Anna-Katharina Wickert

According to our database1, Anna-Katharina Wickert authored at least 13 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Supporting Error Chains in Static Analysis for Precise Evaluation Results and Enhanced Usability.
Proceedings of the IEEE International Conference on Software Analysis, 2024

2023
Algebraic Replicated Data Types: Programming Secure Local-First Software (Artifact).
Dagstuhl Artifacts Ser., 2023

Securing Your Crypto-API Usage Through Tool Support - A Usability Study.
Proceedings of the IEEE Secure Development Conference, 2023

UnGoML: Automated Classification of unsafe Usages in Go.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

Algebraic Replicated Data Types: Programming Secure Local-First Software.
Proceedings of the 37th European Conference on Object-Oriented Programming, 2023

2022
A fine-grained data set and analysis of tangling in bug fixing commits.
Empir. Softw. Eng., 2022

CamBench - Cryptographic API Misuse Detection Tool Benchmark Suite.
CoRR, 2022

To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Python Crypto Misuses in the Wild.
Proceedings of the ESEM '21: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2021

2020
Large-Scale Manual Validation of Bug Fixing Commits: A Fine-grained Analysis of Tangling.
CoRR, 2020

Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
A dataset of parametric cryptographic misuses.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

2016
Information Flow Analysis for Go.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016


  Loading...