Eric Bodden

According to our database1, Eric Bodden authored at least 138 papers between 2003 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
ModGuard: Identifying Integrity & Confidentiality Violations in Java Modules.
Proceedings of the Software Engineering 2021, 2021

Heaps'n Leaks: How Heap Snapshots Improve Android Taint Analysis.
Proceedings of the Software Engineering 2021, 2021

2020
Using Abstract Contracts for Verifying Evolving Features and Their Interactions.
Proceedings of the Deductive Software Verification: Future Perspectives, 2020

Debugging Static Analysis.
IEEE Trans. Software Eng., 2020

Computation on Encrypted Data using Dataflow Authentication.
Proc. Priv. Enhancing Technol., 2020

A systematic literature review of model-driven security engineering for cyber-physical systems.
J. Syst. Softw., 2020

Reproducing Taint-Analysis Results with ReproDroid.
Proceedings of the Software Engineering 2020, 2020

Scenario-based specification of security protocols and transformation to security model checkers.
Proceedings of the MoDELS '20: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems, 2020

Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems.
Proceedings of the Advanced, Contemporary Control - Proceedings of KKA 2020, 2020

PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

CogniCrypt<sub><i>GEN</i></sub>: generating code for the secure usage of crypto APIs.
Proceedings of the CGO '20: 18th ACM/IEEE International Symposium on Code Generation and Optimization, 2020

2019
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems.
Proc. ACM Program. Lang., 2019

PhASAR: An Inter-procedural Static Analysis Framework for C/C++.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2019

Know your analysis: how instrumentation aids understanding static analysis.
Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2019

SootDiff: bytecode comparison across different Java compilers.
Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2019

SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Explaining Static Analysis - A Perspective.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

A Qualitative Analysis of Android Taint-Analysis Results.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Codebase-adaptive detection of security-relevant methods.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Architectural Runtime Verification.
Proceedings of the IEEE International Conference on Software Architecture Companion, 2019

AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.
Proceedings of the Formal Methods. FM 2019 International Workshops, 2019

The Impact of Developer Experience in Using Java Cryptography.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019

MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper).
Proceedings of the 33rd European Conference on Object-Oriented Programming, 2019

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Tracking Load-Time Configuration Options.
IEEE Trans. Software Eng., 2018

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (Artifact).
Dagstuhl Artifacts Ser., 2018

Do Android taint analysis tools keep their promises?
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Gamifying static analysis.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Explainable Static Analysis.
Proceedings of the Software Engineering und Software Management 2018, 2018

The secret sauce in efficient and precise static analysis: the beauty of distributive, summary-based static analyses (and how to master them).
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018

Towards ensuring security by design in cyber-physical systems engineering processes.
Proceedings of the 2018 International Conference on Software and System Process, 2018

VISUFLOW: a debugging environment for static analyses.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

State of the systems security.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Self-adaptive static analysis.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

Model Checking the Information Flow Security of Real-Time Systems.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
Proceedings of the 32nd European Conference on Object-Oriented Programming, 2018

2017
IDE<sup><i>al</i></sup>: efficient and precise alias-aware dataflow analysis.
Proc. ACM Program. Lang., 2017

Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
Data Sci. Eng., 2017

CrySL: Validating Correct Usage of Cryptographic APIs.
CoRR, 2017

Computation on Encrypted Data using Data Flow Authentication.
CoRR, 2017

Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

"Jumping Through Hoops": Why do Java Developers Struggle With Cryptography APIs?
Proceedings of the Software Engineering 2017, 2017


CogniCrypt: supporting developers in using cryptography.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Just-in-time static analysis.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Cheetah: just-in-time taint analysis for Android apps.
Proceedings of the 39th International Conference on Software Engineering, 2017

The Soot-Based Toolchain for Analyzing Android Apps.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

2016
Connecting and Serving the Software Engineering Community.
IEEE Trans. Software Eng., 2016

ROPocop - Dynamic mitigation of code-reuse attacks.
J. Inf. Secur. Appl., 2016

Harvester.
Datenschutz und Datensicherheit, 2016

Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (Artifact).
Dagstuhl Artifacts Ser., 2016

PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

Toward an automated benchmark management system.
Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016

Towards cross-platform cross-language analysis with soot.
Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016

Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Information Flow Analysis for Go.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

StubDroid: automatic inference of precise data-flow summaries for the android framework.
Proceedings of the 38th International Conference on Software Engineering, 2016

Investigating Users' Reaction to Fine-Grained Data Requests: A Market Experiment.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Reverse Engineering Android Apps With CodeInspect (invited paper).
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.
Proceedings of the 30th European Conference on Object-Oriented Programming, 2016

An In-Depth Study of More Than Ten Years of Java Exploitation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Incorporating attacker capabilities in risk estimation and mitigation.
Comput. Secur., 2015

How Current Android Malware Seeks to Evade Automated Code Analysis.
Proceedings of the Information Security Theory and Practice, 2015

jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Using targeted symbolic execution for reducing false-positives in dataflow analysis.
Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2015

Towards secure integration of cryptographic software.
Proceedings of the 2015 ACM International Symposium on New Ideas, 2015

Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study.
Proceedings of the Information Security - 18th International Conference, 2015

Dynamically Provisioning Isolation in Hierarchical Architectures.
Proceedings of the Information Security - 18th International Conference, 2015

Mining Apps for Abnormal Usage of Sensitive Data.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Join point interfaces for safe and flexible decoupling of aspects.
ACM Trans. Softw. Eng. Methodol., 2014

