[{"date_updated":"2022-07-25T10:23:44Z","doi":"10.48550/ARXIV.2204.06447","year":"2022","type":"misc","language":[{"iso":"eng"}],"abstract":[{"text":"Context: Cryptographic APIs are often misused in real-world applications. Therefore, many cryptographic API misuse detection tools have been introduced. However, there exists no established reference benchmark for a fair and comprehensive comparison and evaluation of these tools. While there are benchmarks, they often only address a subset of the domain or were only used to evaluate a subset of existing misuse detection tools. Objective: To fairly compare cryptographic API misuse detection tools and to drive future development in this domain, we will devise such a benchmark. Openness and transparency in the generation process are key factors to fairly generate and establish the needed benchmark. Method: We propose an approach where we derive the benchmark generation methodology from the literature which consists of general best practices in benchmarking and domain-specific benchmark generation. A part of this methodology is transparency and openness of the generation process, which is achieved by pre-registering this work. Based on our methodology we design CamBench, a fair \"Cryptographic API Misuse Detection Tool Benchmark Suite\". We will implement the first version of CamBench limiting the domain to Java, the JCA, and static analyses. Finally, we will use CamBench to compare current misuse detection tools and compare CamBench to related benchmarks of its domain.","lang":"eng"}],"department":[{"_id":"76"}],"date_created":"2022-07-25T07:56:59Z","user_id":"32312","citation":{"apa":"Schlichtig, M., Wickert, A.-K., Krüger, S., Bodden, E., & Mezini, M. (2022). CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite. https://doi.org/10.48550/ARXIV.2204.06447","bibtex":"@book{Schlichtig_Wickert_Krüger_Bodden_Mezini_2022, title={CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite}, DOI={10.48550/ARXIV.2204.06447}, author={Schlichtig, Michael and Wickert, Anna-Katharina and Krüger, Stefan and Bodden, Eric and Mezini, Mira}, year={2022} }","mla":"Schlichtig, Michael, et al. CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite. 2022, doi:10.48550/ARXIV.2204.06447.","ama":"Schlichtig M, Wickert A-K, Krüger S, Bodden E, Mezini M. CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite.; 2022. doi:10.48550/ARXIV.2204.06447","ieee":"M. Schlichtig, A.-K. Wickert, S. Krüger, E. Bodden, and M. Mezini, CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite. 2022.","chicago":"Schlichtig, Michael, Anna-Katharina Wickert, Stefan Krüger, Eric Bodden, and Mira Mezini. CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite, 2022. https://doi.org/10.48550/ARXIV.2204.06447.","short":"M. Schlichtig, A.-K. Wickert, S. Krüger, E. Bodden, M. Mezini, CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite, 2022."},"status":"public","title":"CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite","_id":"32409","related_material":{"link":[{"relation":"confirmation","url":"https://arxiv.org/abs/2204.06447"}]},"author":[{"full_name":"Schlichtig, Michael","id":"32312","last_name":"Schlichtig","first_name":"Michael","orcid":"0000-0001-6600-6171"},{"full_name":"Wickert, Anna-Katharina","first_name":"Anna-Katharina","last_name":"Wickert"},{"full_name":"Krüger, Stefan","last_name":"Krüger","first_name":"Stefan"},{"orcid":"0000-0003-3470-3647","first_name":"Eric","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric"},{"first_name":"Mira","last_name":"Mezini","full_name":"Mezini, Mira"}],"keyword":["cryptography","benchmark","API misuse","static analysis"]},{"_id":"32410","author":[{"id":"41213","full_name":"Nachtigall, Marcus","last_name":"Nachtigall","first_name":"Marcus"},{"first_name":"Michael","last_name":"Schlichtig","orcid":"0000-0001-6600-6171","full_name":"Schlichtig, Michael","id":"32312"},{"last_name":"Bodden","first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256"}],"related_material":{"link":[{"relation":"confirmation","url":"https://dl.acm.org/doi/10.1145/3533767.3534374"}]},"keyword":["Automated static analysis","Software usability"],"status":"public","publication_identifier":{"isbn":["9781450393799"]},"title":"A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools","publication_status":"published","type":"conference","publication":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","abstract":[{"lang":"eng","text":"Static analysis tools support developers in detecting potential coding issues, such as bugs or vulnerabilities. Research on static analysis emphasizes its technical challenges but also mentions severe usability shortcomings. These shortcomings hinder the adoption of static analysis tools, and in some cases, user dissatisfaction even leads to tool abandonment.\r\nTo comprehensively assess the current state of the art, this paper presents the first systematic usability evaluation in a wide range of static analysis tools. We derived a set of 36 relevant criteria from the scientific literature and gathered a collection of 46 static analysis tools complying with our inclusion and exclusion criteria - a representative set of mainly non-proprietary tools. Then, we evaluated how well these tools fulfill the aforementioned criteria.