Browse by Research Area

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 179.

Samhi, Jordan and Bissyandé, Tegawendé F. and Klein, Jacques
(2024) AndroLibZoo: A Reliable Dataset of Libraries Based on Software Dependency Analysis.
In: Mining Software Repositories, Lisbon, Portugal.
Conference: MSR IEEE International Working Conference on Mining Software Repositories
(In Press)

Alecci, Marco and Samhi, Jordan and Bissyandé, Tegawendé F. and Jacques, Klein
(2024) Revisiting Android App Categorization.
In: International Conference on Software Engineering (ICSE), 14-20 April 2024, Lisbon, Portugal.
Conference: ICSE International Conference on Software Engineering
(In Press)

Bytes, Andrei and Rajput, Prashant Hari Narayan and Doumanidis, Constantine and Tippenhauer, Nils Ole and Maniatakos, Michail and Zhou, Jianying
(2023) FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
In: Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Mammadov, Tural
(2023) Learning Program Models from Generated Inputs.
In: Doctoral Symposium, 16 May 2023, Melbourne Convention and Exhibition Centre.
Conference: ICSE International Conference on Software Engineering

Walita, Tim and Erba, Alessandro and Castellanos, John H. and Tippenhauer, Nils Ole
(2023) Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
In: Proceedings of the Cyber-Physical System Security Workshop (CPSS).
Conference: UNSPECIFIED

Ding, Aolin and Chan, Matthew and Hassanzadeh, Amin and Tippenhauer, Nils Ole and Ma, Shiqing and Zonouz, Saman
(2023) Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle.
In: Proceedings of the International Conference on Dependable Systems and Networks (DSN).
Conference: DSN IEEE/IFIP International Conference on Dependable Systems and Networks

Motallebighomi, Maryam and Sathaye, Harshad and Singh, Mridula and Ranganathan, Aanjhan
(2023) Location-independent GNSS Relay Attacks: A Lazy Attacker’s Guide to Bypassing Navigation Message Authentication.
In: 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2023), May 29 - June 01, 2023, Surrey, UK.
Conference: UNSPECIFIED

Smytzek, Marius
(2023) From Input to Failure: Explaining Program Behavior via Cause-Effect Chains.
In: ICSE 2023, 14-20 May 2023, Melbourne, Australia.
Conference: ICSE International Conference on Software Engineering
(In Press)

Eberlein, Martin and Smytzek, Marius and Steinhöfel, Dominic and Grunske, Lars and Zeller, Andreas
(2023) Semantic Debugging.
In: ESEC/FSE 2023, Sun 3 - Sat 9 December 2023, San Francisco, California, United States.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)
(In Press)

Eberlein, Martin and Smytzek, Marius and Steinhöfel, Dominic and Grunske, Lars and Zeller, Andreas
(2023) Semantic Debugging.
In: ESEC/FSE 2023, Sun 3 - Sat 9 December 2023, San Francisco, California, United States.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)
(In Press)

Roeschlin, Marc and Camurati, Giovanni and Brunner, Pascal and Mridula, Singh and Srdjan, Capkun
(2023) EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems.
In: NDSS 2023.
Conference: NDSS Network and Distributed System Security Symposium

Schiller, Nico and Chlosta, Merlin and Schloegel, Moritz and Bars, Nils and Eisenhofer, Thorsten and Scharnowski, Tobias and Domke, Felix and Schönherr, Lea and Holz, Thorsten
(2023) Drone Security and the Mysterious Case of DJI's DroneID.
In: NDSS.
Conference: NDSS Network and Distributed System Security Symposium

Gegenhuber, Gabriel Karl and Mayer, Wilfried and Weippl, Edgar and Dabrowski, Adrian
(2023) MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research.
In: USENIX Security Symposium 2023, August 9-11, 2023, Anaheim, California, United State.
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2023) FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs (Extended Version).
Technical Report. UNSPECIFIED.

