first_name: Emerson
  full_name: Murphy-Hill, Emerson
  last_name: Murphy-Hill
citation:
  ama: 'Do LNQ, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Just-in-time
    Static Analysis. In: <i>Proceedings of the 26th ACM SIGSOFT International Symposium
    on Software Testing and Analysis</i>. ISSTA 2017. ACM; 2017:307-317. doi:<a href="https://doi.org/10.1145/3092703.3092705">10.1145/3092703.3092705</a>'
  apa: Do, L. N. Q., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill,
    E. (2017). Just-in-time Static Analysis. <i>Proceedings of the 26th ACM SIGSOFT
    International Symposium on Software Testing and Analysis</i>, 307–317. <a href="https://doi.org/10.1145/3092703.3092705">https://doi.org/10.1145/3092703.3092705</a>
  bibtex: '@inproceedings{Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, place={New
    York, NY, USA}, series={ISSTA 2017}, title={Just-in-time Static Analysis}, DOI={<a
    href="https://doi.org/10.1145/3092703.3092705">10.1145/3092703.3092705</a>}, booktitle={Proceedings
    of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis},
    publisher={ACM}, author={Do, Lisa Nguyen Quang and Ali, Karim and Livshits, Benjamin
    and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017}, pages={307–317},
    collection={ISSTA 2017} }'
  chicago: 'Do, Lisa Nguyen Quang, Karim Ali, Benjamin Livshits, Eric Bodden, Justin
    Smith, and Emerson Murphy-Hill. “Just-in-Time Static Analysis.” In <i>Proceedings
    of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>,
    307–17. ISSTA 2017. New York, NY, USA: ACM, 2017. <a href="https://doi.org/10.1145/3092703.3092705">https://doi.org/10.1145/3092703.3092705</a>.'
  ieee: 'L. N. Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill,
    “Just-in-time Static Analysis,” in <i>Proceedings of the 26th ACM SIGSOFT International
    Symposium on Software Testing and Analysis</i>, 2017, pp. 307–317, doi: <a href="https://doi.org/10.1145/3092703.3092705">10.1145/3092703.3092705</a>.'
  mla: Do, Lisa Nguyen Quang, et al. “Just-in-Time Static Analysis.” <i>Proceedings
    of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis</i>,
    ACM, 2017, pp. 307–17, doi:<a href="https://doi.org/10.1145/3092703.3092705">10.1145/3092703.3092705</a>.
  short: 'L.N.Q. Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in:
    Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing
    and Analysis, ACM, New York, NY, USA, 2017, pp. 307–317.'
date_created: 2020-11-30T11:10:01Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '76'
doi: 10.1145/3092703.3092705
keyword:
- Just-in-Time
- Layered analysis
- Static analysis
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/nal+17jit.pdf
page: 307-317
place: New York, NY, USA
publication: Proceedings of the 26th ACM SIGSOFT International Symposium on Software
  Testing and Analysis
publication_identifier:
  isbn:
  - 978-1-4503-5076-1
publisher: ACM
series_title: ISSTA 2017
status: public
title: Just-in-time Static Analysis
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20715'
author:
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Benjamin
  full_name: Livshits, Benjamin
  last_name: Livshits
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Justin
  full_name: Smith, Justin
  last_name: Smith
- first_name: Emerson
  full_name: Murphy-Hill, Emerson
  last_name: Murphy-Hill
citation:
  ama: 'Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Cheetah:
    Just-in-Time Taint Analysis for Android Apps. In: <i>International Conference
    for Software Engineering (ICSE), Tool Demonstrations Track</i>. ; 2017.'
  apa: 'Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill,
    E. (2017). Cheetah: Just-in-Time Taint Analysis for Android Apps. <i>International
    Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>.'
  bibtex: '@inproceedings{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017,
    title={Cheetah: Just-in-Time Taint Analysis for Android Apps}, booktitle={International
    Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen
    Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith,
    Justin and Murphy-Hill, Emerson}, year={2017} }'
  chicago: 'Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin
    Smith, and Emerson Murphy-Hill. “Cheetah: Just-in-Time Taint Analysis for Android
    Apps.” In <i>International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track</i>, 2017.'
  ieee: 'L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill,
    “Cheetah: Just-in-Time Taint Analysis for Android Apps,” 2017.'
