[{"user_id":"5786","title":"A Systematic Analysis and Hardening of the Java Security Architecture","author":[{"last_name":"Holzinger","first_name":"Philipp","full_name":"Holzinger, Philipp"}],"publisher":"Universität Paderborn","department":[{"_id":"76"}],"status":"public","date_created":"2020-11-26T10:44:52Z","date_updated":"2022-01-06T06:54:29Z","_id":"20522","main_file_link":[{"url":"http://www.bodden.de/pubs/phdHolzinger.pdf"}],"language":[{"iso":"eng"}],"supervisor":[{"full_name":"Bodden, Eric","first_name":"Eric","last_name":"Bodden"}],"type":"dissertation","citation":{"ieee":"P. Holzinger, A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn, 2019.","short":"P. Holzinger, A Systematic Analysis and Hardening of the Java Security Architecture, Universität Paderborn, 2019.","mla":"Holzinger, Philipp. A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn, 2019.","bibtex":"@book{Holzinger_2019, title={A Systematic Analysis and Hardening of the Java Security Architecture}, publisher={Universität Paderborn}, author={Holzinger, Philipp}, year={2019} }","chicago":"Holzinger, Philipp. A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn, 2019.","apa":"Holzinger, P. (2019). A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn.","ama":"Holzinger P. A Systematic Analysis and Hardening of the Java Security Architecture. Universität Paderborn; 2019."},"year":"2019"},{"user_id":"5786","title":"User-Centered Tool Design for Data-Flow Analysis","publisher":"Universität Paderborn","author":[{"last_name":"Nguyen Quang Do","first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa"}],"department":[{"_id":"76"}],"status":"public","date_created":"2020-11-26T10:47:51Z","_id":"20524","date_updated":"2022-01-06T06:54:29Z","supervisor":[{"first_name":"Eric","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","last_name":"Bodden","id":"59256"}],"language":[{"iso":"eng"}],"year":"2019","citation":{"ieee":"L. Nguyen Quang Do, User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn, 2019.","short":"L. Nguyen Quang Do, User-Centered Tool Design for Data-Flow Analysis, Universität Paderborn, 2019.","bibtex":"@book{Nguyen Quang Do_2019, title={User-Centered Tool Design for Data-Flow Analysis}, publisher={Universität Paderborn}, author={Nguyen Quang Do, Lisa}, year={2019} }","mla":"Nguyen Quang Do, Lisa. User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn, 2019.","apa":"Nguyen Quang Do, L. (2019). User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn.","ama":"Nguyen Quang Do L. User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn; 2019.","chicago":"Nguyen Quang Do, Lisa. User-Centered Tool Design for Data-Flow Analysis. Universität Paderborn, 2019."},"type":"dissertation"},{"title":"Architectural Runtime Verification","user_id":"5786","author":[{"id":"48144","last_name":"Stockmann","full_name":"Stockmann, Lars","first_name":"Lars"},{"last_name":"Laux","full_name":"Laux, Sven","first_name":"Sven"},{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"}],"publication":"2019 IEEE International Conference on Software Architecture Companion (ICSA-C)","department":[{"_id":"76"}],"status":"public","date_created":"2020-11-27T10:16:59Z","_id":"20525","date_updated":"2022-01-06T06:54:29Z","doi":"10.1109/ICSA-C.2019.00021","main_file_link":[{"url":"http://www.bodden.de/pubs/stockmann19architectural.pdf"}],"citation":{"chicago":"Stockmann, Lars, Sven Laux, and Eric Bodden. “Architectural Runtime Verification.” In 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 77–84, 2019. https://doi.org/10.1109/ICSA-C.2019.00021.","apa":"Stockmann, L., Laux, S., & Bodden, E. (2019). Architectural Runtime Verification. 