---
_id: '198'
author:
- first_name: Bahar
  full_name: Jazayeri, Bahar
  id: '36399'
  last_name: Jazayeri
- first_name: Marie Christin
  full_name: Platenius, Marie Christin
  last_name: Platenius
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
- first_name: Dennis
  full_name: Kundisch, Dennis
  id: '21117'
  last_name: Kundisch
citation:
  ama: 'Jazayeri B, Platenius MC, Engels G, Kundisch D. <i>Features of IT Service
    Markets: A Systematic Literature Review (Supplementary Material)</i>. Universität
    Paderborn; 2016.'
  apa: 'Jazayeri, B., Platenius, M. C., Engels, G., &#38; Kundisch, D. (2016). <i>Features
    of IT Service Markets: A Systematic Literature Review (Supplementary Material)</i>.
    Universität Paderborn.'
  bibtex: '@book{Jazayeri_Platenius_Engels_Kundisch_2016, title={Features of IT Service
    Markets: A Systematic Literature Review (Supplementary Material)}, publisher={Universität
    Paderborn}, author={Jazayeri, Bahar and Platenius, Marie Christin and Engels,
    Gregor and Kundisch, Dennis}, year={2016} }'
  chicago: 'Jazayeri, Bahar, Marie Christin Platenius, Gregor Engels, and Dennis Kundisch.
    <i>Features of IT Service Markets: A Systematic Literature Review (Supplementary
    Material)</i>. Universität Paderborn, 2016.'
  ieee: 'B. Jazayeri, M. C. Platenius, G. Engels, and D. Kundisch, <i>Features of
    IT Service Markets: A Systematic Literature Review (Supplementary Material)</i>.
    Universität Paderborn, 2016.'
  mla: 'Jazayeri, Bahar, et al. <i>Features of IT Service Markets: A Systematic Literature
    Review (Supplementary Material)</i>. Universität Paderborn, 2016.'
  short: 'B. Jazayeri, M.C. Platenius, G. Engels, D. Kundisch, Features of IT Service
    Markets: A Systematic Literature Review (Supplementary Material), Universität
    Paderborn, 2016.'
date_created: 2017-10-17T12:41:30Z
date_updated: 2022-01-06T06:54:13Z
ddc:
- '040'
department:
- _id: '276'
- _id: '66'
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: bahareh
  date_created: 2018-11-12T19:11:20Z
  date_updated: 2018-11-12T19:11:20Z
  file_id: '5534'
  file_name: MarketSurvey_Techreport (1).pdf
  file_size: 1024328
  relation: main_file
  success: 1
file_date_updated: 2018-11-12T19:11:20Z
has_accepted_license: '1'
language:
- iso: eng
project:
- _id: '1'
  name: SFB 901
- _id: '17'
  name: SFB 901 - Subprojekt C5
- _id: '4'
  name: SFB 901 - Project Area C
publisher: Universität Paderborn
status: public
title: 'Features of IT Service Markets: A Systematic Literature Review (Supplementary
  Material)'
type: report
user_id: '477'
year: '2016'
...
---
_id: '199'
abstract:
- lang: eng
  text: The provision of IT solutions over electronic marketplaces became prominent
    in recent years. We call such marketplaces IT service markets. IT service markets
    have some core architectural building blocks that impact the quality attributes
    of these markets. However, these building blocks and their impacts are not well-known.
    Thus, design choices for IT service markets have been made ad-hoc until now. Furthermore,
    only single aspects of such markets have been investigated until now, but a comprehensive
    view is missing.In this paper, we identify common features and their interrelations
    on the basis of a systematic literature review of 60 publications using grounded
    theory.This knowledge provides an empirical evidence on the interdisciplinary
    design choices of IT service markets and it serves as a basis to support market
    providers and developers to integrate market features. Thereby, we make a first
    step towards the creation of a reference model for IT service markets that provides
    a holistic integrated view that can be used to create and maintain successful
    markets in the future.
author:
- first_name: Bahar
  full_name: Jazayeri, Bahar
  id: '36399'
  last_name: Jazayeri
- first_name: Marie
  full_name: Platenius, Marie
  last_name: Platenius
- first_name: Gregor
  full_name: Engels, Gregor
  id: '107'
  last_name: Engels
- first_name: Dennis
  full_name: Kundisch, Dennis
  id: '21117'
  last_name: Kundisch
citation:
  ama: 'Jazayeri B, Platenius M, Engels G, Kundisch D. Features of IT Service Markets:
    A Systematic Literature Review. In: <i>Proceedings of the 14th International Conference
    on Service Oriented Computing (ICSOC)</i>. Vol 9936. Lecture Notes in Computer
    Science (LNCS). Banff, Canada: Springer; 2016:301-316. doi:<a href="https://doi.org/10.1007/978-3-319-46295-0_19">10.1007/978-3-319-46295-0_19</a>'
  apa: 'Jazayeri, B., Platenius, M., Engels, G., &#38; Kundisch, D. (2016). Features
    of IT Service Markets: A Systematic Literature Review. In <i>Proceedings of the
    14th International Conference on Service Oriented Computing (ICSOC)</i> (Vol.
    9936, pp. 301–316). Banff, Canada: Springer. <a href="https://doi.org/10.1007/978-3-319-46295-0_19">https://doi.org/10.1007/978-3-319-46295-0_19</a>'
  bibtex: '@inproceedings{Jazayeri_Platenius_Engels_Kundisch_2016, place={Banff, Canada},
    series={Lecture Notes in Computer Science (LNCS)}, title={Features of IT Service
    Markets: A Systematic Literature Review}, volume={9936}, DOI={<a href="https://doi.org/10.1007/978-3-319-46295-0_19">10.1007/978-3-319-46295-0_19</a>},
    booktitle={Proceedings of the 14th International Conference on Service Oriented
    Computing (ICSOC)}, publisher={Springer}, author={Jazayeri, Bahar and Platenius,
    Marie and Engels, Gregor and Kundisch, Dennis}, year={2016}, pages={301–316},
    collection={Lecture Notes in Computer Science (LNCS)} }'
  chicago: 'Jazayeri, Bahar, Marie Platenius, Gregor Engels, and Dennis Kundisch.
    “Features of IT Service Markets: A Systematic Literature Review.” In <i>Proceedings
    of the 14th International Conference on Service Oriented Computing (ICSOC)</i>,
    9936:301–16. Lecture Notes in Computer Science (LNCS). Banff, Canada: Springer,
    2016. <a href="https://doi.org/10.1007/978-3-319-46295-0_19">https://doi.org/10.1007/978-3-319-46295-0_19</a>.'
  ieee: 'B. Jazayeri, M. Platenius, G. Engels, and D. Kundisch, “Features of IT Service
    Markets: A Systematic Literature Review,” in <i>Proceedings of the 14th International
    Conference on Service Oriented Computing (ICSOC)</i>, 2016, vol. 9936, pp. 301–316.'
  mla: 'Jazayeri, Bahar, et al. “Features of IT Service Markets: A Systematic Literature
    Review.” <i>Proceedings of the 14th International Conference on Service Oriented
    Computing (ICSOC)</i>, vol. 9936, Springer, 2016, pp. 301–16, doi:<a href="https://doi.org/10.1007/978-3-319-46295-0_19">10.1007/978-3-319-46295-0_19</a>.'
  short: 'B. Jazayeri, M. Platenius, G. Engels, D. Kundisch, in: Proceedings of the
    14th International Conference on Service Oriented Computing (ICSOC), Springer,
    Banff, Canada, 2016, pp. 301–316.'
