Eric Bodden
Orcid: 0000-0003-3470-3647Affiliations:
- Paderborn University, Germany
- Fraunhofer-Institut für Entwurfstechnik Mechatronik, Paderborn, Germany
- Technische Universität Darmstadt, Germany
According to our database1,
Eric Bodden
authored at least 204 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on bodden.de
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Empir. Softw. Eng., September, 2024
Dagstuhl Artifacts Ser., 2024
CoRR, 2024
Supporting Error Chains in Static Analysis for Precise Evaluation Results and Enhanced Usability.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2024
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024
Proceedings of the IEEE/ACM 11th International Conference on Mobile Software Engineering and Systems, 2024
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024
Proceedings of the 1st ACM/IEEE Workshop on Integrated Development Environments, 2024
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 3rd ACM International Fuzzing Workshop, 2024
The Emergence of Large Language Models in Static Analysis: A First Look through Micro-Benchmarks.
Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024
Proceedings of the 38th European Conference on Object-Oriented Programming, 2024
Scaling Interprocedural Static Data-Flow Analysis to Large C/C++ Applications: An Experience Report.
Proceedings of the 38th European Conference on Object-Oriented Programming, 2024
2023
IEEE Trans. Software Eng., October, 2023
Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study.
Empir. Softw. Eng., October, 2023
Dataset, September, 2023
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities.
ACM Trans. Softw. Eng. Methodol., January, 2023
Dagstuhl Reports, 2023
Proceedings of the IEEE International Conference on Software Analysis, 2023
Proceedings of the IEEE Secure Development Conference, 2023
Proceedings of the Software Engineering 2023, 2023
Evaluation of Usability Criteria Addressed by Static Analysis Tools on a Large Scale.
Proceedings of the Software Engineering 2023, 2023
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
2022
IEEE Trans. Software Eng., 2022
ACM Trans. Priv. Secur., 2022
IEEE Secur. Priv., 2022
Empir. Softw. Eng., 2022
To what extent can we analyze Kotlin programs using existing Java taint analysis tools? (Extended Version)
CoRR, 2022
Proceedings of the IEEE International Conference on Software Analysis, 2022
How far are German companies in improving security through static program analysis tools?
Proceedings of the IEEE Secure Development Conference, 2022
Proceedings of the Software Engineering 2022, 2022
Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite (Short Summary).
Proceedings of the Software Engineering 2022, 2022
To what extent can we analyze Kotlin programs using existing Java taint analysis tools?
Proceedings of the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation, 2022
Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
2021
Dataset, April, 2021
IEEE Trans. Software Eng., 2021
IEEE Trans. Software Eng., 2021
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Proceedings of the Software Engineering 2021, 2021
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021
Proceedings of the 21st IEEE International Working Conference on Source Code Analysis and Manipulation, 2021
Proceedings of the AISTA 2021: Proceedings of the 1st ACM International Workshop on AI and Software Testing/Analysis, 2021
Proceedings of the ECSA 2021 Companion Volume, 2021
Lossless, Persisted Summarization of Static Callgraph, Points-To and Data-Flow Analysis.
Proceedings of the 35th European Conference on Object-Oriented Programming, 2021
Proceedings of the 35th European Conference on Object-Oriented Programming, 2021
Proceedings of the ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems, 2021
2020
Dataset, January, 2020
Proceedings of the Deductive Software Verification: Future Perspectives, 2020
Proc. Priv. Enhancing Technol., 2020
A systematic literature review of model-driven security engineering for cyber-physical systems.
J. Syst. Softw., 2020
Proceedings of the Software Engineering 2020, 2020
Scenario-based specification of security protocols and transformation to security model checkers.
Proceedings of the MoDELS '20: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems, 2020
Security-Oriented Fault-Tolerance in Systems Engineering: A Conceptual Threat Modelling Approach for Cyber-Physical Production Systems.
Proceedings of the Advanced, Contemporary Control - Proceedings of KKA 2020, 2020
PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
CogniCrypt<sub><i>GEN</i></sub>: generating code for the secure usage of crypto APIs.
Proceedings of the CGO '20: 18th ACM/IEEE International Symposium on Code Generation and Optimization, 2020
2019
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems.