\r\nThe evaluation shows that more than half of the considered tools offer poor warning messages, while about three-quarters of the tools provide hardly any fix support. Furthermore, the integration of user knowledge is strongly neglected, which could be used for improved handling of false positives and tuning the results for the corresponding developer. Finally, issues regarding workflow integration and specialized user interfaces are proved further.\r\nThese findings should prove useful in guiding and focusing further research and development in the area of user experience for static code analyses."}],"department":[{"_id":"76"}],"language":[{"iso":"eng"}],"citation":{"bibtex":"@inproceedings{Nachtigall_Schlichtig_Bodden_2022, title={A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools}, DOI={10.1145/3533767}, booktitle={Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis}, publisher={ACM}, author={Nachtigall, Marcus and Schlichtig, Michael and Bodden, Eric}, year={2022}, pages={532–543} }","short":"M. Nachtigall, M. Schlichtig, E. Bodden, in: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, 2022, pp. 532–543.","ieee":"M. Nachtigall, M. Schlichtig, and E. Bodden, “A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools,” in Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 2022, pp. 532–543, doi: 10.1145/3533767.","chicago":"Nachtigall, Marcus, Michael Schlichtig, and Eric Bodden. “A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools.” In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 532–43. ACM, 2022. https://doi.org/10.1145/3533767.","ama":"Nachtigall M, Schlichtig M, Bodden E. A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools. In: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis. ACM; 2022:532-543. doi:10.1145/3533767","mla":"Nachtigall, Marcus, et al. “A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools.” Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, 2022, pp. 532–43, doi:10.1145/3533767.","apa":"Nachtigall, M., Schlichtig, M., & Bodden, E. (2022). A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools. Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, 532–543. https://doi.org/10.1145/3533767"},"user_id":"32312","date_created":"2022-07-25T08:02:36Z","page":"532 - 543","doi":"10.1145/3533767","date_updated":"2022-07-26T11:42:23Z","publisher":"ACM","year":"2022","quality_controlled":"1"},{"date_created":"2022-05-09T13:04:10Z","user_id":"32312","citation":{"apa":"Schlichtig, M., Sassalla, S., Narasimhan, K., & Bodden, E. (2022). FUM - A Framework for API Usage constraint and Misuse Classification. 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 673–684. https://doi.org/10.1109/SANER53432.2022.00085","bibtex":"@inproceedings{Schlichtig_Sassalla_Narasimhan_Bodden_2022, title={FUM - A Framework for API Usage constraint and Misuse Classification}, DOI={https://doi.org/10.1109/SANER53432.2022.00085}, booktitle={2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)}, author={Schlichtig, Michael and Sassalla, Steffen and Narasimhan, Krishna and Bodden, Eric}, year={2022}, pages={673–684} }","ieee":"M. Schlichtig, S. Sassalla, K. Narasimhan, and E. Bodden, “FUM - A Framework for API Usage constraint and Misuse Classification,” in 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022, pp. 673–684, doi: https://doi.org/10.1109/SANER53432.2022.00085.","chicago":"Schlichtig, Michael, Steffen Sassalla, Krishna Narasimhan, and Eric Bodden. “FUM - A Framework for API Usage Constraint and Misuse Classification.” In 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 673–84, 2022. https://doi.org/10.1109/SANER53432.2022.00085.","ama":"Schlichtig M, Sassalla S, Narasimhan K, Bodden E. FUM - A Framework for API Usage constraint and Misuse Classification. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). ; 2022:673-684. doi:https://doi.org/10.1109/SANER53432.2022.00085","mla":"Schlichtig, Michael, et al. “FUM - A Framework for API Usage Constraint and Misuse Classification.” 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022, pp. 673–84, doi:https://doi.org/10.1109/SANER53432.2022.00085.","short":"M. Schlichtig, S. Sassalla, K. Narasimhan, E. Bodden, in: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022, pp. 673–684."},"department":[{"_id":"76"}],"language":[{"iso":"eng"}],"abstract":[{"text":"Application Programming Interfaces (APIs) are the primary mechanism that developers use to obtain access to third-party algorithms and services. Unfortunately, APIs can be misused, which can have catastrophic consequences, especially if the APIs provide security-critical functionalities like cryptography. Understanding what API misuses are, and for what reasons they are caused, is important to prevent them, e.g., with API misuse detectors. However, definitions and nominations for API misuses and related terms in literature vary and are diverse. This paper addresses the problem of scattered knowledge and definitions of API misuses by presenting a systematic literature review on the subject and introducing FUM, a novel Framework for API Usage constraint and Misuse classification. The literature review revealed that API misuses are violations of API usage constraints. To capture this, we provide unified definitions and use them to derive FUM. To assess the extent to which FUM aids in determining and guiding the improvement of an API misuses detectors' capabilities, we performed a case study on CogniCrypt, a state-of-the-art misuse detector for cryptographic APIs. The study showed that FUM can be used to properly assess CogniCrypt's capabilities, identify weaknesses and assist in deriving mitigations and improvements. And it appears that also more generally FUM can aid the