[{"publication":"Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages","type":"journal_article","status":"public","_id":"20539","department":[{"_id":"76"}],"user_id":"5786","keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"language":[{"iso":"eng"}],"publication_identifier":{"issn":["2475-1421"]},"issue":"POPL","year":"2019","intvolume":"         3","page":"48:1-48:29","citation":{"ama":"Späth J, Ali K, Bodden E. Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>. 2019;3(POPL):48:1-48:29. doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i> 3, no. POPL (2019): 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>.","ieee":"J. Späth, K. Ali, and E. Bodden, “Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems,” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, p. 48:1-48:29, 2019, doi: <a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","bibtex":"@article{Späth_Ali_Bodden_2019, title={Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems}, volume={3}, DOI={<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>}, number={POPL}, journal={Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages}, publisher={ACM}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2019}, pages={48:1-48:29} }","mla":"Späth, Johannes, et al. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, ACM, 2019, p. 48:1-48:29, doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","short":"J. Späth, K. Ali, E. Bodden, Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages 3 (2019) 48:1-48:29.","apa":"Späth, J., Ali, K., &#38; Bodden, E. (2019). Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, <i>3</i>(POPL), 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>"},"publisher":"ACM","date_updated":"2022-01-06T06:54:29Z","volume":3,"author":[{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"date_created":"2020-11-27T10:53:57Z","title":"Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems","doi":"10.1145/3290361","main_file_link":[{"url":"http://www.bodden.de/pubs/sab19context.pdf"}]},{"status":"public","type":"conference","publication":"ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"series_title":"ISSTA '18","user_id":"5786","department":[{"_id":"76"}],"_id":"20548","citation":{"apa":"Bodden, E. (2018). The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them). <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>, 85–93. <a href=\"https://doi.org/10.1145/3236454.3236500\">https://doi.org/10.1145/3236454.3236500</a>","bibtex":"@inproceedings{Bodden_2018, place={New York, NY, USA}, series={ISSTA ’18}, title={The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them)}, DOI={<a href=\"https://doi.org/10.1145/3236454.3236500\">10.1145/3236454.3236500</a>}, booktitle={ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)}, publisher={ACM}, author={Bodden, Eric}, year={2018}, pages={85–93}, collection={ISSTA ’18} }","mla":"Bodden, Eric. “The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-Based Static Analyses (and How to Master Them).” <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>, ACM, 2018, pp. 85–93, doi:<a href=\"https://doi.org/10.1145/3236454.3236500\">10.1145/3236454.3236500</a>.","short":"E. Bodden, in: ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018), ACM, New York, NY, USA, 2018, pp. 85–93.","chicago":"Bodden, Eric. “The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-Based Static Analyses (and How to Master Them).” In <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>, 85–93. ISSTA ’18. New York, NY, USA: ACM, 2018. <a href=\"https://doi.org/10.1145/3236454.3236500\">https://doi.org/10.1145/3236454.3236500</a>.","ieee":"E. Bodden, “The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them),” in <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>, 2018, pp. 85–93, doi: <a href=\"https://doi.org/10.1145/3236454.3236500\">10.1145/3236454.3236500</a>.","ama":"Bodden E. The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them). In: <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>. ISSTA ’18. ACM; 2018:85-93. doi:<a href=\"https://doi.org/10.1145/3236454.3236500\">10.1145/3236454.3236500</a>"},"page":"85-93","year":"2018","place":"New York, NY, USA","publication_identifier":{"isbn":["978-1-4503-5939-9"]},"main_file_link":[{"url":"http://bodden.de/pubs/bodden18secret.pdf"}],"doi":"10.1145/3236454.3236500","title":"The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them)","author":[{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-11-30T09:51:05Z","publisher":"ACM","date_updated":"2022-01-06T06:54:29Z"},{"department":[{"_id":"76"}],"user_id":"5786","series_title":"ICSE-NIER '18","_id":"20550","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"publication":"Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results","type":"conference","status":"public","date_created":"2020-11-30T09:54:33Z","author":[{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"publisher":"ACM","date_updated":"2022-01-06T06:54:29Z","doi":"10.1145/3183399.3183401","title":"Self-adaptive Static Analysis","related_material":{"link":[{"relation":"confirmation","url":"http://bodden.de/pubs/bodden18selfadaptive.pdf"}]},"publication_identifier":{"isbn":["978-1-4503-5662-6"]},"page":"45-48","citation":{"chicago":"Bodden, Eric. “Self-Adaptive Static Analysis.” In <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>, 45–48. ICSE-NIER ’18. New York, NY, USA: ACM, 2018. <a href=\"https://doi.org/10.1145/3183399.3183401\">https://doi.org/10.1145/3183399.3183401</a>.","ieee":"E. Bodden, “Self-adaptive Static Analysis,” in <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>, 2018, pp. 45–48, doi: <a href=\"https://doi.org/10.1145/3183399.3183401\">10.1145/3183399.3183401</a>.","ama":"Bodden E. Self-adaptive Static Analysis. In: <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>. ICSE-NIER ’18. ACM; 2018:45-48. doi:<a href=\"https://doi.org/10.1145/3183399.3183401\">10.1145/3183399.3183401</a>","mla":"Bodden, Eric. “Self-Adaptive Static Analysis.” <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>, ACM, 2018, pp. 45–48, doi:<a href=\"https://doi.org/10.1145/3183399.3183401\">10.1145/3183399.3183401</a>.","short":"E. Bodden, in: Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, ACM, New York, NY, USA, 2018, pp. 45–48.","bibtex":"@inproceedings{Bodden_2018, place={New York, NY, USA}, series={ICSE-NIER ’18}, title={Self-adaptive Static Analysis}, DOI={<a href=\"https://doi.org/10.1145/3183399.3183401\">10.1145/3183399.3183401</a>}, booktitle={Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results}, publisher={ACM}, author={Bodden, Eric}, year={2018}, pages={45–48}, collection={ICSE-NIER ’18} }","apa":"Bodden, E. (2018). Self-adaptive Static Analysis. <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>, 45–48. <a href=\"https://doi.org/10.1145/3183399.3183401\">https://doi.org/10.1145/3183399.3183401</a>"},"year":"2018","place":"New York, NY, USA"},{"date_created":"2020-11-30T09:55:20Z","author":[{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"first_name":"Patrick","last_name":"Hill","full_name":"Hill, Patrick"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"date_updated":"2022-01-06T06:54:29Z","main_file_link":[{"url":"http://www.bodden.de/pubs/dkh+18visuflow.pdf"}],"title":"VISUFLOW, a Debugging Environment for Static Analyses","citation":{"chicago":"Nguyen Quang Do, Lisa, Stefan Krüger, Patrick Hill, Karim Ali, and Eric Bodden. “VISUFLOW, a Debugging Environment for Static Analyses.” In <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2018.","ieee":"L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, and E. Bodden, “VISUFLOW, a Debugging Environment for Static Analyses,” 2018.","ama":"Nguyen Quang Do L, Krüger S, Hill P, Ali K, Bodden E. VISUFLOW, a Debugging Environment for Static Analyses. In: <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>. ; 2018.","mla":"Nguyen Quang Do, Lisa, et al. “VISUFLOW, a Debugging Environment for Static Analyses.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2018.","bibtex":"@inproceedings{Nguyen Quang Do_Krüger_Hill_Ali_Bodden_2018, title={VISUFLOW, a Debugging Environment for Static Analyses}, booktitle={International Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen Quang Do, Lisa and Krüger, Stefan and Hill, Patrick and Ali, Karim and Bodden, Eric}, year={2018} }","short":"L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, E. Bodden, in: International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2018.","apa":"Nguyen Quang Do, L., Krüger, S., Hill, P., Ali, K., &#38; Bodden, E. (2018). VISUFLOW, a Debugging Environment for Static Analyses. <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>."},"year":"2018","department":[{"_id":"76"}],"user_id":"5786","_id":"20551","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"publication":"International Conference for Software Engineering (ICSE), Tool Demonstrations Track","type":"conference","status":"public"},{"date_updated":"2022-01-06T06:54:34Z","date_created":"2020-12-14T11:51:44Z","author":[{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"last_name":"Livshits","full_name":"Livshits, Benjamin","first_name":"Benjamin"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256"},{"full_name":"Smith, Justin","last_name":"Smith","first_name":"Justin"},{"first_name":"Emerson","last_name":"Murphy-Hill","full_name":"Murphy-Hill, Emerson"}],"title":"Cheetah: Just-in-Time Taint Analysis for Android Apps","main_file_link":[{"url":"http://bodden.de/pubs/dal17cheetah.pdf"}],"year":"2017","citation":{"ieee":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, “Cheetah: Just-in-Time Taint Analysis for Android Apps,” 2017.","chicago":"Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” In <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2017.","ama":"Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Cheetah: Just-in-Time Taint Analysis for Android Apps. In: <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>. ; 2017.","mla":"Nguyen Quang Do, Lisa, et al. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2017.","bibtex":"@inproceedings{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, title={Cheetah: Just-in-Time Taint Analysis for Android Apps}, booktitle={International Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017} }","short":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in: International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2017.","apa":"Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill, E. (2017). Cheetah: Just-in-Time Taint Analysis for Android Apps. <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>."},"_id":"20715","user_id":"5786","department":[{"_id":"76"}],"keyword":["ATTRACT","ITSECWEBSITE"],"language":[{"iso":"eng"}],"type":"conference","publication":"International Conference for Software Engineering (ICSE), Tool Demonstrations Track","status":"public"},{"status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_id":"5273","file_name":"sab17ideal.pdf","file_size":1021251,"creator":"ups","date_created":"2018-11-02T14:28:13Z","date_updated":"2018-11-02T14:28:13Z"}],"publication":"2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)","type":"conference","keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"ddc":["000"],"file_date_updated":"2018-11-02T14:28:13Z","language":[{"iso":"eng"}],"_id":"5204","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"department":[{"_id":"76"}],"user_id":"477","year":"2017","citation":{"ieee":"J. Späth, K. Ali, and E. Bodden, “IDEal: Efficient and Precise Alias-aware Dataflow Analysis,” in <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, 2017.","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press, 2017.","ama":"Späth J, Ali K, Bodden E. IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In: <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press; 2017.","apa":"Späth, J., Ali, K., &#38; Bodden, E. (2017). IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press.","bibtex":"@inproceedings{Späth_Ali_Bodden_2017, title={IDEal: Efficient and Precise Alias-aware Dataflow Analysis}, booktitle={2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)}, publisher={ACM Press}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2017} }","mla":"Späth, Johannes, et al. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, ACM Press, 2017.","short":"J. Späth, K. Ali, E. Bodden, in: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017."},"has_accepted_license":"1","title":"IDEal: Efficient and Precise Alias-aware Dataflow Analysis","main_file_link":[{"url":" http://bodden.de/pubs/sab17ideal.pdf"}],"date_updated":"2022-01-06T07:01:44Z","publisher":"ACM Press","date_created":"2018-10-31T12:46:50Z","author":[{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}]},{"_id":"20717","user_id":"5786","department":[{"_id":"76"}],"keyword":["ATTRACT","ITSECWEBSITE"],"language":[{"iso":"eng"}],"type":"report","status":"public","date_updated":"2022-01-06T06:54:34Z","date_created":"2020-12-14T11:57:09Z","author":[{"first_name":"Lisa","last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"last_name":"Livshits","full_name":"Livshits, Benjamin","first_name":"Benjamin"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"},{"first_name":"Justin","full_name":"Smith, Justin","last_name":"Smith"},{"first_name":"Emerson","last_name":"Murphy-Hill","full_name":"Murphy-Hill, Emerson"}],"title":"Just-in-Time Static Analysis","main_file_link":[{"url":"http://bodden.de/pubs/dal16jit-tr.pdf"}],"doi":"http://dx.doi.org/10.7939/DVN/10859","year":"2016","citation":{"apa":"Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill, E. (2016). <i>Just-in-Time Static Analysis</i>. <a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>","mla":"Nguyen Quang Do, Lisa, et al. <i>Just-in-Time Static Analysis</i>. 2016, doi:<a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>.","short":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, Just-in-Time Static Analysis, 2016.","bibtex":"@book{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2016, title={Just-in-Time Static Analysis}, DOI={<a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>}, author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2016} }","ieee":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, <i>Just-in-Time Static Analysis</i>. 