Publikationen der Fachgruppe Secure Software Engineering

UpCy: Safely Updating Outdated Dependencies
A.P. Dann, B. Hermann, E. Bodden, (2023).
Model Generation For Java Frameworks
L. Luo, G. Piskachev, R. Krishnamurthy, J. Dolby, M. Schäf, E. Bodden, in: IEEE International Conference on Software Testing, Verification and Validation (ICST), 2023.
Enhancing Comprehension and Navigation in Jupyter Notebooks with Static Analysis
A.P. Shivarpatna Venkatesh, J. Wang, L. Li, E. Bodden, in: IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2023.
Two Sparsification Strategies for Accelerating Demand-Driven Pointer Analysis
K. Karakaya, E. Bodden, in: 2023 IEEE Conference on Software Testing, Verification and Validation (ICST), IEEE, 2023.
Runtime Verification of Crypto APIs: An Empirical Study
A. Torres, P. Costa, L. Amaral, J. Pastro, R. Bonifácio, M. d’Amorim, O. Legunsen, E. Bodden, E. Dias Canedo, IEEE Transactions on Software Engineering 49 (2023) 4510–4525.
Securing Your Crypto-API Usage Through Tool Support - A Usability Study
S. Krüger, M. Reif, A.-K. Wickert, S. Nadi, K. Ali, E. Bodden, Y. Acar, M. Mezini, S. Fahl, in: 2023 IEEE Secure Development Conference (SecDev), IEEE, 2023.
Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth
J. Pottebaum, J. Rossel, J. Somorovsky, Y. Acar, R. Fahr, P. Arias Cabarcos, E. Bodden, I. Gräßler, in: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE, 2023, pp. 379–385.
Computation on Encrypted Data Using Dataflow Authentication
A. Fischer, B. Fuhry, J. Kußmaul, J. Janneck, F. Kerschbaum, E. Bodden, ACM Transactions on Privacy and Security 25 (2022) 1–36.
CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite
M. Schlichtig, A.-K. Wickert, S. Krüger, E. Bodden, M. Mezini, CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite, 2022.
A Large-Scale Study of Usability Criteria Addressed by Static Analysis Tools
M. Nachtigall, M. Schlichtig, E. Bodden, in: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, 2022, pp. 532–543.
FUM - A Framework for API Usage constraint and Misuse Classification
M. Schlichtig, S. Sassalla, K. Narasimhan, E. Bodden, in: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), 2022, pp. 673–684.
Domain-specific Language for Condition Monitoring Software Development
F. Pasic, M. Becker, in: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, 2022.
Static data-flow analysis for software product lines in C
P. Schubert, P. Gazzillo, Z. Patterson, J. Braha, F. Schiebel, B. Hermann, S. Wei, E. Bodden, Automated Software Engineering 29 (2022).
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities
I. Sayar, A. Bartel, E. Bodden, Y. Le Traon, ACM Transactions on Software Engineering and Methodology (2022).
Fluently specifying taint-flow queries with fluentTQL
G. Piskachev, J. Späth, I. Budde, E. Bodden, Empirical Software Engineering 27 (2022) 1–33.
How far are German companies in improving security through static program analysis tools?
G. Piskachev, S. Dziwok, T. Koch, S. Merschjohann, E. Bodden, (2022).
To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild
A.-K. Wickert, L. Baumgärtner, M. Schlichtig, M. Mezini, To Fix or Not to Fix: A Critical Study of Crypto-Misuses in the Wild, 2022.
TaintBench: Automatic real-world malware benchmarking of Android taint analyses
L. Luo, F. Pauck, G. Piskachev, M. Benz, I. Pashchenko, M. Mory, E. Bodden, B. Hermann, F. Massacci, Empirical Software Engineering (2021).
Improving Real-World Applicability of Static Taint Analysis
L. Luo, Improving Real-World Applicability of Static Taint Analysis, Universität Paderborn, 2021.
Using Architectural Runtime Verification for Offline Data Analysis
L. Stockmann, S. Laux, E. Bodden, Journal of Automotive Software Engineering (2021).
Computing on Encrypted Data using Trusted Execution Environments
A. Fischer, Computing on Encrypted Data Using Trusted Execution Environments, Universität Paderborn, 2021.
Alle Publikationen anzeigen