date_created: 2017-10-17T12:41:30Z
date_updated: 2022-01-06T06:54:14Z
ddc:
- '040'
department:
- _id: '66'
- _id: '276'
- _id: '76'
doi: 10.1007/978-3-319-46295-0_19
file:
- access_level: closed
  content_type: application/pdf
  creator: florida
  date_created: 2018-03-21T12:15:24Z
  date_updated: 2018-03-21T12:15:24Z
  file_id: '1526'
  file_name: 199-chp_3A10.1007_2F978-3-319-46295-0_19.pdf
  file_size: 765410
  relation: main_file
  success: 1
file_date_updated: 2018-03-21T12:15:24Z
has_accepted_license: '1'
intvolume: '      9936'
language:
- iso: eng
page: 301-316
place: Banff, Canada
project:
- _id: '1'
  name: SFB 901
- _id: '17'
  name: SFB 901 - Subprojekt C5
- _id: '4'
  name: SFB 901 - Project Area C
publication: Proceedings of the 14th International Conference on Service Oriented
  Computing (ICSOC)
publisher: Springer
series_title: Lecture Notes in Computer Science (LNCS)
status: public
title: 'Features of IT Service Markets: A Systematic Literature Review'
type: conference
user_id: '477'
volume: 9936
year: '2016'
...
---
_id: '20556'
author:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Ka
  full_name: I Pun, Ka
  last_name: I Pun
- first_name: Martin
  full_name: Steffen, Martin
  last_name: Steffen
- first_name: Volker
  full_name: Stolz, Volker
  last_name: Stolz
- first_name: Anna-Katharina
  full_name: Wickert, Anna-Katharina
  last_name: Wickert
citation:
  ama: 'Bodden E, I Pun K, Steffen M, Stolz V, Wickert A-K. Information Flow Analysis
    for Go. In: <i>Leveraging Applications of Formal Methods, Verification and Validation:
    Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu,
    Greece, October 10-14, 2016, Proceedings, Part {I}</i>. ; 2016:431-445. doi:<a
    href="https://doi.org/10.1007/978-3-319-47166-2_30">10.1007/978-3-319-47166-2_30</a>'
  apa: 'Bodden, E., I Pun, K., Steffen, M., Stolz, V., &#38; Wickert, A.-K. (2016).
    Information Flow Analysis for Go. <i>Leveraging Applications of Formal Methods,
    Verification and Validation: Foundational Techniques - 7th International Symposium,
    ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}</i>,
    431–445. <a href="https://doi.org/10.1007/978-3-319-47166-2_30">https://doi.org/10.1007/978-3-319-47166-2_30</a>'
  bibtex: '@inproceedings{Bodden_I Pun_Steffen_Stolz_Wickert_2016, title={Information
    Flow Analysis for Go}, DOI={<a href="https://doi.org/10.1007/978-3-319-47166-2_30">10.1007/978-3-319-47166-2_30</a>},
    booktitle={Leveraging Applications of Formal Methods, Verification and Validation:
    Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu,
    Greece, October 10-14, 2016, Proceedings, Part {I}}, author={Bodden, Eric and
    I Pun, Ka and Steffen, Martin and Stolz, Volker and Wickert, Anna-Katharina},
    year={2016}, pages={431–445} }'
  chicago: 'Bodden, Eric, Ka I Pun, Martin Steffen, Volker Stolz, and Anna-Katharina
    Wickert. “Information Flow Analysis for Go.” In <i>Leveraging Applications of
    Formal Methods, Verification and Validation: Foundational Techniques - 7th International
    Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016, Proceedings,
    Part {I}</i>, 431–45, 2016. <a href="https://doi.org/10.1007/978-3-319-47166-2_30">https://doi.org/10.1007/978-3-319-47166-2_30</a>.'
  ieee: 'E. Bodden, K. I Pun, M. Steffen, V. Stolz, and A.-K. Wickert, “Information
    Flow Analysis for Go,” in <i>Leveraging Applications of Formal Methods, Verification
    and Validation: Foundational Techniques - 7th International Symposium, ISoLA 2016,
    Imperial, Corfu, Greece, October 10-14, 2016, Proceedings, Part {I}</i>, 2016,
    pp. 431–445, doi: <a href="https://doi.org/10.1007/978-3-319-47166-2_30">10.1007/978-3-319-47166-2_30</a>.'
  mla: 'Bodden, Eric, et al. “Information Flow Analysis for Go.” <i>Leveraging Applications
    of Formal Methods, Verification and Validation: Foundational Techniques - 7th
    International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14, 2016,
    Proceedings, Part {I}</i>, 2016, pp. 431–45, doi:<a href="https://doi.org/10.1007/978-3-319-47166-2_30">10.1007/978-3-319-47166-2_30</a>.'
  short: 'E. Bodden, K. I Pun, M. Steffen, V. Stolz, A.-K. Wickert, in: Leveraging
    Applications of Formal Methods, Verification and Validation: Foundational Techniques
    - 7th International Symposium, ISoLA 2016, Imperial, Corfu, Greece, October 10-14,
    2016, Proceedings, Part {I}, 2016, pp. 431–445.'
date_created: 2020-11-30T11:02:52Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '76'
doi: 10.1007/978-3-319-47166-2_30
language:
- iso: eng
page: 431-445
publication: 'Leveraging Applications of Formal Methods, Verification and Validation:
  Foundational Techniques - 7th International Symposium, ISoLA 2016, Imperial, Corfu,
  Greece, October 10-14, 2016, Proceedings, Part {I}'
status: public
title: Information Flow Analysis for Go
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20716'
author:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Michael
  full_name: Eichberg, Michael
  last_name: Eichberg
- first_name: Ka
  full_name: I Pun, Ka
  last_name: I Pun
- first_name: Martin
  full_name: Steffen, Martin
  last_name: Steffen
- first_name: Volker
  full_name: Stolz, Volker
  last_name: Stolz
- first_name: Anna-Katharina
  full_name: Wickert, Anna-Katharina
  last_name: Wickert
citation:
  ama: 'Bodden E, Eichberg M, I Pun K, Steffen M, Stolz V, Wickert A-K. Don’t let
    data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs in
    Go. In: <i>Nordic Workshop on Programming Theory (NWPT’16)</i>. ; 2016.'
  apa: Bodden, E., Eichberg, M., I Pun, K., Steffen, M., Stolz, V., &#38; Wickert,
    A.-K. (2016). Don’t let data Go astray---A Context-Sensitive Taint Analysis for
    Concurrent Programs in Go. <i>Nordic Workshop on Programming Theory (NWPT’16)</i>.
  bibtex: '@inproceedings{Bodden_Eichberg_I Pun_Steffen_Stolz_Wickert_2016, title={Don’t
    let data Go astray---A Context-Sensitive Taint Analysis for Concurrent Programs
    in Go}, booktitle={Nordic Workshop on Programming Theory (NWPT’16)}, author={Bodden,
    Eric and Eichberg, Michael and I Pun, Ka and Steffen, Martin and Stolz, Volker
    and Wickert, Anna-Katharina}, year={2016} }'
  chicago: Bodden, Eric, Michael Eichberg, Ka I Pun, Martin Steffen, Volker Stolz,
    and Anna-Katharina Wickert. “Don’t Let Data Go Astray---A Context-Sensitive Taint
    Analysis for Concurrent Programs in Go.” In <i>Nordic Workshop on Programming
    Theory (NWPT’16)</i>, 2016.