development and improvement of misuse detection tools.","lang":"eng"}],"publication":"2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)","type":"conference","quality_controlled":"1","year":"2022","doi":"https://doi.org/10.1109/SANER53432.2022.00085","date_updated":"2022-07-26T11:42:30Z","page":"673 - 684","keyword":["API misuses","API usage constraints","classification framework","API misuse detection","static analysis"],"related_material":{"link":[{"relation":"confirmation","url":"https://ieeexplore.ieee.org/document/9825763"}]},"author":[{"last_name":"Schlichtig","first_name":"Michael","orcid":"0000-0001-6600-6171","full_name":"Schlichtig, Michael","id":"32312"},{"full_name":"Sassalla, Steffen","last_name":"Sassalla","first_name":"Steffen"},{"first_name":"Krishna","last_name":"Narasimhan","full_name":"Narasimhan, Krishna"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric","id":"59256","full_name":"Bodden, Eric"}],"_id":"31133","title":"FUM - A Framework for API Usage constraint and Misuse Classification","status":"public"},{"type":"misc","abstract":[{"text":"Recent studies have revealed that 87 % to 96 % of the Android apps using cryptographic APIs have a misuse which may cause security vulnerabilities. As previous studies did not conduct a qualitative examination of the validity and severity of the findings, our objective was to understand the findings in more depth. We analyzed a set of 936 open-source Java applications for cryptographic misuses. Our study reveals that 88.10 % of the analyzed applications fail to use cryptographic APIs securely. Through our manual analysis of a random sample, we gained new insights into effective false positives. For example, every fourth misuse of the frequently misused JCA class MessageDigest is an effective false positive due to its occurrence in a non-security context. As we wanted to gain deeper insights into the security implications of these misuses, we created an extensive vulnerability model for cryptographic API misuses. Our model includes previously undiscussed attacks in the context of cryptographic APIs such as DoS attacks. This model reveals that nearly half of the misuses are of high severity, e.g., hard-coded credentials and potential Man-in-the-Middle attacks.","lang":"eng"}],"department":[{"_id":"76"}],"language":[{"iso":"eng"}],"date_created":"2022-10-28T13:21:05Z","user_id":"32312","citation":{"mla":"Wickert, Anna-Katharina, et al. To Fix or Not to Fix: A Critical Study of Crypto-Misuses in the Wild. 2022, doi:10.48550/ARXIV.2209.11103.","ieee":"A.-K. Wickert, L. Baumgärtner, M. Schlichtig, and M. Mezini, To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild. 2022.","chicago":"Wickert, Anna-Katharina, Lars Baumgärtner, Michael Schlichtig, and Mira Mezini. To Fix or Not to Fix: A Critical Study of Crypto-Misuses in the Wild, 2022. https://doi.org/10.48550/ARXIV.2209.11103.","ama":"Wickert A-K, Baumgärtner L, Schlichtig M, Mezini M. To Fix or Not to Fix: A Critical Study of Crypto-Misuses in the Wild.; 2022. doi:10.48550/ARXIV.2209.11103","short":"A.-K. Wickert, L. Baumgärtner, M. Schlichtig, M. Mezini, To Fix or Not to Fix: A Critical Study of Crypto-Misuses in the Wild, 2022.","bibtex":"@book{Wickert_Baumgärtner_Schlichtig_Mezini_2022, title={To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild}, DOI={10.48550/ARXIV.2209.11103}, author={Wickert, Anna-Katharina and Baumgärtner, Lars and Schlichtig, Michael and Mezini, Mira}, year={2022} }","apa":"Wickert, A.-K., Baumgärtner, L., Schlichtig, M., & Mezini, M. (2022). To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild. https://doi.org/10.48550/ARXIV.2209.11103"},"date_updated":"2022-10-28T13:26:39Z","doi":"10.48550/ARXIV.2209.11103","year":"2022","_id":"33959","related_material":{"link":[{"relation":"confirmation","url":"https://arxiv.org/abs/2209.11103"}]},"author":[{"last_name":"Wickert","first_name":"Anna-Katharina","full_name":"Wickert, Anna-Katharina"},{"first_name":"Lars","last_name":"Baumgärtner","full_name":"Baumgärtner, Lars"},{"orcid":"0000-0001-6600-6171","last_name":"Schlichtig","first_name":"Michael","id":"32312","full_name":"Schlichtig, Michael"},{"full_name":"Mezini, Mira","last_name":"Mezini","first_name":"Mira"}],"status":"public","title":"To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild"},{"publication":"Sammelband der 27. Fachtagung der BAG Berufliche Bildung","citation":{"apa":"Opel, S. A., & Schlichtig, M. (2020). Data Science und Big Data in der beruflichen Bildung – Konzeption und Erprobung eines Projektkurses für die Sekundarstufe II. In T. Vollmer, T. Karges, T. Richter, B. Schlömer, & S. Schütt-Sayed (Eds.), Sammelband der 27. Fachtagung der BAG Berufliche Bildung (Vol. 55, pp. 176–194). wbv Media GmbH & Co. KG. https://doi.org/10.3278/6004722w","bibtex":"@inproceedings{Opel_Schlichtig_2020, place={Bielefeld}, series={Berufsbildung, Arbeit und Innovation}, title={Data Science und Big Data in der beruflichen Bildung – Konzeption und Erprobung eines Projektkurses für die Sekundarstufe II}, volume={55}, DOI={https://doi.org/10.3278/6004722w}, booktitle={Sammelband der 27. Fachtagung der BAG Berufliche Bildung}, publisher={wbv Media GmbH & Co. KG}, author={Opel, Simone Anna and Schlichtig, Michael}, editor={Vollmer, Thomas and Karges, Torben and Richter, Tim and Schlömer, Britta and Schütt-Sayed, Sören}, year={2020}, pages={176–194}, collection={Berufsbildung, Arbeit und Innovation} }","chicago":"Opel, Simone Anna, and Michael Schlichtig. “Data Science und Big