TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Jump to: 2017 | 2016 | 2015 | 2014 | 2013
Number of items: 10.

2017

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, Paderborn, Germany, In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3106305],
[Conference or Workshop Item]

Holzinger, Philipp and Hermann, Ben and Lerch, Johannes and Bodden, Eric and Mezini, Mira (2017):
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
In: 2017 IEEE Symposium on Security and Privacy (SP 2017), Curran Associates, Inc, San Jose, CA, USA, 2, ISBN 978-1-5090-5534-0,
[Conference or Workshop Item]

2016

Lerch, Johannes (2016):
On the Scalability of Static Program Analysis to Detect Vulnerabilities in the Java Platform.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5580],
[Ph.D. Thesis]

Reif, Michael and Eichberg, Michael and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2016):
Call graph construction for Java libraries.
In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, DOI: 10.1145/2950290.2950312,
[Conference or Workshop Item]

2015

Proksch, Sebastian and Lerch, Johannes and Mezini, Mira (2015):
Intelligent Code Completion with Bayesian Networks.
In: ACM Transactions on Software Engineering and Methodology (TOSEM), ACM Press, pp. 3:1-3:31, 25, (1), [Online-Edition: http://doi.acm.org/10.1145/2744200],
[Article]

Lerch, Johannes and Späth, Johannes and Bodden, Eric and Mezini, Mira (2015):
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
In: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), Washington, DC, USA, IEEE Computer Society, In: Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, Lincoln, Nebraska, USA, 9.-13. November 2015, [Online-Edition: https://dl.acm.org/citation.cfm?id=2916135&picked=prox],
[Conference or Workshop Item]

Lerch, Johannes and Hermann, Ben (2015):
Design Your Analysis: A Case Study on Implementation Reusability of Data-flow Functions.
New York, NY, USA, ACM, In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, New York, NY, USA, In: SOAP 2015, ISBN 978-1-4503-3585-0,
[Online-Edition: http://doi.acm.org/10.1145/2771284.2771289],
[Conference or Workshop Item]

2014

Lerch, Johannes and Hermann, Ben and Bodden, Eric and Mezini, Mira (2014):
FlowTwist: Efficient Context-sensitive Inside-out Taint Analysis for Large Codebases.
New York, NY, USA, ACM, In: Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, In: FSE 2014, [Online-Edition: http://doi.acm.org/10.1145/2635868.2635878],
[Conference or Workshop Item]

2013

Bodden, Eric and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2013):
Reducing human factors in software security architectures.
In: Future Security Conference 2013, [Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf],
[Conference or Workshop Item]

Lerch, Johannes and Mezini, Mira (2013):
Finding Duplicates of Your Yet Unwritten Bug Report.
In: 2013 17th European Conference on Software Maintenance and Reengineering, [Online-Edition: http://dx.doi.org/10.1109/CSMR.2013.17],
[Conference or Workshop Item]

This list was generated on Tue Nov 19 01:18:52 2019 CET.