Karim Ali

Orcid: 0000-0002-5516-1376

Affiliations:
  • University of Alberta, Department of Computing Science, Edmonton, AB, Canada
  • TU Darmstadt, CASED, Germany


According to our database1, Karim Ali authored at least 44 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Securing Your Crypto-API Usage Through Tool Support - A Usability Study.
Dataset, September, 2023

Securing Your Crypto-API Usage Through Tool Support - A Usability Study.
Proceedings of the IEEE Secure Development Conference, 2023

Energy Consumption Estimation of API-usage in Smartphone Apps via Static Analysis.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2023

Exploring Quality Assurance Practices and Tools for Indie Games.
Proceedings of the 7th IEEE/ACM International Workshop on Games and Software Engineering, 2023

2022
Debugging Static Analysis.
Dataset, May, 2022

Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations.
IEEE Trans. Software Eng., 2022

Designing UIs for static-analysis tools.
Commun. ACM, 2022

Black Box Technique to Reduce Energy Consumption of Android Apps.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results ICSE (NIER) 2022, 2022

A Human-in-the-loop Approach to Generate Annotation Usage Rules.
Proceedings of the 32nd Annual International Conference on Computer Science and Software Engineering, 2022

2021
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
IEEE Trans. Software Eng., 2021

A Study of Call Graph Construction for JVM-Hosted Languages.
IEEE Trans. Software Eng., 2021

Designing UIs for Static Analysis Tools: Evaluating tool design guidelines with SWAN.
ACM Queue, 2021

Energy Efficient Guidelines for iOS Core Location Framework.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

U can't inline this!
Proceedings of the CASCON '21: Proceedings of the 31st Annual International Conference on Computer Science and Software Engineering, Toronto, Ontario, Canada, November 22, 2021

Hotfixing misuses of crypto APIs in Java programs.
Proceedings of the CASCON '21: Proceedings of the 31st Annual International Conference on Computer Science and Software Engineering, Toronto, Ontario, Canada, November 22, 2021

2020
CogniCrypt_GEN - Generating Code for the Secure Use of Crypto APIs (Artefact).
Dataset, January, 2020

Debugging Static Analysis.
IEEE Trans. Software Eng., 2020

On the time-based conclusion stability of cross-project defect prediction models.
Empir. Softw. Eng., 2020

Game Theoretic Malware Detection.
CoRR, 2020

SWAN: a static analysis framework for swift.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

CogniCrypt<sub><i>GEN</i></sub>: generating code for the secure usage of crypto APIs.
Proceedings of the CGO '20: 18th ACM/IEEE International Symposium on Code Generation and Optimization, 2020

2019
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems.
Proc. ACM Program. Lang., 2019

On the Time-Based Conclusion Stability of Software Defect Prediction Models.
CoRR, 2019

What do developers know about machine learning: a study of ML discussions on StackOverflow.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Toward an Analytical Performance Model to Select between GPU and CPU Execution.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2019

2018
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (Artifact).
Dagstuhl Artifacts Ser., 2018

VISUFLOW: a debugging environment for static analyses.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2017
Lifting the curse of stringly-typed code.
PeerJ Prepr., 2017

IDE<sup><i>al</i></sup>: efficient and precise alias-aware dataflow analysis.
Proc. ACM Program. Lang., 2017

CrySL: Validating Correct Usage of Cryptographic APIs.
CoRR, 2017

Detecting Security Vulnerabilities in Object-Oriented PHP Programs.
Proceedings of the 17th IEEE International Working Conference on Source Code Analysis and Manipulation, 2017

CogniCrypt: supporting developers in using cryptography.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Just-in-time static analysis.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Cheetah: just-in-time taint analysis for Android apps.
Proceedings of the 39th International Conference on Software Engineering, 2017

Compiler-driven performance.
Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering, 2017

2016
Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (Artifact).
Dagstuhl Artifacts Ser., 2016

Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java.
Proceedings of the 30th European Conference on Object-Oriented Programming, 2016

2015
Type-Based Call Graph Construction Algorithms for Scala.
ACM Trans. Softw. Eng. Methodol., 2015

Towards secure integration of cryptographic software.
Proceedings of the 2015 ACM International Symposium on New Ideas, 2015

2014
The Separate Compilation Assumption.
PhD thesis, 2014

Constructing Call Graphs of Scala Programs.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

2013
Averroes: Whole-Program Analysis without the Whole Program.
Proceedings of the ECOOP 2013 - Object-Oriented Programming, 2013

2012
Application-Only Call Graph Construction.
Proceedings of the ECOOP 2012 - Object-Oriented Programming, 2012


  Loading...