Eric Bodden

Orcid: 0000-0003-3470-3647

Affiliations:
  • Paderborn University, Germany
  • Fraunhofer-Institut für Entwurfstechnik Mechatronik, Paderborn, Germany
  • Technische Universität Darmstadt, Germany


According to our database1, Eric Bodden authored at least 204 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Static analysis driven enhancements for comprehension in machine learning notebooks.
Empir. Softw. Eng., September, 2024

Ernst Denert Preis 2023.
Softwaretechnik-Trends, May, 2024

Evaluating Security Through Isolation and Defense in Depth.
IEEE Secur. Priv., 2024

Java Bytecode Normalization for Code Similarity Analysis (Artifact).
Dagstuhl Artifacts Ser., 2024

An Empirical Study of Large Language Models for Type and Call Graph Analysis.
CoRR, 2024

Compilation of Commit Changes within Java Source Code Repositories.
CoRR, 2024

Supporting Error Chains in Static Analysis for Precise Evaluation Results and Enhanced Usability.
Proceedings of the IEEE International Conference on Software Analysis, 2024

SootUp: A Redesign of the Soot Static Analysis Framework.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2024

Two Sparsification Strategies for Accelerating Demand-Driven Pointer Analysis.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024

UpCy: Safely Updating Outdated Dependencies (Summary).
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024

Toward an Android Static Analysis Approach for Data Protection.
Proceedings of the IEEE/ACM 11th International Conference on Mobile Software Engineering and Systems, 2024

Advancing Android Privacy Assessments with Automation.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024

Do Android App Developers Accurately Report Collection of Privacy-Related Data?
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024

Detecting Security-Relevant Methods using Multi-label Machine Learning.
Proceedings of the 1st ACM/IEEE Workshop on Integrated Development Environments, 2024

TypeEvalPy: A Micro-benchmarking Framework for Python Type Inference Tools.
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

Symbol-Specific Sparsification of Interprocedural Distributive Environment Problems.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Visualization Task Taxonomy to Understand the Fuzzing Internals (Registered Report).
Proceedings of the 3rd ACM International Fuzzing Workshop, 2024

The Emergence of Large Language Models in Static Analysis: A First Look through Micro-Benchmarks.
Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024

Java Bytecode Normalization for Code Similarity Analysis.
Proceedings of the 38th European Conference on Object-Oriented Programming, 2024

Scaling Interprocedural Static Data-Flow Analysis to Large C/C++ Applications: An Experience Report.
Proceedings of the 38th European Conference on Object-Oriented Programming, 2024

2023
Runtime Verification of Crypto APIs: An Empirical Study.
IEEE Trans. Software Eng., October, 2023

Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study.
Empir. Softw. Eng., October, 2023

Securing Your Crypto-API Usage Through Tool Support - A Usability Study.
Dataset, September, 2023

An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities.
ACM Trans. Softw. Eng. Methodol., January, 2023

UpCy: Safely Updating Outdated Dependencies.
Dataset, January, 2023

UpCy: Safely Updating Outdated Dependencies.
Dataset, January, 2023

UpCy: Safely Updating Outdated Dependencies.
Dataset, January, 2023

Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 23181).
Dagstuhl Reports, 2023

slash: A Technique for Static Configuration-Logic Identification.
CoRR, 2023

Enhancing Comprehension and Navigation in Jupyter Notebooks with Static Analysis.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Securing Your Crypto-API Usage Through Tool Support - A Usability Study.
Proceedings of the IEEE Secure Development Conference, 2023

Introducing FUM: A Framework for API Usage Constraint and Misuse Classification.
Proceedings of the Software Engineering 2023, 2023

Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale.
Proceedings of the Software Engineering 2023, 2023

Model Generation For Java Frameworks.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

UPCY: Safely Updating Outdated Dependencies.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
Debugging Static Analysis.
Dataset, May, 2022

Explaining Static Analysis With Rule Graphs.
IEEE Trans. Software Eng., 2022

Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite.
IEEE Trans. Software Eng., 2022

Computation on Encrypted Data Using Dataflow Authentication.
ACM Trans. Priv. Secur., 2022

25 Years in Application Security: Looking Back, Looking Forward.
IEEE Secur. Priv., 2022

"Free" as in Freedom to Protest?
IEEE Secur. Priv., 2022

Fluently specifying taint-flow queries with fluentTQL.
Empir. Softw. Eng., 2022

TaintBench: Automatic real-world malware benchmarking of Android taint analyses.
Empir. Softw. Eng., 2022

