---
_id: '20538'
author:
- first_name: Sigmund
  full_name: Albert Gorski Iii, Sigmund
  last_name: Albert Gorski Iii
- first_name: Benjamin
  full_name: Andow, Benjamin
  last_name: Andow
- first_name: Adwait
  full_name: Nadkarni, Adwait
  last_name: Nadkarni
- first_name: Sunil
  full_name: Manandhar, Sunil
  last_name: Manandhar
- first_name: William
  full_name: Enck, William
  last_name: Enck
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Alexandre
  full_name: Bartel, Alexandre
  last_name: Bartel
citation:
  ama: 'Albert Gorski Iii S, Andow B, Nadkarni A, et al. ACMiner: Extraction and Analysis
    of Authorization Checks in Android’s Middleware. In: <i>ACM Conference on Data
    and Application Security and Privacy (CODASPY 2019)</i>. ; 2019.'
  apa: 'Albert Gorski Iii, S., Andow, B., Nadkarni, A., Manandhar, S., Enck, W., Bodden,
    E., &#38; Bartel, A. (2019). ACMiner: Extraction and Analysis of Authorization
    Checks in Android’s Middleware. <i>ACM Conference on Data and Application Security
    and Privacy (CODASPY 2019)</i>.'
  bibtex: '@inproceedings{Albert Gorski Iii_Andow_Nadkarni_Manandhar_Enck_Bodden_Bartel_2019,
    title={ACMiner: Extraction and Analysis of Authorization Checks in Android’s Middleware},
    booktitle={ACM Conference on Data and Application Security and Privacy (CODASPY
    2019)}, author={Albert Gorski Iii, Sigmund and Andow, Benjamin and Nadkarni, Adwait
    and Manandhar, Sunil and Enck, William and Bodden, Eric and Bartel, Alexandre},
    year={2019} }'
  chicago: 'Albert Gorski Iii, Sigmund, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar,
    William Enck, Eric Bodden, and Alexandre Bartel. “ACMiner: Extraction and Analysis
    of Authorization Checks in Android’s Middleware.” In <i>ACM Conference on Data
    and Application Security and Privacy (CODASPY 2019)</i>, 2019.'
  ieee: 'S. Albert Gorski Iii <i>et al.</i>, “ACMiner: Extraction and Analysis of
    Authorization Checks in Android’s Middleware,” 2019.'
  mla: 'Albert Gorski Iii, Sigmund, et al. “ACMiner: Extraction and Analysis of Authorization
    Checks in Android’s Middleware.” <i>ACM Conference on Data and Application Security
    and Privacy (CODASPY 2019)</i>, 2019.'
  short: 'S. Albert Gorski Iii, B. Andow, A. Nadkarni, S. Manandhar, W. Enck, E. Bodden,
    A. Bartel, in: ACM Conference on Data and Application Security and Privacy (CODASPY
    2019), 2019.'
date_created: 2020-11-27T10:52:59Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
keyword:
- ITSECWEBSITE
- CROSSING
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/gan19acminer.pdf
publication: ACM Conference on Data and Application Security and Privacy (CODASPY
  2019)
status: public
title: 'ACMiner: Extraction and Analysis of Authorization Checks in Android''s Middleware'
type: conference
user_id: '5786'
year: '2019'
...
---
_id: '20539'
author:
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: Späth J, Ali K, Bodden E. Context-, Flow-, and Field-sensitive Data-flow Analysis
    Using Synchronized Pushdown Systems. <i>Proceedings of the ACM SIGPLAN Symposium
    on Principles of Programming Languages</i>. 2019;3(POPL):48:1-48:29. doi:<a href="https://doi.org/10.1145/3290361">10.1145/3290361</a>
  apa: Späth, J., Ali, K., &#38; Bodden, E. (2019). Context-, Flow-, and Field-sensitive
    Data-flow Analysis Using Synchronized Pushdown Systems. <i>Proceedings of the
    ACM SIGPLAN Symposium on Principles of Programming Languages</i>, <i>3</i>(POPL),
    48:1-48:29. <a href="https://doi.org/10.1145/3290361">https://doi.org/10.1145/3290361</a>
  bibtex: '@article{Späth_Ali_Bodden_2019, title={Context-, Flow-, and Field-sensitive
    Data-flow Analysis Using Synchronized Pushdown Systems}, volume={3}, DOI={<a href="https://doi.org/10.1145/3290361">10.1145/3290361</a>},
    number={POPL}, journal={Proceedings of the ACM SIGPLAN Symposium on Principles
    of Programming Languages}, publisher={ACM}, author={Späth, Johannes and Ali, Karim
    and Bodden, Eric}, year={2019}, pages={48:1-48:29} }'
  chicago: 'Späth, Johannes, Karim Ali, and Eric Bodden. “Context-, Flow-, and Field-Sensitive
    Data-Flow Analysis Using Synchronized Pushdown Systems.” <i>Proceedings of the
    ACM SIGPLAN Symposium on Principles of Programming Languages</i> 3, no. POPL (2019):
    48:1-48:29. <a href="https://doi.org/10.1145/3290361">https://doi.org/10.1145/3290361</a>.'
  ieee: 'J. Späth, K. Ali, and E. Bodden, “Context-, Flow-, and Field-sensitive Data-flow
    Analysis Using Synchronized Pushdown Systems,” <i>Proceedings of the ACM SIGPLAN
    Symposium on Principles of Programming Languages</i>, vol. 3, no. POPL, p. 48:1-48:29,
    2019, doi: <a href="https://doi.org/10.1145/3290361">10.1145/3290361</a>.'
  mla: Späth, Johannes, et al. “Context-, Flow-, and Field-Sensitive Data-Flow Analysis
    Using Synchronized Pushdown Systems.” <i>Proceedings of the ACM SIGPLAN Symposium
    on Principles of Programming Languages</i>, vol. 3, no. POPL, ACM, 2019, p. 48:1-48:29,
    doi:<a href="https://doi.org/10.1145/3290361">10.1145/3290361</a>.
  short: J. Späth, K. Ali, E. Bodden, Proceedings of the ACM SIGPLAN Symposium on
    Principles of Programming Languages 3 (2019) 48:1-48:29.
date_created: 2020-11-27T10:53:57Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: 10.1145/3290361
intvolume: '         3'
issue: POPL
keyword:
- ATTRACT
- ITSECWEBSITE
- CROSSING
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/sab19context.pdf
page: 48:1-48:29
publication: Proceedings of the ACM SIGPLAN Symposium on Principles of Programming
  Languages
publication_identifier:
  issn:
  - 2475-1421
publisher: ACM
status: public
title: Context-, Flow-, and Field-sensitive Data-flow Analysis Using Synchronized
  Pushdown Systems
type: journal_article
user_id: '5786'
volume: 3
year: '2019'
...
