[{"citation":{"ama":"Albert Gorski Iii S, Andow B, Nadkarni A, et al. ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. In: <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>. ; 2019.","chicago":"Albert Gorski Iii, Sigmund, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, and Alexandre Bartel. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” In <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>, 2019.","ieee":"S. Albert Gorski Iii <i>et al.</i>, “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware,” 2019.","apa":"Albert Gorski Iii, S., Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden, E., &#38; Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware. <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>.","short":"S. Albert Gorski Iii, B. Andow, A. Nadkarni, S. Manandhar, W. Enck, E. Bodden, A. Bartel, in: ACM Conference on Data and Application Security and Privacy (CODASPY 2019), 2019.","bibtex":"@inproceedings{Albert Gorski Iii_Andow_Nadkarni_Manandhar_Enck_Bodden_Bartel_2019, title={ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware}, booktitle={ACM Conference on Data and Application Security and Privacy (CODASPY 2019)}, author={Albert Gorski Iii, Sigmund and Andow, Benjamin and Nadkarni, Adwait and Manandhar, Sunil and Enck, William and Bodden, Eric and Bartel, Alexandre}, year={2019} }","mla":"Albert Gorski Iii, Sigmund, et al. “ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware.” <i>ACM Conference on Data and Application Security and Privacy (CODASPY 2019)</i>, 2019."},"year":"2019","main_file_link":[{"url":"http://www.bodden.de/pubs/gan19acminer.pdf"}],"title":"ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware","date_created":"2020-11-27T10:52:59Z","author":[{"full_name":"Albert Gorski Iii, Sigmund","last_name":"Albert Gorski Iii","first_name":"Sigmund"},{"first_name":"Benjamin","last_name":"Andow","full_name":"Andow, Benjamin"},{"first_name":"Adwait","full_name":"Nadkarni, Adwait","last_name":"Nadkarni"},{"first_name":"Sunil","full_name":"Manandhar, Sunil","last_name":"Manandhar"},{"last_name":"Enck","full_name":"Enck, William","first_name":"William"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256"},{"first_name":"Alexandre","last_name":"Bartel","full_name":"Bartel, Alexandre"}],"date_updated":"2022-01-06T06:54:29Z","status":"public","publication":"ACM Conference on Data and Application Security and Privacy (CODASPY 2019)","type":"conference","language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE","CROSSING"],"department":[{"_id":"76"}],"user_id":"5786","_id":"20538"},{"intvolume":"         3","page":"48:1-48:29","citation":{"bibtex":"@article{Späth_Ali_Bodden_2019, title={Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems}, volume={3}, DOI={<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>}, number={POPL}, journal={Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages}, publisher={ACM}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2019}, pages={48:1-48:29} }","mla":"Späth, Johannes, et al. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, ACM, 2019, p. 48:1-48:29, doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","short":"J. Späth, K. Ali, E. Bodden, Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages 3 (2019) 48:1-48:29.","apa":"Späth, J., Ali, K., &#38; Bodden, E. (2019). Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, <i>3</i>(POPL), 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>","ama":"Späth J, Ali K, Bodden E. Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>. 2019;3(POPL):48:1-48:29. doi:<a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>","ieee":"J. Späth, K. Ali, and E. Bodden, “Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems,” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, p. 48:1-48:29, 2019, doi: <a href=\"https://doi.org/10.1145/3290361\">10.1145/3290361</a>.","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages</i> 3, no. POPL (2019): 48:1-48:29. <a href=\"https://doi.org/10.1145/3290361\">https://doi.org/10.1145/3290361</a>."},"year":"2019","issue":"POPL","publication_identifier":{"issn":["2475-1421"]},"doi":"10.1145/3290361","main_file_link":[{"url":"http://www.bodden.de/pubs/sab19context.pdf"}],"title":"Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized Pushdown Systems","volume":3,"date_created":"2020-11-27T10:53:57Z","author":[{"first_name":"Johannes","last_name":"Späth","full_name":"Späth, Johannes"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"publisher":"ACM","date_updated":"2022-01-06T06:54:29Z","status":"public","publication":"Proceedings of the ACM SIGPLAN Symposium on Principles of Programming Languages","type":"journal_article","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"department":[{"_id":"76"}],"user_id":"5786","_id":"20539"},{"place":"New York, NY, USA","year":"2018","page":"85-93","citation":{"ieee":"E. Bodden, “The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them),” in <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>, 2018, pp. 85–93, doi: <a href=\"https://doi.org/10.1145/3236454.3236500\">10.1145/3236454.3236500</a>.","chicago":"Bodden, Eric. “The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-Based Static Analyses (and How to Master Them).” In <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>, 85–93. ISSTA ’18. New York, NY, USA: ACM, 2018. <a href=\"https://doi.org/10.1145/3236454.3236500\">https://doi.org/10.1145/3236454.3236500</a>.","ama":"Bodden E. The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them). In: <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>. ISSTA ’18. ACM; 2018:85-93. doi:<a href=\"https://doi.org/10.1145/3236454.3236500\">10.1145/3236454.3236500</a>","apa":"Bodden, E. (2018). The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them). <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>, 