[{"citation":{"mla":"Torres, Adriano, et al. “Runtime Verification of Crypto APIs: An Empirical Study.” <i>IEEE Transactions on Software Engineering</i>, vol. 49, no. 10, Institute of Electrical and Electronics Engineers (IEEE), 2023, pp. 4510–25, doi:<a href=\"https://doi.org/10.1109/tse.2023.3301660\">10.1109/tse.2023.3301660</a>.","bibtex":"@article{Torres_Costa_Amaral_Pastro_Bonifácio_d’Amorim_Legunsen_Bodden_Dias Canedo_2023, title={Runtime Verification of Crypto APIs: An Empirical Study}, volume={49}, DOI={<a href=\"https://doi.org/10.1109/tse.2023.3301660\">10.1109/tse.2023.3301660</a>}, number={10}, journal={IEEE Transactions on Software Engineering}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Torres, Adriano and Costa, Pedro and Amaral, Luis and Pastro, Jonata and Bonifácio, Rodrigo and d’Amorim, Marcelo and Legunsen, Owolabi and Bodden, Eric and Dias Canedo, Edna}, year={2023}, pages={4510–4525} }","short":"A. Torres, P. Costa, L. Amaral, J. Pastro, R. Bonifácio, M. d’Amorim, O. Legunsen, E. Bodden, E. Dias Canedo, IEEE Transactions on Software Engineering 49 (2023) 4510–4525.","apa":"Torres, A., Costa, P., Amaral, L., Pastro, J., Bonifácio, R., d’Amorim, M., Legunsen, O., Bodden, E., &#38; Dias Canedo, E. (2023). Runtime Verification of Crypto APIs: An Empirical Study. <i>IEEE Transactions on Software Engineering</i>, <i>49</i>(10), 4510–4525. <a href=\"https://doi.org/10.1109/tse.2023.3301660\">https://doi.org/10.1109/tse.2023.3301660</a>","ama":"Torres A, Costa P, Amaral L, et al. Runtime Verification of Crypto APIs: An Empirical Study. <i>IEEE Transactions on Software Engineering</i>. 2023;49(10):4510-4525. doi:<a href=\"https://doi.org/10.1109/tse.2023.3301660\">10.1109/tse.2023.3301660</a>","chicago":"Torres, Adriano, Pedro Costa, Luis Amaral, Jonata Pastro, Rodrigo Bonifácio, Marcelo d’Amorim, Owolabi Legunsen, Eric Bodden, and Edna Dias Canedo. “Runtime Verification of Crypto APIs: An Empirical Study.” <i>IEEE Transactions on Software Engineering</i> 49, no. 10 (2023): 4510–25. <a href=\"https://doi.org/10.1109/tse.2023.3301660\">https://doi.org/10.1109/tse.2023.3301660</a>.","ieee":"A. Torres <i>et al.</i>, “Runtime Verification of Crypto APIs: An Empirical Study,” <i>IEEE Transactions on Software Engineering</i>, vol. 49, no. 10, pp. 4510–4525, 2023, doi: <a href=\"https://doi.org/10.1109/tse.2023.3301660\">10.1109/tse.2023.3301660</a>."},"intvolume":"        49","page":"4510 - 4525","year":"2023","issue":"10","publication_status":"published","publication_identifier":{"issn":["0098-5589","1939-3520","2326-3881"]},"doi":"10.1109/tse.2023.3301660","title":"Runtime Verification of Crypto APIs: An Empirical Study","author":[{"full_name":"Torres, Adriano","last_name":"Torres","first_name":"Adriano"},{"first_name":"Pedro","full_name":"Costa, Pedro","last_name":"Costa"},{"first_name":"Luis","last_name":"Amaral","full_name":"Amaral, Luis"},{"full_name":"Pastro, Jonata","last_name":"Pastro","first_name":"Jonata"},{"first_name":"Rodrigo","last_name":"Bonifácio","full_name":"Bonifácio, Rodrigo"},{"last_name":"d'Amorim","full_name":"d'Amorim, Marcelo","first_name":"Marcelo"},{"last_name":"Legunsen","full_name":"Legunsen, Owolabi","first_name":"Owolabi"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric"},{"last_name":"Dias Canedo","full_name":"Dias Canedo, Edna","first_name":"Edna"}],"date_created":"2023-09-06T07:42:40Z","volume":49,"date_updated":"2023-12-04T11:05:26Z","publisher":"Institute of Electrical and Electronics Engineers (IEEE)","status":"public","type":"journal_article","publication":"IEEE