To what extent can we analyze Kotlin programs using existing Java taint analysis tools? (Extended Version)
CoRR, 2022

CamBench - Cryptographic API Misuse Detection Tool Benchmark Suite.
CoRR, 2022

Static data-flow analysis for software product lines in C.
Autom. Softw. Eng., 2022

FUM - A Framework for API Usage constraint and Misuse Classification.
Proceedings of the IEEE International Conference on Software Analysis, 2022

How far are German companies in improving security through static program analysis tools?
Proceedings of the IEEE Secure Development Conference, 2022

IDE Support for Cloud-Based Static Analyses.
Proceedings of the Software Engineering 2022, 2022

Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite (Short Summary).
Proceedings of the Software Engineering 2022, 2022

To what extent can we analyze Kotlin programs using existing Java taint analysis tools?
Proceedings of the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation, 2022

Integrating Security Protocols in Scenario-based Requirements Specifications.
Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, 2022

A large-scale study of usability criteria addressed by static analysis tools.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
Dealing with Variability in API Misuse Specification (Artifact Package).
Dataset, April, 2021

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
IEEE Trans. Software Eng., 2021

ModGuard : Identifying Integrity & Confidentiality Violations in Java Modules.
IEEE Trans. Software Eng., 2021

IDE support for cloud-based static analyses.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Heaps'n Leaks: How Heap Snapshots Improve Android Taint Analysis.
Proceedings of the Software Engineering 2021, 2021

Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++.
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021

Into the Woods: Experiences from Building a Dataflow Analysis Framework for C/C++.
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021

SecuCheck: Engineering configurable taint analysis for software developers.
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021

SootFX: A Static Code Feature Extraction Tool for Java and Android.
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021

Automated cell header generator for Jupyter notebooks.
Proceedings of the AISTA 2021: Proceedings of the 1st ACM International Workshop on AI and Software Testing/Analysis, 2021

Ensuring threat-model assumptions by using static code analyses.
Proceedings of the ECSA 2021 Companion Volume, 2021

Lossless, Persisted Summarization of Static Callgraph, Points-To and Data-Flow Analysis.
Proceedings of the 35th European Conference on Object-Oriented Programming, 2021

Dealing with Variability in API Misuse Specification.
Proceedings of the 35th European Conference on Object-Oriented Programming, 2021

A Systematic Hardening of Java's Information Hiding.
Proceedings of the ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems, 2021

2020
CogniCrypt_GEN - Generating Code for the Secure Use of Crypto APIs (Artefact).
Dataset, January, 2020

Using Abstract Contracts for Verifying Evolving Features and Their Interactions.
Proceedings of the Deductive Software Verification: Future Perspectives, 2020

Debugging Static Analysis.
IEEE Trans. Software Eng., 2020

Computation on Encrypted Data using Dataflow Authentication.
Proc. Priv. Enhancing Technol., 2020

A systematic literature review of model-driven security engineering for cyber-physical systems.
J. Syst. Softw., 2020

Reproducing Taint-Analysis Results with ReproDroid.
Proceedings of the Software Engineering 2020, 2020

Scenario-based specification of security protocols and transformation to security model checkers.
Proceedings of the MoDELS '20: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems, 2020

Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems.
Proceedings of the Advanced, Contemporary Control - Proceedings of KKA 2020, 2020

PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

CogniCrypt<sub><i>GEN</i></sub>: generating code for the secure usage of crypto APIs.
Proceedings of the CGO '20: 18th ACM/IEEE International Symposium on Code Generation and Optimization, 2020

2019
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems.
Proc. ACM Program. Lang., 2019

PhASAR: An Inter-procedural Static Analysis Framework for C/C++.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2019

Know your analysis: how instrumentation aids understanding static analysis.
Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2019

SootDiff: bytecode comparison across different Java compilers.
Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2019

SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Explaining Static Analysis - A Perspective.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

A Qualitative Analysis of Android Taint-Analysis Results.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Codebase-adaptive detection of security-relevant methods.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Architectural Runtime Verification.
Proceedings of the IEEE International Conference on Software Architecture Companion, 2019

AuthCheck: Program-State Analysis for Access-Control Vulnerabilities.
Proceedings of the Formal Methods. FM 2019 International Workshops, 2019

The Impact of Developer Experience in Using Java Cryptography.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019

MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper).
Proceedings of the 33rd European Conference on Object-Oriented Programming, 2019

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Tracking Load-Time Configuration Options.
IEEE Trans. Software Eng., 2018