2016.","chicago":"Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. <i>Just-in-Time Static Analysis</i>, 2016. <a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>.","ama":"Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. <i>Just-in-Time Static Analysis</i>.; 2016. doi:<a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>"}},{"type":"journal_article","publication":"Datenschutz und Datensicherheit","status":"public","user_id":"5786","department":[{"_id":"76"}],"_id":"20718","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"citation":{"ama":"Rasthofer S, Arzt S, Bodden E, Miltenberger M. Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. <i>Datenschutz und Datensicherheit</i>. Published online 2016:718-722. doi:<a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>","ieee":"S. Rasthofer, S. Arzt, E. Bodden, and M. Miltenberger, “Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen,” <i>Datenschutz und Datensicherheit</i>, pp. 718–722, 2016, doi: <a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.","chicago":"Rasthofer, Siegfried, Steven Arzt, Eric Bodden, and Marc Miltenberger. “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.” <i>Datenschutz Und Datensicherheit</i>, 2016, 718–22. <a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.","apa":"Rasthofer, S., Arzt, S., Bodden, E., &#38; Miltenberger, M. (2016). Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. <i>Datenschutz Und Datensicherheit</i>, 718–722. <a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>","short":"S. Rasthofer, S. Arzt, E. Bodden, M. Miltenberger, Datenschutz Und Datensicherheit (2016) 718–722.","bibtex":"@article{Rasthofer_Arzt_Bodden_Miltenberger_2016, title={Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen}, DOI={<a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>}, journal={Datenschutz und Datensicherheit}, author={Rasthofer, Siegfried and Arzt, Steven and Bodden, Eric and Miltenberger, Marc}, year={2016}, pages={718–722} }","mla":"Rasthofer, Siegfried, et al. “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.” <i>Datenschutz Und Datensicherheit</i>, 2016, pp. 718–22, doi:<a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>."},"page":"718-722","year":"2016","author":[{"first_name":"Siegfried","last_name":"Rasthofer","full_name":"Rasthofer, Siegfried"},{"first_name":"Steven","last_name":"Arzt","full_name":"Arzt, Steven"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"full_name":"Miltenberger, Marc","last_name":"Miltenberger","first_name":"Marc"}],"date_created":"2020-12-14T11:57:48Z","date_updated":"2022-01-06T06:54:34Z","main_file_link":[{"url":"http://bodden.de/pubs/rabm16harvester.pdf"}],"doi":"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536","title":"Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen"},{"publication_identifier":{"isbn":["978-1-4503-4139-4"]},"citation":{"chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–90. CCS ’16, 2016. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–790, doi: <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>. CCS ’16. ; 2016:779-790. doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>","bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }","mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–90, doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.","apa":"Holzinger, P., Triller, S., Bartel, A., &#38; Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–790. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>"},"page":"779-790","year":"2016","author":[{"first_name":"Philipp","full_name":"Holzinger, Philipp","last_name":"Holzinger"},{"first_name":"Stefan","full_name":"Triller, Stefan","last_name":"Triller"},{"last_name":"Bartel","full_name":"Bartel, Alexandre","first_name":"Alexandre"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2020-12-14T11:58:33Z","date_updated":"2022-01-06T06:54:34Z","doi":"http://doi.acm.org/10.1145/2976749.2978361","title":"An In-Depth Study of More Than Ten Years of Java Exploitation","type":"conference","publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","status":"public","series_title":"CCS '16","user_id":"5786","department":[{"_id":"76"}],"_id":"20719","language":[{"iso":"eng"}],"keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"]},{"_id":"20721","department":[{"_id":"76"}],"user_id":"5786","series_title":"SOAP 