  mla: 'Nguyen Quang Do, Lisa, et al. “Cheetah: Just-in-Time Taint Analysis for Android
    Apps.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track</i>, 2017.'
  short: 'L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill,
    in: International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track, 2017.'
date_created: 2020-12-14T11:51:44Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/dal17cheetah.pdf
publication: International Conference for Software Engineering (ICSE), Tool Demonstrations
  Track
status: public
title: 'Cheetah: Just-in-Time Taint Analysis for Android Apps'
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20792'
author:
- first_name: Stefano
  full_name: Schivo, Stefano
  last_name: Schivo
- first_name: Bugra M.
  full_name: Yildiz., Bugra M.
  last_name: Yildiz.
- first_name: Enno
  full_name: Ruijters, Enno
  last_name: Ruijters
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
- first_name: Rajesh
  full_name: Kumar, Rajesh
  last_name: Kumar
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Arend
  full_name: Rensink, Arend
  last_name: Rensink
- first_name: Mariëlle
  full_name: Stoelinga, Mariëlle
  last_name: Stoelinga
citation:
  ama: 'Schivo S, Yildiz. BM, Ruijters E, et al. How to Efficiently Build a Front-End
    Tool for UPPAAL: A Model-Driven Approach. In: Larsen KG, Sokolsky O, Wang J, eds.
    <i>Dependable Software Engineering, 3rd International Symposium (SETTA 2017)</i>.
    Lecture Notes in Computer Science. Springer; 2017:319-336. doi:<a href="https://doi.org/10.1007/978-3-319-69483-2_19">10.1007/978-3-319-69483-2_19</a>'
  apa: 'Schivo, S., Yildiz., B. M., Ruijters, E., Gerking, C., Kumar, R., Dziwok,
    S., Rensink, A., &#38; Stoelinga, M. (2017). How to Efficiently Build a Front-End
    Tool for UPPAAL: A Model-Driven Approach. In K. G. Larsen, O. Sokolsky, &#38;
    J. Wang (Eds.), <i>Dependable Software Engineering, 3rd International Symposium
    (SETTA 2017)</i> (Issue 10606, pp. 319–336). Springer. <a href="https://doi.org/10.1007/978-3-319-69483-2_19">https://doi.org/10.1007/978-3-319-69483-2_19</a>'
  bibtex: '@inproceedings{Schivo_Yildiz._Ruijters_Gerking_Kumar_Dziwok_Rensink_Stoelinga_2017,
    place={Changsha}, series={Lecture Notes in Computer Science}, title={How to Efficiently
    Build a Front-End Tool for UPPAAL: A Model-Driven Approach}, DOI={<a href="https://doi.org/10.1007/978-3-319-69483-2_19">10.1007/978-3-319-69483-2_19</a>},
    number={10606}, booktitle={Dependable Software Engineering, 3rd International
    Symposium (SETTA 2017)}, publisher={Springer}, author={Schivo, Stefano and Yildiz.,
    Bugra M. and Ruijters, Enno and Gerking, Christopher and Kumar, Rajesh and Dziwok,
    Stefan and Rensink, Arend and Stoelinga, Mariëlle}, editor={Larsen, Kim G. and
    Sokolsky, Oleg and Wang, Ji}, year={2017}, pages={319–336}, collection={Lecture
    Notes in Computer Science} }'
  chicago: 'Schivo, Stefano, Bugra M. Yildiz., Enno Ruijters, Christopher Gerking,
    Rajesh Kumar, Stefan Dziwok, Arend Rensink, and Mariëlle Stoelinga. “How to Efficiently
    Build a Front-End Tool for UPPAAL: A Model-Driven Approach.” In <i>Dependable
    Software Engineering, 3rd International Symposium (SETTA 2017)</i>, edited by
    Kim G. Larsen, Oleg Sokolsky, and Ji Wang, 319–36. Lecture Notes in Computer Science.