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 77–84. https://doi.org/10.1109/ICSA-C.2019.00021","ama":"Stockmann L, Laux S, Bodden E. Architectural Runtime Verification. In: 2019 IEEE International Conference on Software Architecture Companion (ICSA-C). ; 2019:77-84. doi:10.1109/ICSA-C.2019.00021","bibtex":"@inproceedings{Stockmann_Laux_Bodden_2019, title={Architectural Runtime Verification}, DOI={10.1109/ICSA-C.2019.00021}, booktitle={2019 IEEE International Conference on Software Architecture Companion (ICSA-C)}, author={Stockmann, Lars and Laux, Sven and Bodden, Eric}, year={2019}, pages={77–84} }","mla":"Stockmann, Lars, et al. “Architectural Runtime Verification.” 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 2019, pp. 77–84, doi:10.1109/ICSA-C.2019.00021.","short":"L. Stockmann, S. Laux, E. Bodden, in: 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 2019, pp. 77–84.","ieee":"L. Stockmann, S. Laux, and E. Bodden, “Architectural Runtime Verification,” in 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), 2019, pp. 77–84, doi: 10.1109/ICSA-C.2019.00021."},"type":"conference","year":"2019","page":"77-84","language":[{"iso":"eng"}]},{"publication":"2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)","department":[{"_id":"76"}],"author":[{"last_name":"Hazhirpasand","full_name":"Hazhirpasand, Mohammadreza","first_name":"Mohammadreza"},{"last_name":"Ghafari","first_name":"Mohammad","full_name":"Ghafari, Mohammad"},{"first_name":"Stefan","full_name":"Krüger, Stefan","last_name":"Krüger"},{"id":"59256","last_name":"Bodden","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric"},{"last_name":"Nierstrasz","full_name":"Nierstrasz, Oskar","first_name":"Oskar"}],"publication_identifier":{"issn":["1949-3770"]},"date_created":"2020-11-27T10:20:37Z","status":"public","title":"The Impact of Developer Experience in Using Java Cryptography","user_id":"5786","main_file_link":[{"url":"http://www.bodden.de/pubs/hazhirpasand19impact.pdf"}],"page":"1-6","type":"conference","year":"2019","citation":{"apa":"Hazhirpasand, M., Ghafari, M., Krüger, S., Bodden, E., & Nierstrasz, O. (2019). The Impact of Developer Experience in Using Java Cryptography. 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 1–6. https://doi.org/10.1109/ESEM.2019.8870184","ama":"Hazhirpasand M, Ghafari M, Krüger S, Bodden E, Nierstrasz O. The Impact of Developer Experience in Using Java Cryptography. In: 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). ; 2019:1-6. doi:10.1109/ESEM.2019.8870184","chicago":"Hazhirpasand, Mohammadreza, Mohammad Ghafari, Stefan Krüger, Eric Bodden, and Oskar Nierstrasz. “The Impact of Developer Experience in Using Java Cryptography.” In 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 1–6, 2019. https://doi.org/10.1109/ESEM.2019.8870184.","bibtex":"@inproceedings{Hazhirpasand_Ghafari_Krüger_Bodden_Nierstrasz_2019, title={The Impact of Developer Experience in Using Java Cryptography}, DOI={10.1109/ESEM.2019.8870184}, booktitle={2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)}, author={Hazhirpasand, Mohammadreza and Ghafari, Mohammad and Krüger, Stefan and Bodden, Eric and Nierstrasz, Oskar}, year={2019}, pages={1–6} }","mla":"Hazhirpasand, Mohammadreza, et al. “The Impact of Developer Experience in Using Java Cryptography.” 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019, pp. 1–6, doi:10.1109/ESEM.2019.8870184.","short":"M. Hazhirpasand, M. Ghafari, S. Krüger, E. Bodden, O. Nierstrasz, in: 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019, pp. 1–6.","ieee":"M. Hazhirpasand, M. Ghafari, S. Krüger, E. Bodden, and O. Nierstrasz, “The Impact of Developer Experience in Using Java Cryptography,” in 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), 2019, pp. 1–6, doi: 10.1109/ESEM.2019.8870184."},"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:29Z","_id":"20527","doi":"10.1109/ESEM.2019.8870184"},{"language":[{"iso":"eng"}],"year":"2019","citation":{"mla":"Piskachev, Goran, et al. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” 10th Workshop on Tools for Automatic Program Analysis (TAPAS), 2019.","bibtex":"@inproceedings{Piskachev_Petrasch_Späth_Bodden_2019, title={AuthCheck: Program-state Analysis for Access-control Vulnerabilities}, booktitle={10th Workshop on Tools for Automatic Program Analysis (TAPAS)}, author={Piskachev, Goran and Petrasch, Tobias and Späth, Johannes and Bodden, Eric}, year={2019} }","ama":"Piskachev G, Petrasch T, Späth J, Bodden E. AuthCheck: Program-state Analysis for Access-control Vulnerabilities. In: 10th Workshop on Tools for Automatic Program Analysis (TAPAS). ; 2019.","apa":"Piskachev, G., Petrasch, T., Späth, J., & Bodden, E. (2019). AuthCheck: Program-state Analysis for Access-control Vulnerabilities. 10th Workshop on Tools for Automatic Program Analysis (TAPAS).","chicago":"Piskachev, Goran, Tobias Petrasch, Johannes Späth, and Eric Bodden. “AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.” In 10th Workshop on Tools for Automatic Program Analysis (TAPAS), 2019.","ieee":"G. Piskachev, T. Petrasch, J. Späth, and E. Bodden, “AuthCheck: Program-state Analysis for Access-control Vulnerabilities,” 2019.","short":"G. Piskachev, T. Petrasch, J. Späth, E. Bodden, in: 10th Workshop on Tools for Automatic Program Analysis (TAPAS), 2019."},"type":"conference","main_file_link":[{"url":"http://www.bodden.de/pubs/piskachev19authcheck.pdf"}],"date_updated":"2022-01-06T06:54:29Z","_id":"20528","date_created":"2020-11-27T10:21:19Z","status":"public","department":[{"_id":"76"},{"_id":"241"}],"publication":"10th Workshop on Tools for Automatic Program Analysis (TAPAS)","author":[{"last_name":"Piskachev","full_name":"Piskachev, Goran","first_name":"Goran"},{"full_name":"Petrasch, Tobias","first_name":"Tobias","last_name":"Petrasch"},{"full_name":"Späth, Johannes","first_name":"Johannes","last_name":"Späth"},{"first_name":"Eric","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256"}],"user_id":"5786","title":"AuthCheck: Program-state Analysis for Access-control Vulnerabilities"},{"user_id":"5786","title":"Explaining Static Analysis -- A Perspective","date_created":"2020-11-27T10:22:38Z","status":"public","department":[{"_id":"76"}],"publication":"1st International Workshop on Explainable Software (EXPLAIN) at ASE","author":[{"first_name":"Marcus","full_name":"Nachtigall, Marcus","last_name":"Nachtigall","id":"41213"},{"first_name":"Lisa","full_name":"Nguyen Quang Do, Lisa","last_name":"Nguyen Quang Do"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"}],"_id":"20529","date_updated":"2022-01-06T06:54:29Z","language":[{"iso":"eng"}],"type":"conference","year":"2019","citation":{"apa":"Nachtigall, M., Nguyen Quang Do, L., & Bodden, E. (2019). Explaining Static Analysis -- A Perspective. 1st International Workshop on Explainable Software (EXPLAIN) at ASE.","ama":"Nachtigall M, Nguyen Quang Do L, Bodden E. Explaining Static Analysis -- A Perspective. In: 1st International Workshop on Explainable Software (EXPLAIN) at ASE. ; 2019.","chicago":"Nachtigall, Marcus, Lisa Nguyen Quang Do, and Eric Bodden. “Explaining Static Analysis -- A Perspective.” In 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","mla":"Nachtigall, Marcus, et al. “Explaining Static Analysis -- A Perspective.” 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","bibtex":"@inproceedings{Nachtigall_Nguyen Quang Do_Bodden_2019, title={Explaining Static Analysis -- A Perspective}, booktitle={1st International Workshop on Explainable Software (EXPLAIN) at ASE}, author={Nachtigall, Marcus and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }","short":"M. Nachtigall, L. Nguyen Quang Do, E. Bodden, in: 1st International Workshop on Explainable Software (EXPLAIN) at ASE, 2019.","ieee":"M. Nachtigall, L. Nguyen Quang Do, and E. Bodden, “Explaining Static Analysis -- A Perspective,” 2019."