Chakraborty, Dhiman and Schwarz, Michael and Bugiel, Sven
(2023) TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors.
In: Financial Cryptography and Data Security - 27th International Conference, FC 2023, May 1–5, 2023, Bol, Brač, Croatia.
Conference: FC Financial Cryptography and Data Security Conference

Erba, Alessandro and Tippenhauer, Nils Ole
(2022) Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
In: Proceedings of the Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC Annual Computer Security Applications Conference

Schwarz, Fabian and Do, Khue and Heide, Gunnar and Hanzlik, Lucjan and Rossow, Christian
(2022) FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
In: 29th ACM Conference on Computer and Communications Security (CCS), 7-11 Nov 2022, Los Angeles, U.S.A..
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Gupta, Abhilash and Gopinath, Rahul and Zeller, Andreas
(2022) CLIFuzzer: Mining Grammars for Command-Line Invocations.
In: ESEC/FSE 2022, Singapore.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Hamid Reza, Ghaeini and Nils Ole, Tippenhauer
(2022) Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision.
In: 2022 IEEE 96th Vehicular Technology Conference, 26-29 Sep 2022, London and Beijing.
Conference: VTC IEEE Vehicular Technology Conference
(In Press)

Smytzek, Marius and Zeller, Andreas
(2022) SFLKit: A Workbench for Statistical Fault Localization.
In: ESEC/FSE 2022.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)
(In Press)

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper and Payer, Mathias
(2022) Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy.
In: Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS).
Conference: ASIACCS ACM ASIA Conference on Computer and Communications Security

Singh, Mridula and Roeschlin, Marc and Ranganathan, Aanjhan and Capkun, Srdjan
(2022) V-Range: Enabling Secure Ranging in 5G Wireless Networks.
In: NDSS 2022, 24 - 28 April 2022, San Diego, California.
Conference: NDSS Network and Distributed System Security Symposium
(In Press)

Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Tippenhauer, Nils Ole and Ochoa, Martín
(2022) Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 25 (2).

Huang, Jie and Backes, Michael and Bugiel, Sven
(2021) A11y and Privacy don’t have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
In: 30th USENIX Security Symposium (USENIX Security 21).
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Kuznetsov, Konstantin and Fu, Chen and Gao, Song and Jansen, David N. and Zhang, Lijun and Zeller, Andreas
(2021) Frontmatter: Mining Android User Interfaces at Scale.
In: ESEC/FSE 2021, August 23–28, 2021, Athens, Greece.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Oltrogge, Marten and Huaman, Nicolas and Amft, Sabrina and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2021) Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.
In: 30th USENIX Security Symposium (USENIX Security 21).
Conference: USENIX-Security Usenix Security Symposium
(In Press)

Bhattacharyya, Apratim and Reino, Daniel Olmeda and Fritz, Mario and Schiele, Bernt
(2021) Euro-PVI: Pedestrian Vehicle Interactions in Dense Urban Centers.
In: 34th IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Gopinath, Rahul and Nemati, Hamed and Zeller, Andreas
(2021) Input Algebras.
In: International Conference on Software Engineering (ICSE).
Conference: ICSE International Conference on Software Engineering

Wang, Jiawei and Li, Li and Zeller, Andreas
(2021) Restoring Execution Environments of Jupyter Notebooks.
In: ICSE 2021, May 2021, Virtual.
Conference: ICSE International Conference on Software Engineering

Soremekun, Ezekiel and Kirschner, Lukas and Böhme, Marcel and Zeller, Andreas
(2021) Locating Faults with Program Slicing: An Empirical Analysis.
Empirical Software Engineering, 26.

Dawoud, Abdallah and Bugiel, Sven
(2021) Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework.
In: Network and Distributed Systems Security (NDSS) Symposium 2021, 21.02.2021, San Diego, California, USA.
Conference: NDSS Network and Distributed System Security Symposium

Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2020) Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
In: Annual Computer Security Applications Conference (ACSAC 2020).
Conference: ACSAC Annual Computer Security Applications Conference

Schlüter, Till and Lemke-Rust, Kerstin
(2020) Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.
In: Conference on Smart Card Research and Advanced Applications (CARDIS).
Conference: CARDIS Smart Card Research and Advanced Application Conference

Gopinath, Rahul and Mathis, Björn and Zeller, Andreas
(2020) Mining Input Grammars from Dynamic Control Flow.
In: ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), 2020-11-09, virtual.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)

Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020) Debugging Inputs.
In: 42nd International Conference on Software Engineering, October 5-11, 2020, Seoul, South Korea..
Conference: ICSE International Conference on Software Engineering

Chen, Yiqun T and Gopinath, Rahul and Tadakamalla, Anita and Ernst, Michael D and Holmes, Reid and Fraser, Gordon and Ammann, Paul and Just, Rene
(2020) Revisiting the Relationship Between Fault Detection,Test Adequacy Criteria, and Test Set Size.
In: The 35th IEEE/ACM International Conference on Automated Software Engineering..
Conference: ASE Automated Software Engineering Conference