    Changsha: Springer, 2017. <a href="https://doi.org/10.1007/978-3-319-69483-2_19">https://doi.org/10.1007/978-3-319-69483-2_19</a>.'
  ieee: 'S. Schivo <i>et al.</i>, “How to Efficiently Build a Front-End Tool for UPPAAL:
    A Model-Driven Approach,” in <i>Dependable Software Engineering, 3rd International
    Symposium (SETTA 2017)</i>, 2017, no. 10606, pp. 319–336, doi: <a href="https://doi.org/10.1007/978-3-319-69483-2_19">10.1007/978-3-319-69483-2_19</a>.'
  mla: 'Schivo, Stefano, et al. “How to Efficiently Build a Front-End Tool for UPPAAL:
    A Model-Driven Approach.” <i>Dependable Software Engineering, 3rd International
    Symposium (SETTA 2017)</i>, edited by Kim G. Larsen et al., no. 10606, Springer,
    2017, pp. 319–36, doi:<a href="https://doi.org/10.1007/978-3-319-69483-2_19">10.1007/978-3-319-69483-2_19</a>.'
  short: 'S. Schivo, B.M. Yildiz., E. Ruijters, C. Gerking, R. Kumar, S. Dziwok, A.
    Rensink, M. Stoelinga, in: K.G. Larsen, O. Sokolsky, J. Wang (Eds.), Dependable
    Software Engineering, 3rd International Symposium (SETTA 2017), Springer, Changsha,
    2017, pp. 319–336.'
date_created: 2020-12-17T13:30:15Z
date_updated: 2022-01-06T06:54:38Z
department:
- _id: '76'
- _id: '241'
doi: 10.1007/978-3-319-69483-2_19
editor:
- first_name: Kim G.
  full_name: Larsen, Kim G.
  last_name: Larsen
- first_name: Oleg
  full_name: Sokolsky, Oleg
  last_name: Sokolsky
- first_name: Ji
  full_name: Wang, Ji
  last_name: Wang
issue: '10606'
language:
- iso: eng
page: 319-336
place: Changsha
publication: Dependable Software Engineering, 3rd International Symposium (SETTA 2017)
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: 'How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach'
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20794'
abstract:
- lang: eng
  text: Cyber-physische Systeme (CPSs) sind die nächste Generation von eingebetteten
    Systemen, die fortwährend ihre Zusammenarbeit koordinieren, um anspruchsvolle
    Funktionen zu erfüllen. Die Koordination zwischen ihnen kann in Software mittels
    asynchroner Nachrichtenkommunikation realisiert werden. Um die funktionale Korrektheit
    der Software zu gewährleisten, ist aufgrund der Kritikalität dieser Systeme eine
    formale Verifikation wie z.B. Model Checking notwendig. Die Eingabesprache eines
    Model Checkers unterstützt jedoch domänenspezifische Aspekte wie asynchrone Kommunikation
    nicht direkt, wodurch diese vom Softwareingenieur mittels zahlreicher Modellelemente
    spezifiziert werden müssen. Dies ist hochgradig komplex und somit fehleranfällig.
    Im Rahmen dieser Arbeit wird eine modellgetriebene Methode zur domänenspezifischen
    Spezifikation und vollautomatischen Verifikation der nachrichtenbasierten Koordination
    von CPSs präsentiert. Mit Hilfe dieser Methode kann der Softwareingenieur die
    Koordination kompakt modellieren und muss nicht länger verstehen, wie seine Spezifikation
    auf der Ebene des Model Checkers ausgedrückt wird. Insgesamt wird die Komplexität
    für den Softwareingenieur somit deutlich handhabbarer. Bezüglich der Spezifikation
    einer solchen Koordination definiert die Arbeit eine domänenspezifische Sprache
    namens Real-Time Coordination Protocols (RTCPs). Darüber hinaus wird eine domänenspezifische
    Sprache zur Spezifikation von Verifikationseigenschaften eingeführt und Entwurfsmuster
    für RTCPs präsentiert, um die Anzahl der Modellierungsfehler zu senken.
author:
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
citation:
  ama: Dziwok S. <i>Specification and Verification for Real-Time Coordination Protocols
    of Cyber-Physical Systems</i>. Paderborn University; 2017.
  apa: Dziwok, S. (2017). <i>Specification and Verification for Real-Time Coordination
    Protocols of Cyber-physical Systems</i>. Paderborn University.