---
_id: '20548'
author:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Bodden E. The Secret Sauce in Efficient and Precise Static Analysis: The Beauty
    of Distributive, Summary-based Static Analyses (and How to Master Them). In: <i>ACM
    SIGPLAN International Workshop on the State Of the Art in Java Program Analysis
    (SOAP 2018)</i>. ISSTA ’18. ACM; 2018:85-93. doi:<a href="https://doi.org/10.1145/3236454.3236500">10.1145/3236454.3236500</a>'
  apa: 'Bodden, E. (2018). The Secret Sauce in Efficient and Precise Static Analysis:
    The Beauty of Distributive, Summary-based Static Analyses (and How to Master Them).
    <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program
    Analysis (SOAP 2018)</i>, 85–93. <a href="https://doi.org/10.1145/3236454.3236500">https://doi.org/10.1145/3236454.3236500</a>'
  bibtex: '@inproceedings{Bodden_2018, place={New York, NY, USA}, series={ISSTA ’18},
    title={The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of
    Distributive, Summary-based Static Analyses (and How to Master Them)}, DOI={<a
    href="https://doi.org/10.1145/3236454.3236500">10.1145/3236454.3236500</a>}, booktitle={ACM
    SIGPLAN International Workshop on the State Of the Art in Java Program Analysis
    (SOAP 2018)}, publisher={ACM}, author={Bodden, Eric}, year={2018}, pages={85–93},
    collection={ISSTA ’18} }'
  chicago: 'Bodden, Eric. “The Secret Sauce in Efficient and Precise Static Analysis:
    The Beauty of Distributive, Summary-Based Static Analyses (and How to Master Them).”
    In <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program
    Analysis (SOAP 2018)</i>, 85–93. ISSTA ’18. New York, NY, USA: ACM, 2018. <a href="https://doi.org/10.1145/3236454.3236500">https://doi.org/10.1145/3236454.3236500</a>.'
  ieee: 'E. Bodden, “The Secret Sauce in Efficient and Precise Static Analysis: The
    Beauty of Distributive, Summary-based Static Analyses (and How to Master Them),”
    in <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program
    Analysis (SOAP 2018)</i>, 2018, pp. 85–93, doi: <a href="https://doi.org/10.1145/3236454.3236500">10.1145/3236454.3236500</a>.'
  mla: 'Bodden, Eric. “The Secret Sauce in Efficient and Precise Static Analysis:
    The Beauty of Distributive, Summary-Based Static Analyses (and How to Master Them).”
    <i>ACM SIGPLAN International Workshop on the State Of the Art in Java Program
    Analysis (SOAP 2018)</i>, ACM, 2018, pp. 85–93, doi:<a href="https://doi.org/10.1145/3236454.3236500">10.1145/3236454.3236500</a>.'
  short: 'E. Bodden, in: ACM SIGPLAN International Workshop on the State Of the Art
    in Java Program Analysis (SOAP 2018), ACM, New York, NY, USA, 2018, pp. 85–93.'
date_created: 2020-11-30T09:51:05Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: 10.1145/3236454.3236500
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/bodden18secret.pdf
page: 85-93
place: New York, NY, USA
publication: ACM SIGPLAN International Workshop on the State Of the Art in Java Program
  Analysis (SOAP 2018)
publication_identifier:
  isbn:
  - 978-1-4503-5939-9
publisher: ACM
series_title: ISSTA '18
status: public
title: 'The Secret Sauce in Efficient and Precise Static Analysis: The Beauty of Distributive,
  Summary-based Static Analyses (and How to Master Them)'
type: conference
user_id: '5786'
year: '2018'
...
---
_id: '20549'
author:
- first_name: Johannes
  full_name: Geismann, Johannes
  id: '20063'
  last_name: Geismann
  orcid: https://orcid.org/0000-0003-2015-2047
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Geismann J, Gerking C, Bodden E. Towards Ensuring Security by Design in Cyber-Physical
    Systems Engineering Processes. In: <i>International Conference on Software and
    System Processes (ICSSP)</i>. ; 2018.'
  apa: Geismann, J., Gerking, C., &#38; Bodden, E. (2018). Towards Ensuring Security
    by Design in Cyber-Physical Systems Engineering Processes. <i>International Conference
    on Software and System Processes (ICSSP)</i>.
  bibtex: '@inproceedings{Geismann_Gerking_Bodden_2018, title={Towards Ensuring Security
    by Design in Cyber-Physical Systems Engineering Processes}, booktitle={International
    Conference on Software and System Processes (ICSSP)}, author={Geismann, Johannes
    and Gerking, Christopher and Bodden, Eric}, year={2018} }'
  chicago: Geismann, Johannes, Christopher Gerking, and Eric Bodden. “Towards Ensuring
    Security by Design in Cyber-Physical Systems Engineering Processes.” In <i>International
    Conference on Software and System Processes (ICSSP)</i>, 2018.
  ieee: J. Geismann, C. Gerking, and E. Bodden, “Towards Ensuring Security by Design
    in Cyber-Physical Systems Engineering Processes,” 2018.
  mla: Geismann, Johannes, et al. “Towards Ensuring Security by Design in Cyber-Physical
    Systems Engineering Processes.” <i>International Conference on Software and System
    Processes (ICSSP)</i>, 2018.
  short: 'J. Geismann, C. Gerking, E. Bodden, in: International Conference on Software
    and System Processes (ICSSP), 2018.'
date_created: 2020-11-30T09:52:21Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
keyword:
- ITSECWEBSITE
language:
- iso: eng
publication: International Conference on Software and System Processes (ICSSP)
related_material:
  link:
  - relation: confirmation
    url: http://bodden.de/pubs/ggb18towards.pdf
status: public
title: Towards Ensuring Security by Design in Cyber-Physical Systems Engineering Processes
type: conference
user_id: '5786'
year: '2018'
...
