Search

Your search keyword '"Bodden, Eric"' showing total 516 results

Search Constraints

Start Over You searched for: Author "Bodden, Eric" Remove constraint Author: "Bodden, Eric"
516 results on '"Bodden, Eric"'

Search Results

1. An Empirical Study of Large Language Models for Type and Call Graph Analysis

2. Software Security Analysis in 2030 and Beyond: A Research Roadmap

3. Advancing Android Privacy Assessments with Automation

4. Do Android App Developers Accurately Report Collection of Privacy-Related Data?

5. Compilation of Commit Changes within Java Source Code Repositories

6. Supporting Error Chains in Static Analysis for Precise Evaluation Results and Enhanced Usability

7. Detecting Security-Relevant Methods using Multi-label Machine Learning

8. The Emergence of Large Language Models in Static Analysis: A First Look through Micro-Benchmarks

9. Toward an Android Static Analysis Approach for Data Protection

10. Symbol-Specific Sparsification of Interprocedural Distributive Environment Problems

11. TypeEvalPy: A Micro-benchmarking Framework for Python Type Inference Tools

12. slash: A Technique for Static Configuration-Logic Identification

14. Ernst Denert Software Engineering Award 2022

15. Static Analysis Driven Enhancements for Comprehension in Machine Learning Notebooks

16. An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities

17. How far are German companies in improving security through static program analysis tools?

18. SootUp: A Redesign of the Soot Static Analysis Framework

19. To what extent can we analyze Kotlin programs using existing Java taint analysis tools? (Extended Version)

20. CamBench -- Cryptographic API Misuse Detection Tool Benchmark Suite

21. Fluently specifying taint-flow queries with fluentTQL

22. Ernst Denert Award for Software Engineering 2022

23. Dealing with Variability in API Misuse Specification

24. The Impact of Developer Experience in Using Java Cryptography

26. ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware

27. Do Android Taint Analysis Tools Keep Their Promises?

28. Debugging Static Analysis

29. Self-adaptive static analysis

30. CrySL: Validating Correct Usage of Cryptographic APIs

31. Computation on Encrypted Data using Data Flow Authentication

32. Analyzing the Gadgets Towards a Metric to Measure Gadget Quality

33. ROPocop - Dynamic Mitigation of Code-Reuse Attacks

35. Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems

36. Using Abstract Contracts for Verifying Evolving Features and Their Interactions

37. AuthCheck: Program-State Analysis for Access-Control Vulnerabilities

43. I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis

45. PhASAR: An Inter-procedural Static Analysis Framework for C/C++

47. The Rocky Road to Sustainable Security

49. Model Checking the Information Flow Security of Real-Time Systems

50. Are Machine Learning Models for Malware Detection Ready for Prime Time?

Catalog

Books, media, physical & digital resources