  bibtex: '@book{Dziwok_2017, title={Specification and Verification for Real-Time
    Coordination Protocols of Cyber-physical Systems}, publisher={Paderborn University},
    author={Dziwok, Stefan}, year={2017} }'
  chicago: Dziwok, Stefan. <i>Specification and Verification for Real-Time Coordination
    Protocols of Cyber-Physical Systems</i>. Paderborn University, 2017.
  ieee: S. Dziwok, <i>Specification and Verification for Real-Time Coordination Protocols
    of Cyber-physical Systems</i>. Paderborn University, 2017.
  mla: Dziwok, Stefan. <i>Specification and Verification for Real-Time Coordination
    Protocols of Cyber-Physical Systems</i>. Paderborn University, 2017.
  short: S. Dziwok, Specification and Verification for Real-Time Coordination Protocols
    of Cyber-Physical Systems, Paderborn University, 2017.
date_created: 2020-12-17T13:32:52Z
date_updated: 2022-01-06T06:54:38Z
department:
- _id: '76'
- _id: '241'
language:
- iso: eng
publisher: Paderborn University
status: public
title: Specification and Verification for Real-Time Coordination Protocols of Cyber-physical
  Systems
type: dissertation
user_id: '5786'
year: '2017'
...
---
_id: '20797'
author:
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
- first_name: David
  full_name: Schubert, David
  id: '9106'
  last_name: Schubert
- first_name: Ingo
  full_name: Budde, Ingo
  id: '13693'
  last_name: Budde
  orcid: https://orcid.org/0000-0003-0124-6291
citation:
  ama: 'Gerking C, Schubert D, Budde I. Reducing the Verbosity of Imperative Model
    Refinements by using General-Purpose Language Facilities. In: Guerra E, van den
    Brand M, eds. <i>Theory and Practice of Model Transformation, 10th International
    Conference (ICMT 2017)</i>. Lecture Notes in Computer Science. Springer; 2017:19-34.'
  apa: Gerking, C., Schubert, D., &#38; Budde, I. (2017). Reducing the Verbosity of
    Imperative Model Refinements by using General-Purpose Language Facilities. In
    E. Guerra &#38; M. van den Brand (Eds.), <i>Theory and Practice of Model Transformation,
    10th International Conference (ICMT 2017)</i> (Issue 10374, pp. 19–34). Springer.
  bibtex: '@inproceedings{Gerking_Schubert_Budde_2017, place={Marburg}, series={Lecture
    Notes in Computer Science}, title={Reducing the Verbosity of Imperative Model
    Refinements by using General-Purpose Language Facilities}, number={10374}, booktitle={Theory
    and Practice of Model Transformation, 10th International Conference (ICMT 2017)},
    publisher={Springer}, author={Gerking, Christopher and Schubert, David and Budde,
    Ingo}, editor={Guerra, Esther and van den Brand, Mark}, year={2017}, pages={19–34},
    collection={Lecture Notes in Computer Science} }'
  chicago: 'Gerking, Christopher, David Schubert, and Ingo Budde. “Reducing the Verbosity
    of Imperative Model Refinements by Using General-Purpose Language Facilities.”
    In <i>Theory and Practice of Model Transformation, 10th International Conference
    (ICMT 2017)</i>, edited by Esther Guerra and Mark van den Brand, 19–34. Lecture
    Notes in Computer Science. Marburg: Springer, 2017.'
  ieee: C. Gerking, D. Schubert, and I. Budde, “Reducing the Verbosity of Imperative
    Model Refinements by using General-Purpose Language Facilities,” in <i>Theory
    and Practice of Model Transformation, 10th International Conference (ICMT 2017)</i>,
    2017, no. 10374, pp. 19–34.
  mla: Gerking, Christopher, et al. “Reducing the Verbosity of Imperative Model Refinements
    by Using General-Purpose Language Facilities.” <i>Theory and Practice of Model
    Transformation, 10th International Conference (ICMT 2017)</i>, edited by Esther
    Guerra and Mark van den Brand, no. 10374, Springer, 2017, pp. 19–34.
  short: 'C. Gerking, D. Schubert, I. Budde, in: E. Guerra, M. van den Brand (Eds.),
    Theory and Practice of Model Transformation, 10th International Conference (ICMT
    2017), Springer, Marburg, 2017, pp. 19–34.'