Mathis, Björn and Gopinath, Rahul and Zeller, Andreas
(2020) Learning Input Tokens for Effective Fuzzing.
In: ISSTA - ACM SIGSOFT International Symposium on Software Testing and Analysis, Sat 18 - Wed 22 July 2020, Virtual.
Conference: ISSTA International Symposium on Software Testing and Analysis
(In Press)

Kampmann, Alexander and Havrikov, Nikolas and Soremekun, Ezekiel and Zeller, Andreas
(2020) When does my Program do this? Learning Circumstances of Software Behavior.
In: ESEC/FSE 2020.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (formerly listed as ESEC)
(In Press)

Gopinath, Rahul and Kampmann, Alexander and Havrikov, Nikolas and Soremekun, Ezekiel and Zeller, Andreas
(2020) Abstracting Failure-Inducing Inputs.
In: ISSTA - ACM SIGSOFT International Symposium on Software Testing and Analysis, Sat 18 - Wed 22 July 2020, Virtual.
Conference: ISSTA International Symposium on Software Testing and Analysis

Calciati, Paolo and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas
(2020) Automatically Granted Permissions in Android apps: An Empirical Study on their Prevalence and on the Potential Threats for Privacy.
In: MSR 2020.
Conference: MSR IEEE International Working Conference on Mining Software Repositories

Wang, Jiawei and Li, Li and Zeller, Andreas
(2020) Better Code, Better Sharing: On the Need of Analyzing Jupyter Notebooks.
In: 2020 IEEE/ACM 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER).
Conference: ICSE International Conference on Software Engineering

Wanwarang, Tanapuch and Pereira Borges Jr., Nataniel and Bettscheider, Leon and Zeller, Andreas
(2020) Testing Apps With Real-World Inputs.
In: 1st IEEE/ACM International Conference on Automation of Software Test, May 25-26, 2020, Seoul, South Korea.
Conference: AST Automation of Software Test
(In Press)

Grochowksi, Marco and Simon, Hendrik and Bohlender, Dimitri and Kowalewski, Stefan and Löcklin, Andreas and Müller, Timo and Jazdi, Nasser and Zeller, Andreas and Weyrich, Michael
(2020) Formale Methoden für rekonfigurierbare cyber-physische Systeme in der Produktion.
Automatisierungstechnik, 68 (1). ISSN 0178-2312

Benz, Manuel and Kristensen, Erik Krogh and Luo, Linghui and Pereira Borges Jr., Nataniel and Bodden, Eric and Zeller, Andreas
(2020) Heaps’n’Leaks: How Heap Snapshots Improve Android Taint Analysis.
In: ICSE 2020: Proceedings of the International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Chakraborty, Dhiman and Bugiel, Sven
(2019) Poster: simFIDO – FIDO2 User Authentication with simTPM.
In: CCS 19, 11/11/2019 - 15/11/2019, London, UK.
Conference: CCS ACM Conference on Computer and Communications Security

Havrikov, Nikolas and Zeller, Andreas
(2019) Systematically Covering Input Structure.
In: ASE 2019.
Conference: ASE Automated Software Engineering Conference

Hof, Hans-Joachim and Fritz, Mario and Krauss, Christoph and Wasenmüller, Oliver
(2019) ACM Computer Science in Cars Symposium.
Association for Computing Machinery, Kaiserslautern, Germany. ISBN 978-1-4503-7004-2

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne
(2019) The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
In: Usenix Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Naseri, Mohammad and Pereira Borges Jr., Nataniel and Zeller, Andreas and Rouvoy, Romain
(2019) AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service.
In: PETS 2019 - The 19th Privacy Enhancing Technologies Symposium, 16-20, Stockholm, Sweden.
Conference: PETS Privacy Enhancing Technologies Symposium (was International Workshop of Privacy Enhancing Technologies)

Degott, Christian and Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019) Learning User Interface Element Interactions.
In: ACM SIGSOFT International Symposium on Software Testing and Analysis, July 15-19, 2019, Beijing, China.
Conference: ISSTA International Symposium on Software Testing and Analysis

Mathis, Björn and Gopinath, Rahul and Mera, Michaël and Kampmann, Alexander and Höschele, Matthias and Zeller, Andreas
(2019) Parser-Directed Fuzzing.
In: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2019), Sat 22 - Wed 26 June 2019, Phoenix, Arizona, United States.
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation
(In Press)

Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019) simTPM: User-centric TPM for Mobile Devices (Technical Report).
arxiv.org.

Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019) simTPM: User-centric TPM for Mobile Devices.
In: Usenix Security Symposium, Santa Clara, CA, USA.
Conference: USENIX-Security Usenix Security Symposium

Kampmann, Alexander and Zeller, Andreas
(2019) Carving Parameterized Unit Tests.
In: 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), May 2019, Montreal.
Conference: ICSE International Conference on Software Engineering

Chakraborty, Dhiman and Hammer, Christian and Bugiel, Sven
(2019) Secure Multi-Execution in Android.
In: 34th ACM/SIGAPP Symposium On Applied Computing.
Conference: SAC ACM Symposium on Applied Computing

Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019) Why does this App need this Data? Automatic Tightening of Resource Access.
In: 2019 IEEE 12th International Conference on Software Testing, Verification and Validation (ICST).
Conference: ICST International Conference on Software Testing, Verification and Validation

Dawoud, Abdallah and Bugiel, Sven
(2019) DroidCap: OS Support for Capability-based Permissions in Android.
In: NDSS Symposium 2019.
Conference: NDSS Network and Distributed System Security Symposium

Chakraborty, Dhiman and Bugiel, Sven and Jha, Atul Ananad
(2019) Poster: TGX: Secure SGX enclave management using TPM.
In: NDSS Symposium 2019, February 24-27, 2019, San Diego, CA, USA.
Conference: NDSS Network and Distributed System Security Symposium

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2019) Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android.
In: Proceedings of the Network and Distributed System Security Symposium (NDSS).
Conference: NDSS Network and Distributed System Security Symposium

Christi, Arpit and Groce, Alex and Gopinath, Rahul
(2019) Evaluating Fault Localization for Resource Adaptation via Test-Based Software Modification.
In: Software Quality, Reliability, and Security (QRS).
Conference: QRS Software Quality, Reliability, and Security (was International Conference on Quality Software, QSIC, that merged with SERE 2015)

Zeller, Andreas and Gopinath, Rahul and Böhme, Marcel and Fraser, Gordon and Holler, Christian
(2019) The Fuzzing Book.
CISPA + Saarland University, Saarbrücken. ISBN n/a

Huang, Jie and Pereira Borges Jr., Nataniel and Bugiel, Sven and Backes, Michael
(2019) Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
In: 4th IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Zhao, Fanghua and Gao, Linan and Zhang, Yang and Wang, Zeyu and Wang, Bo and Guo, Shanqing
(2018) You Are Where You APP: An Assessment on Location Privacy of Social APPs.
In: IEEE International Symposium on Software Reliability Engineering, 15.10.2018-18.10.2018.
Conference: ISSRE International Symposium on Software Reliability Engineering

Borges, Nataniel P. and Hotzkow, Jenny and Zeller, Andreas
(2018) DroidMate-2: A Platform for Android Test Generation.
In: The 33rd ACM/IEEE International Conference on Automated Software Engineering, Montpellier, France.
Conference: ASE Automated Software Engineering Conference

Wang, Xueou and Hou, Xiaolu and Rios, Ruben and Hallgren, Per and Tippenhauer, Nils Ole and Ochoa, Martín
(2018) Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies.
In: Proceedings of the European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Rau, Andreas and Hotzkow, Jenny and Zeller, Andreas
(2018) Efficient GUI Test Generation by Learning from Tests of Other Apps.
In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings.
Conference: ICSE International Conference on Software Engineering

Pereira Borges Jr., Nataniel and Gómez, Maria and Zeller, Andreas
(2018) Guiding app testing with mined interaction models.
In: Proceedings of the 5th International Conference on Mobile Software Engineering and Systems.
Conference: MOBILESoft@ICSE MOBILESoft@ICSE

Kuznetsov, Konstantin and Avdiienko, Vitalii and Gorla, Alessandra and Zeller, Andreas
(2018) Analyzing the User Interface of Android Apps.
In: MOBILESoft ’18: 5th IEEE/ACM International Conference on Mobile Software Engineering and Systems, May 27–28, Gothenburg, Sweden.
Conference: MOBILESoft@ICSE MOBILESoft@ICSE

Fakhreddine, Aymen and Tippenhauer, Nils Ole and Giustiniano, Domenico
(2018) Design and Large-Scale Evaluation of WiFi Proximity Metrics.
In: Proceedings of European Wireless.
Conference: UNSPECIFIED

Gopinath, Rahul and Mathis, Björn and Zeller, Andreas
(2018) If You Can't Kill a Supermutant, You Have a Problem.
In: Software Testing, Verification and Validation Workshops (ICSTW), 2018 IEEE Seventh International Conference on.
Conference: ICST International Conference on Software Testing, Verification and Validation

Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole
(2018) State-Aware Anomaly Detection for Industrial Control Systems.
In: Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC).
Conference: SAC ACM Symposium on Applied Computing

Dawoud, Abdallah
(2018) OS Support For Capabilities In Android.
Masters thesis, Saarland University.