---
_id: '20550'
author:
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Bodden E. Self-adaptive Static Analysis. In: <i>Proceedings of the 40th International
    Conference on Software Engineering: New Ideas and Emerging Results</i>. ICSE-NIER
    ’18. ACM; 2018:45-48. doi:<a href="https://doi.org/10.1145/3183399.3183401">10.1145/3183399.3183401</a>'
  apa: 'Bodden, E. (2018). Self-adaptive Static Analysis. <i>Proceedings of the 40th
    International Conference on Software Engineering: New Ideas and Emerging Results</i>,
    45–48. <a href="https://doi.org/10.1145/3183399.3183401">https://doi.org/10.1145/3183399.3183401</a>'
  bibtex: '@inproceedings{Bodden_2018, place={New York, NY, USA}, series={ICSE-NIER
    ’18}, title={Self-adaptive Static Analysis}, DOI={<a href="https://doi.org/10.1145/3183399.3183401">10.1145/3183399.3183401</a>},
    booktitle={Proceedings of the 40th International Conference on Software Engineering:
    New Ideas and Emerging Results}, publisher={ACM}, author={Bodden, Eric}, year={2018},
    pages={45–48}, collection={ICSE-NIER ’18} }'
  chicago: 'Bodden, Eric. “Self-Adaptive Static Analysis.” In <i>Proceedings of the
    40th International Conference on Software Engineering: New Ideas and Emerging
    Results</i>, 45–48. ICSE-NIER ’18. New York, NY, USA: ACM, 2018. <a href="https://doi.org/10.1145/3183399.3183401">https://doi.org/10.1145/3183399.3183401</a>.'
  ieee: 'E. Bodden, “Self-adaptive Static Analysis,” in <i>Proceedings of the 40th
    International Conference on Software Engineering: New Ideas and Emerging Results</i>,
    2018, pp. 45–48, doi: <a href="https://doi.org/10.1145/3183399.3183401">10.1145/3183399.3183401</a>.'
  mla: 'Bodden, Eric. “Self-Adaptive Static Analysis.” <i>Proceedings of the 40th
    International Conference on Software Engineering: New Ideas and Emerging Results</i>,
    ACM, 2018, pp. 45–48, doi:<a href="https://doi.org/10.1145/3183399.3183401">10.1145/3183399.3183401</a>.'
  short: 'E. Bodden, in: Proceedings of the 40th International Conference on Software
    Engineering: New Ideas and Emerging Results, ACM, New York, NY, USA, 2018, pp.
    45–48.'
date_created: 2020-11-30T09:54:33Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: 10.1145/3183399.3183401
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
page: 45-48
place: New York, NY, USA
publication: 'Proceedings of the 40th International Conference on Software Engineering:
  New Ideas and Emerging Results'
publication_identifier:
  isbn:
  - 978-1-4503-5662-6
publisher: ACM
related_material:
  link:
  - relation: confirmation
    url: http://bodden.de/pubs/bodden18selfadaptive.pdf
series_title: ICSE-NIER '18
status: public
title: Self-adaptive Static Analysis
type: conference
user_id: '5786'
year: '2018'
...
---
_id: '20551'
author:
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Patrick
  full_name: Hill, Patrick
  last_name: Hill
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Nguyen Quang Do L, Krüger S, Hill P, Ali K, Bodden E. VISUFLOW, a Debugging
    Environment for Static Analyses. In: <i>International Conference for Software
    Engineering (ICSE), Tool Demonstrations Track</i>. ; 2018.'
  apa: Nguyen Quang Do, L., Krüger, S., Hill, P., Ali, K., &#38; Bodden, E. (2018).
    VISUFLOW, a Debugging Environment for Static Analyses. <i>International Conference
    for Software Engineering (ICSE), Tool Demonstrations Track</i>.
  bibtex: '@inproceedings{Nguyen Quang Do_Krüger_Hill_Ali_Bodden_2018, title={VISUFLOW,
    a Debugging Environment for Static Analyses}, booktitle={International Conference
    for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen Quang
    Do, Lisa and Krüger, Stefan and Hill, Patrick and Ali, Karim and Bodden, Eric},
    year={2018} }'
  chicago: Nguyen Quang Do, Lisa, Stefan Krüger, Patrick Hill, Karim Ali, and Eric
    Bodden. “VISUFLOW, a Debugging Environment for Static Analyses.” In <i>International
    Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>, 2018.
  ieee: L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, and E. Bodden, “VISUFLOW,
    a Debugging Environment for Static Analyses,” 2018.
  mla: Nguyen Quang Do, Lisa, et al. “VISUFLOW, a Debugging Environment for Static
    Analyses.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track</i>, 2018.
  short: 'L. Nguyen Quang Do, S. Krüger, P. Hill, K. Ali, E. Bodden, in: International
    Conference for Software Engineering (ICSE), Tool Demonstrations Track, 2018.'
date_created: 2020-11-30T09:55:20Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/dkh+18visuflow.pdf
publication: International Conference for Software Engineering (ICSE), Tool Demonstrations
  Track
status: public
title: VISUFLOW, a Debugging Environment for Static Analyses
type: conference
user_id: '5786'
year: '2018'
...
---
_id: '5203'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
citation:
  ama: 'Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach
    to Validating the Correct Usage of Cryptographic APIs. In: <i>European Conference
    on Object-Oriented Programming (ECOOP)</i>. ; 2018:10:1-10:27.'
  apa: 'Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2018). CrySL:
    An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
    In <i>European Conference on Object-Oriented Programming (ECOOP)</i> (pp. 10:1-10:27).'
  bibtex: '@inproceedings{Krüger_Späth_Ali_Bodden_Mezini_2018, title={CrySL: An Extensible
    Approach to Validating the Correct Usage of Cryptographic APIs}, booktitle={European
    Conference on Object-Oriented Programming (ECOOP)}, author={Krüger, Stefan and
    Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2018},
    pages={10:1-10:27} }'
  chicago: 'Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini.
    “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic
    APIs.” In <i>European Conference on Object-Oriented Programming (ECOOP)</i>, 10:1-10:27,
    2018.'
  ieee: 'S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible
    Approach to Validating the Correct Usage of Cryptographic APIs,” in <i>European
    Conference on Object-Oriented Programming (ECOOP)</i>, 2018, pp. 10:1-10:27.'
  mla: 'Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct
    Usage of Cryptographic APIs.” <i>European Conference on Object-Oriented Programming
    (ECOOP)</i>, 2018, pp. 10:1-10:27.'
  short: 'S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, in: European Conference
    on Object-Oriented Programming (ECOOP), 2018, pp. 10:1-10:27.'
date_created: 2018-10-31T12:37:29Z
date_updated: 2022-01-06T07:01:44Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T13:51:05Z
  date_updated: 2018-11-02T13:51:05Z
  file_id: '5255'
  file_name: ksa+18crysl.pdf
  file_size: 747259
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T13:51:05Z
has_accepted_license: '1'
keyword:
- ITSECWEBSITE
- CROSSING
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/ksa+18crysl.pdf
page: 10:1-10:27
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publication: European Conference on Object-Oriented Programming (ECOOP)
status: public
title: 'CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic
  APIs'
type: conference
user_id: '477'
year: '2018'
...
---
_id: '20552'
abstract:
- lang: eng
  text: Das Zukunftsszenario der Industrie 4.0 ist gepr{\"a}gt durch einen massiven
    Anstieg der unternehmens{\"u}bergreifenden Vernetzung. Um einer Bedrohung durch
    unautorisierte Weitergabe oder Sabotage vertraulicher Daten entgegenzuwirken,
    muss der Informationssicherheit bereits im Entwurf der cyber-physischen Produktionssysteme
    ein hoher Stellenwert einger{\"a}umt werden. Dieses Paradigma wird als Security
    by Design bezeichnet. {\"U}ber den gesamten Entstehungsprozess hinweg muss nachverfolgt
    werden k{\"o}nnen, ob die Systeme spezifische Anforderungen an die Informationssicherheit
    erf{\"u}llen und damit die Eigenschaft der Industrial Security gew{\"a}hrleisten.