date_created: 2020-12-17T13:36:44Z
date_updated: 2022-01-06T06:54:39Z
department:
- _id: '76'
- _id: '241'
editor:
- first_name: Esther
  full_name: Guerra, Esther
  last_name: Guerra
- first_name: Mark
  full_name: van den Brand, Mark
  last_name: van den Brand
issue: '10374'
language:
- iso: eng
main_file_link:
- url: https://link.springer.com/chapter/10.1007/978-3-319-61473-1_2
page: 19-34
place: Marburg
publication: Theory and Practice of Model Transformation, 10th International Conference
  (ICMT 2017)
publisher: Springer
series_title: Lecture Notes in Computer Science
status: public
title: Reducing the Verbosity of Imperative Model Refinements by using General-Purpose
  Language Facilities
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20804'
abstract:
- lang: eng
  text: Modern Cyber-physical Systems are executed in physical environments and distributed
    over several Electronic Control Units using multiple cores for execution. These
    systems perform safety-critical tasks and, therefore, have to fulfill hard real-time
    requirements. To face these requirements systematically, system engineers de-
    velop these systems model-driven and prove the fulfillment of these requirements
    via model checking. It is important to ensure that the runtime scheduling does
    not violate the verified requirements by neglecting the model checking assumptions.
    Currently, there is a gap in the process for model-driven approaches to derive
    a feasible runtime scheduling that respects these assumptions. In this paper,
    we present an approach for a semi- automatic synthesis of behavioral models into
    a deterministic scheduling that respects real-time requirements at runtime. We
    evaluate our approach using an example of a distributed automotive system with
    hard real-time requirements specified with the MechatronicUML method.
author:
- first_name: Johannes
  full_name: Geismann, Johannes
  id: '20063'
  last_name: Geismann
  orcid: https://orcid.org/0000-0003-2015-2047
- first_name: Uwe
  full_name: Pohlmann, Uwe
  last_name: Pohlmann
- first_name: David
  full_name: Schmelter, David
  id: '40982'
  last_name: Schmelter
  orcid: 0000-0001-7787-5380
citation:
  ama: 'Geismann J, Pohlmann U, Schmelter D. Towards an Automated Synthesis of a Real-time
    Scheduling for Cyber-physical Multi-core Systems. In: <i>Proceedings of the 5th
    International Conference on Model-Driven Engineering and Software Development</i>.
    ; 2017.'
  apa: Geismann, J., Pohlmann, U., &#38; Schmelter, D. (2017). Towards an Automated
    Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems. <i>Proceedings
    of the 5th International Conference on Model-Driven Engineering and Software Development</i>.
  bibtex: '@inproceedings{Geismann_Pohlmann_Schmelter_2017, title={Towards an Automated
    Synthesis of a Real-time Scheduling for Cyber-physical Multi-core Systems}, booktitle={Proceedings
    of the 5th International Conference on Model-Driven Engineering and Software Development},
    author={Geismann, Johannes and Pohlmann, Uwe and Schmelter, David}, year={2017}
    }'
  chicago: Geismann, Johannes, Uwe Pohlmann, and David Schmelter. “Towards an Automated
    Synthesis of a Real-Time Scheduling for Cyber-Physical Multi-Core Systems.” In
    <i>Proceedings of the 5th International Conference on Model-Driven Engineering
    and Software Development</i>, 2017.
  ieee: J. Geismann, U. Pohlmann, and D. Schmelter, “Towards an Automated Synthesis
    of a Real-time Scheduling for Cyber-physical Multi-core Systems,” 2017.
  mla: Geismann, Johannes, et al. “Towards an Automated Synthesis of a Real-Time Scheduling
    for Cyber-Physical Multi-Core Systems.” <i>Proceedings of the 5th International
    Conference on Model-Driven Engineering and Software Development</i>, 2017.
  short: 'J. Geismann, U. Pohlmann, D. Schmelter, in: Proceedings of the 5th International
    Conference on Model-Driven Engineering and Software Development, 2017.'
