Follow
Ben Hermann
Ben Hermann
Professor for Secure Software Enginnering at Technische Universität Dortmund
Verified email at cs.tu-dortmund.de - Homepage
Title
Cited by
Cited by
Year
Phasar: An inter-procedural static analysis framework for c/c++
PD Schubert, B Hermann, E Bodden
International Conference on Tools and Algorithms for the Construction and …, 2019
922019
CodeMatch: obfuscation won't conceal your repackaged app
L Glanz, S Amann, M Eichberg, M Reif, B Hermann, J Lerch, M Mezini
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
552017
Call graph construction for java libraries
M Reif, M Eichberg, B Hermann, J Lerch, M Mezini
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
552016
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases
J Lerch, B Hermann, E Bodden, M Mezini
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
522014
A software product line for static analyses: the OPAL framework
M Eichberg, B Hermann
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of …, 2014
432014
From needs to actions to secure apps? the effect of requirements and developer practices on app security
C Weir, B Hermann, S Fahl
29th USENIX security symposium (USENIX security 20), 289-305, 2020
392020
A vulnerability's lifetime: enhancing version information in CVE databases
L Glanz, S Schmidt, S Wollny, B Hermann
Proceedings of the 15th International Conference on Knowledge Technologies …, 2015
202015
Hidden truths in dead software paths
M Eichberg, B Hermann, M Mezini, L Glanz
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
202015
TaintBench: Automatic real-world malware benchmarking of Android taint analyses
L Luo, F Pauck, G Piskachev, M Benz, I Pashchenko, M Mory, E Bodden, ...
Empirical Software Engineering 27, 1-41, 2022
192022
Community expectations for research artifacts and evaluation processes
B Hermann, S Winter, J Siegmund
Proceedings of the 28th ACM joint meeting on european software engineering …, 2020
192020
Lossless, persisted summarization of static callgraph, points-to and data-flow analysis
PD Schubert, B Hermann, E Bodden
35th European Conference on Object-Oriented Programming (ECOOP 2021), 2021
162021
Identifying challenges for oss vulnerability scanners-a study & test suite
A Dann, H Plate, B Hermann, SE Ponta, E Bodden
IEEE Transactions on Software Engineering 48 (9), 3613-3625, 2021
142021
Sootdiff: Bytecode comparison across different java compilers
A Dann, B Hermann, E Bodden
Proceedings of the 8th ACM SIGPLAN International Workshop on State of the …, 2019
132019
Hermes: assessment and creation of effective test corpora
M Reif, M Eichberg, B Hermann, M Mezini
Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the …, 2017
132017
Hardening java’s access control by abolishing implicit privilege elevation
P Holzinger, B Hermann, J Lerch, E Bodden, M Mezini
2017 IEEE Symposium on Security and Privacy (SP), 1027-1040, 2017
132017
Analyzing the direct and transitive impact of vulnerabilities onto different artifact repositories
J Düsing, B Hermann
Digital Threats: Research and Practice 3 (4), 1-25, 2022
122022
Can an online service predict gender? On the state-of-the-art in gender identification from texts
S Krüger, B Hermann
2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software …, 2019
122019
Static data-flow analysis for software product lines in C: Revoking the preprocessor’s special role
PD Schubert, P Gazzillo, Z Patterson, J Braha, F Schiebel, B Hermann, ...
Automated Software Engineering 29 (1), 35, 2022
102022
Getting to know you: Towards a capability model for java
B Hermann, M Reif, M Eichberg, M Mezini
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
92015
Design your analysis: A case study on implementation reusability of data-flow functions
J Lerch, B Hermann
Proceedings of the 4th ACM SIGPLAN International Workshop on State of the …, 2015
92015
The system can't perform the operation now. Try again later.
Articles 1–20