},"main_file_link":[{"url":"http://www.bodden.de/pubs/nachtigall19explaining.pdf"}]},{"_id":"20531","date_updated":"2022-01-06T06:54:29Z","main_file_link":[{"url":"http://www.bodden.de/pubs/ase19qualitative.pdf"}],"language":[{"iso":"eng"}],"citation":{"ieee":"L. Luo, E. Bodden, and J. Späth, “A Qualitative Analysis of Android Taint-Analysis Results,” 2019.","short":"L. Luo, E. Bodden, J. Späth, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","bibtex":"@inproceedings{Luo_Bodden_Späth_2019, title={A Qualitative Analysis of Android Taint-Analysis Results}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)}, author={Luo, Linghui and Bodden, Eric and Späth, Johannes}, year={2019} }","mla":"Luo, Linghui, et al. “A Qualitative Analysis of Android Taint-Analysis Results.” IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019.","ama":"Luo L, Bodden E, Späth J. A Qualitative Analysis of Android Taint-Analysis Results. In: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019). ; 2019.","apa":"Luo, L., Bodden, E., & Späth, J. (2019). A Qualitative Analysis of Android Taint-Analysis Results. IEEE/ACM International Conference on Automated Software Engineering (ASE 2019).","chicago":"Luo, Linghui, Eric Bodden, and Johannes Späth. “A Qualitative Analysis of Android Taint-Analysis Results.” In IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), 2019."},"type":"conference","year":"2019","user_id":"5786","title":"A Qualitative Analysis of Android Taint-Analysis Results","publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019)","department":[{"_id":"76"}],"author":[{"last_name":"Luo","full_name":"Luo, Linghui","first_name":"Linghui"},{"full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","first_name":"Eric","id":"59256","last_name":"Bodden"},{"last_name":"Späth","full_name":"Späth, Johannes","first_name":"Johannes"}],"date_created":"2020-11-27T10:25:40Z","status":"public"},{"department":[{"_id":"76"}],"publication":"IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track","author":[{"full_name":"Piskachev, Goran","first_name":"Goran","last_name":"Piskachev"},{"full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa","last_name":"Nguyen Quang Do"},{"last_name":"Johnson","full_name":"Johnson, Oshando","first_name":"Oshando"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-11-27T10:37:17Z","status":"public","user_id":"5786","title":"SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods","main_file_link":[{"url":"http://www.bodden.de/pubs/ase19swanAssist.pdf"}],"language":[{"iso":"eng"}],"type":"conference","year":"2019","citation":{"short":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, E. Bodden, in: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019.","ieee":"G. Piskachev, L. Nguyen Quang Do, O. Johnson, and E. Bodden, “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods,” 2019.","ama":"Piskachev G, Nguyen Quang Do L, Johnson O, Bodden E. SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. In: IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track. ; 2019.","apa":"Piskachev, G., Nguyen Quang Do, L., Johnson, O., & Bodden, E. (2019). SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track.","chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, Oshando Johnson, and Eric Bodden. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” In IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Johnson_Bodden_2019, title={SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods}, booktitle={IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Johnson, Oshando and Bodden, Eric}, year={2019} }","mla":"Piskachev, Goran, et al. “SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.” IEEE/ACM International Conference on Automated Software Engineering (ASE 2019), Tool Demo Track, 2019."