date_created: 2020-12-17T13:59:04Z
date_updated: 2022-01-06T06:54:39Z
department:
- _id: '76'
- _id: '241'
- _id: '662'
language:
- iso: eng
publication: Proceedings of the 5th International Conference on Model-Driven Engineering
  and Software Development
status: public
title: Towards an Automated Synthesis of a Real-time Scheduling for Cyber-physical
  Multi-core Systems
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20805'
author:
- first_name: Matthias
  full_name: Becker, Matthias
  last_name: Becker
citation:
  ama: Becker M. <i>Engineering Self-Adaptive Systems with Simulation-Based Performance
    Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik;
    2017.
  apa: Becker, M. (2017). <i>Engineering Self-Adaptive Systems with Simulation-Based
    Performance Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik.
  bibtex: '@book{Becker_2017, title={Engineering Self-Adaptive Systems with Simulation-Based
    Performance Prediction}, publisher={Universität Paderborn, Heinz Nixdorf Institut,
    Softwaretechnik}, author={Becker, Matthias}, year={2017} }'
  chicago: Becker, Matthias. <i>Engineering Self-Adaptive Systems with Simulation-Based
    Performance Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik,
    2017.
  ieee: M. Becker, <i>Engineering Self-Adaptive Systems with Simulation-Based Performance
    Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik,
    2017.
  mla: Becker, Matthias. <i>Engineering Self-Adaptive Systems with Simulation-Based
    Performance Prediction</i>. Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik,
    2017.
  short: M. Becker, Engineering Self-Adaptive Systems with Simulation-Based Performance
    Prediction, Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik, 2017.
date_created: 2020-12-17T14:00:21Z
date_updated: 2022-01-06T06:54:39Z
department:
- _id: '76'
language:
- iso: eng
publisher: Universität Paderborn, Heinz Nixdorf Institut, Softwaretechnik
status: public
title: Engineering Self-Adaptive Systems with Simulation-Based Performance Prediction
type: dissertation
user_id: '5786'
year: '2017'
...
---
_id: '5204'
author:
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Späth J, Ali K, Bodden E. IDEal: Efficient and Precise Alias-aware Dataflow
    Analysis. In: <i>2017 International Conference on Object-Oriented Programming,
    Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press; 2017.'
  apa: 'Späth, J., Ali, K., &#38; Bodden, E. (2017). IDEal: Efficient and Precise
    Alias-aware Dataflow Analysis. In <i>2017 International Conference on Object-Oriented
    Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press.'
  bibtex: '@inproceedings{Späth_Ali_Bodden_2017, title={IDEal: Efficient and Precise
    Alias-aware Dataflow Analysis}, booktitle={2017 International Conference on Object-Oriented
    Programming, Languages and Applications (OOPSLA/SPLASH)}, publisher={ACM Press},
    author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2017} }'
  chicago: 'Späth, Johannes, Karim Ali, and Eric Bodden. “IDEal: Efficient and Precise
    Alias-Aware Dataflow Analysis.” In <i>2017 International Conference on Object-Oriented
    Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press, 2017.'
  ieee: 'J. Späth, K. Ali, and E. Bodden, “IDEal: Efficient and Precise Alias-aware
    Dataflow Analysis,” in <i>2017 International Conference on Object-Oriented Programming,
    Languages and Applications (OOPSLA/SPLASH)</i>, 2017.'
  mla: 'Späth, Johannes, et al. “IDEal: Efficient and Precise Alias-Aware Dataflow
    Analysis.” <i>2017 International Conference on Object-Oriented Programming, Languages
    and Applications (OOPSLA/SPLASH)</i>, ACM Press, 2017.'
  short: 'J. Späth, K. Ali, E. Bodden, in: 2017 International Conference on Object-Oriented
    Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017.'
date_created: 2018-10-31T12:46:50Z
date_updated: 2022-01-06T07:01:44Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T14:28:13Z
  date_updated: 2018-11-02T14:28:13Z
  file_id: '5273'
  file_name: sab17ideal.pdf
  file_size: 1021251
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T14:28:13Z
has_accepted_license: '1'
keyword:
- ATTRACT
- ITSECWEBSITE
- CROSSING
language:
- iso: eng
main_file_link:
- url: ' http://bodden.de/pubs/sab17ideal.pdf'
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publication: 2017 International Conference on Object-Oriented Programming, Languages
  and Applications (OOPSLA/SPLASH)
publisher: ACM Press
status: public
title: 'IDEal: Efficient and Precise Alias-aware Dataflow Analysis'
type: conference
user_id: '477'
year: '2017'
...