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (Artifact).
Dagstuhl Artifacts Ser., 2018

Do Android taint analysis tools keep their promises?
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Gamifying static analysis.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Explainable Static Analysis.
Proceedings of the Software Engineering und Software Management 2018, 2018

The secret sauce in efficient and precise static analysis: the beauty of distributive, summary-based static analyses (and how to master them).
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018

Towards ensuring security by design in cyber-physical systems engineering processes.
Proceedings of the 2018 International Conference on Software and System Process, 2018

VISUFLOW: a debugging environment for static analyses.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

State of the systems security.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Self-adaptive static analysis.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

Model Checking the Information Flow Security of Real-Time Systems.
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018

2017
IDE<sup><i>al</i></sup>: efficient and precise alias-aware dataflow analysis.
Proc. ACM Program. Lang., 2017

Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
Data Sci. Eng., 2017

CrySL: Validating Correct Usage of Cryptographic APIs.
CoRR, 2017

Computation on Encrypted Data using Data Flow Authentication.
CoRR, 2017

Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

"Jumping Through Hoops": Why do Java Developers Struggle With Cryptography APIs?
Proceedings of the Software Engineering 2017, 2017


CogniCrypt: supporting developers in using cryptography.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Just-in-time static analysis.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Cheetah: just-in-time taint analysis for Android apps.
Proceedings of the 39th International Conference on Software Engineering, 2017

The Soot-Based Toolchain for Analyzing Android Apps.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

2016
Connecting and Serving the Software Engineering Community.
IEEE Trans. Software Eng., 2016

ROPocop - Dynamic mitigation of code-reuse attacks.
J. Inf. Secur. Appl., 2016

Harvester.
Datenschutz und Datensicherheit, 2016

Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (Artifact).
Dagstuhl Artifacts Ser., 2016

PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

Toward an automated benchmark management system.
Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016

Towards cross-platform cross-language analysis with soot.
Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016

Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Information Flow Analysis for Go.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

StubDroid: automatic inference of precise data-flow summaries for the android framework.
Proceedings of the 38th International Conference on Software Engineering, 2016

Investigating Users' Reaction to Fine-Grained Data Requests: A Market Experiment.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Reverse Engineering Android Apps With CodeInspect (invited paper).
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.
Proceedings of the 30th European Conference on Object-Oriented Programming, 2016

An In-Depth Study of More Than Ten Years of Java Exploitation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Incorporating attacker capabilities in risk estimation and mitigation.
Comput. Secur., 2015

How Current Android Malware Seeks to Evade Automated Code Analysis.
Proceedings of the Information Security Theory and Practice, 2015

jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Using targeted symbolic execution for reducing false-positives in dataflow analysis.
Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2015

Towards secure integration of cryptographic software.
Proceedings of the 2015 ACM International Symposium on New Ideas, 2015

Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study.
Proceedings of the Information Security - 18th International Conference, 2015

Dynamically Provisioning Isolation in Hierarchical Architectures.
Proceedings of the Information Security - 18th International Conference, 2015

Mining Apps for Abnormal Usage of Sensitive Data.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Join point interfaces for safe and flexible decoupling of aspects.
ACM Trans. Softw. Eng. Methodol., 2014

Likelihood of Threats to Connected Vehicles.
Int. J. Next Gener. Comput., 2014

I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
CoRR, 2014

FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

SPLLIFT - Statically Analyzing Software Product Lines in Minutes Instead of Years.
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014

How to build the perfect Swiss army knife, and keep it sharp?: Challenges for the soot program-analysis framework in the light of past, current and future demands.
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014

TS4J: a fluent interface for defining and computing typestate analyses.
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014

FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

Variational Data Structures: Exploring Tradeoffs in Computing with Variability.
Proceedings of the Onward! 2014, 2014

A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
Proceedings of the 36th International Conference on Software Engineering, 2014

Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Automated API Property Inference Techniques.
IEEE Trans. Software Eng., 2013

Schutzmaßnahmen gegen datenschutz- unfreundliche Smartphone-Apps.
Datenschutz und Datensicherheit, 2013

Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

How Useful Are Existing Monitoring Languages for Securing Android Apps?
Proceedings of the Software Engineering 2013 - Workshopband (inkl. Doktorandensymposium), Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar, 2013

Distributed Finite-State Runtime Monitoring with Aggregated Events.
Proceedings of the Runtime Verification - 4th International Conference, 2013

