[{"title":"Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?","user_id":"477","publisher":"ACM","author":[{"id":"50003","last_name":"Richter","full_name":"Richter, Cedric","first_name":"Cedric"},{"full_name":"Haltermann, Jan Frederik","first_name":"Jan Frederik","id":"44413","last_name":"Haltermann"},{"last_name":"Jakobs","first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine"},{"id":"22398","last_name":"Pauck","full_name":"Pauck, Felix","first_name":"Felix"},{"full_name":"Schott, Stefan","first_name":"Stefan","id":"54847","last_name":"Schott"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"department":[{"_id":"77"}],"publication":"37th IEEE/ACM International Conference on Automated Software Engineering","publication_status":"published","status":"public","date_created":"2023-01-09T06:28:44Z","project":[{"name":"SFB 901 - B: SFB 901 - Project Area B","_id":"3"},{"_id":"12","name":"SFB 901 - B4: SFB 901 - Subproject B4"},{"name":"SFB 901: SFB 901","_id":"1"}],"_id":"35426","date_updated":"2023-01-19T13:50:18Z","doi":"10.1145/3551349.3561156","oa":"1","main_file_link":[{"url":"https://doi.org/10.1145/3551349.3561156","open_access":"1"}],"type":"conference","citation":{"ama":"Richter C, Haltermann JF, Jakobs M-C, Pauck F, Schott S, Wehrheim H. Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? In: 37th IEEE/ACM International Conference on Automated Software Engineering. ACM; 2023. doi:10.1145/3551349.3561156","apa":"Richter, C., Haltermann, J. F., Jakobs, M.-C., Pauck, F., Schott, S., & Wehrheim, H. (2023). Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? 37th IEEE/ACM International Conference on Automated Software Engineering. https://doi.org/10.1145/3551349.3561156","chicago":"Richter, Cedric, Jan Frederik Haltermann, Marie-Christine Jakobs, Felix Pauck, Stefan Schott, and Heike Wehrheim. “Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?” In 37th IEEE/ACM International Conference on Automated Software Engineering. ACM, 2023. https://doi.org/10.1145/3551349.3561156.","mla":"Richter, Cedric, et al. “Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?” 37th IEEE/ACM International Conference on Automated Software Engineering, ACM, 2023, doi:10.1145/3551349.3561156.","bibtex":"@inproceedings{Richter_Haltermann_Jakobs_Pauck_Schott_Wehrheim_2023, title={Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?}, DOI={10.1145/3551349.3561156}, booktitle={37th IEEE/ACM International Conference on Automated Software Engineering}, publisher={ACM}, author={Richter, Cedric and Haltermann, Jan Frederik and Jakobs, Marie-Christine and Pauck, Felix and Schott, Stefan and Wehrheim, Heike}, year={2023} }","short":"C. Richter, J.F. Haltermann, M.-C. Jakobs, F. Pauck, S. Schott, H. Wehrheim, in: 37th IEEE/ACM International Conference on Automated Software Engineering, ACM, 2023.","ieee":"C. Richter, J. F. Haltermann, M.-C. Jakobs, F. Pauck, S. Schott, and H. Wehrheim, “Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?,” 2023, doi: 10.1145/3551349.3561156."},"year":"2023","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"citation":{"ieee":"J. F. Haltermann and H. Wehrheim, “Cooperative Verification via Collective Invariant Generation,” arXiv:2008.04551. 2020.","short":"J.F. Haltermann, H. Wehrheim, ArXiv:2008.04551 (2020).","bibtex":"@article{Haltermann_Wehrheim_2020, title={Cooperative Verification via Collective Invariant Generation}, journal={arXiv:2008.04551}, author={Haltermann, Jan Frederik and Wehrheim, Heike}, year={2020} }","mla":"Haltermann, Jan Frederik, and Heike Wehrheim. “Cooperative Verification via Collective Invariant Generation.” ArXiv:2008.04551, 2020.","ama":"Haltermann JF, Wehrheim H. Cooperative Verification via Collective Invariant Generation. arXiv:200804551. 2020.","apa":"Haltermann, J. F., & Wehrheim, H. (2020). Cooperative Verification via Collective Invariant Generation. ArXiv:2008.04551.","chicago":"Haltermann, Jan Frederik, and Heike Wehrheim. “Cooperative Verification via Collective Invariant Generation.” ArXiv:2008.04551, 2020."