Data in der beruflichen Bildung – Konzeption und Erprobung eines Projektkurses für die Sekundarstufe II.” In Sammelband der 27. Fachtagung der BAG Berufliche Bildung, edited by Thomas Vollmer, Torben Karges, Tim Richter, Britta Schlömer, and Sören Schütt-Sayed, 55:176–94. Berufsbildung, Arbeit und Innovation. Bielefeld: wbv Media GmbH & Co. KG, 2020. https://doi.org/10.3278/6004722w.","ama":"Opel SA, Schlichtig M. Data Science und Big Data in der beruflichen Bildung – Konzeption und Erprobung eines Projektkurses für die Sekundarstufe II. In: Vollmer T, Karges T, Richter T, Schlömer B, Schütt-Sayed S, eds. Sammelband der 27. Fachtagung der BAG Berufliche Bildung. Vol 55. Berufsbildung, Arbeit und Innovation. wbv Media GmbH & Co. KG; 2020:176-194. doi:https://doi.org/10.3278/6004722w","ieee":"S. A. Opel and M. Schlichtig, “Data Science und Big Data in der beruflichen Bildung – Konzeption und Erprobung eines Projektkurses für die Sekundarstufe II,” in Sammelband der 27. Fachtagung der BAG Berufliche Bildung, Siegen, 2020, vol. 55, pp. 176–194, doi: https://doi.org/10.3278/6004722w.","mla":"Opel, Simone Anna, and Michael Schlichtig. “Data Science und Big Data in der beruflichen Bildung – Konzeption und Erprobung eines Projektkurses für die Sekundarstufe II.” Sammelband der 27. Fachtagung der BAG Berufliche Bildung, edited by Thomas Vollmer et al., vol. 55, wbv Media GmbH & Co. KG, 2020, pp. 176–94, doi:https://doi.org/10.3278/6004722w.","short":"S.A. Opel, M. Schlichtig, in: T. Vollmer, T. Karges, T. Richter, B. Schlömer, S. Schütt-Sayed (Eds.), Sammelband der 27. Fachtagung der BAG Berufliche Bildung, wbv Media GmbH & Co. KG, Bielefeld, 2020, pp. 176–194."},"user_id":"32312","abstract":[{"text":"Die Themen „Big Data“, „Künstliche Intelligenz und „Data Science“ werden seit einiger Zeit nicht nur in der breiten Öffentlichkeit kontrovers diskutiert, sondern stellen für die Ausbildung in den IT- und IT-nahen Berufen schon heute neue Herausforderungen dar, die in Zukunft durch die gesellschaftliche und technologische Weiterentwicklung hin zu einer Datengesellschaft noch größer werden.\r\nAn dieser Stelle stellt sich die Frage, welche Aspekte dieses großen Themenkomplexes für Schule und Ausbildung von Wichtigkeit sind und wie diese Themen sinnstiftend und gewinnbringend in die informatische Ausbildung in verschiedenen Bildungsgängen integriert werden können. Im Rahmen des von uns im Jahr 2017 organisierten Symposiums zum Thema „Data Science“ wurden für die Bildung relevante Aspekte erörtert, wodurch als Kernelemente für den Unterricht Algorithmen der Künstlichen Intelligenz und ihre Anwendung in Industrie und Gesellschaft, Explorationen von Big Data sowie der Umgang mit eigenen Daten in sozialen Netzwerken herausgearbeitet wurden. Ziel ist, aus diesen Themenbereichen sowohl ein umfassendes Curriculum als auch Module für verschiedene Unterrichtsszenarien zu entwickeln und zu erproben. Durch diese Materialien soll es Lehrkräften aus der Informatik, Mathematik oder Technik ermöglicht werden, diese Themen auf Basis des Curriculums und der erprobten Unterrichtskonzepte selbst zu unterrichten.\r\nHierfür wurde im Rahmen des Projekts ProDaBi (Projekt Data Science und Big Data in der Schule, https://www.prodabi.de), initiiert von der Telekom Stiftung, ein experimenteller Projektkurs entwickelt, den wir mit Schüler:innen der Sekundarstufe II an der Universität Paderborn im Schuljahr 2018/19 durchführten. Dieser Kurs enthält neben einem Modul zur Exploration von Big Data und einem weiteren Modul zum Maschinellen Lernen als Teil der Künstlichen Intelligenz auch eine Projektphase, die es in Zusammenarbeit mit lokalen Unternehmen den Schüler:innen\r\nermöglicht, das Erlernte in ein reales Data Science-Projekt einzubringen. Aus den Erfahrungen dieses Projektkurses sowie den parallel durchgeführten Erprobungen einzelner Bausteine auch mit beruflichen Schulen werden ab dem Schuljahr 2019/20 die hierfür verwendeten Materialien weiterentwickelt und weiteren Kooperationspartnern zur Erprobung zur Verfügung gestellt. Damit wurden zum Ende des Projekts nicht nur vollständige Unterrichtsmaterialien, sondern auch ein umfassendes Curriculum entwickelt.","lang":"ger"},{"lang":"eng","text":"The topics ”Big Data”, “Artificial Intelligence” and “Data Science” are controversially discussed among the general public, but they present new challenges for training in IT and IT-related professions. These challenges will become more important in the future as a result of further social and technological development towards a data society.\r\nAt this point, the question arises as to which aspects of this large complex of topics are important for school and education, and how these topics can be integrated in a meaningful and profitable way into informatics education in vocational education. In 2017, we organized a symposium towards the topic “Data Science” and discussed relevant aspects for general and vocational education. Algorithms of artificial intelligence and their application in industry and society, explorations of Big Data as well as the handling of one's own data in social networks were worked out as core elements for teaching. For this reason, our aim is to develop a comprehensive curriculum on this topic from these subject areas and to develop and test modules for various teaching scenarios in order to enable teachers from computer science, mathematics or technology to teach these topics themselves.