  ieee: E. Bodden, M. Eichberg, K. I Pun, M. Steffen, V. Stolz, and A.-K. Wickert,
    “Don’t let data Go astray---A Context-Sensitive Taint Analysis for Concurrent
    Programs in Go,” 2016.
  mla: Bodden, Eric, et al. “Don’t Let Data Go Astray---A Context-Sensitive Taint
    Analysis for Concurrent Programs in Go.” <i>Nordic Workshop on Programming Theory
    (NWPT’16)</i>, 2016.
  short: 'E. Bodden, M. Eichberg, K. I Pun, M. Steffen, V. Stolz, A.-K. Wickert, in:
    Nordic Workshop on Programming Theory (NWPT’16), 2016.'
date_created: 2020-12-14T11:56:15Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/bep16gotaint.pdf
publication: Nordic Workshop on Programming Theory (NWPT'16)
status: public
title: Don't let data Go astray---A Context-Sensitive Taint Analysis for Concurrent
  Programs in Go
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20717'
author:
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Benjamin
  full_name: Livshits, Benjamin
  last_name: Livshits
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Justin
  full_name: Smith, Justin
  last_name: Smith
- first_name: Emerson
  full_name: Murphy-Hill, Emerson
  last_name: Murphy-Hill
citation:
  ama: Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. <i>Just-in-Time
    Static Analysis</i>.; 2016. doi:<a href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>
  apa: Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill,
    E. (2016). <i>Just-in-Time Static Analysis</i>. <a href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>
  bibtex: '@book{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2016, title={Just-in-Time
    Static Analysis}, DOI={<a href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>},
    author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden,
    Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2016} }'
  chicago: Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin
    Smith, and Emerson Murphy-Hill. <i>Just-in-Time Static Analysis</i>, 2016. <a
    href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>.
  ieee: L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill,
    <i>Just-in-Time Static Analysis</i>. 2016.
  mla: Nguyen Quang Do, Lisa, et al. <i>Just-in-Time Static Analysis</i>. 2016, doi:<a
    href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>.
  short: L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill,
    Just-in-Time Static Analysis, 2016.
date_created: 2020-12-14T11:57:09Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: http://dx.doi.org/10.7939/DVN/10859
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/dal16jit-tr.pdf
status: public
title: Just-in-Time Static Analysis
type: report
user_id: '5786'
year: '2016'
...
---
_id: '20718'
author:
- first_name: Siegfried
  full_name: Rasthofer, Siegfried
  last_name: Rasthofer
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Marc
  full_name: Miltenberger, Marc
  last_name: Miltenberger
citation:
  ama: Rasthofer S, Arzt S, Bodden E, Miltenberger M. Harvester - Vollautomatische
    Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. <i>Datenschutz
    und Datensicherheit</i>. Published online 2016:718-722. doi:<a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>
  apa: Rasthofer, S., Arzt, S., Bodden, E., &#38; Miltenberger, M. (2016). Harvester
    - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen.
    <i>Datenschutz Und Datensicherheit</i>, 718–722. <a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>
  bibtex: '@article{Rasthofer_Arzt_Bodden_Miltenberger_2016, title={Harvester - Vollautomatische
    Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen}, DOI={<a
    href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>},
    journal={Datenschutz und Datensicherheit}, author={Rasthofer, Siegfried and Arzt,
    Steven and Bodden, Eric and Miltenberger, Marc}, year={2016}, pages={718–722}
    }'
  chicago: Rasthofer, Siegfried, Steven Arzt, Eric Bodden, and Marc Miltenberger.
    “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.”
    <i>Datenschutz Und Datensicherheit</i>, 2016, 718–22. <a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.
  ieee: 'S. Rasthofer, S. Arzt, E. Bodden, and M. Miltenberger, “Harvester - Vollautomatische
    Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen,” <i>Datenschutz
    und Datensicherheit</i>, pp. 718–722, 2016, doi: <a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.'
  mla: Rasthofer, Siegfried, et al. “Harvester - Vollautomatische Extraktion von Laufzeitwerten
    Aus Obfuskierten Android-Applikationen.” <i>Datenschutz Und Datensicherheit</i>,
    2016, pp. 718–22, doi:<a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.
  short: S. Rasthofer, S. Arzt, E. Bodden, M. Miltenberger, Datenschutz Und Datensicherheit
    (2016) 718–722.
date_created: 2020-12-14T11:57:48Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/rabm16harvester.pdf
page: 718-722
publication: Datenschutz und Datensicherheit
status: public
title: Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten
  Android-Applikationen
type: journal_article
user_id: '5786'
year: '2016'
...
---
_id: '20719'
author:
- first_name: Philipp
  full_name: Holzinger, Philipp
  last_name: Holzinger
- first_name: Stefan
  full_name: Triller, Stefan
  last_name: Triller
- first_name: Alexandre
  full_name: Bartel, Alexandre
  last_name: Bartel
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than
    Ten Years of Java Exploitation. In: <i>Proceedings of the 2016 ACM SIGSAC Conference
    on Computer and Communications Security</i>. CCS ’16. ; 2016:779-790. doi:<a href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>'
  apa: Holzinger, P., Triller, S., Bartel, A., &#38; Bodden, E. (2016). An In-Depth
    Study of More Than Ten Years of Java Exploitation. <i>Proceedings of the 2016
    ACM SIGSAC Conference on Computer and Communications Security</i>, 779–790. <a
    href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>
  bibtex: '@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16},
    title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={<a
    href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>},
    booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications
    Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre
    and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }'
  chicago: Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden.
    “An In-Depth Study of More Than Ten Years of Java Exploitation.” In <i>Proceedings
    of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>,
    779–90. CCS ’16, 2016. <a href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>.
  ieee: 'P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of
    More Than Ten Years of Java Exploitation,” in <i>Proceedings of the 2016 ACM SIGSAC
    Conference on Computer and Communications Security</i>, 2016, pp. 779–790, doi:
    <a href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>.'
  mla: Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java
    Exploitation.” <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and
    Communications Security</i>, 2016, pp. 779–90, doi:<a href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>.
  short: 'P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016
    ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.'
date_created: 2020-12-14T11:58:33Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: http://doi.acm.org/10.1145/2976749.2978361
keyword:
- ATTRACT
- access control
- exploits
- java security
- security analysis
- ITSECWEBSITE
language:
- iso: eng
page: 779-790
publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications
  Security
publication_identifier:
  isbn:
  - 978-1-4503-4139-4
series_title: CCS '16
status: public
title: An In-Depth Study of More Than Ten Years of Java Exploitation
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20720'
author:
- first_name: Andreas
  full_name: Follner, Andreas
  last_name: Follner
- first_name: Alexandre
  full_name: Bartel, Alexandre
  last_name: Bartel
- first_name: Hui
  full_name: Peng, Hui
  last_name: Peng
- first_name: Yu-Chen
  full_name: Chang, Yu-Chen
  last_name: Chang
- first_name: Kyriakos
  full_name: Ispoglou, Kyriakos
  last_name: Ispoglou
- first_name: Mathias
  full_name: Payer, Mathias
  last_name: Payer
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Follner A, Bartel A, Peng H, et al. PSHAPE: Automatically Combining Gadgets
    for Arbitrary Method Execution. In: <i>International Workshop on Security and
    Trust Management (STM)</i>. ; 2016:212-228.'