Instrumenting Android and Java Applications as Easy as abc.
Proceedings of the Runtime Verification - 4th International Conference, 2013

SPL<sup>LIFT</sup>: statically analyzing software product lines in minutes instead of years.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013

Easily instrumenting android applications for security purposes.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

A brief tour of join point interfaces.
Proceedings of the Aspect-Oriented Software Development, 2013

2012
Partially Evaluating Finite-State Runtime Monitors Ahead of Time.
ACM Trans. Program. Lang. Syst., 2012

The Clara framework for hybrid typestate analysis.
Int. J. Softw. Tools Technol. Transf., 2012

Challenges for Refinement and Composition of Instrumentations: Position Paper.
Proceedings of the Software Composition - 11th International Conference, 2012

InvokeDynamic support in Soot.
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012

Inter-procedural data-flow analysis with IFDS/IDE and Soot.
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012

Static flow-sensitive & context-sensitive information-flow analysis for software product lines: position paper.
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012

Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
Proceedings of the Information Security - 15th International Conference, 2012

RefaFlex: safer refactorings for reflective Java programs.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Challenges in Defining a Programming Language for Provably Correct Dynamic Analyses.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012

Delta-Oriented Monitor Specification.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012

Towards typesafe weaving for modular reasoning in aspect-oriented programs.
Proceedings of the eleventh workshop on Foundations of Aspect-Oriented Languages, 2012

2011
Join point interfaces for modular reasoning in aspect-oriented programs.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

Stateful breakpoints: a practical approach to defining parameterized runtime monitors.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

MOPBox: A Library Approach to Runtime Verification - (Tool Demonstration).
Proceedings of the Runtime Verification - Second International Conference, 2011

Continuation equivalence: a correctness criterion for static optimizations of dynamic analyses.
Proceedings of the International Workshop on Dynamic Analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2011), 2011

Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Closure joinpoints: block joinpoints without surprises.
Proceedings of the 10th International Conference on Aspect-Oriented Software Development, 2011

2010
Aspect-Oriented Race Detection in Java.
IEEE Trans. Software Eng., 2010

Collaborative Runtime Verification with Tracematches.
J. Log. Comput., 2010

IDE 2.0: collective intelligence in software development.
Proceedings of the Workshop on Future of Software Engineering Research, 2010

Reducing Configurations to Monitor in a Software Product Line.
Proceedings of the Runtime Verification - First International Conference, 2010

Clara: A Framework for Partially Evaluating Finite-State Runtime Monitors Ahead of Time.
Proceedings of the Runtime Verification - First International Conference, 2010

Clara: Partially Evaluating Runtime Monitors at Compile Time - Tutorial Supplement.
Proceedings of the Runtime Verification - First International Conference, 2010

Effective API navigation and reuse.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010

Efficient hybrid typestate analysis by determining continuation-equivalent states.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

2009
Dependent advice: a general approach to optimizing history-based aspects.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009

2008
Finding programming errors earlier by evaluating runtime monitors ahead-of-time.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Racer: effective race detection using aspectj.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008

Object representatives: a uniform abstraction for pointer information.
Proceedings of the Visions of Computer Science, 2008

Relational aspects as tracematches.
Proceedings of the 7th International Conference on Aspect-Oriented Software Development, 2008

2007
The design and implementation of formal monitoring techniques.
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

Domain-Specific Modelling With Atom3.
Proceedings of the ICSOFT 2007, 2007

A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring.
Proceedings of the ECOOP 2007 - Object-Oriented Programming, 21st European Conference, Berlin, Germany, July 30, 2007

Transforming Timeline Specifications into Automata for Runtime Monitoring.
Proceedings of the Applications of Graph Transformations with Industrial Relevance, 2007

2006
Tracechecks: Defining Semantic Interfaces with Temporal Logic.
Proceedings of the Software Composition - 5th International Symposium, 2006

Efficient trace monitoring.
Proceedings of the Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2006

Aspects and Data Refinement.
Proceedings of the Mathematics of Program Construction, 8th International Conference, 2006

Avoiding Infinite Recursion with Stratified Aspects.
Proceedings of the Conference Proceedings NODe 2006, 2006

Aspects for Trace Monitoring.
Proceedings of the Formal Approaches to Software Testing and Runtime Verification, 2006

2005
Temporal Assertions using AspectJ.
Proceedings of the Fifth Workshop on Runtime Verification, 2005

2004
A lightweight LTL runtime verification tool for java.
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

2003
A high-level view of Java applications.
Proceedings of the Companion of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2003


  Loading...