2016","keyword":["ATTRACT"],"language":[{"iso":"eng"}],"publication":"Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis","type":"conference","status":"public","date_updated":"2022-01-06T06:54:34Z","date_created":"2020-12-14T12:00:32Z","author":[{"full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do","first_name":"Lisa"},{"last_name":"Eichberg","full_name":"Eichberg, Michael","first_name":"Michael"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"title":"Toward an Automated Benchmark Management System","main_file_link":[{"url":"http://bodden.de/pubs/neb16toward.pdf"}],"year":"2016","page":"13-17","citation":{"ama":"Nguyen Quang Do L, Eichberg M, Bodden E. Toward an Automated Benchmark Management System. In: <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>. SOAP 2016. ; 2016:13-17.","chicago":"Nguyen Quang Do, Lisa, Michael Eichberg, and Eric Bodden. “Toward an Automated Benchmark Management System.” In <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 13–17. SOAP 2016, 2016.","ieee":"L. Nguyen Quang Do, M. Eichberg, and E. Bodden, “Toward an Automated Benchmark Management System,” in <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 2016, pp. 13–17.","bibtex":"@inproceedings{Nguyen Quang Do_Eichberg_Bodden_2016, series={SOAP 2016}, title={Toward an Automated Benchmark Management System}, booktitle={Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis}, author={Nguyen Quang Do, Lisa and Eichberg, Michael and Bodden, Eric}, year={2016}, pages={13–17}, collection={SOAP 2016} }","mla":"Nguyen Quang Do, Lisa, et al. “Toward an Automated Benchmark Management System.” <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 2016, pp. 13–17.","short":"L. Nguyen Quang Do, M. Eichberg, E. Bodden, in: Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016, pp. 13–17.","apa":"Nguyen Quang Do, L., Eichberg, M., &#38; Bodden, E. (2016). Toward an Automated Benchmark Management System. <i>Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis</i>, 13–17."}},{"date_updated":"2022-01-06T06:54:34Z","author":[{"first_name":"Siegfried","last_name":"Rasthofer","full_name":"Rasthofer, Siegfried"},{"first_name":"Steven","last_name":"Arzt","full_name":"Arzt, Steven"},{"last_name":"Miltenberger","full_name":"Miltenberger, Marc","first_name":"Marc"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_created":"2020-12-14T14:21:41Z","title":"Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques","main_file_link":[{"url":"http://www.bodden.de/pubs/ssme16harvesting.pdf"}],"year":"2016","citation":{"ama":"Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In: <i>Network and Distributed System Security Symposium (NDSS)</i>. ; 2016.","ieee":"S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden, “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques,” 2016.","chicago":"Rasthofer, Siegfried, Steven Arzt, Marc Miltenberger, and Eric Bodden. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” In <i>Network and Distributed System Security Symposium (NDSS)</i>, 2016.","short":"S. Rasthofer, S. Arzt, M. Miltenberger, E. Bodden, in: Network and Distributed System Security Symposium (NDSS), 2016.","bibtex":"@inproceedings{Rasthofer_Arzt_Miltenberger_Bodden_2016, title={Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques}, booktitle={Network and Distributed System Security Symposium (NDSS)}, author={Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric}, year={2016} }","mla":"Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” <i>Network and Distributed System Security Symposium (NDSS)</i>, 2016.","apa":"Rasthofer, S., Arzt, S., Miltenberger, M., &#38; Bodden, E. (2016). Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. <i>Network and Distributed System Security Symposium (NDSS)</i>."},"_id":"20727","department":[{"_id":"76"}],"user_id":"5786","keyword":["ATTRACT","ITSECWEBSITE"],"language":[{"iso":"eng"}],"publication":"Network and Distributed System Security Symposium (NDSS)","type":"conference","status":"public"},{"date_updated":"2022-01-06T07:01:45Z","date_created":"2018-10-31T12:51:26Z","author":[{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"},{"last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"}],"title":"Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java","main_file_link":[{"url":"http://www.bodden.de/pubs/sna+16boomerang.pdf"}],"has_accepted_license":"1","year":"2016","citation":{"mla":"Späth, Johannes, et al. “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.” <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2016.","short":"J. Späth, L. Nguyen Quang Do, K. Ali, E. Bodden, in: European Conference on Object-Oriented Programming (ECOOP), 2016.","bibtex":"@inproceedings{Späth_Nguyen Quang Do_Ali_Bodden_2016, title={Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Späth, Johannes and Nguyen Quang Do, Lisa and Ali, Karim and Bodden, Eric}, year={2016} }","apa":"Späth, J., Nguyen Quang Do, L., Ali, K., &#38; Bodden, E. (2016). Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java. In <i>European Conference on Object-Oriented Programming (ECOOP)</i>.","ama":"Späth J, Nguyen Quang Do L, Ali K, Bodden E. Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java. In: <i>European Conference on Object-Oriented Programming (ECOOP)</i>. ; 2016.","chicago":"Späth, Johannes, Lisa Nguyen Quang Do, Karim Ali, and Eric Bodden. “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.” In <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2016.","ieee":"J. Späth, L. Nguyen Quang Do, K. Ali, and E. Bodden, “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java,” in <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2016."},"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"_id":"5205","user_id":"477","department":[{"_id":"76"}],"ddc":["000"],"keyword":["ATTRACT","ITSECWEBSITE"],"file_date_updated":"2018-11-02T14:13:19Z","language":[{"iso":"eng"}],"type":"conference","publication":"European Conference on Object-Oriented Programming (ECOOP)","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":1921617,"file_name":"sna+16boomerang.pdf","access_level":"closed","file_id":"5265","date_updated":"2018-11-02T14:13:19Z","creator":"ups","date_created":"2018-11-02T14:13:19Z"}],"status":"public"},{"type":"conference","publication":"2015 International Conference on Software Engineering (ICSE)","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"5263","access_level":"closed","file_name":"lbb+15iccta.pdf","file_size":206378,"date_created":"2018-11-02T14:10:22Z","creator":"ups","date_updated":"2018-11-02T14:10:22Z"}],"status":"public","user_id":"477","department":[{"_id":"76"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"_id":"5207","language":[{"iso":"eng"}],"file_date_updated":"2018-11-02T14:10:22Z","extern":"1","ddc":["000"],"keyword":["CROSSING","ATTRACT","ITSECWEBSITE"],"publication_identifier":{"isbn":["978-1-4799-1934-5"]},"has_accepted_license":"1","citation":{"ama":"Li L, Bartel A, Bissyande TF, et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In: <i>2015 International Conference on Software Engineering (ICSE)</i>. ; 2015:280-291.","ieee":"L. Li <i>et al.</i>, “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps,” in <i>2015 International Conference on Software Engineering (ICSE)</i>, 2015, pp. 280–291.","chicago":"Li, Li, Alexandre Bartel, Tegawende F. Bissyande, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” In <i>2015 International Conference on Software Engineering (ICSE)</i>, 280–91, 2015.","apa":"Li, L., Bartel, A., Bissyande, T. F., Klein, J., Le Traon, Y., Arzt, S., … McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In <i>2015 International Conference on Software Engineering (ICSE)</i> (pp. 280–291).","bibtex":"@inproceedings{Li_Bartel_Bissyande_Klein_Le Traon_Arzt_Rasthofer_Bodden_Octeau_McDaniel_2015, title={IccTA: Detecting Inter-Component Privacy Leaks in Android Apps}, booktitle={2015 International Conference on Software Engineering (ICSE)}, author={Li, Li and Bartel, Alexandre and Bissyande, Tegawende F. and Klein, Jacques and Le Traon, Yves and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Octeau, Damien and McDaniel, Patrick}, year={2015}, pages={280–291} }","short":"L. Li, A. Bartel, T.F. Bissyande, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, P. McDaniel, in: 2015 International Conference on Software Engineering (ICSE), 2015, pp. 280–291.","mla":"Li, Li, et al. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” <i>2015 International Conference on Software Engineering (ICSE)</i>, 2015, pp. 280–91."},"page":"280-291","year":"2015","date_created":"2018-10-31T12:59:44Z","author":[{"first_name":"Li","full_name":"Li, Li","last_name":"Li"},{"first_name":"Alexandre","last_name":"Bartel","full_name":"Bartel, Alexandre"},{"first_name":"Tegawende F.","last_name":"Bissyande","full_name":"Bissyande, Tegawende F."},{"first_name":"Jacques","last_name":"Klein","full_name":"Klein, Jacques"},{"first_name":"Yves","full_name":"Le Traon, Yves","last_name":"Le Traon"},{"first_name":"Steven","full_name":"Arzt, Steven","last_name":"Arzt"},{"full_name":"Rasthofer, Siegfried","last_name":"Rasthofer","first_name":"Siegfried"},{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"last_name":"Octeau","full_name":"Octeau, Damien","first_name":"Damien"},{"first_name":"Patrick","last_name":"McDaniel","full_name":"McDaniel, Patrick"}],"date_updated":"2022-01-06T07:01:46Z","main_file_link":[{"url":"http://www.bodden.de/pubs/lbb+15iccta.pdf"}],"title":"IccTA: Detecting Inter-Component Privacy Leaks in Android Apps"}]