  apa: 'Follner, A., Bartel, A., Peng, H., Chang, Y.-C., Ispoglou, K., Payer, M.,
    &#38; Bodden, E. (2016). PSHAPE: Automatically Combining Gadgets for Arbitrary
    Method Execution. <i>International Workshop on Security and Trust Management (STM)</i>,
    212–228.'
  bibtex: '@inproceedings{Follner_Bartel_Peng_Chang_Ispoglou_Payer_Bodden_2016, title={PSHAPE:
    Automatically Combining Gadgets for Arbitrary Method Execution}, booktitle={International
    Workshop on Security and Trust Management (STM)}, author={Follner, Andreas and
    Bartel, Alexandre and Peng, Hui and Chang, Yu-Chen and Ispoglou, Kyriakos and
    Payer, Mathias and Bodden, Eric}, year={2016}, pages={212–228} }'
  chicago: 'Follner, Andreas, Alexandre Bartel, Hui Peng, Yu-Chen Chang, Kyriakos
    Ispoglou, Mathias Payer, and Eric Bodden. “PSHAPE: Automatically Combining Gadgets
    for Arbitrary Method Execution.” In <i>International Workshop on Security and
    Trust Management (STM)</i>, 212–28, 2016.'
  ieee: 'A. Follner <i>et al.</i>, “PSHAPE: Automatically Combining Gadgets for Arbitrary
    Method Execution,” in <i>International Workshop on Security and Trust Management
    (STM)</i>, 2016, pp. 212–228.'
  mla: 'Follner, Andreas, et al. “PSHAPE: Automatically Combining Gadgets for Arbitrary
    Method Execution.” <i>International Workshop on Security and Trust Management
    (STM)</i>, 2016, pp. 212–28.'
  short: 'A. Follner, A. Bartel, H. Peng, Y.-C. Chang, K. Ispoglou, M. Payer, E. Bodden,
    in: International Workshop on Security and Trust Management (STM), 2016, pp. 212–228.'
date_created: 2020-12-14T11:59:04Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/fbt+16pshape.pdf
page: 212-228
publication: International Workshop on Security and Trust Management (STM)
status: public
title: 'PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution'
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20721'
author:
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Michael
  full_name: Eichberg, Michael
  last_name: Eichberg
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Nguyen Quang Do L, Eichberg M, Bodden E. Toward an Automated Benchmark Management
    System. In: <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State
    Of the Art in Program Analysis</i>. SOAP 2016. ; 2016:13-17.'
  apa: Nguyen Quang Do, L., Eichberg, M., &#38; Bodden, E. (2016). Toward an Automated
    Benchmark Management System. <i>Proceedings of the 5th ACM SIGPLAN International
    Workshop on State Of the Art in Program Analysis</i>, 13–17.
  bibtex: '@inproceedings{Nguyen Quang Do_Eichberg_Bodden_2016, series={SOAP 2016},
    title={Toward an Automated Benchmark Management System}, booktitle={Proceedings
    of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis},
    author={Nguyen Quang Do, Lisa and Eichberg, Michael and Bodden, Eric}, year={2016},
    pages={13–17}, collection={SOAP 2016} }'
  chicago: Nguyen Quang Do, Lisa, Michael Eichberg, and Eric Bodden. “Toward an Automated
    Benchmark Management System.” In <i>Proceedings of the 5th ACM SIGPLAN International
    Workshop on State Of the Art in Program Analysis</i>, 13–17. SOAP 2016, 2016.
  ieee: L. Nguyen Quang Do, M. Eichberg, and E. Bodden, “Toward an Automated Benchmark
    Management System,” in <i>Proceedings of the 5th ACM SIGPLAN International Workshop
    on State Of the Art in Program Analysis</i>, 2016, pp. 13–17.
  mla: Nguyen Quang Do, Lisa, et al. “Toward an Automated Benchmark Management System.”
    <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art
    in Program Analysis</i>, 2016, pp. 13–17.
  short: 'L. Nguyen Quang Do, M. Eichberg, E. Bodden, in: Proceedings of the 5th ACM
    SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016,
    pp. 13–17.'
date_created: 2020-12-14T12:00:32Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ATTRACT
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/neb16toward.pdf
page: 13-17
publication: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of
  the Art in Program Analysis
series_title: SOAP 2016
status: public
title: Toward an Automated Benchmark Management System
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20722'
author:
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Tobias
  full_name: Kussmaul, Tobias
  last_name: Kussmaul
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Arzt S, Kussmaul T, Bodden E. Towards Cross-Platform Cross-Language Analysis
    with Soot. In: <i>Proceedings of the 5th ACM SIGPLAN International Workshop on
    State Of the Art in Program Analysis</i>. SOAP 2016. ; 2016:1-6.'
  apa: Arzt, S., Kussmaul, T., &#38; Bodden, E. (2016). Towards Cross-Platform Cross-Language
    Analysis with Soot. <i>Proceedings of the 5th ACM SIGPLAN International Workshop
    on State Of the Art in Program Analysis</i>, 1–6.
  bibtex: '@inproceedings{Arzt_Kussmaul_Bodden_2016, series={SOAP 2016}, title={Towards
    Cross-Platform Cross-Language Analysis with Soot}, booktitle={Proceedings of the
    5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis},
    author={Arzt, Steven and Kussmaul, Tobias and Bodden, Eric}, year={2016}, pages={1–6},
    collection={SOAP 2016} }'
  chicago: Arzt, Steven, Tobias Kussmaul, and Eric Bodden. “Towards Cross-Platform
    Cross-Language Analysis with Soot.” In <i>Proceedings of the 5th ACM SIGPLAN International
    Workshop on State Of the Art in Program Analysis</i>, 1–6. SOAP 2016, 2016.
  ieee: S. Arzt, T. Kussmaul, and E. Bodden, “Towards Cross-Platform Cross-Language
    Analysis with Soot,” in <i>Proceedings of the 5th ACM SIGPLAN International Workshop
    on State Of the Art in Program Analysis</i>, 2016, pp. 1–6.
  mla: Arzt, Steven, et al. “Towards Cross-Platform Cross-Language Analysis with Soot.”
    <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art
    in Program Analysis</i>, 2016, pp. 1–6.
  short: 'S. Arzt, T. Kussmaul, E. Bodden, in: Proceedings of the 5th ACM SIGPLAN
    International Workshop on State Of the Art in Program Analysis, 2016, pp. 1–6.'
date_created: 2020-12-14T12:02:21Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/akb16towards.pdf
page: 1-6
publication: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of
  the Art in Program Analysis
series_title: SOAP 2016
status: public
title: Towards Cross-Platform Cross-Language Analysis with Soot
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20724'
author:
- first_name: Andreas
  full_name: Follner, Andreas
  last_name: Follner
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Follner A, Bodden E. ROPocop — Dynamic mitigation of code-reuse attacks. <i>Journal
    of Information Security and Applications </i>. 2016;29:16-26. doi:<a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>
  apa: Follner, A., &#38; Bodden, E. (2016). ROPocop — Dynamic mitigation of code-reuse
    attacks. <i>Journal of Information Security and Applications </i>, <i>29</i>,
    16–26. <a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>
  bibtex: '@article{Follner_Bodden_2016, title={ROPocop — Dynamic mitigation of code-reuse
    attacks}, volume={29}, DOI={<a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>},
    journal={Journal of Information Security and Applications }, author={Follner,
    Andreas and Bodden, Eric}, year={2016}, pages={16–26} }'
  chicago: 'Follner, Andreas, and Eric Bodden. “ROPocop — Dynamic Mitigation of Code-Reuse
    Attacks.” <i>Journal of Information Security and Applications </i> 29 (2016):
    16–26. <a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>.'