85–93. <a href=\"https://doi.org/10.1145/3236454.3236500\">https://doi.org/10.1145/3236454.3236500</a>","short":"E. Bodden, in: ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018), ACM, New York, NY, USA, 2018, pp. 85–93.","bibtex":"@inproceedings{Bodden_2018, place={New York, NY, USA}, series={ISSTA ’18}, title={The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them)}, DOI={<a href=\"https://doi.org/10.1145/3236454.3236500\">10.1145/3236454.3236500</a>}, booktitle={ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)}, publisher={ACM}, author={Bodden, Eric}, year={2018}, pages={85–93}, collection={ISSTA ’18} }","mla":"Bodden, Eric. “The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-Based Static Analyses (and How to Master Them).” <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)</i>, ACM, 2018, pp. 85–93, doi:<a href=\"https://doi.org/10.1145/3236454.3236500\">10.1145/3236454.3236500</a>."},"publication_identifier":{"isbn":["978-1-4503-5939-9"]},"title":"The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them)","doi":"10.1145/3236454.3236500","main_file_link":[{"url":"http://bodden.de/pubs/bodden18secret.pdf"}],"publisher":"ACM","date_updated":"2022-01-06T06:54:29Z","author":[{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"date_created":"2020-11-30T09:51:05Z","status":"public","publication":"ACM SIGPLAN International Workshop on the State Of the Art in Java Program Analysis (SOAP 2018)","type":"conference","keyword":["ATTRACT","ITSECWEBSITE"],"language":[{"iso":"eng"}],"_id":"20548","department":[{"_id":"76"}],"user_id":"5786","series_title":"ISSTA '18"},{"year":"2018","citation":{"bibtex":"@inproceedings{Geismann_Gerking_Bodden_2018, title={Towards Ensuring Security by Design in Cyber-Physical Systems Engineering Processes}, booktitle={International Conference on Software and System Processes (ICSSP)}, author={Geismann, Johannes and Gerking, Christopher and Bodden, Eric}, year={2018} }","short":"J. Geismann, C. Gerking, E. Bodden, in: International Conference on Software and System Processes (ICSSP), 2018.","mla":"Geismann, Johannes, et al. “Towards Ensuring Security by Design in Cyber-Physical Systems Engineering Processes.” <i>International Conference on Software and System Processes (ICSSP)</i>, 2018.","apa":"Geismann, J., Gerking, C., &#38; Bodden, E. (2018). Towards Ensuring Security by Design in Cyber-Physical Systems Engineering Processes. <i>International Conference on Software and System Processes (ICSSP)</i>.","ama":"Geismann J, Gerking C, Bodden E. Towards Ensuring Security by Design in Cyber-Physical Systems Engineering Processes. In: <i>International Conference on Software and System Processes (ICSSP)</i>. ; 2018.","ieee":"J. Geismann, C. Gerking, and E. Bodden, “Towards Ensuring Security by Design in Cyber-Physical Systems Engineering Processes,” 2018.","chicago":"Geismann, Johannes, Christopher Gerking, and Eric Bodden. “Towards Ensuring Security by Design in Cyber-Physical Systems Engineering Processes.” In <i>International Conference on Software and System Processes (ICSSP)</i>, 2018."},"related_material":{"link":[{"url":"http://bodden.de/pubs/ggb18towards.pdf","relation":"confirmation"}]},"title":"Towards Ensuring Security by Design in Cyber-Physical Systems Engineering Processes","date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-30T09:52:21Z","author":[{"first_name":"Johannes","orcid":"https://orcid.org/0000-0003-2015-2047","last_name":"Geismann","full_name":"Geismann, Johannes","id":"20063"},{"first_name":"Christopher","last_name":"Gerking","full_name":"Gerking, Christopher"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"status":"public","type":"conference","publication":"International Conference on Software and System Processes (ICSSP)","keyword":["ITSECWEBSITE"],"language":[{"iso":"eng"}],"_id":"20549","user_id":"5786","department":[{"_id":"76"}]},{"related_material":{"link":[{"relation":"confirmation","url":"http://bodden.de/pubs/bodden18selfadaptive.pdf"}]},"publication_identifier":{"isbn":["978-1-4503-5662-6"]},"page":"45-48","citation":{"short":"E. Bodden, in: Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, ACM, New York, NY, USA, 2018, pp. 45–48.","mla":"Bodden, Eric. “Self-Adaptive Static Analysis.” <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>, ACM, 2018, pp. 45–48, doi:<a href=\"https://doi.org/10.1145/3183399.3183401\">10.1145/3183399.3183401</a>.","bibtex":"@inproceedings{Bodden_2018, place={New York, NY, USA}, series={ICSE-NIER ’18}, title={Self-adaptive Static Analysis}, DOI={<a href=\"https://doi.org/10.1145/3183399.3183401\">10.1145/3183399.3183401</a>}, booktitle={Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results}, publisher={ACM}, author={Bodden, Eric}, year={2018}, pages={45–48}, collection={ICSE-NIER ’18} }","apa":"Bodden, E. (2018). Self-adaptive Static Analysis. <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>, 45–48. <a href=\"https://doi.org/10.1145/3183399.3183401\">https://doi.org/10.1145/3183399.3183401</a>","ama":"Bodden E. Self-adaptive Static Analysis. In: <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>. ICSE-NIER ’18. ACM; 2018:45-48. doi:<a href=\"https://doi.org/10.1145/3183399.3183401\">10.1145/3183399.3183401</a>","chicago":"Bodden, Eric. “Self-Adaptive Static Analysis.” In <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>, 45–48. ICSE-NIER ’18. New York, NY, USA: ACM, 2018. <a href=\"https://doi.org/10.1145/3183399.3183401\">https://doi.org/10.1145/3183399.3183401</a>.","ieee":"E. Bodden, “Self-adaptive Static Analysis,” in <i>Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results</i>, 2018, pp. 45–48, doi: <a href=\"https://doi.org/10.1145/3183399.3183401\">10.1145/3183399.3183401</a>."