Author of the publication

SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods.

, , , and . ASE, page 1094-1097. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring., , and . ECOOP, volume 4609 of Lecture Notes in Computer Science, page 525-549. Springer, (2007)Debugging Static Analysis., , , , and . IEEE Trans. Software Eng., 46 (7): 697-709 (2020)The Clara framework for hybrid typestate analysis., and . Int. J. Softw. Tools Technol. Transf., 14 (3): 307-326 (2012)An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities., , , and . ACM Trans. Softw. Eng. Methodol., 32 (1): 25:1-25:45 (January 2023)"Free" as in Freedom to Protest?, , , , , , , , and . IEEE Secur. Priv., 20 (5): 16-21 (2022)Evaluating Security Through Isolation and Defense in Depth., , , and . IEEE Secur. Priv., 22 (1): 69-72 (January 2024)A systematic literature review of model-driven security engineering for cyber-physical systems., and . J. Syst. Softw., (2020)A lightweight LTL runtime verification tool for java.. OOPSLA Companion, page 306-307. ACM, (2004)IDE Support for Cloud-Based Static Analyses., and . Software Engineering, volume P-320 of LNI, page 61-63. Gesellschaft für Informatik e.V., (2022)Gamifying static analysis., and . ESEC/SIGSOFT FSE, page 714-718. ACM, (2018)