  ieee: 'A. Follner and E. Bodden, “ROPocop — Dynamic mitigation of code-reuse attacks,”
    <i>Journal of Information Security and Applications </i>, vol. 29, pp. 16–26,
    2016, doi: <a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>.'
  mla: Follner, Andreas, and Eric Bodden. “ROPocop — Dynamic Mitigation of Code-Reuse
    Attacks.” <i>Journal of Information Security and Applications </i>, vol. 29, 2016,
    pp. 16–26, doi:<a href="http://dx.doi.org/10.1016/j.jisa.2016.01.002">http://dx.doi.org/10.1016/j.jisa.2016.01.002</a>.
  short: A. Follner, E. Bodden, Journal of Information Security and Applications  29
    (2016) 16–26.
date_created: 2020-12-14T14:11:40Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: http://dx.doi.org/10.1016/j.jisa.2016.01.002
intvolume: '        29'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/fb2016ropocop.pdf
page: 16-26
publication: 'Journal of Information Security and Applications '
publication_identifier:
  issn:
  - 2214-2126
status: public
title: ROPocop — Dynamic mitigation of code-reuse attacks
type: journal_article
user_id: '5786'
volume: 29
year: '2016'
...
---
_id: '20725'
author:
- first_name: Andreas
  full_name: Follner, Andreas
  last_name: Follner
- first_name: Alexandre
  full_name: Bartel, Alexandre
  last_name: Bartel
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Follner A, Bartel A, Bodden E. Analyzing the Gadgets - Towards a Metric to
    Measure Gadget Quality. In: <i>International Symposium on Engineering Secure Software
    and Systems (ESSoS)</i>. ; 2016.'
  apa: Follner, A., Bartel, A., &#38; Bodden, E. (2016). Analyzing the Gadgets - Towards
    a Metric to Measure Gadget Quality. <i>International Symposium on Engineering
    Secure Software and Systems (ESSoS)</i>.
  bibtex: '@inproceedings{Follner_Bartel_Bodden_2016, title={Analyzing the Gadgets
    - Towards a Metric to Measure Gadget Quality}, booktitle={International Symposium
    on Engineering Secure Software and Systems (ESSoS)}, author={Follner, Andreas
    and Bartel, Alexandre and Bodden, Eric}, year={2016} }'
  chicago: Follner, Andreas, Alexandre Bartel, and Eric Bodden. “Analyzing the Gadgets
    - Towards a Metric to Measure Gadget Quality.” In <i>International Symposium on
    Engineering Secure Software and Systems (ESSoS)</i>, 2016.
  ieee: A. Follner, A. Bartel, and E. Bodden, “Analyzing the Gadgets - Towards a Metric
    to Measure Gadget Quality,” 2016.
  mla: Follner, Andreas, et al. “Analyzing the Gadgets - Towards a Metric to Measure
    Gadget Quality.” <i>International Symposium on Engineering Secure Software and
    Systems (ESSoS)</i>, 2016.
  short: 'A. Follner, A. Bartel, E. Bodden, in: International Symposium on Engineering
    Secure Software and Systems (ESSoS), 2016.'
date_created: 2020-12-14T14:12:36Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/fbb16analyzing.pdf
publication: International Symposium on Engineering Secure Software and Systems (ESSoS)
status: public
title: Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20726'
author:
- first_name: Kevin
  full_name: Falzon, Kevin
  last_name: Falzon
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Falzon K, Bodden E. Towards a Comprehensive Model of Isolation for Mitigating
    Illicit Channels. In: Piessens F, Vigan’o L, eds. <i>Principles of Security and
    Trust: 5th International Conference, POST 2016, Held as Part of the European Joint
    Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands,
    April 2--8, 2016, Proceedings</i>. Springer Berlin Heidelberg; 2016:116-138. doi:<a
    href="https://doi.org/10.1007/978-3-662-49635-0_7">10.1007/978-3-662-49635-0_7</a>'
  apa: 'Falzon, K., &#38; Bodden, E. (2016). Towards a Comprehensive Model of Isolation
    for Mitigating Illicit Channels. In F. Piessens &#38; L. Vigan’o (Eds.), <i>Principles
    of Security and Trust: 5th International Conference, POST 2016, Held as Part of
    the European Joint Conferences on Theory and Practice of Software, ETAPS 2016,
    Eindhoven, The Netherlands, April 2--8, 2016, Proceedings</i> (pp. 116–138). Springer
    Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-662-49635-0_7">https://doi.org/10.1007/978-3-662-49635-0_7</a>'
  bibtex: '@inproceedings{Falzon_Bodden_2016, place={Berlin, Heidelberg}, title={Towards
    a Comprehensive Model of Isolation for Mitigating Illicit Channels}, DOI={<a href="https://doi.org/10.1007/978-3-662-49635-0_7">10.1007/978-3-662-49635-0_7</a>},
    booktitle={Principles of Security and Trust: 5th International Conference, POST
    2016, Held as Part of the European Joint Conferences on Theory and Practice of
    Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings},
    publisher={Springer Berlin Heidelberg}, author={Falzon, Kevin and Bodden, Eric},
    editor={Piessens, Frank and Vigan’o, Luca}, year={2016}, pages={116–138} }'
  chicago: 'Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation
    for Mitigating Illicit Channels.” In <i>Principles of Security and Trust: 5th
    International Conference, POST 2016, Held as Part of the European Joint Conferences
    on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April
    2--8, 2016, Proceedings</i>, edited by Frank Piessens and Luca Vigan’o, 116–38.
    Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. <a href="https://doi.org/10.1007/978-3-662-49635-0_7">https://doi.org/10.1007/978-3-662-49635-0_7</a>.'
  ieee: 'K. Falzon and E. Bodden, “Towards a Comprehensive Model of Isolation for
    Mitigating Illicit Channels,” in <i>Principles of Security and Trust: 5th International
    Conference, POST 2016, Held as Part of the European Joint Conferences on Theory
    and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8,
    2016, Proceedings</i>, 2016, pp. 116–138, doi: <a href="https://doi.org/10.1007/978-3-662-49635-0_7">10.1007/978-3-662-49635-0_7</a>.'
  mla: 'Falzon, Kevin, and Eric Bodden. “Towards a Comprehensive Model of Isolation
    for Mitigating Illicit Channels.” <i>Principles of Security and Trust: 5th International
    Conference, POST 2016, Held as Part of the European Joint Conferences on Theory
    and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2--8,
    2016, Proceedings</i>, edited by Frank Piessens and Luca Vigan’o, Springer Berlin
    Heidelberg, 2016, pp. 116–38, doi:<a href="https://doi.org/10.1007/978-3-662-49635-0_7">10.1007/978-3-662-49635-0_7</a>.'
  short: 'K. Falzon, E. Bodden, in: F. Piessens, L. Vigan’o (Eds.), Principles of
    Security and Trust: 5th International Conference, POST 2016, Held as Part of the
    European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven,
    The Netherlands, April 2--8, 2016, Proceedings, Springer Berlin Heidelberg, Berlin,
    Heidelberg, 2016, pp. 116–138.'