\r\nFor this purpose, an experimental project course was developed within the framework of the ProDaBi project (Project Data Science and Big Data at School, https://www.prodabi.de), which we conducted with students from upper secondary classes at the University of Paderborn in the school year 2018/19. In this course we try to address all these aspects. This course consists of several modules: One module has been designed to teach the exploration of Big Data. Another module encompasses aspects of machine learning as part of artificial intelligence. The course concludes in a project phase which, in cooperation with local companies, will enable the students to apply what they have learned into a real Data Science project. Based on the experiences of this project course and the parallel testing of individual modules with vocational schools, we will further develop the material and make it available to other cooperation partners for testing, so that not only complete teaching materials but also a comprehensive curriculum will have been developed until the end of the project."}],"department":[{"_id":"67"}],"language":[{"iso":"ger"}],"doi":"https://doi.org/10.3278/6004722w","date_updated":"2022-01-12T17:04:10Z","_id":"29298","author":[{"full_name":"Opel, Simone Anna","id":"72932","last_name":"Opel","first_name":"Simone Anna"},{"last_name":"Schlichtig","first_name":"Michael","id":"32312","full_name":"Schlichtig, Michael"}],"series_title":"Berufsbildung, Arbeit und Innovation","title":"Data Science und Big Data in der beruflichen Bildung – Konzeption und Erprobung eines Projektkurses für die Sekundarstufe II","volume":55,"type":"conference","publication_status":"published","date_created":"2022-01-12T16:43:38Z","oa":"1","publisher":"wbv Media GmbH & Co. KG","intvolume":" 55","conference":{"location":"Siegen","name":"20. Hochschultage Berufliche Bildung (HTBB) \"Digitale Welt - Bildung und Arbeit in Transformationsgesellschaften\".","start_date":"2019-03-11","end_date":"2019-03-13"},"page":"176-194","place":"Bielefeld","year":"2020","editor":[{"first_name":"Thomas","last_name":"Vollmer","full_name":"Vollmer, Thomas"},{"full_name":"Karges, Torben","first_name":"Torben","last_name":"Karges"},{"full_name":"Richter, Tim","first_name":"Tim","last_name":"Richter"},{"full_name":"Schlömer, Britta","first_name":"Britta","last_name":"Schlömer"},{"last_name":"Schütt-Sayed","first_name":"Sören","full_name":"Schütt-Sayed, Sören"}],"main_file_link":[{"url":"https://library.oapen.org/handle/20.500.12657/43933","open_access":"1"}],"keyword":["Berufsbildung","vocational education","Ausbildung","training","berufliche Weiterbildung","advanced vocational education","Digitalisierung","digitalization","Unterricht","teaching","Lehrmethode","teaching method","Interdisziplinarität","interdisciplinarity","Fachdidaktik","subject didactics","Curriculum","curriculum","gewerblich-technischer Beruf","vocational/technical occupation","Fachkraft","specialist","Qualifikationsanforderungen","qualification requirements","Kompetenz","competence","Lehrerbildung","teacher training","Bundesrepublik Deutschland","Federal Republic of Germany"],"status":"public"},{"_id":"15332","author":[{"last_name":"Schlichtig","first_name":"Michael","orcid":"0000-0001-6600-6171","full_name":"Schlichtig, Michael","id":"32312"},{"first_name":"Simone Anna","last_name":"Opel","id":"72932","full_name":"Opel, Simone Anna"},{"first_name":"Lea","last_name":"Budde","full_name":"Budde, Lea","id":"32443"},{"first_name":"Carsten","last_name":"Schulte","id":"60311","full_name":"Schulte, Carsten"}],"publication_identifier":{"isbn":["978-9925-553-27-3"]},"volume":12,"title":"Understanding Artificial Intelligence – A Project for the Development of Comprehensive Teaching Material","publication":"ISSEP 2019 - 12th International conference on informatics in schools: Situation, evaluation and perspectives, Local Proceedings","language":[{"iso":"eng"}],"department":[{"_id":"67"}],"abstract":[{"text":"Artificial intelligence (AI) has the potential for far-reaching – in our opinion – irreversible changes.\r\nThey range from effects on the individual and society to new societal and social issues. The question arises\r\nas to how students can learn the basic functioning of AI systems, what areas of life and society are affected\r\nby these and – most important – how their own lives are affected by these changes. Therefore, we are developing and evaluating school materials for the German ”Science Year AI”. It can be used for students of all\r\nschool types from the seventh grade upwards and will be distributed to about 2000 schools in autumn with\r\nthe support of the Federal Ministry of Education and Research. The material deals with the following aspects\r\nof AI: Discussing everyday experiences with AI, how does machine learning work, historical development\r\nof AI concepts, difference between man and machine, future distribution of roles between man and machine,\r\nin which AI world do we want to live and how much AI would we like to have in our lives. Through an\r\naccompanying evaluation, high quality of the technical content and didactic preparation is achieved in order\r\nto guarantee the long-term applicability in the teaching context in the different age groups and school types.