},"place":"New York, NY, USA","year":"2018","author":[{"id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_created":"2020-11-30T09:54:33Z","date_updated":"2022-01-06T06:54:29Z","publisher":"ACM","doi":"10.1145/3183399.3183401","title":"Self-adaptive Static Analysis","publication":"Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results","type":"conference","status":"public","department":[{"_id":"76"}],"user_id":"5786","series_title":"ICSE-NIER '18","_id":"20550","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"]},{"department":[{"_id":"76"}],"user_id":"5786","_id":"20551","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"publication":"International Conference for Software Engineering (ICSE), Tool Demonstrations Track","type":"conference","status":"public","date_created":"2020-11-30T09:55:20Z","author":[{"first_name":"Lisa","last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa"},{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"full_name":"Hill, Patrick","last_name":"Hill","first_name":"Patrick"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_updated":"2022-01-06T06:54:29Z","main_file_link":[{"url":"http://www.bodden.de/pubs/dkh+18visuflow.pdf"}],"title":"VISUFLOW, a Debugging Environment for Static Analyses","citation":{"mla":"Nguyen Quang Do, Lisa, et al. “VISUFLOW, a Debugging Environment for Static Analyses.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2018.","bibtex":"@inproceedings{Nguyen Quang Do_Krüger_Hill_Ali_Bodden_2018, title={VISUFLOW, a Debugging Environment for Static Analyses}, booktitle={International Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen Quang Do, Lisa and Krüger, Stefan and Hill, Patrick and Ali, Karim and Bodden, Eric}, year={2018} }","short":"L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, E. Bodden, in: International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2018.","apa":"Nguyen Quang Do, L., Krüger, S., Hill, P., Ali, K., &#38; Bodden, E. (2018). VISUFLOW, a Debugging Environment for Static Analyses. <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>.","ama":"Nguyen Quang Do L, Krüger S, Hill P, Ali K, Bodden E. VISUFLOW, a Debugging Environment for Static Analyses. In: <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>. ; 2018.","ieee":"L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, and E. Bodden, “VISUFLOW, a Debugging Environment for Static Analyses,” 2018.","chicago":"Nguyen Quang Do, Lisa, Stefan Krüger, Patrick Hill, Karim Ali, and Eric Bodden. “VISUFLOW, a Debugging Environment for Static Analyses.” In <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2018."},"year":"2018"},{"file_date_updated":"2018-11-02T13:51:05Z","language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE","CROSSING"],"ddc":["000"],"department":[{"_id":"76"}],"user_id":"477","_id":"5203","project":[{"_id":"1","name":"SFB 901"},{"_id":"3","name":"SFB 901 - Project Area B"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"status":"public","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":747259,"file_name":"ksa+18crysl.pdf","access_level":"closed","file_id":"5255","date_updated":"2018-11-02T13:51:05Z","creator":"ups","date_created":"2018-11-02T13:51:05Z"}],"publication":"European Conference on Object-Oriented Programming (ECOOP)","type":"conference","main_file_link":[{"url":"http://bodden.de/pubs/ksa+18crysl.pdf"}],"title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","author":[{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"full_name":"Späth, Johannes","last_name":"Späth","first_name":"Johannes"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"first_name":"Eric","full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"}],"date_created":"2018-10-31T12:37:29Z","date_updated":"2022-01-06T07:01:44Z","page":"10:1-10:27","citation":{"chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” In <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 10:1-10:27, 2018.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” in <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2018, pp. 10:1-10:27.","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In: <i>European Conference on Object-Oriented Programming (ECOOP)</i>. ; 2018:10:1-10:27.","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2018). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. In <i>European Conference on Object-Oriented Programming (ECOOP)</i> (pp. 10:1-10:27).","bibtex":"@inproceedings{Krüger_Späth_Ali_Bodden_Mezini_2018, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2018}, pages={10:1-10:27} }","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, in: European Conference on Object-Oriented Programming (ECOOP), 2018, pp. 10:1-10:27.","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2018, pp. 10:1-10:27."},"year":"2018","has_accepted_license":"1"},{"publisher":"Springer Berlin Heidelberg","date_updated":"2022-01-06T06:54:29Z","date_created":"2020-11-30T09:56:23Z","author":[{"first_name":"Christopher","last_name":"Gerking","full_name":"Gerking, Christopher"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"first_name":"Wilhelm","last_name":"Schäfer","full_name":"Schäfer, Wilhelm"}],"title":"Industrial Security by Design","doi":"10.1007/978-3-662-52903-4_8-1","publication_identifier":{"isbn":["978-3-662-52903-4"]},"place":"Berlin, Heidelberg","year":"2017","citation":{"short":"C. Gerking, E. Bodden, W. Schäfer, in: G.W. Maier, G. Engels, E. Steffen (Eds.), Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, Springer Berlin Heidelberg, Berlin, Heidelberg, 2017, pp. 1–24.","bibtex":"@inbook{Gerking_Bodden_Schäfer_2017, place={Berlin, Heidelberg}, title={Industrial Security by Design}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">10.1007/978-3-662-52903-4_8-1</a>}, booktitle={Handbuch Gestaltung digitaler und vernetzter Arbeitswelten}, publisher={Springer Berlin Heidelberg}, author={Gerking, Christopher and Bodden, Eric and Schäfer, Wilhelm}, editor={Maier, Günter W. and Engels, Gregor and Steffen, Eckhard}, year={2017}, pages={1–24} }","mla":"Gerking, Christopher, et al. “Industrial Security by Design.” <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>, edited by Günter W. Maier et al., Springer Berlin Heidelberg, 2017, pp. 1–24, doi:<a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">10.1007/978-3-662-52903-4_8-1</a>.","apa":"Gerking, C., Bodden, E., &#38; Schäfer, W. (2017). Industrial Security by Design. In G. W. Maier, G. Engels, &#38; E. Steffen (Eds.), <i>Handbuch Gestaltung digitaler und vernetzter Arbeitswelten</i> (pp. 1–24). Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>","ieee":"C. Gerking, E. Bodden, and W. Schäfer, “Industrial Security by Design,” in <i>Handbuch Gestaltung digitaler und vernetzter Arbeitswelten</i>, G. W. Maier, G. Engels, and E. Steffen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017, pp. 1–24.","chicago":"Gerking, Christopher, Eric Bodden, and Wilhelm Schäfer. “Industrial Security by Design.” In <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>, edited by Günter W. Maier, Gregor Engels, and Eckhard Steffen, 1–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. <a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>.","ama":"Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW, Engels G, Steffen E, eds. <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>. Springer Berlin Heidelberg; 2017:1-24. doi:<a href=\"https://doi.org/10.1007/978-3-662-52903-4_8-1\">10.1007/978-3-662-52903-4_8-1</a>"},"page":"1-24","_id":"20552","user_id":"5786","department":[{"_id":"76"}],"keyword":["ITSECWEBSITE"],"language":[{"iso":"eng"}],"type":"book_chapter","publication":"Handbuch Gestaltung digitaler und vernetzter Arbeitswelten","editor":[{"first_name":"Günter W.","last_name":"Maier","full_name":"Maier, Günter W."},{"last_name":"Engels","full_name":"Engels, Gregor","first_name":"Gregor"},{"first_name":"Eckhard","last_name":"Steffen","full_name":"Steffen, Eckhard"}],"abstract":[{"text":"Das Zukunftsszenario der Industrie 4.0 ist gepr{\\\"a}gt durch einen massiven Anstieg der unternehmens{\\\"u}bergreifenden Vernetzung. Um einer Bedrohung durch unautorisierte Weitergabe oder Sabotage vertraulicher Daten entgegenzuwirken, muss der Informationssicherheit bereits im Entwurf der cyber-physischen Produktionssysteme ein hoher Stellenwert einger{\\\"a}umt werden. Dieses Paradigma wird als Security by Design bezeichnet. {\\\"U}ber den gesamten Entstehungsprozess hinweg muss nachverfolgt werden k{\\\"o}nnen, ob die Systeme spezifische Anforderungen an die Informationssicherheit erf{\\\"u}llen und damit die Eigenschaft der Industrial Security gew{\\\"a}hrleisten. Dieser Beitrag stellt einen Entwurfsansatz zur Nachverfolgung der Informationssicherheit vor, der durch Integration softwaretechnischer Methoden in das Systems Engineering eine Entwicklung nach dem Paradigma Security by Design erm{\\\"o}glicht.","lang":"eng"}],"status":"public"},{"citation":{"ieee":"S. Krüger <i>et al.</i>, “CogniCrypt: Supporting Developers in using Cryptography,” 2017.","chicago":"Krüger, Stefan, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” In <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>, 2017.","ama":"Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using Cryptography. In: <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>. ; 2017.","apa":"Krüger, S., Nadi, S., Reif, M., Ali, K., Mezini, M., Bodden, E., Göpfert, F., Günther, F., Weinert, C., Demmler, D., &#38; Kamath, R. (2017). CogniCrypt: Supporting Developers in using Cryptography. <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>.","bibtex":"@inproceedings{Krüger_Nadi_Reif_Ali_Mezini_Bodden_Göpfert_Günther_Weinert_Demmler_et al._2017, title={CogniCrypt: Supporting Developers in using Cryptography}, booktitle={International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track}, author={Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and et al.}, year={2017} }","mla":"Krüger, Stefan, et al. “CogniCrypt: Supporting Developers in Using Cryptography.” <i>International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track</i>, 2017.","short":"S. Krüger, S. Nadi, M. Reif, K. Ali, M. Mezini, E. Bodden, F. Göpfert, F. Günther, C. Weinert, D. Demmler, R. Kamath, in: International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track, 2017."},"year":"2017","date_created":"2020-11-30T11:08:26Z","author":[{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"last_name":"Nadi","full_name":"Nadi, Sarah","first_name":"Sarah"},{"full_name":"Reif, Michael","last_name":"Reif","first_name":"Michael"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"first_name":"Mira","full_name":"Mezini, Mira","last_name":"Mezini"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"last_name":"Göpfert","full_name":"Göpfert, Florian","first_name":"Florian"},{"last_name":"Günther","full_name":"Günther, Felix","first_name":"Felix"},{"first_name":"Christian","full_name":"Weinert, Christian","last_name":"Weinert"},{"first_name":"Daniel","last_name":"Demmler","full_name":"Demmler, Daniel"},{"full_name":"Kamath, Ram","last_name":"Kamath","first_name":"Ram"}],"date_updated":"2022-01-06T06:54:30Z","main_file_link":[{"url":"http://bodden.de/pubs/knr+17cognicrypt.pdf"}],"title":"CogniCrypt: Supporting Developers in using Cryptography","publication":"International Conference on Automated Software Engineering (ASE 2017), Tool Demo Track","type":"conference","status":"public","department":[{"_id":"76"}],"user_id":"5786","_id":"20558","language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE","CROSSING"]},{"year":"2017","citation":{"short":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, in: International Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2017.","bibtex":"@inproceedings{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017, title={Cheetah: Just-in-Time Taint Analysis for Android Apps}, booktitle={International Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2017} }","mla":"Nguyen Quang Do, Lisa, et al. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2017.","apa":"Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill, E. (2017). Cheetah: Just-in-Time Taint Analysis for Android Apps. <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>.","ieee":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, “Cheetah: Just-in-Time Taint Analysis for Android Apps,” 2017.","chicago":"Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. “Cheetah: Just-in-Time Taint Analysis for Android Apps.” In <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2017.","ama":"Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Cheetah: Just-in-Time Taint Analysis for Android Apps. In: <i>International Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>. ; 2017."},"title":"Cheetah: Just-in-Time Taint Analysis for Android Apps","main_file_link":[{"url":"http://bodden.de/pubs/dal17cheetah.pdf"}],"date_updated":"2022-01-06T06:54:34Z","author":[{"first_name":"Lisa","last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"first_name":"Benjamin","last_name":"Livshits","full_name":"Livshits, Benjamin"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"first_name":"Justin","last_name":"Smith","full_name":"Smith, Justin"},{"first_name":"Emerson","full_name":"Murphy-Hill, Emerson","last_name":"Murphy-Hill"}],"date_created":"2020-12-14T11:51:44Z","status":"public","type":"conference","publication":"International Conference for Software Engineering (ICSE), Tool Demonstrations Track","keyword":["ATTRACT","ITSECWEBSITE"],"language":[{"iso":"eng"}],"_id":"20715","user_id":"5786","department":[{"_id":"76"}]},{"year":"2017","citation":{"apa":"Späth, J., Ali, K., &#38; Bodden, E. (2017). IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press.","bibtex":"@inproceedings{Späth_Ali_Bodden_2017, title={IDEal: Efficient and Precise Alias-aware Dataflow Analysis}, booktitle={2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)}, publisher={ACM Press}, author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2017} }","mla":"Späth, Johannes, et al. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, ACM Press, 2017.","short":"J. Späth, K. Ali, E. Bodden, in: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017.","chicago":"Späth, Johannes, Karim Ali, and Eric Bodden. “IDEal: Efficient and Precise Alias-Aware Dataflow Analysis.” In <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press, 2017.","ieee":"J. Späth, K. Ali, and E. Bodden, “IDEal: Efficient and Precise Alias-aware Dataflow Analysis,” in <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>, 2017.","ama":"Späth J, Ali K, Bodden E. IDEal: Efficient and Precise Alias-aware Dataflow Analysis. In: <i>2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press; 2017."},"has_accepted_license":"1","title":"IDEal: Efficient and Precise Alias-aware Dataflow Analysis","main_file_link":[{"url":" http://bodden.de/pubs/sab17ideal.pdf"}],"publisher":"ACM Press","date_updated":"2022-01-06T07:01:44Z","date_created":"2018-10-31T12:46:50Z","author":[{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"first_name":"Karim","last_name":"Ali","full_name":"Ali, Karim"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_id":"5273","access_level":"closed","file_name":"sab17ideal.pdf","file_size":1021251,"creator":"ups","date_created":"2018-11-02T14:28:13Z","date_updated":"2018-11-02T14:28:13Z"}],"publication":"2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH)","type":"conference","keyword":["ATTRACT","ITSECWEBSITE","CROSSING"],"ddc":["000"],"file_date_updated":"2018-11-02T14:28:13Z","language":[{"iso":"eng"}],"_id":"5204","project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"department":[{"_id":"76"}],"user_id":"477"},{"status":"public","type":"report","language":[{"iso":"eng"}],"keyword":["ITSECWEBSITE"],"user_id":"14972","department":[{"_id":"76"}],"_id":"20555","external_id":{"arxiv":["1710.00564"]},"citation":{"ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>.; 2017.","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>, 2017.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>. 2017.","apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2017). <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>.","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, CrySL: Validating Correct Usage of Cryptographic APIs, 2017.","mla":"Krüger, Stefan, et al. <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>. 2017.","bibtex":"@book{Krüger_Späth_Ali_Bodden_Mezini_2017, title={CrySL: Validating Correct Usage of Cryptographic APIs}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2017} }"},"year":"2017","main_file_link":[{"url":"https://arxiv.org/abs/1710.00564"}],"title":"CrySL: Validating Correct Usage of Cryptographic APIs","date_created":"2020-11-30T10:29:41Z","author":[{"first_name":"Stefan","last_name":"Krüger","full_name":"Krüger, Stefan"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric"},{"first_name":"Mira","full_name":"Mezini, Mira","last_name":"Mezini"}],"date_updated":"2026-02-19T14:39:50Z"},{"status":"public","type":"report","keyword":["ATTRACT","ITSECWEBSITE"],"language":[{"iso":"eng"}],"_id":"20717","user_id":"5786","department":[{"_id":"76"}],"year":"2016","citation":{"ama":"Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. <i>Just-in-Time Static Analysis</i>.; 2016. doi:<a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>","chicago":"Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, and Emerson Murphy-Hill. <i>Just-in-Time Static Analysis</i>, 2016. <a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>.","ieee":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill, <i>Just-in-Time Static Analysis</i>. 