date_created: 2020-12-14T14:20:20Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: 10.1007/978-3-662-49635-0_7
editor:
- first_name: Frank
  full_name: Piessens, Frank
  last_name: Piessens
- first_name: Luca
  full_name: Vigan'o, Luca
  last_name: Vigan'o
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/fb16mitigating.pdf
page: 116-138
place: Berlin, Heidelberg
publication: 'Principles of Security and Trust: 5th International Conference, POST
  2016, Held as Part of the European Joint Conferences on Theory and Practice of Software,
  ETAPS 2016, Eindhoven, The Netherlands, April 2--8, 2016, Proceedings'
publication_identifier:
  isbn:
  - 978-3-662-49635-0
publisher: Springer Berlin Heidelberg
status: public
title: Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20727'
author:
- first_name: Siegfried
  full_name: Rasthofer, Siegfried
  last_name: Rasthofer
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Marc
  full_name: Miltenberger, Marc
  last_name: Miltenberger
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in
    Android Applications That Feature Anti-Analysis Techniques. In: <i>Network and
    Distributed System Security Symposium (NDSS)</i>. ; 2016.'
  apa: Rasthofer, S., Arzt, S., Miltenberger, M., &#38; Bodden, E. (2016). Harvesting
    Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
    <i>Network and Distributed System Security Symposium (NDSS)</i>.
  bibtex: '@inproceedings{Rasthofer_Arzt_Miltenberger_Bodden_2016, title={Harvesting
    Runtime Values in Android Applications That Feature Anti-Analysis Techniques},
    booktitle={Network and Distributed System Security Symposium (NDSS)}, author={Rasthofer,
    Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric}, year={2016}
    }'
  chicago: Rasthofer, Siegfried, Steven Arzt, Marc Miltenberger, and Eric Bodden.
    “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis
    Techniques.” In <i>Network and Distributed System Security Symposium (NDSS)</i>,
    2016.
  ieee: S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden, “Harvesting Runtime
    Values in Android Applications That Feature Anti-Analysis Techniques,” 2016.
  mla: Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications
    That Feature Anti-Analysis Techniques.” <i>Network and Distributed System Security
    Symposium (NDSS)</i>, 2016.
  short: 'S. Rasthofer, S. Arzt, M. Miltenberger, E. Bodden, in: Network and Distributed
    System Security Symposium (NDSS), 2016.'
date_created: 2020-12-14T14:21:41Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/ssme16harvesting.pdf
publication: Network and Distributed System Security Symposium (NDSS)
status: public
title: Harvesting Runtime Values in Android Applications That Feature Anti-Analysis
  Techniques
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20728'
author:
- first_name: Sarah
  full_name: Nadi, Sarah
  last_name: Nadi
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Nadi S, Krüger S, Mezini M, Bodden E. Jumping Through Hoops: Why do Java Developers
    Struggle With Cryptography APIs? In: <i>International Conference for Software
    Engineering (ICSE)</i>. ; 2016:935-946.'
  apa: 'Nadi, S., Krüger, S., Mezini, M., &#38; Bodden, E. (2016). Jumping Through
    Hoops: Why do Java Developers Struggle With Cryptography APIs? <i>International
    Conference for Software Engineering (ICSE)</i>, 935–946.'
  bibtex: '@inproceedings{Nadi_Krüger_Mezini_Bodden_2016, title={Jumping Through Hoops:
    Why do Java Developers Struggle With Cryptography APIs?}, booktitle={International
    Conference for Software Engineering (ICSE)}, author={Nadi, Sarah and Krüger, Stefan
    and Mezini, Mira and Bodden, Eric}, year={2016}, pages={935–946} }'
  chicago: 'Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden. “Jumping Through
    Hoops: Why Do Java Developers Struggle With Cryptography APIs?” In <i>International
    Conference for Software Engineering (ICSE)</i>, 935–46, 2016.'
  ieee: 'S. Nadi, S. Krüger, M. Mezini, and E. Bodden, “Jumping Through Hoops: Why
    do Java Developers Struggle With Cryptography APIs?,” in <i>International Conference
    for Software Engineering (ICSE)</i>, 2016, pp. 935–946.'
  mla: 'Nadi, Sarah, et al. “Jumping Through Hoops: Why Do Java Developers Struggle
    With Cryptography APIs?” <i>International Conference for Software Engineering
    (ICSE)</i>, 2016, pp. 935–46.'
  short: 'S. Nadi, S. Krüger, M. Mezini, E. Bodden, in: International Conference for
    Software Engineering (ICSE), 2016, pp. 935–946.'
date_created: 2020-12-14T14:22:36Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- CROSSING
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/nkm+16jumping.pdf
page: 935-946
publication: International Conference for Software Engineering (ICSE)
status: public
title: 'Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?'
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20729'
author:
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Arzt S, Bodden E. StubDroid: Automatic Inference of Precise Data-flow Summaries
    for the Android Framework. In: <i>International Conference for Software Engineering
    (ICSE)</i>. ; 2016.'
  apa: 'Arzt, S., &#38; Bodden, E. (2016). StubDroid: Automatic Inference of Precise
    Data-flow Summaries for the Android Framework. <i>International Conference for
    Software Engineering (ICSE)</i>.'
  bibtex: '@inproceedings{Arzt_Bodden_2016, title={StubDroid: Automatic Inference
    of Precise Data-flow Summaries for the Android Framework}, booktitle={International
    Conference for Software Engineering (ICSE)}, author={Arzt, Steven and Bodden,
    Eric}, year={2016} }'
  chicago: 'Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise
    Data-Flow Summaries for the Android Framework.” In <i>International Conference
    for Software Engineering (ICSE)</i>, 2016.'
  ieee: 'S. Arzt and E. Bodden, “StubDroid: Automatic Inference of Precise Data-flow
    Summaries for the Android Framework,” 2016.'
  mla: 'Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise
    Data-Flow Summaries for the Android Framework.” <i>International Conference for
    Software Engineering (ICSE)</i>, 2016.'
  short: 'S. Arzt, E. Bodden, in: International Conference for Software Engineering
    (ICSE), 2016.'
date_created: 2020-12-14T14:23:29Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/ab16stubdroid.pdf
publication: International Conference for Software Engineering (ICSE)
status: public
title: 'StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android
  Framework'
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20730'
author:
- first_name: N.
  full_name: Eling, N.
  last_name: Eling
- first_name: S.
  full_name: Rasthofer, S.
  last_name: Rasthofer
- first_name: M.
  full_name: Kolhagen, M.
  last_name: Kolhagen
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: P.
  full_name: Buxmann, P.
  last_name: Buxmann
citation:
  ama: 'Eling N, Rasthofer S, Kolhagen M, Bodden E, Buxmann P. Investigating Users’
    Reaction to Fine-Grained Data Requests: A Market Experiment. In: <i>2016 49th
    Hawaii International Conference on System Sciences (HICSS)</i>. ; 2016:3666-3675.
    doi:<a href="https://doi.org/10.1109/HICSS.2016.458">10.1109/HICSS.2016.458</a>'
  apa: 'Eling, N., Rasthofer, S., Kolhagen, M., Bodden, E., &#38; Buxmann, P. (2016).
    Investigating Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.
    <i>2016 49th Hawaii International Conference on System Sciences (HICSS)</i>, 3666–3675.
