Research Seminar

The Research Seminar "Secure Software Engineering" is open to the public.

It takes place every second Wednesday from 4 - 5 pm.

To book an appointment, please send the following answer by e-mail to Kadiray Karakaya at least one week before the desired date:

1. title of your talk

2. abstract of your talk

3. do you authorise us to publish your name on this website (yes/no)?

4. the name of the supervisor of the Bachelor's or Master's thesis

5. the name of the first and second reviewer for final presentations

Date Title Referent Type Location Language Comment
06.03.2024, 16:00 Leveraging Large Language Models for Automated Classification of Code Cells in Jupyter Notebooks Containing Python Code for Machine Learning Akshita Dubey Master's Proposal In person, F1.110 English

Supervisor: Ashwin Prasad

13.03.2024, 16:00 Tailoring Code Property Graphs to Jimple Michael Youkeim Bachelor's Defense In person, F1.110 English

Supervisor: Stefan Schott,

1st Examiner: Eric Bodden

2nd Examiner: Juraj Somorovsky

13.03.2024, 16:30 Analyse der Veränderung der Fixes von CVE-Schwachstellen in Java Open-Source Software Damian Finke Bachelor's Defense In person, F1.110 German

Supervisor: Stefan Schott,

1st Examiner: Eric Bodden

2nd Examiner: Juraj Somorovsky

20.03.2024, 16:00 SootUp: A Redesign of the Soot Static Analysis Framework Kadiray Karakaya Mock Presentation In person, F1.110 English To be presented at TACAS
20.03.2024,
16:30
In Progress Aakash Chaturvedi Master Proposal In person, F1.110 English

Supervisor: Stefan Schott, Ashwin Prasad

1st Examiner: Eric Bodden

2nd Examiner: Yasemin Acar

27.03.2024, 16:00 Symbol-Specific Sparsification
of Interprocedural Distributive Environment Problems
Kadiray Karakaya Mock Presentation In person, F1.110 English To be presented at ICSE
27.03.2024, 16:30 Benchmarking Large Language Models for Vulnerability Detection Vaibhav Chaudhari Master Proposal In person, F1.110 English Supervisor:  Ashwin Prasad,
Oshando Johnson
10.04.2024, 16:00 Classification of Data Science based Jupyter Notebook Cells using Large Language Models, Deep Learning and Static Analysis Suvansh Chawla Master Thesis Defense In person, F1.110 English

Supervisor:  Ashwin Prasad

1st Examiner: Eric Bodden

2nd Examiner: Stefan Dziwok

10.04.2024, 16:30 Toward an Android Static Analysis Approach for Data Protection Mugdha Khedkar Mock Presentation In person, F1.110 English To be presented at ICSE
24.04.2024,
16:00
Leveraging Body Interceptors and Evaluating Performance Impact on Client Analyses Sahil Agichani Master Thesis
Proposal
In person, F1.110 English

Supervisor: Stefan Schott,
Kadiray Karakaya

24.04.2024,
16:30
Empirical Evaluation of Java Instrumentation Frameworks for Call graph generation Rashmi Gupta Master Thesis In person, F1.110 English

Supervisor: Jonas Klauke

1st Examiner: Eric Bodden

2nd Examiner: Juraj Somorovsky

08.05.2024, 16:30 Empirical Evaluation of Call Graph Precision’s Impact on the Scalability

Palaniappan Muthuraman

Master Thesis Defense In person, F1.110 English

Supervisor: Kadiray Karakaya

1st Examiner: Eric Bodden

2nd Examiner: Juraj Somorovsky

16.05.2024, 16:00 A Benchmark Generator for Static Call Graph Analysis Jan-Philipp Hampe Master Thesis Defense In person, F1.110 English

Supervisor: Jonas Klauke

1st Examiner: Eric Bodden

2nd Examiner: Juraj Somorovsky

TBA Stefan Topic Presentation Stefan Schott Research Topic Talk In person, F1.110 English  
TBA Hybrid Reachabilty-Based Vulnerability Assessment and Debloating of Open Source Dependencies1 Jonas Klauke Research Topic Talk In person, F1.110 English  

The Type column indicates the type of presentation.

  • Master thesis (M),
  • Inaugural presentation for a Master's thesis (AM)
  • Bachelor thesis (B),
  • Inaugural presentation for a Bachelor's thesis (AB)
  • Doctoral dissertation (Diss),
  • Interim report on the doctoral dissertation (ZDiss),
  • Project group report (PG),
  • Interim report of the project group (ZPG)
  • Invited lecture (EV)
  • Other (S)

acts. Interim reports are usually shorter and should present the topic and possibly initial ideas for solutions.

Abstracts

1 Research findings indicate the prevalence of unused or partially utilized open source dependencies in applications. To tackle this issue, a reachability-based approach is employed, utilizing both static and dynamic call graph generation to identify reachable vulnerable methods while eliminating unreachable ones. The presentation will discuss the challenges, progress, and planned solution for a hybrid reachability-based vulnerability assessment and attack surface reduction in open source dependencies.