Mathis, Björn and Avdiienko, Vitalii and Soremekun, Ezekiel and Böhme, Marcel and Zeller, Andreas
(2018) Detecting Information Flow by Mutating Input data.
In: Software Engineering (SE) 2018.
Conference: SE IASTED International Conference on Software Engineering

Hotzkow, Jenny
(2017) Automatically Inferring and Enforcing User Expectations.
In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017, July 10-14, Santa Barbara, CA, USA.
Conference: ISSTA International Symposium on Software Testing and Analysis

Pereira Borges Jr., Nataniel
(2017) Data flow oriented UI testing: exploiting data flows and UI elements to test Android applications.
In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, July 10 - 14, 2017, Santa Barbara, CA, USA.
Conference: ISSTA International Symposium on Software Testing and Analysis

Fischer, Felix and Böttinger, Konstantin and Xiao, Huang and Stransky, Christian and Acar, Yasemin and Backes, Michael and Fahl, Sascha
(2017) Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
In: 38th IEEE Symposium on Security and Privacy (S&P '17).
Conference: SP IEEE Symposium on Security and Privacy

Avdiienko, Vitalii and Kuznetsov, Konstantin and Rommelfanger, Isabelle and Rau, Andreas and Gorla, Alessandra and Zeller, Andreas
(2017) Detecting behavior anomalies in graphical user interfaces.
In: Software Engineering Companion (ICSE-C), 2017 IEEE/ACM 39th International Conference on.
Conference: ICSE International Conference on Software Engineering

Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von and Weisgerber, Sebastian
(2017) ARTist: The Android Runtime Instrumentation and Security Toolkit.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: AMCIS Americas Conference on Information Systems

Backes, Michael and Nauman, Mohammad
(2017) LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P '17).
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Huang, Jie and Schranz, Oliver and Bugiel, Sven and Backes, Michael
(2017) The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
In: Proceedings of the 24th ACM Conference on Computer and Communication Security (CCS'17).
Conference: CCS ACM Conference on Computer and Communications Security

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2017) App Mining.
In: Lecture Notes in Informatics (LNI) - Proceedings. LNI, P-267 . GI.

Malinowski, Mateusz and Rohrbach, Marcus and Fritz, Mario
(2017) Ask Your Neurons: A Deep Learning Approach to Visual Question Answering.
International Journal of Computer Vision, 125 (1-3). pp. 110-135.

Mathis, Björn and Avdiienko, Vitalii and Soremekun, Ezekiel and Böhme, Marcel and Zeller, Andreas
(2017) Detecting Information Flow by Mutating Input Data.
In: Proceedings of the 32Nd IEEE/ACM International Conference on Automated Software Engineering.
Conference: ASE Automated Software Engineering Conference

Mathis, Björn
(2017) Dynamic Tainting for Automatic Test Case Generation.
In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis.
Conference: ISSTA International Symposium on Software Testing and Analysis

Havrikov, Nikolas and Gambi, Alessio and Zeller, Andreas and Arcuri, Andrea and Galeotti, Juan Pablo
(2017) Generating Unit Tests with Structured System Interactions.
In: 12th IEEE/ACM International Workshop on Automation of Software Testing, AST@ICSE 2017, Buenos Aires, Argentina, May 20-21, 2017.

Jamrozik, Konrad and Zeller, Andreas
(2017) Mining Sandboxes for Security - Automatisches Sandboxing für Software-Sicherheit.
In: Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland, Hannover, Deutschland.

Chattopadhyay, Sudipta and Beck, Moritz and Rezine, Ahmed and Zeller, Andreas
(2017) Quantifying the information leak in cache attacks via symbolic execution.
In: Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2017, Vienna, Austria, September 29 - October 02, 2017.

Backes, Michael and Bugiel, Sven and von Styp-Rekowsky, Philipp and Wißfeld, Marvin
(2017) Seamless In-App Ad Blocking on Stock Android.
In: Mobile Security Technologies (MOST) 2017 Workshop.

Zeller, Andreas
(2017) Search-Based Testing and System Testing: A Marriage in Heaven.
In: 10th IEEE/ACM International Workshop on Search-Based Software Testing, SBST@ICSE 2017, Buenos Aires, Argentina, May 22-23, 2017.