    <a href="https://doi.org/10.1109/HICSS.2016.458">https://doi.org/10.1109/HICSS.2016.458</a>'
  bibtex: '@inproceedings{Eling_Rasthofer_Kolhagen_Bodden_Buxmann_2016, title={Investigating
    Users’ Reaction to Fine-Grained Data Requests: A Market Experiment}, DOI={<a href="https://doi.org/10.1109/HICSS.2016.458">10.1109/HICSS.2016.458</a>},
    booktitle={2016 49th Hawaii International Conference on System Sciences (HICSS)},
    author={Eling, N. and Rasthofer, S. and Kolhagen, M. and Bodden, Eric and Buxmann,
    P.}, year={2016}, pages={3666–3675} }'
  chicago: 'Eling, N., S. Rasthofer, M. Kolhagen, Eric Bodden, and P. Buxmann. “Investigating
    Users’ Reaction to Fine-Grained Data Requests: A Market Experiment.” In <i>2016
    49th Hawaii International Conference on System Sciences (HICSS)</i>, 3666–75,
    2016. <a href="https://doi.org/10.1109/HICSS.2016.458">https://doi.org/10.1109/HICSS.2016.458</a>.'
  ieee: 'N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, and P. Buxmann, “Investigating
    Users’ Reaction to Fine-Grained Data Requests: A Market Experiment,” in <i>2016
    49th Hawaii International Conference on System Sciences (HICSS)</i>, 2016, pp.
    3666–3675, doi: <a href="https://doi.org/10.1109/HICSS.2016.458">10.1109/HICSS.2016.458</a>.'
  mla: 'Eling, N., et al. “Investigating Users’ Reaction to Fine-Grained Data Requests:
    A Market Experiment.” <i>2016 49th Hawaii International Conference on System Sciences
    (HICSS)</i>, 2016, pp. 3666–75, doi:<a href="https://doi.org/10.1109/HICSS.2016.458">10.1109/HICSS.2016.458</a>.'
  short: 'N. Eling, S. Rasthofer, M. Kolhagen, E. Bodden, P. Buxmann, in: 2016 49th
    Hawaii International Conference on System Sciences (HICSS), 2016, pp. 3666–3675.'
date_created: 2020-12-14T14:24:12Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: 10.1109/HICSS.2016.458
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/erk+15investigating.pdf
page: 3666-3675
publication: 2016 49th Hawaii International Conference on System Sciences (HICSS)
publication_identifier:
  issn:
  - 1530-1605
status: public
title: 'Investigating Users'' Reaction to Fine-Grained Data Requests: A Market Experiment'
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20822'
abstract:
- lang: eng
  text: 'Several examples of mechatronic systems can be found nowadays in modern cars,
    production systems, and medical technology. Day by day, the number of innovative
    functionalities in such mechatronic systems is increasing. These functionalities
    are realized with complex software. Such software exhibits hard real-time, safety
    requirements. The adherence to these requirements must be thoroughly analyzed
    and verified. Moreover, to obtain a significant increment in the reliability,
    performance, and efficiency of such software, it needs to maintain the self-adaptation
    of its properties. In order to develop such systems with a high quality and within
    a short time, we need a systematic and consistent design method. For this purpose,
    the software engineering group at the University of Paderborn and the Fraunhofer
    IEM in Paderborn propose the MechatronicUML method. This method provides a comprehensive
    model-driven process support, that starts from requirements and reaches the executable
    software after passing through several design and analysis steps. This process
    improves the comprehension during development and makes complex systems manageable.
    MechatronicUML emphasizes mainly on: (1) modeling and (formal) verification of
    reconfigurable software architectures, (2) the coordination among system components
    in such architectures, and (3) the integration of discrete software events with
    the continuous behavior of control devices.'
author:
- first_name: Stefan
  full_name: Dziwok, Stefan
  id: '3901'
  last_name: Dziwok
  orcid: http://orcid.org/0000-0002-8679-6673
- first_name: Uwe
  full_name: Pohlmann, Uwe
  last_name: Pohlmann
- first_name: Goran
  full_name: Piskachev, Goran
  id: '41936'
  last_name: Piskachev
  orcid: 0000-0003-4424-5838
- first_name: David
  full_name: Schubert, David
  id: '9106'
  last_name: Schubert
- first_name: Sebastian
  full_name: Thiele, Sebastian
  last_name: Thiele
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
citation:
  ama: 'Dziwok S, Pohlmann U, Piskachev G, Schubert D, Thiele S, Gerking C. <i>The
    MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</i>.;
    2016.'
  apa: 'Dziwok, S., Pohlmann, U., Piskachev, G., Schubert, D., Thiele, S., &#38; Gerking,
    C. (2016). <i>The MechatronicUML Design Method: Process and Language for Platform-Independent
    Modeling</i>.'
  bibtex: '@book{Dziwok_Pohlmann_Piskachev_Schubert_Thiele_Gerking_2016, place={Zukunftsmeile
    1, 33102 Paderborn, Germany}, title={The MechatronicUML Design Method: Process
    and Language for Platform-Independent Modeling}, author={Dziwok, Stefan and Pohlmann,
    Uwe and Piskachev, Goran and Schubert, David and Thiele, Sebastian and Gerking,
    Christopher}, year={2016} }'
  chicago: 'Dziwok, Stefan, Uwe Pohlmann, Goran Piskachev, David Schubert, Sebastian
    Thiele, and Christopher Gerking. <i>The MechatronicUML Design Method: Process
    and Language for Platform-Independent Modeling</i>. Zukunftsmeile 1, 33102 Paderborn,
    Germany, 2016.'
  ieee: 'S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, and C. Gerking,
    <i>The MechatronicUML Design Method: Process and Language for Platform-Independent
    Modeling</i>. Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.'
  mla: 'Dziwok, Stefan, et al. <i>The MechatronicUML Design Method: Process and Language
    for Platform-Independent Modeling</i>. 2016.'
  short: 'S. Dziwok, U. Pohlmann, G. Piskachev, D. Schubert, S. Thiele, C. Gerking,
    The MechatronicUML Design Method: Process and Language for Platform-Independent
    Modeling, Zukunftsmeile 1, 33102 Paderborn, Germany, 2016.'
date_created: 2020-12-22T09:24:42Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '76'
- _id: '241'
language:
- iso: eng
place: Zukunftsmeile 1, 33102 Paderborn, Germany
status: public
title: 'The MechatronicUML Design Method: Process and Language for Platform-Independent
  Modeling'
type: report
user_id: '5786'
year: '2016'
...
---
_id: '20823'
abstract:
- lang: eng
  text: 'In this technical report, we present the MechatronicUML requirements engineering
    method. The method encompasses a process and a scenario-based modeling language
    for the documentation and analysis of requirements on the message-based interaction
    behavior of software-intensive systems. The modeling language uses a scenario
    notation based on Modal Sequence Diagrams (MSDs), which borrows concepts of UML
    Interactions as well as of Live Sequence Charts. Furthermore, we introduce the
    so-called Emergency Braking & Evasion System (EBEAS) as a running example, which
    is based on current and upcoming real-world driver assistance systems. '
author:
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
- first_name: Markus
  full_name: Fockel, Markus
  id: '8472'
  last_name: Fockel
  orcid: 0000-0002-1269-0702
- first_name: Thorsten
  full_name: Koch, Thorsten
  id: '13616'
  last_name: Koch
- first_name: David
  full_name: Schmelter, David
  id: '40982'
  last_name: Schmelter
  orcid: 0000-0001-7787-5380
- first_name: Christian
  full_name: Brenner, Christian
  last_name: Brenner
- first_name: Ruslan
  full_name: Bernijazov, Ruslan
  last_name: Bernijazov
- first_name: Marcel
  full_name: Sander, Marcel
  last_name: Sander
citation:
  ama: 'Holtmann J, Fockel M, Koch T, et al. <i>The MechatronicUML Requirements Engineering
    Method: Process and Language</i>.; 2016. doi:<a href="https://doi.org/10.13140/RG.2.2.33223.29606">10.13140/RG.2.2.33223.29606</a>'
  apa: 'Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov,
    R., &#38; Sander, M. (2016). <i>The MechatronicUML Requirements Engineering Method:
    Process and Language</i>. <a href="https://doi.org/10.13140/RG.2.2.33223.29606">https://doi.org/10.13140/RG.2.2.33223.29606</a>'
  bibtex: '@book{Holtmann_Fockel_Koch_Schmelter_Brenner_Bernijazov_Sander_2016, title={The
    MechatronicUML Requirements Engineering Method: Process and Language}, DOI={<a
    href="https://doi.org/10.13140/RG.2.2.33223.29606">10.13140/RG.2.2.33223.29606</a>},
    author={Holtmann, Jörg and Fockel, Markus and Koch, Thorsten and Schmelter, David
    and Brenner, Christian and Bernijazov, Ruslan and Sander, Marcel}, year={2016}
    }'
  chicago: 'Holtmann, Jörg, Markus Fockel, Thorsten Koch, David Schmelter, Christian
    Brenner, Ruslan Bernijazov, and Marcel Sander. <i>The MechatronicUML Requirements
    Engineering Method: Process and Language</i>, 2016. <a href="https://doi.org/10.13140/RG.2.2.33223.29606">https://doi.org/10.13140/RG.2.2.33223.29606</a>.'
