Eric Bodden
Bodden, Eric
Bodden, Eric 1980-
VIAF ID: 4566155566462113380005 (Personal)
Permalink: http://viaf.org/viaf/4566155566462113380005
Preferred Forms
- 100 1 _ ‡a Bodden, Eric
-
-
- 100 1 _ ‡a Bodden, Eric ‡d 1980-
- 100 0 _ ‡a Eric Bodden
- 100 0 _ ‡a Eric Bodden
4xx's: Alternate Name Forms (11)
5xx's: Related Names (2)
Works
Title | Sources |
---|---|
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T) | |
Analyzing the Gadgets | |
Aspects and Data Refinement | |
Automated API Property Inference Techniques | |
Behavior Compliance Control for More Trustworthy Computation Outsourcing | |
Challenges for Refinement and Composition of Instrumentations: Position Paper | |
Challenges in Defining a Programming Language for Provably Correct Dynamic Analyses | |
The Clara framework for hybrid typestate analysis | |
Closure joinpoints | |
Collaborative Runtime Verification with Tracematches | |
Computation on Encrypted Data Using Dataflow Authentication | |
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs | |
Delta-Oriented Monitor Specification | |
Denial-of-App Attack | |
Dependent advice | |
The design and implementation of formal monitoring techniques | |
Distributed Finite-State Runtime Monitoring with Aggregated Events | |
DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android | |
DroidSearch: A tool for scaling Android app triage to real-world app stores | |
Dynamically Provisioning Isolation in Hierarchical Architectures | |
Effective API navigation and reuse | |
Efficient hybrid typestate analysis by determining continuation-equivalent states | |
Efficient trace monitoring | |
Engineering Secure Software and Systems : 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings | |
Entwicklung sicherer Software durch Security by Design [Trend- und Strategiebericht] | |
Factors Impacting the Effort Required to Fix Security Vulnerabilities | |
FlowDroid | |
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases | |
Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation | |
A high-level view of Java applications | |
How Current Android Malware Seeks to Evade Automated Code Analysis | |
How to build the perfect Swiss army knife, and keep it sharp? | |
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps | |
IDE 2.0 | |
Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite | |
An In-Depth Study of More Than Ten Years of Java Exploitation | |
Incorporating attacker capabilities in risk estimation and mitigation | |
Instrumenting Android and Java Applications as Easy as abc | |
Inter-procedural data-flow analysis with IFDS/IDE and Soot | |
Investigating Users' Reaction to Fine-Grained Data Requests: A Market Experiment | |
InvokeDynamic support in Soot | |
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications | |
Join point interfaces for modular reasoning in aspect-oriented programs | |
Join point interfaces for safe and flexible decoupling of aspects | |
Jumping through hoops | |
Just-in-time static analysis | |
Kontrolle der Verhaltenskonformität für mehr vertrauenswürdiges Outsourcing von Berechnungen | |
A lightweight LTL runtime verification tool for java | |
Mining Apps for Abnormal Usage of Sensitive Data | |
MOPBox: A Library Approach to Runtime Verification | |
Neuartige Ansätze zum systematischen Evaluieren und Konstruieren von Call Graphen für Java Software | |
Novel Approaches to Systematically Evaluating and Constructing Call Graphs for Java Software | |
On the Scalability of Static Program Analysis to Detect Vulnerabilities in the Java Platform | |
Partially Evaluating Finite-State Runtime Monitors Ahead of Time | |
PhASAR: An Inter-procedural Static Analysis Framework for C/C++ | |
PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution | |
Racer | |
Reducing Configurations to Monitor in a Software Product Line | |
Relational aspects as tracematches | |
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes | |
ROPocop — Dynamic mitigation of code-reuse attacks | |
Software composition, 2013: | |
The Soot-Based Toolchain for Analyzing Android Apps | |
SPLLIFT | |
Stateful breakpoints | |
Static flow-sensitive & context-sensitive information-flow analysis for software product lines | |
StubDroid | |
Taming reflection | |
Temporal Assertions using AspectJ | |
Toward an automated benchmark management system | |
Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels | |
Towards cross-platform cross-language analysis with soot | |
Towards secure integration of cryptographic software | |
Tracking Load-Time Configuration Options | |
Transactions on Aspect-Oriented Software Development XI | |
Über die Skalierbarkeit von statischen Programmanalysen zur Erkennung von Sicherheitslücken in der Java Plattform | |
Using targeted symbolic execution for reducing false-positives in dataflow analysis | |
Variational Data Structures | |
Wissenschaftsforum Intelligente Technische Systeme (WInTeSys) 2017 11. und 12. Mai 2017, Heinz Nixdorf MuseumsForum, Paderborn |