Nguyen, Duc Cuong and Wermke, Dominik and Acar, Yasemin and Backes, Michael and Weir, Charles Alexander Forbes and Fahl, Sascha
(2017) A Stitch in Time: Supporting Android Developers in Writing Secure Code.
In: Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS '17).
Conference: CCS ACM Conference on Computer and Communications Security

Oh, Seong Joon and Augustin, Max and Schiele, Bernt and Fritz, Mario
(2017) Whitening Black-Box Neural Networks.
Technical Report. arXiv.

Endner-Dühr, Frederic
(2016) Extracting and Modeling Typosquatting Errors from Large-scale Passive DNS Data.
Masters thesis, UNSPECIFIED.

Lipp, Nils Peter
(2016) Full Reference Monitoring for Android Intents.
Bachelors thesis, UNSPECIFIED.

Steffensky, Joshua
(2016) Hardening Intel SGX enclaves against memory safety exploits.
Bachelors thesis, UNSPECIFIED.

Hagestedt, Inken
(2016) Static Analysis of Non-interference for Android Apps.
Masters thesis, UNSPECIFIED.

Bushart, Jonas
(2016) Time-to-Live based Trilateration.
Bachelors thesis, UNSPECIFIED.

Dietel, Sebastian
(2016) Towards Native Client Executables via Binary Translation on the x86 Platform.
Bachelors thesis, UNSPECIFIED.

Backes, Michael and Bugiel, Sven and Derr, Erik
(2016) Reliable Third-Party Library Detection in Android and its Security Applications.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16).
Conference: CCS ACM Conference on Computer and Communications Security

Backes, Michael and Bugiel, Sven and Derr, Erik and McDaniel, Patrick and Octeau, Damien and Weisgerber, Sebastian
(2016) On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
In: Proceedings of the 25th USENIX Security Symposium (USENIX Security '16).
Conference: USENIX-Security Usenix Security Symposium

Zeller, Andreas
(2016) Mining Apps for Anomalies.
In: SoftwareMining. Perspectives on Data Science for Software Engineering. ISBN 9780128042069

Bhattacharjee, Bobby and Druschel, Peter and Herbster, Raul and DellaTorre, Scott
(2016) Privacy Capsules: Preventing Information Leaks by Mobile Apps.
In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, Singapore, June 26-30, 2016.

Backes, Michael and Bugiel, Sven and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2016) Boxify: Bringing Full-Fledged App Sandboxing to Stock Android.
USENIX ;login:, 41 (2). pp. 16-21.

Backes, Michael and Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2016) R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.

Acar, Yasemin and Backes, Michael and Bugiel, Sven and Fahl, Sascha and McDaniel, Patrick and Smith, Matthew
(2016) SoK: Lessons Learned From Android Security Research For Appified Software Platforms.
In: 37th IEEE Symposium on Security and Privacy (S&P '16).
Conference: SP IEEE Symposium on Security and Privacy

Zeller, Andreas and Jamrozik, Konrad
(2016) DroidMate: a robust and extensible test generator for Android.
In: Proceedings of the International Conference on Mobile Software Engineering and Systems (MOBILESoft '16).

Nürnberger, Stefan and Bugiel, Sven
(2016) Autonome Systeme.
Datenschutz und Datensicherheit, 40 (8). pp. 503-506.

Bugiel, Sven
(2016) Establishing mandatory access control on Android OS.
Doctoral thesis, UNSPECIFIED.

Backes, Michael and Bugiel, Sven and Huang, Jie and Schranz, Oliver
(2016) POSTER: The ART of App Compartmentalization.
In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16 ).
Conference: CCS ACM Conference on Computer and Communications Security

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2016) Abnormal Sensitive Data Usage in Android Apps.
In: In Proceedings of the Jornadas Nacionales de Investigación en Ciberseguridad.

Avdiienko, Vitalii and Kuznetsov, Konstantin and Calciati, Paolo and Caiza Rom\'an, Juan Carlos and Gorla, Alessandra and Zeller, Andreas
(2016) CALAPPA: A Toolchain for Mining Android Applications.
In: Proceedings of the International Workshop on App Market Analytics.

Zeller, Andreas and Weyrich, Michael
(2016) Challenges for functional testing of reconfigurable production systems.
In: 21st IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2016, Berlin, Germany, September 6-9, 2016.

Kuznetsov, Konstantin and Avdiienko, Vitalii and Gorla, Alessandra and Zeller, Andreas
(2016) Checking App User Interfaces Against App Descriptions.
In: Proceedings of the International Workshop on App Market Analytics.