---
_id: '5209'
author:
- first_name: Andreas
  full_name: Fischer, Andreas
  last_name: Fischer
- first_name: Benny
  full_name: Fuhry, Benny
  last_name: Fuhry
- first_name: Florian
  full_name: Kerschbaum, Florian
  last_name: Kerschbaum
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Fischer A, Fuhry B, Kerschbaum F, Bodden E. Computation on Encrypted Data using
    Data Flow Authentication. <i>CoRR</i>. 2017;abs/1710.00390.
  apa: Fischer, A., Fuhry, B., Kerschbaum, F., &#38; Bodden, E. (2017). Computation
    on Encrypted Data using Data Flow Authentication. <i>CoRR</i>, <i>abs/1710.00390</i>.
  bibtex: '@article{Fischer_Fuhry_Kerschbaum_Bodden_2017, title={Computation on Encrypted
    Data using Data Flow Authentication}, volume={abs/1710.00390}, journal={CoRR},
    author={Fischer, Andreas and Fuhry, Benny and Kerschbaum, Florian and Bodden,
    Eric}, year={2017} }'
  chicago: Fischer, Andreas, Benny Fuhry, Florian Kerschbaum, and Eric Bodden. “Computation
    on Encrypted Data Using Data Flow Authentication.” <i>CoRR</i> abs/1710.00390
    (2017).
  ieee: A. Fischer, B. Fuhry, F. Kerschbaum, and E. Bodden, “Computation on Encrypted
    Data using Data Flow Authentication,” <i>CoRR</i>, vol. abs/1710.00390, 2017.
  mla: Fischer, Andreas, et al. “Computation on Encrypted Data Using Data Flow Authentication.”
    <i>CoRR</i>, vol. abs/1710.00390, 2017.
  short: A. Fischer, B. Fuhry, F. Kerschbaum, E. Bodden, CoRR abs/1710.00390 (2017).
date_created: 2018-10-31T13:12:32Z
date_updated: 2022-01-06T07:01:46Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T16:03:01Z
  date_updated: 2018-11-02T16:03:01Z
  file_id: '5321'
  file_name: 1710.00390.pdf
  file_size: 2339380
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T16:03:01Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- url: https://arxiv.org/pdf/1710.00390.pdf
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publication: CoRR
status: public
title: Computation on Encrypted Data using Data Flow Authentication
type: journal_article
user_id: '477'
volume: abs/1710.00390
year: '2017'
...
---
_id: '102'
author:
- first_name: Matthias
  full_name: Becker, Matthias
  last_name: Becker
citation:
  ama: Becker M. <i>Engineering Self-Adaptive Systems with Simulation-Based Performence
    Prediction</i>. Universität Paderborn; 2017. doi:<a href="https://doi.org/10.17619/UNIPB/1-133">10.17619/UNIPB/1-133</a>
  apa: Becker, M. (2017). <i>Engineering Self-Adaptive Systems with Simulation-Based
    Performence Prediction</i>. Universität Paderborn. <a href="https://doi.org/10.17619/UNIPB/1-133">https://doi.org/10.17619/UNIPB/1-133</a>
  bibtex: '@book{Becker_2017, title={Engineering Self-Adaptive Systems with Simulation-Based
    Performence Prediction}, DOI={<a href="https://doi.org/10.17619/UNIPB/1-133">10.17619/UNIPB/1-133</a>},
    publisher={Universität Paderborn}, author={Becker, Matthias}, year={2017} }'
  chicago: Becker, Matthias. <i>Engineering Self-Adaptive Systems with Simulation-Based
    Performence Prediction</i>. Universität Paderborn, 2017. <a href="https://doi.org/10.17619/UNIPB/1-133">https://doi.org/10.17619/UNIPB/1-133</a>.
  ieee: M. Becker, <i>Engineering Self-Adaptive Systems with Simulation-Based Performence
    Prediction</i>. Universität Paderborn, 2017.
  mla: Becker, Matthias. <i>Engineering Self-Adaptive Systems with Simulation-Based
    Performence Prediction</i>. Universität Paderborn, 2017, doi:<a href="https://doi.org/10.17619/UNIPB/1-133">10.17619/UNIPB/1-133</a>.
