[{"language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE","CROSSING"],"user_id":"5786","department":[{"_id":"76"}],"_id":"20538","status":"public","type":"conference","publication":"ACM Conference on Data and Application Security and Privacy (CODASPY 2019)","main_file_link":[{"url":"http://www.bodden.de/pubs/gan19acminer.pdf"}],"title":"ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware","author":[{"first_name":"Sigmund","full_name":"Albert Gorski Iii, Sigmund","last_name":"Albert Gorski Iii"},{"full_name":"Andow, Benjamin","last_name":"Andow","first_name":"Benjamin"},{"first_name":"Adwait","last_name":"Nadkarni","full_name":"Nadkarni, Adwait"},{"full_name":"Manandhar, Sunil","last_name":"Manandhar","first_name":"Sunil"},{"first_name":"William","last_name":"Enck","full_name":"Enck, William"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"full_name":"Bartel, Alexandre","last_name":"Bartel","first_name":"Alexandre"}],"date_created":"2020-11-27T10:52:59Z","date_updated":"2022-01-06T06:54:29Z","citation":{"apa":"Albert Gorski Iii, S., Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden, E., &#38; Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>.","bibtex":"@inproceedings{Albert Gorski Iii_Andow_Nadkarni_Manandhar_Enck_Bodden_Bartel_2019, title={ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware}, booktitle={ACM Conference on Data and Application Security and Privacy (CODASPY 2019)}, author={Albert Gorski Iii, Sigmund and Andow, Benjamin and Nadkarni, Adwait and Manandhar, Sunil and Enck, William and Bodden, Eric and Bartel, Alexandre}, year={2019} }","short":"S. Albert Gorski Iii, B. Andow, A. Nadkarni, S. Manandhar, W. Enck, E. Bodden, A. Bartel, in: ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019.","mla":"Albert Gorski Iii, Sigmund, et al. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>, 2019.","ama":"Albert Gorski Iii S, Andow B, Nadkarni A, et al. ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. In: <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>. ; 2019.","ieee":"S. Albert Gorski Iii <i>et al.</i>, “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware,” 2019.","chicago":"Albert Gorski Iii, Sigmund, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, and Alexandre Bartel. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” In <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>, 2019."},"year":"2019"},{"date_created":"2020-11-27T10:53:57Z","author":[{"full_name":"Späth, Johannes","last_name":"Späth","first_name":"Johannes"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"volume":3,"date_updated":"2022-01-06T06:54:29Z","publisher":"ACM","main_file_link":[{"url":"http://www.bodden.de/pubs/sab19context.pdf"}],"doi":"10.1145/3290361","title":"Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems","issue":"POPL","publication_identifier":{"issn":["2475-1421"]},"citation":{"chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i> 3, no. POPL (2019): 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>.","ieee":"J. Späth, K. Ali, and E. Bodden, “Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems,” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, p. 48:1-48:29, 2019, doi: <a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","ama":"Späth J, Ali K, Bodden E. Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>. 2019;3(POPL):48:1-48:29. doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>","apa":"Späth, J., Ali, K., &#38; Bodden, E. (2019). Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, <i>3</i>(POPL), 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>","short":"J. Späth, K. Ali, E. Bodden, Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages 3 (2019) 48:1-48:29.","mla":"Späth, Johannes, et al. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, ACM, 2019, p. 48:1-48:29, doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","bibtex":"@article{Späth_Ali_Bodden_2019, title={Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems}, volume={3}, DOI={<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>}, number={POPL}, journal={Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages}, publisher={ACM}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2019}, pages={48:1-48:29} }"},"intvolume":"         3","page":"48:1-48:29","year":"2019","user_id":"5786","department":[{"_id":"76"}],"_id":"20539","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"type":"journal_article","publication":"Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages","status":"public"},{"date_updated":"2022-01-06T07:01:44Z","date_created":"2018-10-31T12:37:29Z","author":[{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"},{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"}],"title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","main_file_link":[{"url":"http://bodden.de/pubs/ksa+18crysl.pdf"}],"has_accepted_license":"1","year":"2018","citation":{"bibtex":"@inproceedings{Krüger_Späth_Ali_Bodden_Mezini_2018, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2018}, pages={10:1-10:27} }","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, in: European Conference on Object-Oriented Programming (ECOOP), 2018, pp. 10:1-10:27.","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2018, pp. 10:1-10:27.","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2018). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In <i>European Conference on Object-Oriented Programming (ECOOP)</i> (pp. 10:1-10:27).","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In: <i>European Conference on Object-Oriented Programming (ECOOP)</i>. ; 2018:10:1-10:27.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” in <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2018, pp. 10:1-10:27.","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” In <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 10:1-10:27, 2018."},"page":"10:1-10:27","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"_id":"5203","user_id":"477","department":[{"_id":"76"}],"ddc":["000"],"keyword":["ITSECWEBSITE","CROSSING"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-02T13:51:05Z","type":"conference","publication":"European Conference on Object-Oriented Programming (ECOOP)","file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-02T13:51:05Z","creator":"ups","date_created":"2018-11-02T13:51:05Z","file_size":747259,"file_id":"5255","access_level":"closed","file_name":"ksa+18crysl.pdf"}],"status":"public"},{"user_id":"5786","department":[{"_id":"76"}],"_id":"20558","language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE","CROSSING"],"type":"conference","publication":"International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track","status":"public","date_created":"2020-11-30T11:08:26Z","author":[{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"last_name":"Nadi","full_name":"Nadi, Sarah","first_name":"Sarah"},{"full_name":"Reif, Michael","last_name":"Reif","first_name":"Michael"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"},{"last_name":"Göpfert","full_name":"Göpfert, Florian","first_name":"Florian"},{"full_name":"Günther, Felix","last_name":"Günther","first_name":"Felix"},{"first_name":"Christian","full_name":"Weinert, Christian","last_name":"Weinert"},{"last_name":"Demmler","full_name":"Demmler, Daniel","first_name":"Daniel"},{"first_name":"Ram","full_name":"Kamath, Ram","last_name":"Kamath"}],"date_updated":"2022-01-06T06:54:30Z","main_file_link":[{"url":"http://bodden.de/pubs/knr+17cognicrypt.pdf"}],"title":"CogniCrypt: Supporting Developers in using Cryptography","citation":{"ieee":"S. Krüger <i>et al.</i>, “CogniCrypt: Supporting Developers in using Cryptography,” 2017.","chicago":"Krüger, Stefan, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” In <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>, 2017.","ama":"Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using Cryptography. In: <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>. ; 2017.","apa":"Krüger, S., Nadi, S., Reif, M., Ali, K., Mezini, M., Bodden, E., Göpfert, F., Günther, F., Weinert, C., Demmler, D., &#38; Kamath, R. (2017). CogniCrypt: Supporting Developers in using Cryptography. <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>.","mla":"Krüger, Stefan, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>, 2017.","bibtex":"@inproceedings{Krüger_Nadi_Reif_Ali_Mezini_Bodden_Göpfert_Günther_Weinert_Demmler_et al._2017, title={CogniCrypt: Supporting Developers in using Cryptography}, booktitle={International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track}, author={Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and et al.}, year={2017} }","short":"S. Krüger, S. Nadi, M. Reif, K. Ali, M. Mezini, E. Bodden, F. Göpfert, F. Günther, C. Weinert, D. Demmler, R. Kamath, in: International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track, 2017."},"year":"2017"},{"year":"2017","citation":{"short":"J. Späth, K. Ali, E. Bodden, in: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017.","mla":"Späth, Johannes, et al. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, ACM Press, 2017.","bibtex":"@inproceedings{Späth_Ali_Bodden_2017, title={IDEal: Efficient and Precise Alias-aware Dataflow Analysis}, booktitle={2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)}, publisher={ACM Press}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2017} }","apa":"Späth, J., Ali, K., &#38; Bodden, E. (2017). IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press.","ama":"Späth J, Ali K, Bodden E. IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In: <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press; 2017.","ieee":"J. Späth, K. Ali, and E. Bodden, “IDEal: Efficient and Precise Alias-aware Dataflow Analysis,” in <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, 2017.","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press, 2017."},"has_accepted_license":"1","title":"IDEal: Efficient and Precise Alias-aware Dataflow Analysis","main_file_link":[{"url":" http://bodden.de/pubs/sab17ideal.pdf"}],"publisher":"ACM Press","date_updated":"2022-01-06T07:01:44Z","author":[{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_created":"2018-10-31T12:46:50Z","status":"public","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":1021251,"file_name":"sab17ideal.pdf","file_id":"5273","access_level":"closed","date_updated":"2018-11-02T14:28:13Z","date_created":"2018-11-02T14:28:13Z","creator":"ups"}],"publication":"2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)","type":"conference","keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"ddc":["000"],"file_date_updated":"2018-11-02T14:28:13Z","language":[{"iso":"eng"}],"_id":"5204","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"department":[{"_id":"76"}],"user_id":"477"},{"year":"2016","page":"935-946","citation":{"short":"S. Nadi, S. Krüger, M. Mezini, E. Bodden, in: International Conference for Software Engineering (ICSE), 2016, pp. 935–946.","bibtex":"@inproceedings{Nadi_Krüger_Mezini_Bodden_2016, title={Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?