    Dieser Beitrag stellt einen Entwurfsansatz zur Nachverfolgung der Informationssicherheit
    vor, der durch Integration softwaretechnischer Methoden in das Systems Engineering
    eine Entwicklung nach dem Paradigma Security by Design erm{\"o}glicht.
author:
- first_name: Christopher
  full_name: Gerking, Christopher
  last_name: Gerking
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Wilhelm
  full_name: Schäfer, Wilhelm
  last_name: Schäfer
citation:
  ama: 'Gerking C, Bodden E, Schäfer W. Industrial Security by Design. In: Maier GW,
    Engels G, Steffen E, eds. <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>.
    Springer Berlin Heidelberg; 2017:1-24. doi:<a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">10.1007/978-3-662-52903-4_8-1</a>'
  apa: Gerking, C., Bodden, E., &#38; Schäfer, W. (2017). Industrial Security by Design.
    In G. W. Maier, G. Engels, &#38; E. Steffen (Eds.), <i>Handbuch Gestaltung digitaler
    und vernetzter Arbeitswelten</i> (pp. 1–24). Springer Berlin Heidelberg. <a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>
  bibtex: '@inbook{Gerking_Bodden_Schäfer_2017, place={Berlin, Heidelberg}, title={Industrial
    Security by Design}, DOI={<a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">10.1007/978-3-662-52903-4_8-1</a>},
    booktitle={Handbuch Gestaltung digitaler und vernetzter Arbeitswelten}, publisher={Springer
    Berlin Heidelberg}, author={Gerking, Christopher and Bodden, Eric and Schäfer,
    Wilhelm}, editor={Maier, Günter W. and Engels, Gregor and Steffen, Eckhard}, year={2017},
    pages={1–24} }'
  chicago: 'Gerking, Christopher, Eric Bodden, and Wilhelm Schäfer. “Industrial Security
    by Design.” In <i>Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten</i>,
    edited by Günter W. Maier, Gregor Engels, and Eckhard Steffen, 1–24. Berlin, Heidelberg:
    Springer Berlin Heidelberg, 2017. <a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">https://doi.org/10.1007/978-3-662-52903-4_8-1</a>.'
  ieee: 'C. Gerking, E. Bodden, and W. Schäfer, “Industrial Security by Design,” in
    <i>Handbuch Gestaltung digitaler und vernetzter Arbeitswelten</i>, G. W. Maier,
    G. Engels, and E. Steffen, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg,
    2017, pp. 1–24.'
  mla: Gerking, Christopher, et al. “Industrial Security by Design.” <i>Handbuch Gestaltung
    Digitaler Und Vernetzter Arbeitswelten</i>, edited by Günter W. Maier et al.,
    Springer Berlin Heidelberg, 2017, pp. 1–24, doi:<a href="https://doi.org/10.1007/978-3-662-52903-4_8-1">10.1007/978-3-662-52903-4_8-1</a>.
  short: 'C. Gerking, E. Bodden, W. Schäfer, in: G.W. Maier, G. Engels, E. Steffen
    (Eds.), Handbuch Gestaltung Digitaler Und Vernetzter Arbeitswelten, Springer Berlin
    Heidelberg, Berlin, Heidelberg, 2017, pp. 1–24.'
date_created: 2020-11-30T09:56:23Z
date_updated: 2022-01-06T06:54:29Z
department:
- _id: '76'
doi: 10.1007/978-3-662-52903-4_8-1
editor:
- first_name: Günter W.
  full_name: Maier, Günter W.
  last_name: Maier
- first_name: Gregor
  full_name: Engels, Gregor
  last_name: Engels
- first_name: Eckhard
  full_name: Steffen, Eckhard
  last_name: Steffen
keyword:
- ITSECWEBSITE
language:
- iso: eng
page: 1-24
place: Berlin, Heidelberg
publication: Handbuch Gestaltung digitaler und vernetzter Arbeitswelten
publication_identifier:
  isbn:
  - 978-3-662-52903-4
publisher: Springer Berlin Heidelberg
status: public
title: Industrial Security by Design
type: book_chapter
user_id: '5786'
year: '2017'
...
---
_id: '20558'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Sarah
  full_name: Nadi, Sarah
  last_name: Nadi
- first_name: Michael
  full_name: Reif, Michael
  last_name: Reif
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Florian
  full_name: Göpfert, Florian
  last_name: Göpfert
- first_name: Felix
  full_name: Günther, Felix
  last_name: Günther
- first_name: Christian
  full_name: Weinert, Christian
  last_name: Weinert
- first_name: Daniel
  full_name: Demmler, Daniel
  last_name: Demmler
- first_name: Ram
  full_name: Kamath, Ram
  last_name: Kamath
citation:
  ama: 'Krüger S, Nadi S, Reif M, et al. CogniCrypt: Supporting Developers in using
    Cryptography. In: <i>International Conference on Automated Software Engineering
    (ASE 2017), Tool Demo Track</i>. ; 2017.'
  apa: 'Krüger, S., Nadi, S., Reif, M., Ali, K., Mezini, M., Bodden, E., Göpfert,
    F., Günther, F., Weinert, C., Demmler, D., &#38; Kamath, R. (2017). CogniCrypt:
    Supporting Developers in using Cryptography. <i>International Conference on Automated
    Software Engineering (ASE 2017), Tool Demo Track</i>.'
  bibtex: '@inproceedings{Krüger_Nadi_Reif_Ali_Mezini_Bodden_Göpfert_Günther_Weinert_Demmler_et
    al._2017, title={CogniCrypt: Supporting Developers in using Cryptography}, booktitle={International
    Conference on Automated Software Engineering (ASE 2017), Tool Demo Track}, author={Krüger,
    Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden,
    Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler,
    Daniel and et al.}, year={2017} }'
  chicago: 'Krüger, Stefan, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric
    Bodden, Florian Göpfert, et al. “CogniCrypt: Supporting Developers in Using Cryptography.”
    In <i>International Conference on Automated Software Engineering (ASE 2017), Tool
    Demo Track</i>, 2017.'
  ieee: 'S. Krüger <i>et al.</i>, “CogniCrypt: Supporting Developers in using Cryptography,”
    2017.'
  mla: 'Krüger, Stefan, et al. “CogniCrypt: Supporting Developers in Using Cryptography.”
    <i>International Conference on Automated Software Engineering (ASE 2017), Tool
    Demo Track</i>, 2017.'
  short: 'S. Krüger, S. Nadi, M. Reif, K. Ali, M. Mezini, E. Bodden, F. Göpfert, F.