  short: M. Becker, Engineering Self-Adaptive Systems with Simulation-Based Performence
    Prediction, Universität Paderborn, 2017.
date_created: 2017-10-17T12:41:11Z
date_updated: 2022-01-06T06:50:31Z
department:
- _id: '76'
doi: 10.17619/UNIPB/1-133
project:
- _id: '1'
  name: SFB 901
- _id: '11'
  name: SFB 901 - Subprojekt B3
- _id: '3'
  name: SFB 901 - Project Area B
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Steffen
  full_name: Becker, Steffen
  last_name: Becker
title: Engineering Self-Adaptive Systems with Simulation-Based Performence Prediction
type: dissertation
user_id: '477'
year: '2017'
...
---
_id: '20555'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
citation:
  ama: 'Krüger S, Späth J, Ali K, Bodden E, Mezini M. <i>CrySL: Validating Correct
    Usage of Cryptographic APIs</i>.; 2017.'
  apa: 'Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2017). <i>CrySL:
    Validating Correct Usage of Cryptographic APIs</i>.'
  bibtex: '@book{Krüger_Späth_Ali_Bodden_Mezini_2017, title={CrySL: Validating Correct
    Usage of Cryptographic APIs}, author={Krüger, Stefan and Späth, Johannes and Ali,
    Karim and Bodden, Eric and Mezini, Mira}, year={2017} }'
  chicago: 'Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini.
    <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>, 2017.'
  ieee: 'S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, <i>CrySL: Validating
    Correct Usage of Cryptographic APIs</i>. 2017.'
  mla: 'Krüger, Stefan, et al. <i>CrySL: Validating Correct Usage of Cryptographic
    APIs</i>. 2017.'
  short: 'S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, CrySL: Validating Correct
    Usage of Cryptographic APIs, 2017.'
date_created: 2020-11-30T10:29:41Z
date_updated: 2026-02-19T14:39:50Z
department:
- _id: '76'
external_id:
  arxiv:
  - '1710.00564'
keyword:
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: https://arxiv.org/abs/1710.00564
status: public
title: 'CrySL: Validating Correct Usage of Cryptographic APIs'
type: report
user_id: '14972'
year: '2017'
...
---
_id: '195'
author:
- first_name: Marie Christin
  full_name: Platenius, Marie Christin
  last_name: Platenius
citation:
  ama: Platenius MC. <i>Fuzzy Matching of Comprehensive Service Specifications</i>.
    Universität Paderborn; 2016.
  apa: Platenius, M. C. (2016). <i>Fuzzy Matching of Comprehensive Service Specifications</i>.
    Universität Paderborn.
  bibtex: '@book{Platenius_2016, title={Fuzzy Matching of Comprehensive Service Specifications},
    publisher={Universität Paderborn}, author={Platenius, Marie Christin}, year={2016}
    }'
  chicago: Platenius, Marie Christin. <i>Fuzzy Matching of Comprehensive Service Specifications</i>.
    Universität Paderborn, 2016.
  ieee: M. C. Platenius, <i>Fuzzy Matching of Comprehensive Service Specifications</i>.
    Universität Paderborn, 2016.
  mla: Platenius, Marie Christin. <i>Fuzzy Matching of Comprehensive Service Specifications</i>.
    Universität Paderborn, 2016.
  short: M.C. Platenius, Fuzzy Matching of Comprehensive Service Specifications, Universität
    Paderborn, 2016.
date_created: 2017-10-17T12:41:30Z
date_updated: 2022-01-06T06:54:06Z
ddc:
- '040'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T12:15:58Z
  date_updated: 2018-03-21T12:15:58Z
  file_id: '1527'
  file_name: 195-Dissertation_-_Marie_Christin_Platenius.pdf
  file_size: 18246710
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T12:15:58Z
has_accepted_license: '1'
project:
- _id: '1'
  name: SFB 901
- _id: '9'
  name: SFB 901 - Subprojekt B1
- _id: '3'
  name: SFB 901 - Project Area B
publisher: Universität Paderborn
status: public
supervisor:
- first_name: Wilhelm
  full_name: Schäfer, Wilhelm
  last_name: Schäfer
title: Fuzzy Matching of Comprehensive Service Specifications
type: dissertation
user_id: '14052'
year: '2016'
...