},"year":"2020","type":"preprint","_id":"17825","date_updated":"2022-01-06T06:53:20Z","project":[{"_id":"85","name":"Kooperative Softwareverifikation"}],"date_created":"2020-08-12T06:49:18Z","status":"public","publication":"arXiv:2008.04551","department":[{"_id":"77"}],"author":[{"id":"44413","last_name":"Haltermann","full_name":"Haltermann, Jan Frederik","first_name":"Jan Frederik"},{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"user_id":"44413","title":"Cooperative Verification via Collective Invariant Generation","abstract":[{"lang":"eng","text":"Software verification has recently made enormous progress due to the\r\ndevelopment of novel verification methods and the speed-up of supporting\r\ntechnologies like SMT solving. To keep software verification tools up to date\r\nwith these advances, tool developers keep on integrating newly designed methods\r\ninto their tools, almost exclusively by re-implementing the method within their\r\nown framework. While this allows for a conceptual re-use of methods, it\r\nrequires novel implementations for every new technique.\r\n In this paper, we employ cooperative verification in order to avoid\r\nreimplementation and enable usage of novel tools as black-box components in\r\nverification. Specifically, cooperation is employed for the core ingredient of\r\nsoftware verification which is invariant generation. Finding an adequate loop\r\ninvariant is key to the success of a verification run. Our framework named\r\nCoVerCIG allows a master verification tool to delegate the task of invariant\r\ngeneration to one or several specialized helper invariant generators. Their\r\nresults are then utilized within the verification run of the master verifier,\r\nallowing in particular for crosschecking the validity of the invariant. We\r\nexperimentally evaluate our framework on an instance with two masters and three\r\ndifferent invariant generators using a number of benchmarks from SV-COMP 2020.\r\nThe experiments show that the use of CoVerCIG can increase the number of\r\ncorrectly verified tasks without increasing the used resources"}]},{"year":"2019","type":"mastersthesis","citation":{"bibtex":"@book{Haltermann_2019, title={Analyzing Data Usage in Array Programs}, author={Haltermann, Jan Frederik}, year={2019} }","mla":"Haltermann, Jan Frederik. Analyzing Data Usage in Array Programs. 2019.","apa":"Haltermann, J. F. (2019). Analyzing Data Usage in Array Programs.","ama":"Haltermann JF. Analyzing Data Usage in Array Programs.; 2019.","chicago":"Haltermann, Jan Frederik. Analyzing Data Usage in Array Programs, 2019.","ieee":"J. F. Haltermann, Analyzing Data Usage in Array Programs. 2019.","short":"J.F. Haltermann, Analyzing Data Usage in Array Programs, 2019."},"supervisor":[{"last_name":"Wehrheim","id":"573","first_name":"Heike","full_name":"Wehrheim, Heike"}],"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:51:23Z","_id":"12885","has_accepted_license":"1","status":"public","date_created":"2019-07-24T08:06:11Z","author":[{"id":"44413","last_name":"Haltermann","full_name":"Haltermann, Jan Frederik","first_name":"Jan Frederik"}],"department":[{"_id":"77"}],"file_date_updated":"2019-07-24T07:44:29Z","file":[{"access_level":"closed","file_name":"Thesis_Haltermann.pdf","date_created":"2019-07-24T07:44:29Z","success":1,"relation":"main_file","date_updated":"2019-07-24T07:44:29Z","content_type":"application/pdf","file_id":"12886","creator":"jfh","file_size":1344093}],"ddc":["000"],"title":"Analyzing Data Usage in Array Programs","user_id":"44413"},{"place":"New York, NY, USA","related_material":{"link":[{"url":"https://github.com/upbcuk","relation":"software"}]},"title":"Fully-Featured Anonymous Credentials with Reputation System","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C1","_id":"13"},{"_id":"44","name":"KogniHome - die mitdenkende Wohnung"}],"publication_status":"accepted","publication_identifier":{"isbn":["978-1-4503-6448-5"]},"date_updated":"2022-01-06T06:59:07Z","oa":"1","doi":"10.1145/3230833.3234517","language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"We present CLARC (Cryptographic Library for Anonymous Reputation and Credentials), an anonymous credentials system (ACS) combined with an anonymous reputation system.\r\n\r\nUsing CLARC, users can receive attribute-based credentials from issuers. They can efficiently prove that their credentials satisfy complex (access) policies in a privacy-preserving way. This implements anonymous access control with complex policies.\r\n\r\nFurthermore, CLARC is the first ACS that is combined with an anonymous reputation system where users can anonymously rate services. A user who gets access to a service via a credential, also anonymously receives a review token to rate the service. If a user creates more than a single rating, this can be detected by anyone, preventing users from spamming ratings to sway public opinion.