}, booktitle={International Conference for Software Engineering (ICSE)}, author={Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric}, year={2016}, pages={935–946} }","mla":"Nadi, Sarah, et al. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” <i>International Conference for Software Engineering (ICSE)</i>, 2016, pp. 935–46.","apa":"Nadi, S., Krüger, S., Mezini, M., &#38; Bodden, E. (2016). Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? <i>International Conference for Software Engineering (ICSE)</i>, 935–946.","ama":"Nadi S, Krüger S, Mezini M, Bodden E. Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? In: <i>International Conference for Software Engineering (ICSE)</i>. ; 2016:935-946.","chicago":"Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” In <i>International Conference for Software Engineering (ICSE)</i>, 935–46, 2016.","ieee":"S. Nadi, S. Krüger, M. Mezini, and E. Bodden, “Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?,” in <i>International Conference for Software Engineering (ICSE)</i>, 2016, pp. 935–946."},"date_updated":"2022-01-06T06:54:34Z","date_created":"2020-12-14T14:22:36Z","author":[{"last_name":"Nadi","full_name":"Nadi, Sarah","first_name":"Sarah"},{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"},{"first_name":"Mira","full_name":"Mezini, Mira","last_name":"Mezini"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"title":"Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?","main_file_link":[{"url":"http://www.bodden.de/pubs/nkm+16jumping.pdf"}],"publication":"International Conference for Software Engineering (ICSE)","type":"conference","status":"public","_id":"20728","department":[{"_id":"76"}],"user_id":"5786","keyword":["CROSSING","ITSECWEBSITE"],"language":[{"iso":"eng"}]},{"title":"IccTA: Detecting Inter-Component Privacy Leaks in Android Apps","main_file_link":[{"url":"http://www.bodden.de/pubs/lbb+15iccta.pdf"}],"date_updated":"2022-01-06T07:01:46Z","date_created":"2018-10-31T12:59:44Z","author":[{"first_name":"Li","last_name":"Li","full_name":"Li, Li"},{"first_name":"Alexandre","full_name":"Bartel, Alexandre","last_name":"Bartel"},{"last_name":"Bissyande","full_name":"Bissyande, Tegawende F.","first_name":"Tegawende F."},{"full_name":"Klein, Jacques","last_name":"Klein","first_name":"Jacques"},{"last_name":"Le Traon","full_name":"Le Traon, Yves","first_name":"Yves"},{"first_name":"Steven","full_name":"Arzt, Steven","last_name":"Arzt"},{"first_name":"Siegfried","full_name":"Rasthofer, Siegfried","last_name":"Rasthofer"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"last_name":"Octeau","full_name":"Octeau, Damien","first_name":"Damien"},{"last_name":"McDaniel","full_name":"McDaniel, Patrick","first_name":"Patrick"}],"year":"2015","citation":{"apa":"Li, L., Bartel, A., Bissyande, T. F., Klein, J., Le Traon, Y., Arzt, S., … McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In <i>2015 International Conference on Software Engineering (ICSE)</i> (pp. 280–291).","mla":"Li, Li, et al. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” <i>2015 International Conference on Software Engineering (ICSE)</i>, 2015, pp. 280–91.","short":"L. Li, A. Bartel, T.F. Bissyande, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, P. McDaniel, in: 2015 International Conference on Software Engineering (ICSE), 2015, pp. 280–291.","bibtex":"@inproceedings{Li_Bartel_Bissyande_Klein_Le Traon_Arzt_Rasthofer_Bodden_Octeau_McDaniel_2015, title={IccTA: Detecting Inter-Component Privacy Leaks in Android Apps}, booktitle={2015 International Conference on Software Engineering (ICSE)}, author={Li, Li and Bartel, Alexandre and Bissyande, Tegawende F. and Klein, Jacques and Le Traon, Yves and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Octeau, Damien and McDaniel, Patrick}, year={2015}, pages={280–291} }","ama":"Li L, Bartel A, Bissyande TF, et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In: <i>2015 International Conference on Software Engineering (ICSE)</i>. ; 2015:280-291.","chicago":"Li, Li, Alexandre Bartel, Tegawende F. Bissyande, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” In <i>2015 International Conference on Software Engineering (ICSE)</i>, 280–91, 2015.","ieee":"L. Li <i>et al.</i>, “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps,” in <i>2015 International Conference on Software Engineering (ICSE)</i>, 2015, pp. 280–291."},"page":"280-291","has_accepted_license":"1","publication_identifier":{"isbn":["978-1-4799-1934-5"]},"ddc":["000"],"keyword":["CROSSING","ATTRACT","ITSECWEBSITE"],"language":[{"iso":"eng"}],"extern":"1","file_date_updated":"2018-11-02T14:10:22Z","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"_id":"5207","user_id":"477","department":[{"_id":"76"}],"file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"5263","access_level":"closed","file_name":"lbb+15iccta.pdf","file_size":206378,"date_created":"2018-11-02T14:10:22Z","creator":"ups","date_updated":"2018-11-02T14:10:22Z"}],"status":"public","type":"conference","publication":"2015 International Conference on Software Engineering (ICSE)"}]