Höschele, Matthias and Zeller, Andreas
(2016) Mining input grammars from dynamic taints.
In: Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, ASE 2016, Singapore, September 3-7, 2016.
Conference: ASE Automated Software Engineering Conference

Blackburn, Stephen M. and Diwan, Amer and Hauswirth, Matthias and Sweeney, Peter F. and Amaral, José Nelson and Brecht, Tim and Bulej, Lubomír and Click, Cliff and Eeckhout, Lieven and Fischmeister, Sebastian and Frampton, Daniel and Hendren, Laurie J. and Hind, Michael and Hosking, Antony L. and Jones, Richard E. and Kalibera, Tomas and Keynes, Nathan and Nystrom, Nathaniel and Zeller, Andreas
(2016) The Truth, The Whole Truth, and Nothing But the Truth: A Pragmatic Guide to Assessing Empirical Evaluations.
ACM Trans. Program. Lang. Syst., 38 (4). 15:1–15:20.

Schranz, Oliver
(2015) Towards Compiler-Assisted Taint Tracking on the Android Runtime.
Masters thesis, Saarland University.

Fatz, Filip
(2015) Toward a Backward-compatible API for Defining Fine-grained App Policies on Android.
Bachelors thesis, Saarland University.

Backes, Michael and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
In: Proceedings of the 22nd ACM conference on Computer and Communications Security (ACM CCS '15).
Conference: CCS ACM Conference on Computer and Communications Security

Frassinelli, Daniel
(2015) Security Analysis of Telematic and Emergency Devices in a Modern Car.
Masters thesis, Saarland University.

Schwarz, Fabian Frank
(2015) Security Analysis of Mobile Banking Apps.
Bachelors thesis, Saarland University.

Kuznetsov, Konstantin and Gorla, Alessandra and Tavecchia, Ilaria and Groß, Florian and Zeller, Andreas
(2015) Mining Android Apps for Anomalies.
In: Perspectives on Data Science for Software Engineering. The Art and Science of Analyzing Software Data. ISBN 9780124115194

Backes, Michael and Bugiel, Sven and Hammer, Christian and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015) Boxify: Full-fledged App Sandboxing for Stock Android.
In: Proceedings of the 24th USENIX Security Symposium (USENIX '15).
Conference: USENIX-Security Usenix Security Symposium

Oltrogge, Marten and Acar, Yasemin and Dechand, Sergej and Smith, Matthew and Fahl, Sascha
(2015) To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections.
In: 24th USENIX Security Symposium (USENIX Security 15).
Conference: USENIX-Security Usenix Security Symposium

Wißfeld, Marvin
(2015) ArtHook: Callee-side Method Hook Injection on the New Android Runtime ART.
Bachelors thesis, Saarland University.

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2015) Mining Apps for Abnormal Usage of Sensitive Data.
In: Proceedings of the 37th International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Galeotti, Juan Pablo and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2015) Inferring Loop Invariants by Mutation, Dynamic Analysis, and Static Checking.
IEEE Transactions of Software Engineering, 41 (10). 1019–1037.

Schur, Matthias and Roth, Andreas and Zeller, Andreas
(2015) Mining Workflow Models from Web Applications.
IEEE Trans. Software Eng., 41 (12). 1184–1201.

Avdiienko, Vitalii and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric
(2015) Mining apps for abnormal usage of sensitive data.
In: In Proceedings of Grande Region Security and Reliability Day.

Zeller, Andreas and Weyrich, Michael
(2015) Test case selection for networked production systems.
In: 20th IEEE Conference on Emerging Technologies & Factory Automation, ETFA 2015, Luxembourg, September 8-11, 2015.

Backes, Michael and Bugiel, Sven and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2014) Android Security Framework: Extensible Multi-Layered Access Control on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Backes, Michael and Bugiel, Sven and Gerling, Sebastian
(2014) Scippa: System-Centric IPC Provenance on Android.
In: In Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Backes, Michael and Bugiel, Sven and Derr, Erik and Hammer, Christian
(2014) Taking Android App Vetting to the Next Level with Path-sensitive Value Analysis.
Technical Report. UNSPECIFIED.
(Unpublished)

Lentz, Matthew and Erdelyi, Viktor and Aditya, Paarijaat and Shi, Elaine and Druschel, Peter and Bhattacharjee, Bobby
(2014) SDDR: Light-Weight, Secure Mobile Encounters.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Grishchenko, Ilya
(2014) Static Analysis of Android Applications.
Masters thesis, Saarland University.

Endner-Dühr, Frederic
(2014) Application-level Firewall in Stock Android.
Bachelors thesis, Saarland University.