\r\n\r\nTo evaluate feasibility of our construction, we present an open-source prototype implementation."}],"user_id":"25078","ddc":["000"],"file":[{"relation":"main_file","content_type":"application/pdf","date_updated":"2018-11-08T10:17:39Z","file_id":"5428","creator":"feidens","file_size":920843,"access_level":"closed","file_name":"react_acs.pdf","date_created":"2018-11-08T10:17:39Z"}],"quality_controlled":"1","author":[{"full_name":"Bemmann, Kai","first_name":"Kai","last_name":"Bemmann"},{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"},{"id":"27207","last_name":"Bobolz","full_name":"Bobolz, Jan","first_name":"Jan"},{"full_name":"Bröcher, Henrik","first_name":"Henrik","id":"41047","last_name":"Bröcher"},{"last_name":"Diemert","id":"44071","first_name":"Denis Pascal","full_name":"Diemert, Denis Pascal"},{"full_name":"Eidens, Fabian","first_name":"Fabian","id":"25078","last_name":"Eidens"},{"last_name":"Eilers","full_name":"Eilers, Lukas","first_name":"Lukas"},{"id":"44413","last_name":"Haltermann","full_name":"Haltermann, Jan Frederik","first_name":"Jan Frederik"},{"full_name":"Juhnke, Jakob","first_name":"Jakob","id":"48090","last_name":"Juhnke"},{"last_name":"Otour","first_name":"Burhan","full_name":"Otour, Burhan"},{"first_name":"Laurens Alexander","full_name":"Porzenheim, Laurens Alexander","last_name":"Porzenheim","id":"47434"},{"last_name":"Pukrop","first_name":"Simon","full_name":"Pukrop, Simon"},{"last_name":"Schilling","first_name":"Erik","full_name":"Schilling, Erik"},{"last_name":"Schlichtig","id":"32312","first_name":"Michael","full_name":"Schlichtig, Michael"},{"full_name":"Stienemeier, Marcel","first_name":"Marcel","last_name":"Stienemeier"}],"publisher":"ACM","file_date_updated":"2018-11-08T10:17:39Z","publication":"Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES '18","status":"public","has_accepted_license":"1","date_created":"2018-06-14T11:19:29Z","_id":"3265","conference":{"end_date":"2018-08-30","name":"ARES 2018 - SECPID","start_date":"2018-08-27","location":"Hamburg, Germany"},"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/835"}],"type":"conference","year":"2018","citation":{"chicago":"Bemmann, Kai, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Pascal Diemert, Fabian Eidens, Lukas Eilers, et al. “Fully-Featured Anonymous Credentials with Reputation System.” In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3234517.","apa":"Bemmann, K., Blömer, J., Bobolz, J., Bröcher, H., Diemert, D. P., Eidens, F., … Stienemeier, M. (n.d.). Fully-Featured Anonymous Credentials with Reputation System. In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. https://doi.org/10.1145/3230833.3234517","ama":"Bemmann K, Blömer J, Bobolz J, et al. Fully-Featured Anonymous Credentials with Reputation System. In: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. doi:10.1145/3230833.3234517","bibtex":"@inproceedings{Bemmann_Blömer_Bobolz_Bröcher_Diemert_Eidens_Eilers_Haltermann_Juhnke_Otour_et al., place={New York, NY, USA}, title={Fully-Featured Anonymous Credentials with Reputation System}, DOI={10.1145/3230833.3234517}, booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18}, publisher={ACM}, author={Bemmann, Kai and Blömer, Johannes and Bobolz, Jan and Bröcher, Henrik and Diemert, Denis Pascal and Eidens, Fabian and Eilers, Lukas and Haltermann, Jan Frederik and Juhnke, Jakob and Otour, Burhan and et al.} }","mla":"Bemmann, Kai, et al. “Fully-Featured Anonymous Credentials with Reputation System.” Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, doi:10.1145/3230833.3234517.","short":"K. Bemmann, J. Blömer, J. Bobolz, H. Bröcher, D.P. Diemert, F. Eidens, L. Eilers, J.F. Haltermann, J. Juhnke, B. Otour, L.A. Porzenheim, S. Pukrop, E. Schilling, M. Schlichtig, M. Stienemeier, in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, New York, NY, USA, n.d.","ieee":"K. Bemmann et al., “Fully-Featured Anonymous Credentials with Reputation System,” in Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, Hamburg, Germany."}},{"page":"39--55","type":"conference","citation":{"mla":"Börding, Paul, et al. “JMCTest: Automatically Testing Inter-Method Contracts in Java.” Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018), vol. 11146, Springer, 2018, pp. 39--55.","bibtex":"@inproceedings{Börding_Haltermann_Jakobs_Wehrheim_2018, series={Lecture Notes in Computer Science}, title={JMCTest: Automatically Testing Inter-Method Contracts in Java}, volume={11146}, booktitle={Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018)}, publisher={Springer}, author={Börding, Paul and Haltermann, Jan Frederik and Jakobs, Marie-Christine and Wehrheim, Heike}, year={2018}, pages={39--55}, collection={Lecture Notes in Computer Science} }","chicago":"Börding, Paul, Jan Frederik Haltermann, Marie-Christine Jakobs, and Heike Wehrheim. “JMCTest: Automatically Testing Inter-Method Contracts in Java.” In Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018), 11146:39--55. Lecture Notes in Computer Science. Springer, 2018.","apa":"Börding, P., Haltermann, J. F., Jakobs, M.-C., & Wehrheim, H. (2018). JMCTest: Automatically Testing Inter-Method Contracts in Java. In Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018) (Vol. 11146, pp. 39--55). Cádiz, Spain: Springer.","ama":"Börding P, Haltermann JF, Jakobs M-C, Wehrheim H. JMCTest: Automatically Testing Inter-Method Contracts in Java. In: Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018). Vol 11146. Lecture Notes in Computer Science. Springer; 2018:39--55.","ieee":"P. Börding, J. F. Haltermann, M.-C. Jakobs, and H. Wehrheim, “JMCTest: Automatically Testing Inter-Method Contracts in Java,” in Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018), Cádiz, Spain, 2018, vol. 11146, pp. 39--55.","short":"P. Börding, J.F. Haltermann, M.-C. Jakobs, H. Wehrheim, in: Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018), Springer, 2018, pp. 39--55."},"year":"2018","conference":{"start_date":"2018-10-01","name":"IFIP International Conference on Testing Software and Systems","location":"Cádiz, Spain","end_date":"2018-10-03"},"intvolume":" 11146","_id":"3414","date_created":"2018-07-02T09:06:56Z","has_accepted_license":"1","status":"public","volume":11146,"file":[{"access_level":"closed","file_name":"Börding2018_Chapter_JMCTestAutomaticallyTestingInt.pdf","date_created":"2018-11-21T09:35:35Z","relation":"main_file","success":1,"date_updated":"2018-11-21T09:35:35Z","content_type":"application/pdf","file_id":"5770","creator":"schlatt","file_size":574386}],"file_date_updated":"2018-11-21T09:35:35Z","publication":"Proceedings of the IFIP International Conference on Testing Software and Systems (ICTSS 2018)","publisher":"Springer","author":[{"last_name":"Börding","first_name":"Paul","full_name":"Börding, Paul"},{"first_name":"Jan Frederik","full_name":"Haltermann, Jan Frederik","last_name":"Haltermann","id":"44413"},{"first_name":"Marie-Christine","full_name":"Jakobs, Marie-Christine","last_name":"Jakobs"},{"id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"user_id":"29719","ddc":["006"],"abstract":[{"lang":"eng","text":"Over the years, Design by Contract (DbC) has evolved as a\r\npowerful concept for program documentation, testing, and verification.\r\nContracts formally specify assertions on (mostly) object-oriented programs:\r\npre- and postconditions of methods, class invariants, allowed call\r\norders, etc. Missing in the long list of properties specifiable by contracts\r\nare, however, method correlations: DbC languages fall short on stating\r\nassertions relating methods.\r\nIn this paper, we propose the novel concept of inter-method contract,\r\nallowing precisely for expressing method correlations.We present JMC as\r\na language for specifying and JMCTest as a tool for dynamically checking\r\ninter-method contracts on Java programs. JMCTest fully automatically\r\ngenerates objects on which the contracted methods are called and\r\nthe validity of the contract is checked. Using JMCTest, we detected\r\nthat large Java code bases (e.g. JBoss, Java RT) frequently violate standard\r\ninter-method contracts. In comparison to other verification tools\r\ninspecting (some) inter-method contracts, JMCTest can find bugs that\r\nremain undetected by those tools."}],"language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","date_updated":"2022-01-06T06:59:15Z","project":[{"_id":"1","name":"SFB 901"},{"name":"SFB 901 - Project Area B","_id":"3"},{"_id":"11","name":"SFB 901 - Subproject B3"}],"publication_status":"published","department":[{"_id":"7"},{"_id":"77"}],"title":"JMCTest: Automatically Testing Inter-Method Contracts in Java"}]