\r\nIn this paper, we describe the current state of the material development, the challenges arising, and the results\r\nof tests with different classes to date. We also present first ideas for evaluating the results.","lang":"eng"}],"user_id":"32312","citation":{"short":"M. Schlichtig, S.A. Opel, L. Budde, C. Schulte, in: E. Jasutė, S. Pozdniakov (Eds.), ISSEP 2019 - 12th International Conference on Informatics in Schools: Situation, Evaluation and Perspectives, Local Proceedings, 2019, pp. 65–73.","mla":"Schlichtig, Michael, et al. “Understanding Artificial Intelligence – A Project for the Development of Comprehensive Teaching Material.” ISSEP 2019 - 12th International Conference on Informatics in Schools: Situation, Evaluation and Perspectives, Local Proceedings, edited by Eglė Jasutė and Sergei Pozdniakov, vol. 12, 2019, pp. 65–73.","ieee":"M. Schlichtig, S. A. Opel, L. Budde, and C. Schulte, “Understanding Artificial Intelligence – A Project for the Development of Comprehensive Teaching Material,” in ISSEP 2019 - 12th International conference on informatics in schools: Situation, evaluation and perspectives, Local Proceedings, Lanarca, 2019, vol. 12, pp. 65–73.","ama":"Schlichtig M, Opel SA, Budde L, Schulte C. Understanding Artificial Intelligence – A Project for the Development of Comprehensive Teaching Material. In: Jasutė E, Pozdniakov S, eds. ISSEP 2019 - 12th International Conference on Informatics in Schools: Situation, Evaluation and Perspectives, Local Proceedings. Vol 12. ; 2019:65-73.","chicago":"Schlichtig, Michael, Simone Anna Opel, Lea Budde, and Carsten Schulte. “Understanding Artificial Intelligence – A Project for the Development of Comprehensive Teaching Material.” In ISSEP 2019 - 12th International Conference on Informatics in Schools: Situation, Evaluation and Perspectives, Local Proceedings, edited by Eglė Jasutė and Sergei Pozdniakov, 12:65–73, 2019.","bibtex":"@inproceedings{Schlichtig_Opel_Budde_Schulte_2019, title={Understanding Artificial Intelligence – A Project for the Development of Comprehensive Teaching Material}, volume={12}, booktitle={ISSEP 2019 - 12th International conference on informatics in schools: Situation, evaluation and perspectives, Local Proceedings}, author={Schlichtig, Michael and Opel, Simone Anna and Budde, Lea and Schulte, Carsten}, editor={Jasutė, Eglė and Pozdniakov, Sergei}, year={2019}, pages={65–73} }","apa":"Schlichtig, M., Opel, S. A., Budde, L., & Schulte, C. (2019). Understanding Artificial Intelligence – A Project for the Development of Comprehensive Teaching Material. In E. Jasutė & S. Pozdniakov (Eds.), ISSEP 2019 - 12th International conference on informatics in schools: Situation, evaluation and perspectives, Local Proceedings (Vol. 12, pp. 65–73)."},"date_updated":"2022-07-26T11:41:41Z","quality_controlled":"1","editor":[{"full_name":"Jasutė, Eglė","last_name":"Jasutė","first_name":"Eglė"},{"full_name":"Pozdniakov, Sergei","first_name":"Sergei","last_name":"Pozdniakov"}],"keyword":["Artificial Intelligence","Machine Learning","Teaching Material","Societal Aspects","Ethics. Social Aspects","Science Year","Simulation Game"],"main_file_link":[{"url":"http://cyprusconferences.org/issep2019/wp-content/uploads/2019/10/LocalISSEP-v5.pdf"}],"status":"public","publication_status":"published","type":"conference","date_created":"2019-12-16T17:50:08Z","conference":{"start_date":"2019-11-18","end_date":"2019-11-20","location":"Lanarca","name":"ISSEP 2019 - 12th International conference on informatics in schools: Situation, evaluation and perspectives"},"intvolume":" 12","page":"65 - 73","year":"2019"},{"series_title":"LNI","author":[{"id":"72932","full_name":"Opel, Simone Anna","first_name":"Simone Anna","last_name":"Opel"},{"full_name":"Schlichtig, Michael","id":"32312","last_name":"Schlichtig","first_name":"Michael","orcid":"0000-0001-6600-6171"},{"last_name":"Schulte","first_name":"Carsten","id":"60311","full_name":"Schulte, Carsten"},{"last_name":"Biehler","first_name":"Rolf","full_name":"Biehler, Rolf"},{"last_name":"Frischemeier","first_name":"Daniel","full_name":"Frischemeier, Daniel"},{"first_name":"Susanne","last_name":"Podworny","full_name":"Podworny, Susanne"},{"full_name":"Wassong, Thomas","id":"21241","first_name":"Thomas","last_name":"Wassong"}],"_id":"15640","volume":"P-288","title":"Entwicklung und Reflexion einer Unterrichtssequenz zum Maschinellen Lernen als Aspekt von Data Science in der Sekundarstufe II","status":"public","language":[{"iso":"ger"}],"department":[{"_id":"67"}],"citation":{"apa":"Opel, S. A., Schlichtig, M., Schulte, C., Biehler, R., Frischemeier, D., Podworny, S., & Wassong, T. (2019). Entwicklung und Reflexion einer Unterrichtssequenz zum Maschinellen Lernen als Aspekt von Data Science in der Sekundarstufe II. INFOS, P-288, 285–294.","short":"S.A. Opel, M. Schlichtig, C. Schulte, R. Biehler, D. Frischemeier, S. Podworny, T. Wassong, in: INFOS, Gesellschaft für Informatik, 2019, pp. 285–294.","ama":"Opel SA, Schlichtig M, Schulte C, et al. Entwicklung und Reflexion einer Unterrichtssequenz zum Maschinellen Lernen als Aspekt von Data Science in der Sekundarstufe II. In: INFOS. Vol P-288. LNI. Gesellschaft für Informatik; 2019:285-294.","ieee":"S. A. Opel et al., “Entwicklung und Reflexion einer Unterrichtssequenz zum Maschinellen Lernen als Aspekt von Data Science in der Sekundarstufe II,” in INFOS, 2019, vol. P-288, pp. 285–294.","chicago":"Opel, Simone Anna, Michael Schlichtig, Carsten Schulte, Rolf Biehler, Daniel Frischemeier, Susanne Podworny, and Thomas Wassong. “Entwicklung und Reflexion einer Unterrichtssequenz zum Maschinellen Lernen als Aspekt von Data Science in der Sekundarstufe II.” In INFOS, P-288:285–94. LNI. Gesellschaft für Informatik, 2019.","mla":"Opel, Simone Anna, et al. “Entwicklung und Reflexion