Phasar: An inter-procedural static analysis framework for c/c++ PD Schubert, B Hermann, E Bodden International Conference on Tools and Algorithms for the Construction and …, 2019 | 112 | 2019 |
Call graph construction for java libraries M Reif, M Eichberg, B Hermann, J Lerch, M Mezini Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 62 | 2016 |
CodeMatch: obfuscation won't conceal your repackaged app L Glanz, S Amann, M Eichberg, M Reif, B Hermann, J Lerch, M Mezini Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 59 | 2017 |
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases J Lerch, B Hermann, E Bodden, M Mezini Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014 | 54 | 2014 |
A software product line for static analyses: the OPAL framework M Eichberg, B Hermann Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of …, 2014 | 48 | 2014 |
From needs to actions to secure apps? the effect of requirements and developer practices on app security C Weir, B Hermann, S Fahl 29th USENIX security symposium (USENIX security 20), 289-305, 2020 | 46 | 2020 |
Identifying challenges for oss vulnerability scanners-a study & test suite A Dann, H Plate, B Hermann, SE Ponta, E Bodden IEEE Transactions on Software Engineering 48 (9), 3613-3625, 2021 | 31 | 2021 |
Community expectations for research artifacts and evaluation processes B Hermann, S Winter, J Siegmund Proceedings of the 28th ACM joint meeting on european software engineering …, 2020 | 29 | 2020 |
TaintBench: Automatic real-world malware benchmarking of Android taint analyses L Luo, F Pauck, G Piskachev, M Benz, I Pashchenko, M Mory, E Bodden, ... Empirical Software Engineering 27, 1-41, 2022 | 27 | 2022 |
A vulnerability's lifetime: enhancing version information in CVE databases L Glanz, S Schmidt, S Wollny, B Hermann Proceedings of the 15th International Conference on Knowledge Technologies …, 2015 | 22 | 2015 |
Lossless, persisted summarization of static callgraph, points-to and data-flow analysis PD Schubert, B Hermann, E Bodden 35th European Conference on Object-Oriented Programming (ECOOP 2021), 2021 | 21 | 2021 |
Analyzing the direct and transitive impact of vulnerabilities onto different artifact repositories J Düsing, B Hermann Digital Threats: Research and Practice 3 (4), 1-25, 2022 | 20 | 2022 |
A retrospective study of one decade of artifact evaluations S Winter, CS Timperley, B Hermann, J Cito, J Bell, M Hilton, D Beyer Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 20 | 2022 |
Hidden truths in dead software paths M Eichberg, B Hermann, M Mezini, L Glanz Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 20 | 2015 |
Static data-flow analysis for software product lines in C: Revoking the preprocessor’s special role PD Schubert, P Gazzillo, Z Patterson, J Braha, F Schiebel, B Hermann, ... Automated Software Engineering 29 (1), 35, 2022 | 18 | 2022 |
Sootdiff: Bytecode comparison across different java compilers A Dann, B Hermann, E Bodden Proceedings of the 8th ACM SIGPLAN International Workshop on State of the …, 2019 | 18 | 2019 |
Can an online service predict gender? On the state-of-the-art in gender identification from texts S Krüger, B Hermann 2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software …, 2019 | 17 | 2019 |
Hermes: assessment and creation of effective test corpora M Reif, M Eichberg, B Hermann, M Mezini Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the …, 2017 | 13 | 2017 |
Hardening java’s access control by abolishing implicit privilege elevation P Holzinger, B Hermann, J Lerch, E Bodden, M Mezini 2017 IEEE Symposium on Security and Privacy (SP), 1027-1040, 2017 | 13 | 2017 |
Getting to know you: Towards a capability model for java B Hermann, M Reif, M Eichberg, M Mezini Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 9 | 2015 |