    Günther, C. Weinert, D. Demmler, R. Kamath, in: International Conference on Automated
    Software Engineering (ASE 2017), Tool Demo Track, 2017.'
date_created: 2020-11-30T11:08:26Z
date_updated: 2022-01-06T06:54:30Z
department:
- _id: '76'
keyword:
- ITSECWEBSITE
- CROSSING
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/knr+17cognicrypt.pdf
publication: International Conference on Automated Software Engineering (ASE 2017),
  Tool Demo Track
status: public
title: 'CogniCrypt: Supporting Developers in using Cryptography'
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '20715'
author:
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Benjamin
  full_name: Livshits, Benjamin
  last_name: Livshits
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Justin
  full_name: Smith, Justin
  last_name: Smith
- first_name: Emerson
  full_name: Murphy-Hill, Emerson
  last_name: Murphy-Hill
citation:
  ama: 'Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. Cheetah:
    Just-in-Time Taint Analysis for Android Apps. In: <i>International Conference
    for Software Engineering (ICSE), Tool Demonstrations Track</i>. ; 2017.'
  apa: 'Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill,
    E. (2017). Cheetah: Just-in-Time Taint Analysis for Android Apps. <i>International
    Conference for Software Engineering (ICSE), Tool Demonstrations Track</i>.'
  bibtex: '@inproceedings{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2017,
    title={Cheetah: Just-in-Time Taint Analysis for Android Apps}, booktitle={International
    Conference for Software Engineering (ICSE), Tool Demonstrations Track}, author={Nguyen
    Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden, Eric and Smith,
    Justin and Murphy-Hill, Emerson}, year={2017} }'
  chicago: 'Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin
    Smith, and Emerson Murphy-Hill. “Cheetah: Just-in-Time Taint Analysis for Android
    Apps.” In <i>International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track</i>, 2017.'
  ieee: 'L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill,
    “Cheetah: Just-in-Time Taint Analysis for Android Apps,” 2017.'
  mla: 'Nguyen Quang Do, Lisa, et al. “Cheetah: Just-in-Time Taint Analysis for Android
    Apps.” <i>International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track</i>, 2017.'
  short: 'L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill,
    in: International Conference for Software Engineering (ICSE), Tool Demonstrations
    Track, 2017.'
date_created: 2020-12-14T11:51:44Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/dal17cheetah.pdf
publication: International Conference for Software Engineering (ICSE), Tool Demonstrations
  Track
status: public
title: 'Cheetah: Just-in-Time Taint Analysis for Android Apps'
type: conference
user_id: '5786'
year: '2017'
...
---
_id: '5204'
author:
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Späth J, Ali K, Bodden E. IDEal: Efficient and Precise Alias-aware Dataflow
    Analysis. In: <i>2017 International Conference on Object-Oriented Programming,
    Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press; 2017.'
  apa: 'Späth, J., Ali, K., &#38; Bodden, E. (2017). IDEal: Efficient and Precise
    Alias-aware Dataflow Analysis. In <i>2017 International Conference on Object-Oriented
    Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press.'
  bibtex: '@inproceedings{Späth_Ali_Bodden_2017, title={IDEal: Efficient and Precise
    Alias-aware Dataflow Analysis}, booktitle={2017 International Conference on Object-Oriented
    Programming, Languages and Applications (OOPSLA/SPLASH)}, publisher={ACM Press},
    author={Späth, Johannes and Ali, Karim and Bodden, Eric}, year={2017} }'
  chicago: 'Späth, Johannes, Karim Ali, and Eric Bodden. “IDEal: Efficient and Precise
    Alias-Aware Dataflow Analysis.” In <i>2017 International Conference on Object-Oriented
    Programming, Languages and Applications (OOPSLA/SPLASH)</i>. ACM Press, 2017.'
  ieee: 'J. Späth, K. Ali, and E. Bodden, “IDEal: Efficient and Precise Alias-aware
    Dataflow Analysis,” in <i>2017 International Conference on Object-Oriented Programming,
    Languages and Applications (OOPSLA/SPLASH)</i>, 2017.'
  mla: 'Späth, Johannes, et al. “IDEal: Efficient and Precise Alias-Aware Dataflow
    Analysis.” <i>2017 International Conference on Object-Oriented Programming, Languages
    and Applications (OOPSLA/SPLASH)</i>, ACM Press, 2017.'
  short: 'J. Späth, K. Ali, E. Bodden, in: 2017 International Conference on Object-Oriented
    Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, 2017.'
date_created: 2018-10-31T12:46:50Z
date_updated: 2022-01-06T07:01:44Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T14:28:13Z
  date_updated: 2018-11-02T14:28:13Z
  file_id: '5273'
  file_name: sab17ideal.pdf
  file_size: 1021251
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T14:28:13Z
has_accepted_license: '1'
keyword:
- ATTRACT
- ITSECWEBSITE
- CROSSING
language:
- iso: eng
main_file_link:
- url: ' http://bodden.de/pubs/sab17ideal.pdf'
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publication: 2017 International Conference on Object-Oriented Programming, Languages
  and Applications (OOPSLA/SPLASH)
publisher: ACM Press
status: public
title: 'IDEal: Efficient and Precise Alias-aware Dataflow Analysis'
type: conference
user_id: '477'
year: '2017'
...
---
_id: '20555'
author:
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
citation:
  ama: 'Krüger S, Späth J, Ali K, Bodden E, Mezini M. <i>CrySL: Validating Correct
    Usage of Cryptographic APIs</i>.; 2017.'
  apa: 'Krüger, S., Späth, J., Ali, K., Bodden, E., &#38; Mezini, M. (2017). <i>CrySL:
    Validating Correct Usage of Cryptographic APIs</i>.'
  bibtex: '@book{Krüger_Späth_Ali_Bodden_Mezini_2017, title={CrySL: Validating Correct
    Usage of Cryptographic APIs}, author={Krüger, Stefan and Späth, Johannes and Ali,
    Karim and Bodden, Eric and Mezini, Mira}, year={2017} }'
  chicago: 'Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini.
    <i>CrySL: Validating Correct Usage of Cryptographic APIs</i>, 2017.'
  ieee: 'S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, <i>CrySL: Validating
    Correct Usage of Cryptographic APIs</i>. 2017.'
  mla: 'Krüger, Stefan, et al. <i>CrySL: Validating Correct Usage of Cryptographic
    APIs</i>. 2017.'
  short: 'S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, CrySL: Validating Correct
    Usage of Cryptographic APIs, 2017.'
date_created: 2020-11-30T10:29:41Z
date_updated: 2026-02-19T14:39:50Z
department:
- _id: '76'
external_id:
  arxiv:
  - '1710.00564'
keyword:
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: https://arxiv.org/abs/1710.00564
status: public
title: 'CrySL: Validating Correct Usage of Cryptographic APIs'
type: report
user_id: '14972'
year: '2017'
...