2016.","apa":"Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill, E. (2016). <i>Just-in-Time Static Analysis</i>. <a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>","short":"L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill, Just-in-Time Static Analysis, 2016.","bibtex":"@book{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2016, title={Just-in-Time Static Analysis}, DOI={<a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>}, author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2016} }","mla":"Nguyen Quang Do, Lisa, et al. <i>Just-in-Time Static Analysis</i>. 2016, doi:<a href=\"http://dx.doi.org/10.7939/DVN/10859\">http://dx.doi.org/10.7939/DVN/10859</a>."},"title":"Just-in-Time Static Analysis","main_file_link":[{"url":"http://bodden.de/pubs/dal16jit-tr.pdf"}],"doi":"http://dx.doi.org/10.7939/DVN/10859","date_updated":"2022-01-06T06:54:34Z","date_created":"2020-12-14T11:57:09Z","author":[{"first_name":"Lisa","last_name":"Nguyen Quang Do","full_name":"Nguyen Quang Do, Lisa"},{"full_name":"Ali, Karim","last_name":"Ali","first_name":"Karim"},{"last_name":"Livshits","full_name":"Livshits, Benjamin","first_name":"Benjamin"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"first_name":"Justin","last_name":"Smith","full_name":"Smith, Justin"},{"first_name":"Emerson","last_name":"Murphy-Hill","full_name":"Murphy-Hill, Emerson"}]},{"date_created":"2020-12-14T11:57:48Z","author":[{"full_name":"Rasthofer, Siegfried","last_name":"Rasthofer","first_name":"Siegfried"},{"first_name":"Steven","last_name":"Arzt","full_name":"Arzt, Steven"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric"},{"first_name":"Marc","last_name":"Miltenberger","full_name":"Miltenberger, Marc"}],"date_updated":"2022-01-06T06:54:34Z","doi":"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536","main_file_link":[{"url":"http://bodden.de/pubs/rabm16harvester.pdf"}],"title":"Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen","page":"718-722","citation":{"apa":"Rasthofer, S., Arzt, S., Bodden, E., &#38; Miltenberger, M. (2016). Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. <i>Datenschutz Und Datensicherheit</i>, 718–722. <a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>","bibtex":"@article{Rasthofer_Arzt_Bodden_Miltenberger_2016, title={Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen}, DOI={<a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>}, journal={Datenschutz und Datensicherheit}, author={Rasthofer, Siegfried and Arzt, Steven and Bodden, Eric and Miltenberger, Marc}, year={2016}, pages={718–722} }","short":"S. Rasthofer, S. Arzt, E. Bodden, M. Miltenberger, Datenschutz Und Datensicherheit (2016) 718–722.","mla":"Rasthofer, Siegfried, et al. “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.” <i>Datenschutz Und Datensicherheit</i>, 2016, pp. 718–22, doi:<a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.","ieee":"S. Rasthofer, S. Arzt, E. Bodden, and M. Miltenberger, “Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen,” <i>Datenschutz und Datensicherheit</i>, pp. 718–722, 2016, doi: <a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.","chicago":"Rasthofer, Siegfried, Steven Arzt, Eric Bodden, and Marc Miltenberger. “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.” <i>Datenschutz Und Datensicherheit</i>, 2016, 718–22. <a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.","ama":"Rasthofer S, Arzt S, Bodden E, Miltenberger M. Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. <i>Datenschutz und Datensicherheit</i>. Published online 2016:718-722. doi:<a href=\"https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536\">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>"},"year":"2016","department":[{"_id":"76"}],"user_id":"5786","_id":"20718","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"publication":"Datenschutz und Datensicherheit","type":"journal_article","status":"public"},{"page":"779-790","citation":{"ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>. CCS ’16. ; 2016:779-790. doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>","ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–790, doi: <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–90. CCS ’16, 2016. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }","mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–90, doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.","apa":"Holzinger, P., Triller, S., Bartel, A., &#38; Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–790. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>"},"year":"2016","publication_identifier":{"isbn":["978-1-4503-4139-4"]},"doi":"http://doi.acm.org/10.1145/2976749.2978361","title":"An In-Depth Study of More Than Ten Years of Java Exploitation","author":[{"full_name":"Holzinger, Philipp","last_name":"Holzinger","first_name":"Philipp"},{"last_name":"Triller","full_name":"Triller, Stefan","first_name":"Stefan"},{"last_name":"Bartel","full_name":"Bartel, Alexandre","first_name":"Alexandre"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"date_created":"2020-12-14T11:58:33Z","date_updated":"2022-01-06T06:54:34Z","status":"public","publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","language":[{"iso":"eng"}],"keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"],"department":[{"_id":"76"}],"series_title":"CCS '16","user_id":"5786","_id":"20719"},{"publication":"Network and Distributed System Security Symposium (NDSS)","type":"conference","status":"public","department":[{"_id":"76"}],"user_id":"5786","_id":"20727","language":[{"iso":"eng"}],"keyword":["ATTRACT","ITSECWEBSITE"],"citation":{"ieee":"S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden, “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques,” 2016.","chicago":"Rasthofer, Siegfried, Steven Arzt, Marc Miltenberger, and Eric Bodden. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” In <i>Network and Distributed System Security Symposium (NDSS)</i>, 2016.","ama":"Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. In: <i>Network and Distributed System Security Symposium (NDSS)</i>. ; 2016.","apa":"Rasthofer, S., Arzt, S., Miltenberger, M., &#38; Bodden, E. (2016). Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques. <i>Network and Distributed System Security Symposium (NDSS)</i>.","short":"S. Rasthofer, S. Arzt, M. Miltenberger, E. Bodden, in: Network and Distributed System Security Symposium (NDSS), 2016.","bibtex":"@inproceedings{Rasthofer_Arzt_Miltenberger_Bodden_2016, title={Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques}, booktitle={Network and Distributed System Security Symposium (NDSS)}, author={Rasthofer, Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric}, year={2016} }","mla":"Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.” <i>Network and Distributed System Security Symposium (NDSS)</i>, 2016."},"year":"2016","date_created":"2020-12-14T14:21:41Z","author":[{"last_name":"Rasthofer","full_name":"Rasthofer, Siegfried","first_name":"Siegfried"},{"first_name":"Steven","last_name":"Arzt","full_name":"Arzt, Steven"},{"full_name":"Miltenberger, Marc","last_name":"Miltenberger","first_name":"Marc"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"date_updated":"2022-01-06T06:54:34Z","main_file_link":[{"url":"http://www.bodden.de/pubs/ssme16harvesting.pdf"}],"title":"Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques"},{"department":[{"_id":"76"}],"user_id":"5786","_id":"20728","language":[{"iso":"eng"}],"keyword":["CROSSING","ITSECWEBSITE"],"publication":"International Conference for Software Engineering (ICSE)","type":"conference","status":"public","author":[{"last_name":"Nadi","full_name":"Nadi, Sarah","first_name":"Sarah"},{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"first_name":"Mira","full_name":"Mezini, Mira","last_name":"Mezini"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"}],"date_created":"2020-12-14T14:22:36Z","date_updated":"2022-01-06T06:54:34Z","main_file_link":[{"url":"http://www.bodden.de/pubs/nkm+16jumping.pdf"}],"title":"Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?","page":"935-946","citation":{"ieee":"S. Nadi, S. Krüger, M. Mezini, and E. Bodden, “Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?,” in <i>International Conference for Software Engineering (ICSE)</i>, 2016, pp. 935–946.","chicago":"Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” In <i>International Conference for Software Engineering (ICSE)</i>, 935–46, 2016.","ama":"Nadi S, Krüger S, Mezini M, Bodden E. Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? In: <i>International Conference for Software Engineering (ICSE)</i>. ; 2016:935-946.","apa":"Nadi, S., Krüger, S., Mezini, M., &#38; Bodden, E. (2016). Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs? <i>International Conference for Software Engineering (ICSE)</i>, 935–946.","bibtex":"@inproceedings{Nadi_Krüger_Mezini_Bodden_2016, title={Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?}, booktitle={International Conference for Software Engineering (ICSE)}, author={Nadi, Sarah and Krüger, Stefan and Mezini, Mira and Bodden, Eric}, year={2016}, pages={935–946} }","short":"S. Nadi, S. Krüger, M. Mezini, E. Bodden, in: International Conference for Software Engineering (ICSE), 2016, pp. 935–946.","mla":"Nadi, Sarah, et al. “Jumping Through Hoops: Why Do Java Developers Struggle With Cryptography APIs?” <i>International Conference for Software Engineering (ICSE)</i>, 2016, pp. 935–46."},"year":"2016"},{"year":"2016","citation":{"short":"S. Arzt, E. Bodden, in: International Conference for Software Engineering (ICSE), 2016.","mla":"Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework.” <i>International Conference for Software Engineering (ICSE)</i>, 2016.","bibtex":"@inproceedings{Arzt_Bodden_2016, title={StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework}, booktitle={International Conference for Software Engineering (ICSE)}, author={Arzt, Steven and Bodden, Eric}, year={2016} }","apa":"Arzt, S., &#38; Bodden, E. (2016). StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. <i>International Conference for Software Engineering (ICSE)</i>.","ieee":"S. Arzt and E. Bodden, “StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework,” 2016.","chicago":"Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise Data-Flow Summaries for the Android Framework.” In <i>International Conference for Software Engineering (ICSE)</i>, 2016.","ama":"Arzt S, Bodden E. StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework. In: <i>International Conference for Software Engineering (ICSE)</i>. ; 2016."},"title":"StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework","main_file_link":[{"url":"http://www.bodden.de/pubs/ab16stubdroid.pdf"}],"date_updated":"2022-01-06T06:54:34Z","author":[{"last_name":"Arzt","full_name":"Arzt, Steven","first_name":"Steven"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-12-14T14:23:29Z","status":"public","type":"conference","publication":"International Conference for Software Engineering (ICSE)","keyword":["ITSECWEBSITE"],"language":[{"iso":"eng"}],"_id":"20729","user_id":"5786","department":[{"_id":"76"}]},{"has_accepted_license":"1","citation":{"apa":"Späth, J., Nguyen Quang Do, L., Ali, K., &#38; Bodden, E. (2016). Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java. In <i>European Conference on Object-Oriented Programming (ECOOP)</i>.","bibtex":"@inproceedings{Späth_Nguyen Quang Do_Ali_Bodden_2016, title={Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java}, booktitle={European Conference on Object-Oriented Programming (ECOOP)}, author={Späth, Johannes and Nguyen Quang Do, Lisa and Ali, Karim and Bodden, Eric}, year={2016} }","mla":"Späth, Johannes, et al. “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.” <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2016.","short":"J. Späth, L. Nguyen Quang Do, K. Ali, E. Bodden, in: European Conference on Object-Oriented Programming (ECOOP), 2016.","ama":"Späth J, Nguyen Quang Do L, Ali K, Bodden E. Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java. In: <i>European Conference on Object-Oriented Programming (ECOOP)</i>. ; 2016.","chicago":"Späth, Johannes, Lisa Nguyen Quang Do, Karim Ali, and Eric Bodden. “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.” In <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2016.","ieee":"J. Späth, L. Nguyen Quang Do, K. Ali, and E. Bodden, “Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java,” in <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 2016."},"year":"2016","author":[{"first_name":"Johannes","last_name":"Späth","full_name":"Späth, Johannes"},{"full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do","first_name":"Lisa"},{"first_name":"Karim","full_name":"Ali, Karim","last_name":"Ali"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"}],"date_created":"2018-10-31T12:51:26Z","date_updated":"2022-01-06T07:01:45Z","main_file_link":[{"url":"http://www.bodden.de/pubs/sna+16boomerang.pdf"}],"title":"Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java","type":"conference","publication":"European Conference on Object-Oriented Programming (ECOOP)","file":[{"date_updated":"2018-11-02T14:13:19Z","date_created":"2018-11-02T14:13:19Z","creator":"ups","file_size":1921617,"access_level":"closed","file_id":"5265","file_name":"sna+16boomerang.pdf","content_type":"application/pdf","success":1,"relation":"main_file"}],"status":"public","user_id":"477","department":[{"_id":"76"}],"project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"name":"SFB 901 - Subproject B4","_id":"12"}],"_id":"5205","language":[{"iso":"eng"}],"file_date_updated":"2018-11-02T14:13:19Z","ddc":["000"],"keyword":["ATTRACT","ITSECWEBSITE"]},{"status":"public","file":[{"date_updated":"2018-11-02T14:10:22Z","creator":"ups","date_created":"2018-11-02T14:10:22Z","file_size":206378,"file_name":"lbb+15iccta.pdf","access_level":"closed","file_id":"5263","content_type":"application/pdf","success":1,"relation":"main_file"}],"publication":"2015 International Conference on Software Engineering (ICSE)","type":"conference","file_date_updated":"2018-11-02T14:10:22Z","language":[{"iso":"eng"}],"extern":"1","keyword":["CROSSING","ATTRACT","ITSECWEBSITE"],"ddc":["000"],"department":[{"_id":"76"}],"user_id":"477","_id":"5207","project":[{"name":"SFB 901","_id":"1"},{"_id":"3","name":"SFB 901 - Project Area B"},{"_id":"12","name":"SFB 901 - Subproject B4"}],"page":"280-291","citation":{"bibtex":"@inproceedings{Li_Bartel_Bissyande_Klein_Le Traon_Arzt_Rasthofer_Bodden_Octeau_McDaniel_2015, title={IccTA: Detecting Inter-Component Privacy Leaks in Android Apps}, booktitle={2015 International Conference on Software Engineering (ICSE)}, author={Li, Li and Bartel, Alexandre and Bissyande, Tegawende F. and Klein, Jacques and Le Traon, Yves and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Octeau, Damien and McDaniel, Patrick}, year={2015}, pages={280–291} }","short":"L. Li, A. Bartel, T.F. Bissyande, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer, E. Bodden, D. Octeau, P. McDaniel, in: 2015 International Conference on Software Engineering (ICSE), 2015, pp. 280–291.","mla":"Li, Li, et al. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” <i>2015 International Conference on Software Engineering (ICSE)</i>, 2015, pp. 280–91.","apa":"Li, L., Bartel, A., Bissyande, T. F., Klein, J., Le Traon, Y., Arzt, S., … McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In <i>2015 International Conference on Software Engineering (ICSE)</i> (pp. 280–291).","ama":"Li L, Bartel A, Bissyande TF, et al. IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. In: <i>2015 International Conference on Software Engineering (ICSE)</i>. ; 2015:280-291.","ieee":"L. Li <i>et al.</i>, “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps,” in <i>2015 International Conference on Software Engineering (ICSE)</i>, 2015, pp. 280–291.","chicago":"Li, Li, Alexandre Bartel, Tegawende F. Bissyande, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” In <i>2015 International Conference on Software Engineering (ICSE)</i>, 280–91, 2015."},"year":"2015","publication_identifier":{"isbn":["978-1-4799-1934-5"]},"has_accepted_license":"1","main_file_link":[{"url":"http://www.bodden.de/pubs/lbb+15iccta.pdf"}],"title":"IccTA: Detecting Inter-Component Privacy Leaks in Android Apps","author":[{"last_name":"Li","full_name":"Li, Li","first_name":"Li"},{"first_name":"Alexandre","full_name":"Bartel, Alexandre","last_name":"Bartel"},{"last_name":"Bissyande","full_name":"Bissyande, Tegawende F.","first_name":"Tegawende F."},{"first_name":"Jacques","last_name":"Klein","full_name":"Klein, Jacques"},{"first_name":"Yves","last_name":"Le Traon","full_name":"Le Traon, Yves"},{"full_name":"Arzt, Steven","last_name":"Arzt","first_name":"Steven"},{"full_name":"Rasthofer, Siegfried","last_name":"Rasthofer","first_name":"Siegfried"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647"},{"first_name":"Damien","last_name":"Octeau","full_name":"Octeau, Damien"},{"first_name":"Patrick","full_name":"McDaniel, Patrick","last_name":"McDaniel"}],"date_created":"2018-10-31T12:59:44Z","date_updated":"2022-01-06T07:01:46Z"}]
