E
Eric Bodden
Researcher at University of Paderborn
Publications - 219
Citations - 8255
Eric Bodden is an academic researcher from University of Paderborn. The author has contributed to research in topics: Computer science & Android (operating system). The author has an hindex of 36, co-authored 200 publications receiving 7093 citations. Previous affiliations of Eric Bodden include Technische Universität Darmstadt & Fraunhofer Society.
Papers
More filters
BookDOI
Transactions on Aspect-Oriented Software Development XI
TL;DR: SAGA is introduced, a general framework that provides a smooth integration of the specification and the run-time checking of both data and protocoloriented properties of Java classes and interfaces and is evaluated by conducting an industrial case study from an eCommerce software company Fredhopper.
Posted Content
CrySL: Validating Correct Usage of Cryptographic APIs
TL;DR: CrySL is presented, a definition language that enables cryptography experts to specify the secure usage of the cryptographic libraries that they provide and a compiler is implemented that translates a CrySL ruleset into a context- and flow-sensitive demand-driven static analysis.
Book ChapterDOI
Information Flow Analysis for Go
Eric Bodden,Eric Bodden,Ka I Pun,Martin Steffen,Volker Stolz,Volker Stolz,Anna-Katharina Wickert +6 more
TL;DR: This work presents the current state of the art of information flow analyses for Go applications and discusses future directions of where static analysis information can be used at runtime to for example achieve higher precision, or optimise runtime checks.
Instance keys: A technique for sharpening whole-program pointer analyses with intraprocedural information
TL;DR: This paper describes a technique which sharpens results from a whole-program flow-insensitive points-to analysis using two flow-sensitive intraprocedural analyses: a must-not-alias analysis and amust- alias analysis.
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
TL;DR: In this paper, a flow-sensitive static analysis for analyzing monitor states is presented, which can prove the absence of property violations on all program runs, or flag locations where violations are likely to occur.