},"date_updated":"2022-01-06T06:54:29Z","_id":"20532"},{"publication":"IEEE Transactions on Software Engineering","department":[{"_id":"76"}],"keyword":["Java","Encryption","Static analysis","Tools","Ciphers","Semantics","cryptography","domain-specific language","static analysis"],"author":[{"last_name":"Krüger","full_name":"Krüger, Stefan","first_name":"Stefan"},{"first_name":"Johannes","full_name":"Späth, Johannes","last_name":"Späth"},{"last_name":"Ali","full_name":"Ali, Karim","first_name":"Karim"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"},{"full_name":"Mezini, Mira","first_name":"Mira","last_name":"Mezini"}],"date_created":"2020-11-27T10:48:38Z","status":"public","publication_identifier":{"issn":["2326-3881"]},"user_id":"5786","title":"CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs","main_file_link":[{"url":"http://www.bodden.de/pubs/tse19CrySL.pdf"}],"language":[{"iso":"eng"}],"page":"1-1","year":"2019","type":"journal_article","citation":{"apa":"Krüger, S., Späth, J., Ali, K., Bodden, E., & Mezini, M. (2019). CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. IEEE Transactions on Software Engineering, 1–1. https://doi.org/10.1109/TSE.2019.2948910","ama":"Krüger S, Späth J, Ali K, Bodden E, Mezini M. CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. IEEE Transactions on Software Engineering. Published online 2019:1-1. doi:10.1109/TSE.2019.2948910","chicago":"Krüger, Stefan, Johannes Späth, Karim Ali, Eric Bodden, and Mira Mezini. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” IEEE Transactions on Software Engineering, 2019, 1–1. https://doi.org/10.1109/TSE.2019.2948910.","bibtex":"@article{Krüger_Späth_Ali_Bodden_Mezini_2019, title={CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs}, DOI={10.1109/TSE.2019.2948910}, journal={IEEE Transactions on Software Engineering}, author={Krüger, Stefan and Späth, Johannes and Ali, Karim and Bodden, Eric and Mezini, Mira}, year={2019}, pages={1–1} }","mla":"Krüger, Stefan, et al. “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.” IEEE Transactions on Software Engineering, 2019, pp. 1–1, doi:10.1109/TSE.2019.2948910.","short":"S. Krüger, J. Späth, K. Ali, E. Bodden, M. Mezini, IEEE Transactions on Software Engineering (2019) 1–1.","ieee":"S. Krüger, J. Späth, K. Ali, E. Bodden, and M. Mezini, “CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs,” IEEE Transactions on Software Engineering, pp. 1–1, 2019, doi: 10.1109/TSE.2019.2948910."},"date_updated":"2022-01-06T06:54:29Z","_id":"20533","doi":"10.1109/TSE.2019.2948910"},{"main_file_link":[{"url":"http://www.bodden.de/pubs/issta19swan.pdf"}],"year":"2019","type":"conference","citation":{"chicago":"Piskachev, Goran, Lisa Nguyen Quang Do, and Eric Bodden. “Codebase-Adaptive Detection of Security-Relevant Methods.” In ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019.","ama":"Piskachev G, Nguyen Quang Do L, Bodden E. Codebase-Adaptive Detection of Security-Relevant Methods. In: ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). ; 2019.","apa":"Piskachev, G., Nguyen Quang Do, L., & Bodden, E. (2019). Codebase-Adaptive Detection of Security-Relevant Methods. ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA).","mla":"Piskachev, Goran, et al. “Codebase-Adaptive Detection of Security-Relevant Methods.” ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019.","bibtex":"@inproceedings{Piskachev_Nguyen Quang Do_Bodden_2019, title={Codebase-Adaptive Detection of Security-Relevant Methods}, booktitle={ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)}, author={Piskachev, Goran and Nguyen Quang Do, Lisa and Bodden, Eric}, year={2019} }","short":"G. Piskachev, L. Nguyen Quang Do, E. Bodden, in: ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2019.","ieee":"G. Piskachev, L. Nguyen Quang Do, and E. Bodden, “Codebase-Adaptive Detection of Security-Relevant Methods,” 2019."},"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:54:29Z","_id":"20534","department":[{"_id":"76"}],"publication":"ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)","author":[{"last_name":"Piskachev","full_name":"Piskachev, Goran","first_name":"Goran"},{"full_name":"Nguyen Quang Do, Lisa","first_name":"Lisa","last_name":"Nguyen Quang Do"},{"id":"59256","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","first_name":"Eric"}],"date_created":"2020-11-27T10:49:33Z","status":"public","title":"Codebase-Adaptive Detection of Security-Relevant Methods","user_id":"5786"}]