Likelihood of Threats to Connected Vehicles.
Int. J. Next Gener. Comput., 2014

I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
CoRR, 2014

FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

SPLLIFT - Statically Analyzing Software Product Lines in Minutes Instead of Years.
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014

How to build the perfect Swiss army knife, and keep it sharp?: Challenges for the soot program-analysis framework in the light of past, current and future demands.
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014

TS4J: a fluent interface for defining and computing typestate analyses.
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014

FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

Variational Data Structures: Exploring Tradeoffs in Computing with Variability.
Proceedings of the Onward! 2014, 2014

A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
Proceedings of the 36th International Conference on Software Engineering, 2014

Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Automated API Property Inference Techniques.
IEEE Trans. Software Eng., 2013

Schutzmaßnahmen gegen datenschutz- unfreundliche Smartphone-Apps.
Datenschutz und Datensicherheit, 2013

Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

How Useful Are Existing Monitoring Languages for Securing Android Apps?
Proceedings of the Software Engineering 2013 - Workshopband (inkl. Doktorandensymposium), Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar, 2013

Distributed Finite-State Runtime Monitoring with Aggregated Events.
Proceedings of the Runtime Verification - 4th International Conference, 2013

Instrumenting Android and Java Applications as Easy as abc.
Proceedings of the Runtime Verification - 4th International Conference, 2013

SPL<sup>LIFT</sup>: statically analyzing software product lines in minutes instead of years.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

Easily instrumenting android applications for security purposes.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

A brief tour of join point interfaces.
Proceedings of the Aspect-Oriented Software Development, 2013

2012
Partially Evaluating Finite-State Runtime Monitors Ahead of Time.
ACM Trans. Program. Lang. Syst., 2012

The Clara framework for hybrid typestate analysis.
Int. J. Softw. Tools Technol. Transf., 2012

Challenges for Refinement and Composition of Instrumentations: Position Paper.
Proceedings of the Software Composition - 11th International Conference, 2012

InvokeDynamic support in Soot.
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012

Inter-procedural data-flow analysis with IFDS/IDE and Soot.
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012

Static flow-sensitive & context-sensitive information-flow analysis for software product lines: position paper.
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012

Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
Proceedings of the Information Security - 15th International Conference, 2012

RefaFlex: safer refactorings for reflective Java programs.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Challenges in Defining a Programming Language for Provably Correct Dynamic Analyses.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012

Delta-Oriented Monitor Specification.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012

Towards typesafe weaving for modular reasoning in aspect-oriented programs.
Proceedings of the eleventh workshop on Foundations of Aspect-Oriented Languages, 2012

2011
Join point interfaces for modular reasoning in aspect-oriented programs.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

Stateful breakpoints: a practical approach to defining parameterized runtime monitors.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

MOPBox: A Library Approach to Runtime Verification - (Tool Demonstration).
Proceedings of the Runtime Verification - Second International Conference, 2011

Continuation equivalence: a correctness criterion for static optimizations of dynamic analyses.
Proceedings of the International Workshop on Dynamic Analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2011), 2011

Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Closure joinpoints: block joinpoints without surprises.
Proceedings of the 10th International Conference on Aspect-Oriented Software Development, 2011

2010
Aspect-Oriented Race Detection in Java.
IEEE Trans. Software Eng., 2010

Collaborative Runtime Verification with Tracematches.
J. Log. Comput., 2010

IDE 2.0: collective intelligence in software development.
Proceedings of the Workshop on Future of Software Engineering Research, 2010

Reducing Configurations to Monitor in a Software Product Line.
Proceedings of the Runtime Verification - First International Conference, 2010

Clara: A Framework for Partially Evaluating Finite-State Runtime Monitors Ahead of Time.
Proceedings of the Runtime Verification - First International Conference, 2010

Clara: Partially Evaluating Runtime Monitors at Compile Time - Tutorial Supplement.
Proceedings of the Runtime Verification - First International Conference, 2010

Effective API navigation and reuse.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010

Efficient hybrid typestate analysis by determining continuation-equivalent states.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

2009
Dependent advice: a general approach to optimizing history-based aspects.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

2008
Finding programming errors earlier by evaluating runtime monitors ahead-of-time.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Racer: effective race detection using aspectj.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

Object representatives: a uniform abstraction for pointer information.
Proceedings of the Visions of Computer Science, 2008

Relational aspects as tracematches.
Proceedings of the 7th International Conference on Aspect-Oriented Software Development, 2008

2007
The design and implementation of formal monitoring techniques.
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

Domain-Specific Modelling With Atom3.
Proceedings of the ICSOFT 2007, 2007

A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring.
Proceedings of the ECOOP 2007 - Object-Oriented Programming, 21st European Conference, Berlin, Germany, July 30, 2007

Transforming Timeline Specifications into Automata for Runtime Monitoring.
Proceedings of the Applications of Graph Transformations with Industrial Relevance, 2007

2006
Temporal Assertions using AspectJ.
Electron. Notes Theor. Comput. Sci., 2006

Tracechecks: Defining Semantic Interfaces with Temporal Logic.
Proceedings of the Software Composition - 5th International Symposium, 2006

Efficient trace monitoring.
Proceedings of the Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2006

Aspects and Data Refinement.
Proceedings of the Mathematics of Program Construction, 8th International Conference, 2006

Avoiding Infinite Recursion with Stratified Aspects.
Proceedings of the Conference Proceedings NODe 2006, 2006

Aspects for Trace Monitoring.
Proceedings of the Formal Approaches to Software Testing and Runtime Verification, 2006

2004
A lightweight LTL runtime verification tool for java.
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

2003
A high-level view of Java applications.
Proceedings of the Companion of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2003


  Loading...