einer Unterrichtssequenz zum Maschinellen Lernen als Aspekt von Data Science in der Sekundarstufe II.” INFOS, vol. P-288, Gesellschaft für Informatik, 2019, pp. 285–94.","bibtex":"@inproceedings{Opel_Schlichtig_Schulte_Biehler_Frischemeier_Podworny_Wassong_2019, series={LNI}, title={Entwicklung und Reflexion einer Unterrichtssequenz zum Maschinellen Lernen als Aspekt von Data Science in der Sekundarstufe II}, volume={P-288}, booktitle={INFOS}, publisher={Gesellschaft für Informatik}, author={Opel, Simone Anna and Schlichtig, Michael and Schulte, Carsten and Biehler, Rolf and Frischemeier, Daniel and Podworny, Susanne and Wassong, Thomas}, year={2019}, pages={285–294}, collection={LNI} }"},"date_created":"2020-01-28T10:28:34Z","user_id":"32312","type":"conference","publication":"INFOS","year":"2019","quality_controlled":"1","page":"285-294","date_updated":"2022-07-26T11:42:05Z","publisher":"Gesellschaft für Informatik"},{"date_updated":"2022-07-26T11:41:58Z","page":"385","publisher":"Gesellschaft für Informatik","quality_controlled":"1","year":"2019","publication":"INFOS","type":"conference","department":[{"_id":"67"}],"language":[{"iso":"ger"}],"user_id":"32312","date_created":"2020-01-28T10:28:35Z","citation":{"apa":"Schlichtig, M., Opel, S. A., Schulte, C., Biehler, R., Frischemeier, D., Podworny, S., & Wassong, T. (2019). Maschinelles Lernen im Unterricht mit Jupyter Notebook. INFOS, P-288, 385.","bibtex":"@inproceedings{Schlichtig_Opel_Schulte_Biehler_Frischemeier_Podworny_Wassong_2019, series={LNI}, title={Maschinelles Lernen im Unterricht mit Jupyter Notebook}, volume={P-288}, booktitle={INFOS}, publisher={Gesellschaft für Informatik}, author={Schlichtig, Michael and Opel, Simone Anna and Schulte, Carsten and Biehler, Rolf and Frischemeier, Daniel and Podworny, Susanne and Wassong, Thomas}, year={2019}, pages={385}, collection={LNI} }","short":"M. Schlichtig, S.A. Opel, C. Schulte, R. Biehler, D. Frischemeier, S. Podworny, T. Wassong, in: INFOS, Gesellschaft für Informatik, 2019, p. 385.","mla":"Schlichtig, Michael, et al. “Maschinelles Lernen im Unterricht mit Jupyter Notebook.” INFOS, vol. P-288, Gesellschaft für Informatik, 2019, p. 385.","chicago":"Schlichtig, Michael, Simone Anna Opel, Carsten Schulte, Rolf Biehler, Daniel Frischemeier, Susanne Podworny, and Thomas Wassong. “Maschinelles Lernen im Unterricht mit Jupyter Notebook.” In INFOS, P-288:385. LNI. Gesellschaft für Informatik, 2019.","ieee":"M. Schlichtig et al., “Maschinelles Lernen im Unterricht mit Jupyter Notebook,” in INFOS, 2019, vol. P-288, p. 385.","ama":"Schlichtig M, Opel SA, Schulte C, et al. Maschinelles Lernen im Unterricht mit Jupyter Notebook. In: INFOS. Vol P-288. LNI. Gesellschaft für Informatik; 2019:385."},"status":"public","volume":"P-288","title":"Maschinelles Lernen im Unterricht mit Jupyter Notebook","_id":"15641","series_title":"LNI","author":[{"orcid":"0000-0001-6600-6171","first_name":"Michael","last_name":"Schlichtig","id":"32312","full_name":"Schlichtig, Michael"},{"last_name":"Opel","first_name":"Simone Anna","id":"72932","full_name":"Opel, Simone Anna"},{"first_name":"Carsten","last_name":"Schulte","full_name":"Schulte, Carsten","id":"60311"},{"full_name":"Biehler, Rolf","first_name":"Rolf","last_name":"Biehler"},{"full_name":"Frischemeier, Daniel","first_name":"Daniel","last_name":"Frischemeier"},{"full_name":"Podworny, Susanne","first_name":"Susanne","last_name":"Podworny"},{"first_name":"Thomas","last_name":"Wassong","full_name":"Wassong, Thomas","id":"21241"}]},{"title":"Developing Teaching Materials on Artificial Intelligence by Using a Simulation Game (Work in Progress)","status":"public","author":[{"last_name":"Opel","first_name":"Simone Anna","id":"72932","full_name":"Opel, Simone Anna"},{"id":"32312","full_name":"Schlichtig, Michael","orcid":"0000-0001-6600-6171","last_name":"Schlichtig","first_name":"Michael"},{"first_name":"Carsten","last_name":"Schulte","id":"60311","full_name":"Schulte, Carsten"}],"_id":"15643","quality_controlled":"1","year":"2019","publisher":"ACM","date_updated":"2022-07-26T11:41:51Z","page":"11:1-11:2","date_created":"2020-01-28T10:28:37Z","user_id":"32312","citation":{"apa":"Opel, S. A., Schlichtig, M., & Schulte, C. (2019). Developing Teaching Materials on Artificial Intelligence by Using a Simulation Game (Work in Progress). WiPSCE, 11:1-11:2.","bibtex":"@inproceedings{Opel_Schlichtig_Schulte_2019, title={Developing Teaching Materials on Artificial Intelligence by Using a Simulation Game (Work in Progress)}, booktitle={WiPSCE}, publisher={ACM}, author={Opel, Simone Anna and Schlichtig, Michael and Schulte, Carsten}, year={2019}, pages={11:1-11:2} }","short":"S.A. Opel, M. Schlichtig, C. Schulte, in: WiPSCE, ACM, 2019, p. 11:1-11:2.","mla":"Opel, Simone Anna, et al. “Developing Teaching Materials on Artificial Intelligence by Using a Simulation Game (Work in Progress).” WiPSCE, ACM, 2019, p. 11:1-11:2.","ieee":"S. A. Opel, M. Schlichtig, and C. Schulte, “Developing Teaching Materials on Artificial Intelligence by Using a Simulation Game (Work in Progress),” in WiPSCE, 2019, p. 11:1-11:2.","chicago":"Opel, Simone Anna, Michael Schlichtig, and Carsten Schulte. “Developing Teaching Materials on Artificial Intelligence by Using a Simulation Game (Work in Progress).” In WiPSCE, 11:1-11:2. ACM, 2019.","ama":"Opel SA, Schlichtig M, Schulte C. Developing Teaching Materials on Artificial Intelligence by Using a Simulation Game (Work in Progress). In: WiPSCE. ACM; 2019:11:1-11:2."