---
_id: '20717'
author:
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Benjamin
  full_name: Livshits, Benjamin
  last_name: Livshits
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Justin
  full_name: Smith, Justin
  last_name: Smith
- first_name: Emerson
  full_name: Murphy-Hill, Emerson
  last_name: Murphy-Hill
citation:
  ama: Nguyen Quang Do L, Ali K, Livshits B, Bodden E, Smith J, Murphy-Hill E. <i>Just-in-Time
    Static Analysis</i>.; 2016. doi:<a href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>
  apa: Nguyen Quang Do, L., Ali, K., Livshits, B., Bodden, E., Smith, J., &#38; Murphy-Hill,
    E. (2016). <i>Just-in-Time Static Analysis</i>. <a href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>
  bibtex: '@book{Nguyen Quang Do_Ali_Livshits_Bodden_Smith_Murphy-Hill_2016, title={Just-in-Time
    Static Analysis}, DOI={<a href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>},
    author={Nguyen Quang Do, Lisa and Ali, Karim and Livshits, Benjamin and Bodden,
    Eric and Smith, Justin and Murphy-Hill, Emerson}, year={2016} }'
  chicago: Nguyen Quang Do, Lisa, Karim Ali, Benjamin Livshits, Eric Bodden, Justin
    Smith, and Emerson Murphy-Hill. <i>Just-in-Time Static Analysis</i>, 2016. <a
    href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>.
  ieee: L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, and E. Murphy-Hill,
    <i>Just-in-Time Static Analysis</i>. 2016.
  mla: Nguyen Quang Do, Lisa, et al. <i>Just-in-Time Static Analysis</i>. 2016, doi:<a
    href="http://dx.doi.org/10.7939/DVN/10859">http://dx.doi.org/10.7939/DVN/10859</a>.
  short: L. Nguyen Quang Do, K. Ali, B. Livshits, E. Bodden, J. Smith, E. Murphy-Hill,
    Just-in-Time Static Analysis, 2016.
date_created: 2020-12-14T11:57:09Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: http://dx.doi.org/10.7939/DVN/10859
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/dal16jit-tr.pdf
status: public
title: Just-in-Time Static Analysis
type: report
user_id: '5786'
year: '2016'
...
---
_id: '20718'
author:
- first_name: Siegfried
  full_name: Rasthofer, Siegfried
  last_name: Rasthofer
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Marc
  full_name: Miltenberger, Marc
  last_name: Miltenberger
citation:
  ama: Rasthofer S, Arzt S, Bodden E, Miltenberger M. Harvester - Vollautomatische
    Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen. <i>Datenschutz
    und Datensicherheit</i>. Published online 2016:718-722. doi:<a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>
  apa: Rasthofer, S., Arzt, S., Bodden, E., &#38; Miltenberger, M. (2016). Harvester
    - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen.
    <i>Datenschutz Und Datensicherheit</i>, 718–722. <a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>
  bibtex: '@article{Rasthofer_Arzt_Bodden_Miltenberger_2016, title={Harvester - Vollautomatische
    Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen}, DOI={<a
    href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>},
    journal={Datenschutz und Datensicherheit}, author={Rasthofer, Siegfried and Arzt,
    Steven and Bodden, Eric and Miltenberger, Marc}, year={2016}, pages={718–722}
    }'
  chicago: Rasthofer, Siegfried, Steven Arzt, Eric Bodden, and Marc Miltenberger.
    “Harvester - Vollautomatische Extraktion von Laufzeitwerten Aus Obfuskierten Android-Applikationen.”
    <i>Datenschutz Und Datensicherheit</i>, 2016, 718–22. <a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.
  ieee: 'S. Rasthofer, S. Arzt, E. Bodden, and M. Miltenberger, “Harvester - Vollautomatische
    Extraktion von Laufzeitwerten aus obfuskierten Android-Applikationen,” <i>Datenschutz
    und Datensicherheit</i>, pp. 718–722, 2016, doi: <a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.'
  mla: Rasthofer, Siegfried, et al. “Harvester - Vollautomatische Extraktion von Laufzeitwerten
    Aus Obfuskierten Android-Applikationen.” <i>Datenschutz Und Datensicherheit</i>,
    2016, pp. 718–22, doi:<a href="https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536">https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536</a>.
  short: S. Rasthofer, S. Arzt, E. Bodden, M. Miltenberger, Datenschutz Und Datensicherheit
    (2016) 718–722.
date_created: 2020-12-14T11:57:48Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: https://www.springerprofessional.de/en/datenschutz-und-datensicherheit-dud-11-2016/10866536
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://bodden.de/pubs/rabm16harvester.pdf
page: 718-722
publication: Datenschutz und Datensicherheit
status: public
title: Harvester - Vollautomatische Extraktion von Laufzeitwerten aus obfuskierten
  Android-Applikationen
type: journal_article
user_id: '5786'
year: '2016'
...
---
_id: '20719'
author:
- first_name: Philipp
  full_name: Holzinger, Philipp
  last_name: Holzinger
- first_name: Stefan
  full_name: Triller, Stefan
  last_name: Triller
- first_name: Alexandre
  full_name: Bartel, Alexandre
  last_name: Bartel
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than
    Ten Years of Java Exploitation. In: <i>Proceedings of the 2016 ACM SIGSAC Conference
    on Computer and Communications Security</i>. CCS ’16. ; 2016:779-790. doi:<a href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>'
  apa: Holzinger, P., Triller, S., Bartel, A., &#38; Bodden, E. (2016). An In-Depth
    Study of More Than Ten Years of Java Exploitation. <i>Proceedings of the 2016
    ACM SIGSAC Conference on Computer and Communications Security</i>, 779–790. <a
    href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>
  bibtex: '@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16},
    title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={<a
    href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>},
    booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications
    Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre
    and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }'
  chicago: Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden.