  ieee: 'J. Holtmann <i>et al.</i>, <i>The MechatronicUML Requirements Engineering
    Method: Process and Language</i>. 2016.'
  mla: 'Holtmann, Jörg, et al. <i>The MechatronicUML Requirements Engineering Method:
    Process and Language</i>. 2016, doi:<a href="https://doi.org/10.13140/RG.2.2.33223.29606">10.13140/RG.2.2.33223.29606</a>.'
  short: 'J. Holtmann, M. Fockel, T. Koch, D. Schmelter, C. Brenner, R. Bernijazov,
    M. Sander, The MechatronicUML Requirements Engineering Method: Process and Language,
    2016.'
date_created: 2020-12-22T09:28:23Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '76'
- _id: '241'
- _id: '662'
doi: 10.13140/RG.2.2.33223.29606
language:
- iso: eng
status: public
title: 'The MechatronicUML Requirements Engineering Method: Process and Language'
type: report
user_id: '5786'
year: '2016'
...
---
_id: '20825'
abstract:
- lang: ger
  text: Das Systemmodell ist der Kern des Model-Based Systems Engineering (MBSE).
    Während jedoch im Systems Engineering dem Zusammenspiel von Produkt und Projekt
    ein hoher Stellenwert beigemessen wird, liegt der Fokus im MBSE noch sehr stark
    auf technischen Prozessen. Im Hinblick auf die Idee des Systemmodells als zentrale
    Datenquelle sollten auch Stakeholder jenseits der direkten Entwicklungsaktivitäten
    das Systemmodell entsprechend nutzen können und davon profitieren. Dazu wird ein
    Demonstrator vorgestellt, welcher die Anwendung einer Komplexitätsanalyse auf
    Basis des Systemmodells mechatronischer Systeme stellvertretend für Methoden in
    Sinne der technischen Managementprozesse der ISO/IEC 15288 aufzeigt. Grundlage
    des Demonstrators bildet das Systemmodell eines Pedelecs. Die darin modellierten
    Strukturen dienen als Input für die Komplexitätsanalyse. Über die automatisierte
    Anwendung der Komplexitätsanalyse ergibt sich als Output ein Portfolio, das die
    Komplexität der funktionserfüllenden Komponenten mit der Bewertung der Funktionalität
    in Beziehung setzt und somit eine Beurteilung und entsprechende Handlungsempfehlungen
    der Komponenten ermöglicht.
author:
- first_name: Matthias
  full_name: Greinert, Matthias
  last_name: Greinert
- first_name: Christian
  full_name: Tschirner, Christian
  last_name: Tschirner
- first_name: Jörg
  full_name: Holtmann, Jörg
  id: '3875'
  last_name: Holtmann
  orcid: 0000-0001-6141-4571
citation:
  ama: 'Greinert M, Tschirner C, Holtmann J. Anwendung von Methoden der Produktentstehung
    auf Basis des Systemmodells mechatronischer Systeme. In: <i>Tag Des Systems Engineering
    2016</i>. Gesellschaft f{\"u}r Systems Engineering e.V.; 2016:77-86. doi:<a href="https://doi.org/10.3139/9783446451414.008">10.3139/9783446451414.008</a>'
  apa: Greinert, M., Tschirner, C., &#38; Holtmann, J. (2016). Anwendung von Methoden
    der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme. <i>Tag
    Des Systems Engineering 2016</i>, 77–86. <a href="https://doi.org/10.3139/9783446451414.008">https://doi.org/10.3139/9783446451414.008</a>
  bibtex: '@inproceedings{Greinert_Tschirner_Holtmann_2016, title={Anwendung von Methoden
    der Produktentstehung auf Basis des Systemmodells mechatronischer Systeme}, DOI={<a
    href="https://doi.org/10.3139/9783446451414.008">10.3139/9783446451414.008</a>},
    booktitle={Tag des Systems Engineering 2016}, publisher={Gesellschaft f{\"u}r
    Systems Engineering e.V.}, author={Greinert, Matthias and Tschirner, Christian
    and Holtmann, Jörg}, year={2016}, pages={77–86} }'
  chicago: Greinert, Matthias, Christian Tschirner, and Jörg Holtmann. “Anwendung
    von Methoden Der Produktentstehung Auf Basis Des Systemmodells Mechatronischer
    Systeme.” In <i>Tag Des Systems Engineering 2016</i>, 77–86. Gesellschaft f{\"u}r
    Systems Engineering e.V., 2016. <a href="https://doi.org/10.3139/9783446451414.008">https://doi.org/10.3139/9783446451414.008</a>.
  ieee: 'M. Greinert, C. Tschirner, and J. Holtmann, “Anwendung von Methoden der Produktentstehung
    auf Basis des Systemmodells mechatronischer Systeme,” in <i>Tag des Systems Engineering
    2016</i>, 2016, pp. 77–86, doi: <a href="https://doi.org/10.3139/9783446451414.008">10.3139/9783446451414.008</a>.'
  mla: Greinert, Matthias, et al. “Anwendung von Methoden Der Produktentstehung Auf
    Basis Des Systemmodells Mechatronischer Systeme.” <i>Tag Des Systems Engineering
    2016</i>, Gesellschaft f{\"u}r Systems Engineering e.V., 2016, pp. 77–86, doi:<a
    href="https://doi.org/10.3139/9783446451414.008">10.3139/9783446451414.008</a>.
  short: 'M. Greinert, C. Tschirner, J. Holtmann, in: Tag Des Systems Engineering
    2016, Gesellschaft f{\"u}r Systems Engineering e.V., 2016, pp. 77–86.'
date_created: 2020-12-22T09:32:08Z
date_updated: 2022-01-06T06:54:40Z
department:
- _id: '76'
doi: 10.3139/9783446451414.008
language:
- iso: eng
page: 77-86
publication: Tag des Systems Engineering 2016
publisher: Gesellschaft f{\"u}r Systems Engineering e.V.
status: public
title: Anwendung von Methoden der Produktentstehung auf Basis des Systemmodells mechatronischer
  Systeme
type: conference
user_id: '5786'
year: '2016'
...