},"language":[{"iso":"eng"}],"department":[{"_id":"67"}],"publication":"WiPSCE","type":"conference"},{"quality_controlled":"1","doi":"10.1145/3230833.3234517","date_updated":"2022-01-06T06:59:07Z","citation":{"apa":"Bemmann, K., Blömer, J., Bobolz, J., Bröcher, H., Diemert, D. P., Eidens, F., … Stienemeier, M. (n.d.). Fully-Featured Anonymous Credentials with Reputation System. In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. https://doi.org/10.1145/3230833.3234517","bibtex":"@inproceedings{Bemmann_Blömer_Bobolz_Bröcher_Diemert_Eidens_Eilers_Haltermann_Juhnke_Otour_et al., place={New York, NY, USA}, title={Fully-Featured Anonymous Credentials with Reputation System}, DOI={10.1145/3230833.3234517}, booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18}, publisher={ACM}, author={Bemmann, Kai and Blömer, Johannes and Bobolz, Jan and Bröcher, Henrik and Diemert, Denis Pascal and Eidens, Fabian and Eilers, Lukas and Haltermann, Jan Frederik and Juhnke, Jakob and Otour, Burhan and et al.} }","mla":"Bemmann, Kai, et al. “Fully-Featured Anonymous Credentials with Reputation System.” Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, doi:10.1145/3230833.3234517.","ama":"Bemmann K, Blömer J, Bobolz J, et al. Fully-Featured Anonymous Credentials with Reputation System. In: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. doi:10.1145/3230833.3234517","ieee":"K. Bemmann et al., “Fully-Featured Anonymous Credentials with Reputation System,” in Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, Hamburg, Germany.","chicago":"Bemmann, Kai, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Pascal Diemert, Fabian Eidens, Lukas Eilers, et al. “Fully-Featured Anonymous Credentials with Reputation System.” In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3234517.","short":"K. Bemmann, J. Blömer, J. Bobolz, H. Bröcher, D.P. Diemert, F. Eidens, L. Eilers, J.F. Haltermann, J. Juhnke, B. Otour, L.A. Porzenheim, S. Pukrop, E. Schilling, M. Schlichtig, M. Stienemeier, in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, New York, NY, USA, n.d."},"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"},{"name":"KogniHome - die mitdenkende Wohnung","_id":"44"}],"has_accepted_license":"1","user_id":"25078","abstract":[{"text":"We present CLARC (Cryptographic Library for Anonymous Reputation and Credentials), an anonymous credentials system (ACS) combined with an anonymous reputation system.\r\n\r\nUsing CLARC, users can receive attribute-based credentials from issuers. They can efficiently prove that their credentials satisfy complex (access) policies in a privacy-preserving way. This implements anonymous access control with complex policies.\r\n\r\nFurthermore, CLARC is the first ACS that is combined with an anonymous reputation system where users can anonymously rate services. A user who gets access to a service via a credential, also anonymously receives a review token to rate the service. If a user creates more than a single rating, this can be detected by anyone, preventing users from spamming ratings to sway public opinion.\r\n\r\nTo evaluate feasibility of our construction, we present an open-source prototype implementation.","lang":"eng"}],"language":[{"iso":"eng"}],"department":[{"_id":"64"}],"publication":"Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES '18","file_date_updated":"2018-11-08T10:17:39Z","title":"Fully-Featured Anonymous Credentials with Reputation System","publication_identifier":{"isbn":["978-1-4503-6448-5"]},"author":[{"last_name":"Bemmann","first_name":"Kai","full_name":"Bemmann, Kai"},{"last_name":"Blömer","first_name":"Johannes","full_name":"Blömer, Johannes","id":"23"},{"first_name":"Jan","last_name":"Bobolz","id":"27207","full_name":"Bobolz, Jan"},{"first_name":"Henrik","last_name":"Bröcher","id":"41047","full_name":"Bröcher, Henrik"},{"id":"44071","full_name":"Diemert, Denis Pascal","first_name":"Denis Pascal","last_name":"Diemert"},{"first_name":"Fabian","last_name":"Eidens","id":"25078","full_name":"Eidens, Fabian"},{"full_name":"Eilers, Lukas","first_name":"Lukas","last_name":"Eilers"},{"first_name":"Jan Frederik","last_name":"Haltermann","id":"44413","full_name":"Haltermann, Jan Frederik"},{"last_name":"Juhnke","first_name":"Jakob","full_name":"Juhnke, Jakob","id":"48090"},{"last_name":"Otour","first_name":"Burhan","full_name":"Otour, Burhan"},{"id":"47434","full_name":"Porzenheim, Laurens Alexander","last_name":"Porzenheim","first_name":"Laurens Alexander"},{"first_name":"Simon","last_name":"Pukrop","full_name":"Pukrop, Simon"},{"full_name":"Schilling, Erik","last_name":"Schilling","first_name":"Erik"},{"first_name":"Michael","last_name":"Schlichtig","id":"32312","full_name":"Schlichtig, Michael"},{"full_name":"Stienemeier, Marcel","last_name":"Stienemeier","first_name":"Marcel"}],"ddc":["000"],"_id":"3265","place":"New York, NY, USA","year":"2018","publisher":"ACM","conference":{"name":"ARES 2018 - SECPID","location":"Hamburg, Germany","end_date":"2018-08-30","start_date":"2018-08-27"},"date_created":"2018-06-14T11:19:29Z","oa":"1","type":"conference","publication_status":"accepted","file":[{"date_created":"2018-11-08T10:17:39Z","access_level":"closed","file_id":"5428","creator":"feidens","file_name":"react_acs.pdf","date_updated":"2018-11-08T10:17:39Z","relation":"main_file","file_size":920843,"content_type":"application/pdf"}],"status":"public","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/835"}],"related_material":{"link":[{"url":"https://github.com/upbcuk","relation":"software"}]}}]