TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 10.

Glanz, Leonid and Amann, Sven and Eichberg, Michael and Reif, Michael and Hermann, Ben and Lerch, Johannes and Mezini, Mira :
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
[Online-Edition: http://dl.acm.org/citation.cfm?id=3106305]
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering. Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering Paderborn, Germany
[Conference or Workshop Item] , (2017)

Holzinger, Philipp and Hermann, Ben and Lerch, Johannes and Bodden, Eric and Mezini, Mira :
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
2017 IEEE Symposium on Security and Privacy (SP 2017) Curran Associates, Inc
[Conference or Workshop Item] , (2017)

Lerch, Johannes :
On the Scalability of Static Program Analysis to Detect Vulnerabilities in the Java Platform.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5580]
Technische Universität Darmstadt , Darmstadt
[Ph.D. Thesis], (2016)

Reif, Michael and Eichberg, Michael and Hermann, Ben and Lerch, Johannes and Mezini, Mira :
Call graph construction for Java libraries.
In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering.
[Conference or Workshop Item] , (2016)

Proksch, Sebastian and Lerch, Johannes and Mezini, Mira :
Intelligent Code Completion with Bayesian Networks.
[Online-Edition: http://doi.acm.org/10.1145/2744200]
In: ACM Transactions on Software Engineering and Methodology (TOSEM), 25 (1) 3:1-3:31.
[Article] , (2015)

Lerch, Johannes and Späth, Johannes and Bodden, Eric and Mezini, Mira :
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
[Online-Edition: https://dl.acm.org/citation.cfm?id=2916135&picked=prox]
In: Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, 9.-13. November 2015, Lincoln, Nebraska, USA. Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE) IEEE Computer Society , Washington, DC, USA
[Conference or Workshop Item] , (2015)

Lerch, Johannes and Hermann, Ben :
Design Your Analysis: A Case Study on Implementation Reusability of Data-flow Functions.
[Online-Edition: http://doi.acm.org/10.1145/2771284.2771289]
In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, New York, NY, USA. In: SOAP 2015 . ACM , New York, NY, USA
[Conference or Workshop Item] , (2015)

Lerch, Johannes and Hermann, Ben and Bodden, Eric and Mezini, Mira :
FlowTwist: Efficient Context-sensitive Inside-out Taint Analysis for Large Codebases.
[Online-Edition: http://doi.acm.org/10.1145/2635868.2635878]
In: Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. In: FSE 2014 . ACM , New York, NY, USA
[Conference or Workshop Item] , (2014)

Bodden, Eric and Hermann, Ben and Lerch, Johannes and Mezini, Mira :
Reducing human factors in software security architectures.
[Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf]
In: Future Security Conference 2013.
[Conference or Workshop Item] , (2013)

Lerch, Johannes and Mezini, Mira :
Finding Duplicates of Your Yet Unwritten Bug Report.
[Online-Edition: http://dx.doi.org/10.1109/CSMR.2013.17]
2013 17th European Conference on Software Maintenance and Reengineering
[Conference or Workshop Item] , (2013)

This list was generated on Sat Apr 20 00:15:23 2019 CEST.