    “An In-Depth Study of More Than Ten Years of Java Exploitation.” In <i>Proceedings
    of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>,
    779–90. CCS ’16, 2016. <a href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>.
  ieee: 'P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of
    More Than Ten Years of Java Exploitation,” in <i>Proceedings of the 2016 ACM SIGSAC
    Conference on Computer and Communications Security</i>, 2016, pp. 779–790, doi:
    <a href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>.'
  mla: Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java
    Exploitation.” <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and
    Communications Security</i>, 2016, pp. 779–90, doi:<a href="http://doi.acm.org/10.1145/2976749.2978361">http://doi.acm.org/10.1145/2976749.2978361</a>.
  short: 'P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016
    ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.'
date_created: 2020-12-14T11:58:33Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
doi: http://doi.acm.org/10.1145/2976749.2978361
keyword:
- ATTRACT
- access control
- exploits
- java security
- security analysis
- ITSECWEBSITE
language:
- iso: eng
page: 779-790
publication: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications
  Security
publication_identifier:
  isbn:
  - 978-1-4503-4139-4
series_title: CCS '16
status: public
title: An In-Depth Study of More Than Ten Years of Java Exploitation
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20727'
author:
- first_name: Siegfried
  full_name: Rasthofer, Siegfried
  last_name: Rasthofer
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Marc
  full_name: Miltenberger, Marc
  last_name: Miltenberger
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Rasthofer S, Arzt S, Miltenberger M, Bodden E. Harvesting Runtime Values in
    Android Applications That Feature Anti-Analysis Techniques. In: <i>Network and
    Distributed System Security Symposium (NDSS)</i>. ; 2016.'
  apa: Rasthofer, S., Arzt, S., Miltenberger, M., &#38; Bodden, E. (2016). Harvesting
    Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
    <i>Network and Distributed System Security Symposium (NDSS)</i>.
  bibtex: '@inproceedings{Rasthofer_Arzt_Miltenberger_Bodden_2016, title={Harvesting
    Runtime Values in Android Applications That Feature Anti-Analysis Techniques},
    booktitle={Network and Distributed System Security Symposium (NDSS)}, author={Rasthofer,
    Siegfried and Arzt, Steven and Miltenberger, Marc and Bodden, Eric}, year={2016}
    }'
  chicago: Rasthofer, Siegfried, Steven Arzt, Marc Miltenberger, and Eric Bodden.
    “Harvesting Runtime Values in Android Applications That Feature Anti-Analysis
    Techniques.” In <i>Network and Distributed System Security Symposium (NDSS)</i>,
    2016.
  ieee: S. Rasthofer, S. Arzt, M. Miltenberger, and E. Bodden, “Harvesting Runtime
    Values in Android Applications That Feature Anti-Analysis Techniques,” 2016.
  mla: Rasthofer, Siegfried, et al. “Harvesting Runtime Values in Android Applications
    That Feature Anti-Analysis Techniques.” <i>Network and Distributed System Security
    Symposium (NDSS)</i>, 2016.
  short: 'S. Rasthofer, S. Arzt, M. Miltenberger, E. Bodden, in: Network and Distributed
    System Security Symposium (NDSS), 2016.'
date_created: 2020-12-14T14:21:41Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/ssme16harvesting.pdf
publication: Network and Distributed System Security Symposium (NDSS)
status: public
title: Harvesting Runtime Values in Android Applications That Feature Anti-Analysis
  Techniques
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20728'
author:
- first_name: Sarah
  full_name: Nadi, Sarah
  last_name: Nadi
- first_name: Stefan
  full_name: Krüger, Stefan
  last_name: Krüger
- first_name: Mira
  full_name: Mezini, Mira
  last_name: Mezini
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Nadi S, Krüger S, Mezini M, Bodden E. Jumping Through Hoops: Why do Java Developers
    Struggle With Cryptography APIs? In: <i>International Conference for Software
    Engineering (ICSE)</i>. ; 2016:935-946.'
  apa: 'Nadi, S., Krüger, S., Mezini, M., &#38; Bodden, E. (2016). Jumping Through
    Hoops: Why do Java Developers Struggle With Cryptography APIs? <i>International
    Conference for Software Engineering (ICSE)</i>, 935–946.'
  bibtex: '@inproceedings{Nadi_Krüger_Mezini_Bodden_2016, title={Jumping Through Hoops:
    Why do Java Developers Struggle With Cryptography APIs?}, booktitle={International
    Conference for Software Engineering (ICSE)}, author={Nadi, Sarah and Krüger, Stefan
    and Mezini, Mira and Bodden, Eric}, year={2016}, pages={935–946} }'
  chicago: 'Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden. “Jumping Through
    Hoops: Why Do Java Developers Struggle With Cryptography APIs?” In <i>International
    Conference for Software Engineering (ICSE)</i>, 935–46, 2016.'
  ieee: 'S. Nadi, S. Krüger, M. Mezini, and E. Bodden, “Jumping Through Hoops: Why
    do Java Developers Struggle With Cryptography APIs?,” in <i>International Conference
    for Software Engineering (ICSE)</i>, 2016, pp. 935–946.'
  mla: 'Nadi, Sarah, et al. “Jumping Through Hoops: Why Do Java Developers Struggle
    With Cryptography APIs?” <i>International Conference for Software Engineering
    (ICSE)</i>, 2016, pp. 935–46.'
  short: 'S. Nadi, S. Krüger, M. Mezini, E. Bodden, in: International Conference for
    Software Engineering (ICSE), 2016, pp. 935–946.'
date_created: 2020-12-14T14:22:36Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- CROSSING
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/nkm+16jumping.pdf
page: 935-946
publication: International Conference for Software Engineering (ICSE)
status: public
title: 'Jumping Through Hoops: Why do Java Developers Struggle With Cryptography APIs?'
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '20729'
author:
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Arzt S, Bodden E. StubDroid: Automatic Inference of Precise Data-flow Summaries
    for the Android Framework. In: <i>International Conference for Software Engineering
    (ICSE)</i>. ; 2016.'
  apa: 'Arzt, S., &#38; Bodden, E. (2016). StubDroid: Automatic Inference of Precise
    Data-flow Summaries for the Android Framework. <i>International Conference for
    Software Engineering (ICSE)</i>.'
  bibtex: '@inproceedings{Arzt_Bodden_2016, title={StubDroid: Automatic Inference
    of Precise Data-flow Summaries for the Android Framework}, booktitle={International
    Conference for Software Engineering (ICSE)}, author={Arzt, Steven and Bodden,
    Eric}, year={2016} }'
  chicago: 'Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise
    Data-Flow Summaries for the Android Framework.” In <i>International Conference
    for Software Engineering (ICSE)</i>, 2016.'
  ieee: 'S. Arzt and E. Bodden, “StubDroid: Automatic Inference of Precise Data-flow
    Summaries for the Android Framework,” 2016.'
  mla: 'Arzt, Steven, and Eric Bodden. “StubDroid: Automatic Inference of Precise
    Data-Flow Summaries for the Android Framework.” <i>International Conference for
    Software Engineering (ICSE)</i>, 2016.'
  short: 'S. Arzt, E. Bodden, in: International Conference for Software Engineering
    (ICSE), 2016.'
date_created: 2020-12-14T14:23:29Z
date_updated: 2022-01-06T06:54:34Z
department:
- _id: '76'
keyword:
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/ab16stubdroid.pdf
publication: International Conference for Software Engineering (ICSE)
status: public
title: 'StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android
  Framework'
type: conference
user_id: '5786'
year: '2016'
...
