Travelled to:
1 × China
1 × Hungary
1 × India
1 × Italy
1 × South Africa
1 × Sweden
1 × United Kingdom
2 × Germany
7 × USA
Collaborated with:
J.Späth M.Mezini K.A.0001 S.Arzt ∅ L.N.Q.Do L.J.Hendren L.Luo C.Kästner J.Lerch A.Thies K.Havelund H.Vangheluwe O.Lhoták S.Rasthofer M.Lillack M.Inostroza É.Tanter P.Lam F.Pauck H.Wehrheim J.Dolby S.Krüger S.Nadi B.Hermann G.Piskachev O.Johnson A.Bartel J.Klein Y.L.Traon D.Octeau P.McDaniel E.Walkingshaw M.Erwig S.Apel A.Sewe J.Sinschek H.Oueslati K.Ali S.Erdweg T.Tolêdo M.Ribeiro C.Brabrand P.Borba V.Avdiienko K.Kuznetsov A.Gorla A.Zeller C.Fritz L.Li T.F.Bissyandé P.Avgustinov E.Hajiyev O.d.Moor N.Ongkingco D.Sereni G.Sittampalam J.Tibble M.Verbaere M.Reif F.Göpfert F.G.0001 C.Weinert D.Demmler R.Kamath
Talks about:
analysi (13) flow (8) sensit (6) program (5) monitor (5) static (5) data (5) context (4) android (4) runtim (4)
Person: Eric Bodden
DBLP: Bodden:Eric
Facilitated 1 volumes:
Contributed to:
Wrote 30 papers:
- ICSE-v1-2015-AvdiienkoKGZARB #mining
- Mining Apps for Abnormal Usage of Sensitive Data (VA, KK, AG, AZ, SA, SR, EB), pp. 426–436.
- ICSE-v1-2015-LiBBKTARBOM #android #component #detection #named #privacy
- IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
- Onward-2015-ArztNABEM #encryption #integration #towards
- Towards secure integration of cryptographic software (SA, SN, KA, EB, SE, MM), pp. 1–13.
- ASE-2014-LillackKB #configuration management
- Tracking load-time configuration options (ML, CK, EB), pp. 445–456.
- FSE-2014-LerchHBM #analysis #named #performance #scalability
- FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases (JL, BH, EB, MM), pp. 98–108.
- ICSE-2014-ArztB #analysis #data flow #incremental #named
- Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes (SA, EB), pp. 288–298.
- Onward-2014-WalkingshawKEAB #data type #trade-off #variability
- Variational Data Structures: Exploring Tradeoffs in Computing with Variability (EW, CK, ME, SA, EB), pp. 213–226.
- PLDI-2014-ArztRFBBKTOM #analysis #android #named #precise
- FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
- PLDI-2013-BoddenTRBBM #named #product line
- SPLLIFT: statically analyzing software product lines in minutes instead of years (EB, TT, MR, CB, PB, MM), pp. 355–364.
- ISSTA-2012-ThiesB #java #named #refactoring #source code
- RefaFlex: safer refactorings for reflective Java programs (AT, EB), pp. 1–11.
- ESEC-FSE-2011-Bodden #approach #monitoring #runtime
- Stateful breakpoints: a practical approach to defining parameterized runtime monitors (EB), pp. 492–495.
- ESEC-FSE-2011-InostrozaTB #aspect-oriented #composition #interface #reasoning #source code
- Join point interfaces for modular reasoning in aspect-oriented programs (MI, ÉT, EB), pp. 508–511.
- ICSE-2011-BoddenSSOM #static analysis
- Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders (EB, AS, JS, HO, MM), pp. 241–250.
- ICSE-2010-Bodden #analysis #hybrid #performance #type system
- Efficient hybrid typestate analysis by determining continuation-equivalent states (EB), pp. 5–14.
- FSE-2008-BoddenLH #fault #monitoring #programming #runtime
- Finding programming errors earlier by evaluating runtime monitors ahead-of-time (EB, PL, LJH), pp. 36–47.
- ISSTA-2008-BoddenH #aspectj #concurrent #detection #effectiveness #named #using
- Racer: effective race detection using aspectj (EB, KH), pp. 155–166.
- AGTIVE-2007-BoddenV #automaton #monitoring #runtime #specification #timeline
- Transforming Timeline Specifications into Automata for Runtime Monitoring (EB, HV), pp. 249–264.
- ECOOP-2007-BoddenHL #monitoring #performance #program analysis #runtime #staged
- A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring (EB, LJH, OL), pp. 525–549.
- FATES-RV-2006-AvgustinovBHHLMOSSTV #aspect-oriented #monitoring
- Aspects for Trace Monitoring (PA, EB, EH, LJH, OL, OdM, NO, DS, GS, JT, MV), pp. 20–39.
- ASE-2015-LerchSBM #abstraction #analysis #bound #data flow #scalability
- Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths (T) (JL, JS, EB, MM), pp. 619–629.
- ASE-2017-KrugerNRAMBGGWD #developer #encryption #named #using
- CogniCrypt: supporting developers in using cryptography (SK, SN, MR, KA0, MM, EB, FG, FG0, CW, DD, RK), pp. 931–936.
- ESEC-FSE-2018-DoB #static analysis
- Gamifying static analysis (LNQD, EB), pp. 714–718.
- ESEC-FSE-2018-PauckBW #analysis #android #question #tool support
- Do Android taint analysis tools keep their promises? (FP, EB, HW), pp. 331–341.
- ASE-2019-LuoBS #analysis #android
- A Qualitative Analysis of Android Taint-Analysis Results (LL, EB, JS), pp. 102–114.
- ASE-2019-PiskachevDJB #automation #detection #named
- SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods (GP, LNQD, OJ, EB), pp. 1094–1097.
- ECOOP-2016-SpathDAB #analysis #java #named #pointer
- Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (JS, LNQD, KA0, EB), p. 26.
- OOPSLA-2017-SpathAB #alias #analysis #data flow #named #performance #precise
- IDEal: efficient and precise alias-aware dataflow analysis (JS, KA0, EB), p. 27.
- ECOOP-2018-KrugerS0BM #api #approach #encryption #named #validation
- CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (SK, JS, KA0, EB, MM), p. 27.
- ECOOP-2019-LuoDB #analysis #approach #editing #ide #named
- MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper) (LL, JD, EB), p. 25.
- POPL-2019-SpathAB #analysis #automaton #data flow #using
- Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems (JS, KA0, EB), p. 29.