Transactions on Software Engineering","language":[{"iso":"eng"}],"keyword":["Software"],"user_id":"15249","department":[{"_id":"76"}],"_id":"46816"},{"user_id":"477","department":[{"_id":"76"}],"project":[{"name":"Reaktor: SFB 901 - Automatisierte Risikoanalyse in Bezug auf Open-Source-Abhängigkeiten (Hektor) (Transferproject T3)","_id":"107"},{"_id":"1","name":"SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten"},{"name":"SFB 901; Projektbereich T: Transferprojekte des Sonderforschungsbereichs","_id":"82"},{"name":"SFB 901; TP T3: Automatisierte Risikoanalyse in Bezug auf Open-Source-Abhängigkeiten (Hektor)","_id":"107"}],"_id":"31132","language":[{"iso":"eng"}],"keyword":["Software"],"type":"journal_article","publication":"IEEE Transactions on Software Engineering","status":"public","date_created":"2022-05-09T13:02:35Z","author":[{"full_name":"Dann, Andreas Peter","id":"26886","last_name":"Dann","first_name":"Andreas Peter"},{"full_name":"Plate, Henrik","last_name":"Plate","first_name":"Henrik"},{"full_name":"Hermann, Ben","id":"66173","last_name":"Hermann","orcid":"0000-0001-9848-2017","first_name":"Ben"},{"full_name":"Ponta, Serena Elisa","last_name":"Ponta","first_name":"Serena Elisa"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","date_updated":"2025-11-11T14:28:46Z","doi":"10.1109/tse.2021.3101739","title":"Identifying Challenges for OSS Vulnerability Scanners - A Study &amp; Test Suite","publication_status":"published","publication_identifier":{"issn":["0098-5589","1939-3520","2326-3881"]},"citation":{"chicago":"Dann, Andreas Peter, Henrik Plate, Ben Hermann, Serena Elisa Ponta, and Eric Bodden. “Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite.” <i>IEEE Transactions on Software Engineering</i>, 2021, 1–1. <a href=\"https://doi.org/10.1109/tse.2021.3101739\">https://doi.org/10.1109/tse.2021.3101739</a>.","ieee":"A. P. Dann, H. Plate, B. Hermann, S. E. Ponta, and E. Bodden, “Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2021, doi: <a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>.","ama":"Dann AP, Plate H, Hermann B, Ponta SE, Bodden E. Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite. <i>IEEE Transactions on Software Engineering</i>. Published online 2021:1-1. doi:<a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>","bibtex":"@article{Dann_Plate_Hermann_Ponta_Bodden_2021, title={Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite}, DOI={<a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>}, journal={IEEE Transactions on Software Engineering}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Dann, Andreas Peter and Plate, Henrik and Hermann, Ben and Ponta, Serena Elisa and Bodden, Eric}, year={2021}, pages={1–1} }","short":"A.P. Dann, H. Plate, B. Hermann, S.E. Ponta, E. Bodden, IEEE Transactions on Software Engineering (2021) 1–1.","mla":"Dann, Andreas Peter, et al. “Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite.” <i>IEEE Transactions on Software Engineering</i>, Institute of Electrical and Electronics Engineers (IEEE), 2021, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/tse.2021.3101739\">10.1109/tse.2021.3101739</a>.","apa":"Dann, A. P., Plate, H., Hermann, B., Ponta, S. E., &#38; Bodden, E. (2021). Identifying Challenges for OSS Vulnerability Scanners - A Study &#38;amp; Test Suite. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/tse.2021.3101739\">https://doi.org/10.1109/tse.2021.3101739</a>"},"page":"1-1","year":"2021"},{"_id":"20533","department":[{"_id":"76"}],"user_id":"5786","keyword":["Java","Encryption","Static analysis","Tools","Ciphers","Semantics","cryptography","domain-specific language","static analysis"],"language":[{"iso":"eng"}],"publication":"IEEE Transactions on Software Engineering","type":"journal_article","status":"public","date_updated":"2022-01-06T06:54:29Z","author":[{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"full_name":"Späth, Johannes","last_name":"Späth","first_name":"Johannes"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"},{"first_name":"Mira","last_name":"Mezini","full_name":"Mezini, Mira"}],"date_created":"2020-11-27T10:48:38Z","title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","doi":"10.1109/TSE.2019.2948910","main_file_link":[{"url":"http://www.bodden.de/pubs/tse19CrySL.pdf"}],"publication_identifier":{"issn":["2326-3881"]},"year":"2019","page":"1-1","citation":{"apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2019). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>.","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, IEEE Transactions on Software Engineering (2019) 1–1.","bibtex":"@article{Krüger_Späth_Ali_Bodden_Mezini_2019, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, DOI={<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>}, journal={IEEE Transactions on Software Engineering}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2019}, pages={1–1} }","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. <i>IEEE Transactions on Software Engineering</i>. Published online 2019:1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>IEEE Transactions on Software Engineering</i>, 2019, 1–1. <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">https://doi.org/10.1109/TSE.2019.2948910</a>.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2019, doi: <a href=\"https://doi.org/10.1109/TSE.2019.2948910\">10.1109/TSE.2019.2948910</a>."}},{"department":[{"_id":"76"},{"_id":"34"},{"_id":"26"}],"user_id":"5786","_id":"14896","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"language":[{"iso":"eng"}],"publication":"IEEE Transactions on Software Engineering","type":"journal_article","status":"public","author":[{"first_name":"Andreas","full_name":"Dann, Andreas","last_name":"Dann"},{"first_name":"Ben","orcid":"0000-0001-9848-2017","last_name":"Hermann","full_name":"Hermann, Ben","id":"66173"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"}],"date_created":"2019-11-12T12:20:56Z","date_updated":"2022-01-06T06:52:10Z","doi":"10.1109/tse.2019.2931331","title":"ModGuard: Identifying Integrity &Confidentiality Violations in Java Modules","publication_identifier":{"issn":["0098-5589","1939-3520","2326-3881"]},"publication_status":"published","page":"1-1","citation":{"bibtex":"@article{Dann_Hermann_Bodden_2019, title={ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules}, DOI={<a href=\"https://doi.org/10.1109/tse.2019.2931331\">10.1109/tse.2019.2931331</a>}, journal={IEEE Transactions on Software Engineering}, author={Dann, Andreas and Hermann, Ben and Bodden, Eric}, year={2019}, pages={1–1} }","short":"A. Dann, B. Hermann, E. Bodden, IEEE Transactions on Software Engineering (2019) 1–1.","mla":"Dann, Andreas, et al. “ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules.” <i>IEEE Transactions on Software Engineering</i>, 2019, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/tse.2019.2931331\">10.1109/tse.2019.2931331</a>.","apa":"Dann, A., Hermann, B., &#38; Bodden, E. (2019). ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/tse.2019.2931331\">https://doi.org/10.1109/tse.2019.2931331</a>","ieee":"A. Dann, B. Hermann, and E. Bodden, “ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2019, doi: <a href=\"https://doi.org/10.1109/tse.2019.2931331\">10.1109/tse.2019.2931331</a>.","chicago":"Dann, Andreas, Ben Hermann, and Eric Bodden. “ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules.” <i>IEEE Transactions on Software Engineering</i>, 2019, 1–1. <a href=\"https://doi.org/10.1109/tse.2019.2931331\">https://doi.org/10.1109/tse.2019.2931331</a>.","ama":"Dann A, Hermann B, Bodden E. ModGuard: Identifying Integrity &#38;Confidentiality Violations in Java Modules. <i>IEEE Transactions on Software Engineering</i>. Published online 2019:1-1. doi:<a href=\"https://doi.org/10.1109/tse.2019.2931331\">10.1109/tse.2019.2931331</a>"},"year":"2019"},{"language":[{"iso":"eng"}],"keyword":["Debugging","Static analysis","Tools","Computer bugs","Standards","Writing","Encoding","Testing and Debugging","Program analysis","Development tools","Integrated environments","Graphical environments","Usability testing"],"department":[{"_id":"76"}],"user_id":"5786","_id":"20543","status":"public","publication":"IEEE Transactions on Software Engineering","type":"journal_article","doi":"10.1109/TSE.2018.2868349","main_file_link":[{"url":"http://www.bodden.de/pubs/tse18debugging.pdf"}],"title":"Debugging Static Analysis","author":[{"full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do","first_name":"Lisa"},{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"full_name":"Hill, Patrick","last_name":"Hill","first_name":"Patrick"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_created":"2020-11-30T09:32:12Z","date_updated":"2022-01-06T06:54:29Z","page":"1-1","citation":{"chicago":"Nguyen Quang Do, Lisa, Stefan Krüger, Patrick Hill, Karim Ali, and Eric Bodden. “Debugging Static Analysis.” <i>IEEE Transactions on Software Engineering</i>, 2018, 1–1. <a href=\"https://doi.org/10.1109/TSE.2018.2868349\">https://doi.org/10.1109/TSE.2018.2868349</a>.","ieee":"L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, and E. Bodden, “Debugging Static Analysis,” <i>IEEE Transactions on Software Engineering</i>, pp. 1–1, 2018, doi: <a href=\"https://doi.org/10.1109/TSE.2018.2868349\">10.1109/TSE.2018.2868349</a>.","ama":"Nguyen Quang Do L, Krüger S, Hill P, Ali K, Bodden E. Debugging Static Analysis. <i>IEEE Transactions on Software Engineering</i>. Published online 2018:1-1. doi:<a href=\"https://doi.org/10.1109/TSE.2018.2868349\">10.1109/TSE.2018.2868349</a>","apa":"Nguyen Quang Do, L., Krüger, S., Hill, P., Ali, K., &#38; Bodden, E. (2018). Debugging Static Analysis. <i>IEEE Transactions on Software Engineering</i>, 1–1. <a href=\"https://doi.org/10.1109/TSE.2018.2868349\">https://doi.org/10.1109/TSE.2018.2868349</a>","bibtex":"@article{Nguyen Quang Do_Krüger_Hill_Ali_Bodden_2018, title={Debugging Static Analysis}, DOI={<a href=\"https://doi.org/10.1109/TSE.2018.2868349\">10.1109/TSE.2018.2868349</a>}, journal={IEEE Transactions on Software Engineering}, author={Nguyen Quang Do, Lisa and Krüger, Stefan and Hill, Patrick and Ali, Karim and Bodden, Eric}, year={2018}, pages={1–1} }","short":"L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, E. Bodden, IEEE Transactions on Software Engineering (2018) 1–1.","mla":"Nguyen Quang Do, Lisa, et al. “Debugging Static Analysis.” <i>IEEE Transactions on Software Engineering</i>, 2018, pp. 1–1, doi:<a href=\"https://doi.org/10.1109/TSE.2018.2868349\">10.1109/TSE.2018.2868349</a>."},"year":"2018","publication_identifier":{"issn":["2326-3881"]}}]
