scispace - formally typeset
E

Eric Bodden

Researcher at University of Paderborn

Publications -  219
Citations -  8255

Eric Bodden is an academic researcher from University of Paderborn. The author has contributed to research in topics: Computer science & Android (operating system). The author has an hindex of 36, co-authored 200 publications receiving 7093 citations. Previous affiliations of Eric Bodden include Technische Universität Darmstadt & Fraunhofer Society.

Papers
More filters
Proceedings ArticleDOI

Do Android taint analysis tools keep their promises

TL;DR: ReproDroid as mentioned in this paper ) is a framework allowing the accurate comparison of Android taint analysis tools, which supports researchers in inferring the ground truth for data leaks in apps, automatically applying tools to benchmarks, and in evaluating the obtained results.
Proceedings ArticleDOI

Efficient hybrid typestate analysis by determining continuation-equivalent states

TL;DR: This work presents an efficient novel static typestate analysis that is flow-sensitive, partially context- sensitive, and that generates residual runtime monitors, and uses an additional backward analysis to partition states into equivalence classes.
Posted Content

I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis

TL;DR: This work performs inter-component data-flow analysis to detect privacy leaks between components of Android applications and outperforms all other available tools by reaching a precision of 95.0% and a recall of 82.6%.
Proceedings ArticleDOI

DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android

TL;DR: Droid Force allows users to specify fine-grained constraints on how and when which data may be processed on their phones, regardless of whether the malicious behavior is distributed over different colluding components or even applications.
Proceedings ArticleDOI

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs

TL;DR: This paper has designed an extensive CrySL rule set for the Java Cryptography Architecture (JCA), and empirically evaluated it by analyzing 10,000 current Android apps, showing that misuse of cryptographic APIs is still widespread.