Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Codebase-adaptive detection of security-relevant methods., , and . ISSTA, page 181-191. ACM, (2019)SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods., , , and . ASE, page 1094-1097. IEEE, (2019)Explaining Static Analysis - A Perspective., , and . ASE Workshops, page 29-32. IEEE, (2019)Explainable Static Analysis., and . Software Engineering, volume P-279 of LNI, page 205-208. Gesellschaft für Informatik, (2018)Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security., , and . SOUPS @ USENIX Security Symposium, page 221-238. USENIX Association, (2020)Debugging Static Analysis., , , , and . IEEE Trans. Software Eng., 46 (7): 697-709 (2020)Gamifying static analysis., and . ESEC/SIGSOFT FSE, page 714-718. ACM, (2018)User-centered tool design for data-flow analysis.. University of Paderborn, Germany, (2019)Front Matter, Table of Contents, Preface, Conference Organization., and . Dagstuhl Artifacts Ser., 6 (2): 00:-1-00:-12 (2020)