Proc. ACM Program. Lang., 2019
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2019
Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2019
Proceedings of the 8th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019
Proceedings of the IEEE International Conference on Software Architecture Companion, 2019
Proceedings of the Formal Methods. FM 2019 International Workshops, 2019
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019
MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper).
Proceedings of the 33rd European Conference on Object-Oriented Programming, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (Artifact).
Dagstuhl Artifacts Ser., 2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Proceedings of the Software Engineering und Software Management 2018, 2018
The secret sauce in efficient and precise static analysis: the beauty of distributive, summary-based static analyses (and how to master them).
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018
Proceedings of the 2018 International Conference on Software and System Process, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018
Proceedings of the Engineering Secure Software and Systems - 10th International Symposium, 2018
2017
Proc. ACM Program. Lang., 2017
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
Data Sci. Eng., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Software Engineering 2017, 2017
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017
2016
IEEE Trans. Software Eng., 2016
Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (Artifact).
Dagstuhl Artifacts Ser., 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016
Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016
Proceedings of the 5th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2016
Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016
StubDroid: automatic inference of precise data-flow summaries for the android framework.
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Proceedings of the 30th European Conference on Object-Oriented Programming, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Comput. Secur., 2015
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, 2015
Proceedings of the 2015 ACM International Symposium on New Ideas, 2015
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015
Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
2014
ACM Trans. Softw. Eng. Methodol., 2014
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
CoRR, 2014
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014
How to build the perfect Swiss army knife, and keep it sharp?: Challenges for the soot program-analysis framework in the light of past, current and future demands.
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014
Proceedings of the Onward! 2014, 2014
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
Proceedings of the 36th International Conference on Software Engineering, 2014
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Datenschutz und Datensicherheit, 2013
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Software Engineering 2013 - Workshopband (inkl. Doktorandensymposium), Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar, 2013
Proceedings of the Runtime Verification - 4th International Conference, 2013
Proceedings of the Runtime Verification - 4th International Conference, 2013
SPL<sup>LIFT</sup>: statically analyzing software product lines in minutes instead of years.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Aspect-Oriented Software Development, 2013
2012
ACM Trans. Program. Lang. Syst., 2012
Int. J. Softw. Tools Technol. Transf., 2012
Proceedings of the Software Composition - 11th International Conference, 2012
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012
Static flow-sensitive & context-sensitive information-flow analysis for software product lines: position paper.
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the International Symposium on Software Testing and Analysis, 2012
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012
Proceedings of the eleventh workshop on Foundations of Aspect-Oriented Languages, 2012
2011
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011
Stateful breakpoints: a practical approach to defining parameterized runtime monitors.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011
Proceedings of the Runtime Verification - Second International Conference, 2011
Continuation equivalence: a correctness criterion for static optimizations of dynamic analyses.
Proceedings of the International Workshop on Dynamic Analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2011), 2011
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
Proceedings of the 33rd International Conference on Software Engineering, 2011
Proceedings of the 10th International Conference on Aspect-Oriented Software Development, 2011
2010
Proceedings of the Workshop on Future of Software Engineering Research, 2010
Proceedings of the Runtime Verification - First International Conference, 2010
Clara: A Framework for Partially Evaluating Finite-State Runtime Monitors Ahead of Time.
Proceedings of the Runtime Verification - First International Conference, 2010
Proceedings of the Runtime Verification - First International Conference, 2010
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010
2009
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009
2008
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2008
Proceedings of the Visions of Computer Science, 2008
Proceedings of the 7th International Conference on Aspect-Oriented Software Development, 2008
2007
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007
Domain-Specific Modelling With Atom3.
Proceedings of the ICSOFT 2007, 2007
Proceedings of the ECOOP 2007 - Object-Oriented Programming, 21st European Conference, Berlin, Germany, July 30, 2007
Proceedings of the Applications of Graph Transformations with Industrial Relevance, 2007
2006
Proceedings of the Software Composition - 5th International Symposium, 2006
Proceedings of the Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2006
Proceedings of the Mathematics of Program Construction, 8th International Conference, 2006
Proceedings of the Conference Proceedings NODe 2006, 2006
Proceedings of the Formal Approaches to Software Testing and Runtime Verification, 2006
2005
Proceedings of the Fifth Workshop on Runtime Verification, 2005
2004
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004
2003
Proceedings of the Companion of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2003