---
_id: '5205'
author:
- first_name: Johannes
  full_name: Späth, Johannes
  last_name: Späth
- first_name: Lisa
  full_name: Nguyen Quang Do, Lisa
  last_name: Nguyen Quang Do
- first_name: Karim
  full_name: Ali, Karim
  last_name: Ali
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
citation:
  ama: 'Späth J, Nguyen Quang Do L, Ali K, Bodden E. Boomerang: Demand-Driven Flow-
    and Context-Sensitive Pointer Analysis for Java. In: <i>European Conference on
    Object-Oriented Programming (ECOOP)</i>. ; 2016.'
  apa: 'Späth, J., Nguyen Quang Do, L., Ali, K., &#38; Bodden, E. (2016). Boomerang:
    Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java. In <i>European
    Conference on Object-Oriented Programming (ECOOP)</i>.'
  bibtex: '@inproceedings{Späth_Nguyen Quang Do_Ali_Bodden_2016, title={Boomerang:
    Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java}, booktitle={European
    Conference on Object-Oriented Programming (ECOOP)}, author={Späth, Johannes and
    Nguyen Quang Do, Lisa and Ali, Karim and Bodden, Eric}, year={2016} }'
  chicago: 'Späth, Johannes, Lisa Nguyen Quang Do, Karim Ali, and Eric Bodden. “Boomerang:
    Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.” In <i>European
    Conference on Object-Oriented Programming (ECOOP)</i>, 2016.'
  ieee: 'J. Späth, L. Nguyen Quang Do, K. Ali, and E. Bodden, “Boomerang: Demand-Driven
    Flow- and Context-Sensitive Pointer Analysis for Java,” in <i>European Conference
    on Object-Oriented Programming (ECOOP)</i>, 2016.'
  mla: 'Späth, Johannes, et al. “Boomerang: Demand-Driven Flow- and Context-Sensitive
    Pointer Analysis for Java.” <i>European Conference on Object-Oriented Programming
    (ECOOP)</i>, 2016.'
  short: 'J. Späth, L. Nguyen Quang Do, K. Ali, E. Bodden, in: European Conference
    on Object-Oriented Programming (ECOOP), 2016.'
date_created: 2018-10-31T12:51:26Z
date_updated: 2022-01-06T07:01:45Z
ddc:
- '000'
department:
- _id: '76'
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T14:13:19Z
  date_updated: 2018-11-02T14:13:19Z
  file_id: '5265'
  file_name: sna+16boomerang.pdf
  file_size: 1921617
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T14:13:19Z
has_accepted_license: '1'
keyword:
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/sna+16boomerang.pdf
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publication: European Conference on Object-Oriented Programming (ECOOP)
status: public
title: 'Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for
  Java'
type: conference
user_id: '477'
year: '2016'
...
---
_id: '5207'
author:
- first_name: Li
  full_name: Li, Li
  last_name: Li
- first_name: Alexandre
  full_name: Bartel, Alexandre
  last_name: Bartel
- first_name: Tegawende F.
  full_name: Bissyande, Tegawende F.
  last_name: Bissyande
- first_name: Jacques
  full_name: Klein, Jacques
  last_name: Klein
- first_name: Yves
  full_name: Le Traon, Yves
  last_name: Le Traon
- first_name: Steven
  full_name: Arzt, Steven
  last_name: Arzt
- first_name: Siegfried
  full_name: Rasthofer, Siegfried
  last_name: Rasthofer
- first_name: Eric
  full_name: Bodden, Eric
  id: '59256'
  last_name: Bodden
  orcid: 0000-0003-3470-3647
- first_name: Damien
  full_name: Octeau, Damien
  last_name: Octeau
- first_name: Patrick
  full_name: McDaniel, Patrick
  last_name: McDaniel
citation:
  ama: 'Li L, Bartel A, Bissyande TF, et al. IccTA: Detecting Inter-Component Privacy
    Leaks in Android Apps. In: <i>2015 International Conference on Software Engineering
    (ICSE)</i>. ; 2015:280-291.'
  apa: 'Li, L., Bartel, A., Bissyande, T. F., Klein, J., Le Traon, Y., Arzt, S., …
    McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android
    Apps. In <i>2015 International Conference on Software Engineering (ICSE)</i> (pp.
    280–291).'
  bibtex: '@inproceedings{Li_Bartel_Bissyande_Klein_Le Traon_Arzt_Rasthofer_Bodden_Octeau_McDaniel_2015,
    title={IccTA: Detecting Inter-Component Privacy Leaks in Android Apps}, booktitle={2015
    International Conference on Software Engineering (ICSE)}, author={Li, Li and Bartel,
    Alexandre and Bissyande, Tegawende F. and Klein, Jacques and Le Traon, Yves and
    Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Octeau, Damien and
    McDaniel, Patrick}, year={2015}, pages={280–291} }'
  chicago: 'Li, Li, Alexandre Bartel, Tegawende F. Bissyande, Jacques Klein, Yves
    Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick
    McDaniel. “IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.” In
    <i>2015 International Conference on Software Engineering (ICSE)</i>, 280–91, 2015.'
  ieee: 'L. Li <i>et al.</i>, “IccTA: Detecting Inter-Component Privacy Leaks in Android
    Apps,” in <i>2015 International Conference on Software Engineering (ICSE)</i>,
    2015, pp. 280–291.'
  mla: 'Li, Li, et al. “IccTA: Detecting Inter-Component Privacy Leaks in Android
    Apps.” <i>2015 International Conference on Software Engineering (ICSE)</i>, 2015,
    pp. 280–91.'
  short: 'L. Li, A. Bartel, T.F. Bissyande, J. Klein, Y. Le Traon, S. Arzt, S. Rasthofer,
    E. Bodden, D. Octeau, P. McDaniel, in: 2015 International Conference on Software
    Engineering (ICSE), 2015, pp. 280–291.'
date_created: 2018-10-31T12:59:44Z
date_updated: 2022-01-06T07:01:46Z
ddc:
- '000'
department:
- _id: '76'
extern: '1'
file:
- access_level: closed
  content_type: application/pdf
  creator: ups
  date_created: 2018-11-02T14:10:22Z
  date_updated: 2018-11-02T14:10:22Z
  file_id: '5263'
  file_name: lbb+15iccta.pdf
  file_size: 206378
  relation: main_file
  success: 1
file_date_updated: 2018-11-02T14:10:22Z
has_accepted_license: '1'
keyword:
- CROSSING
- ATTRACT
- ITSECWEBSITE
language:
- iso: eng
main_file_link:
- url: http://www.bodden.de/pubs/lbb+15iccta.pdf
page: 280-291
project:
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
- _id: '12'
  name: SFB 901 - Subproject B4
publication: 2015 International Conference on Software Engineering (ICSE)
publication_identifier:
  isbn:
  - 978-1-4799-1934-5
status: public
title: 'IccTA: Detecting Inter-Component Privacy Leaks in Android Apps'
type: conference
user_id: '477'
year: '2015'
...