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave new world: privacy risks for mobile users.
In: Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014.

Gorla, Alessandra and Tavecchia, Ilaria and Gross, Florian and Zeller, Andreas
(2014) Checking App Behavior Against App Descriptions.
In: Proc. of the 36th International Conference on Software Engineering (ICSE 2014).
Conference: ICSE International Conference on Software Engineering

Schweig, Marc
(2014) Developing a RiskScore for Android Applications.
Bachelors thesis, Saarland University.

Aditya, Paarijaat and Erdelyi, Viktor and Lentz, Matthew and Shi, Elaine and Bhattacharjee, Bobby and Druschel, Peter
(2014) EnCore: Private, Context-based Communication for Mobile Social Apps.
In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services.

Brachmann, Niklas
(2014) Evaluating the Effectiveness of In-app DRM Systems for Android.
Bachelors thesis, Saarland University.

Perlov, Artem
(2014) Identifying the Optimal Permission Set of Android Applications.
Bachelors thesis, Saarland University.

Frey, Tobias
(2014) System Centric IPC Call Chains for Android.
Bachelors thesis, Saarland University.

Derr, Erik
(2014) Verifying the Internet Access of Android Applications.
Masters thesis, Saarland University.

Galeotti, Juan P. and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2014) Automating Full Functional Verification of Programs with Loops.
CoRR - Computing Research Repository, abs/14.

Galeotti, Juan Pablo and Furia, Carlo A. and May, Eva and Fraser, Gordon and Zeller, Andreas
(2014) DynaMate: Dynamically Inferring Loop Invariants for Automatic Full Functional Verification.
In: Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, HVC 2014, Haifa, Israel, November 18-20, 2014. Proceedings.

Backes, Michael and Gagné, Martin and Skoruppa, Malte
(2013) Using Mobile Device Communication to Strengthen e-Voting Protocols.
In: Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society - WPES 2013.

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard – Fine-grained Policy Enforcement for Untrusted Android Applications.
In: 8th International Workshop on Data Privacy Management (DPM'13).

Tippenhauer, Nils Ole and Malisa, Luka and Ranganathan, Aanjhan and Capkun, Srdjan
(2013) On Limitations of Friendly Jamming for Confidentiality.
In: Proceedings of the IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Kahl, Gerrit and Paradowski, Denise
(2013) A Privacy-aware Shopping Scenario.
In: Proceedings of the Companion Publication of the 2013 International Conference on Intelligent User Interfaces. International Conference on Intelligent User Interfaces (IUI-13), March 19-22, Santa Monic.

Bugiel, Sven and Derr, Erik and Gerling, Sebastian and Hammer, Christian
(2013) Advances in Mobile Security.
In: 8th Future Security - Security Research Conference.

Backes, Michael and Gerling, Sebastian and Hammer, Christian and Maffei, Matteo and Styp-Rekowsky, Philipp von
(2013) AppGuard - Enforcing User Requirements on Android Apps.
In: Tools and Algorithms for the Construction and Analysis of Systems. Springer, pp. 545-550.

Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013) Callee-site Rewriting of Sealed System Libraries.
In: Engineering Secure Software and Systems. Springer, pp. 33-41.

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza
(2013) Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13).
Conference: USENIX-Security Usenix Security Symposium

Asghar, Muhammad Rizwan and Miorandi, Daniele
(2013) A Holistic View of Security and Privacy Issues in Smart Grids.
In: UNSPECIFIED Lecture Notes in Computer Science, 7823 . Springer Berlin Heidelberg, pp. 58-71. ISBN 978-3-642-38029-7

Styp-Rekowsky, Philipp von and Gerling, Sebastian and Backes, Michael and Hammer, Christian
(2013) Idea: Callee-Site Rewriting of Sealed System Libraries.
In: International Symposium on Engineering Secure Software and Systems (ESSoS'13).

Hartmanns, Arnd and Hermanns, Holger and Berrang, Pascal
(2012) A comparative analysis of decentralized power grid stabilization strategies.
In: Proceedings of the Winter Simulation Conference.

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2012) MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
In: Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12).
Conference: NDSS Network and Distributed System Security Symposium

Teris, Liviu
(2012) Securing User-data in Android - A conceptual approach for consumer and enterprise usage.
Masters thesis, Saarland University.

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Fischer, Thomas and Sadeghi, Ahmad-Reza and Shastry, Bhargava
(2012) Towards Taming Privilege-Escalation Attacks on Android.
In: 19th Annual Network & Distributed System Security Symposium (NDSS'12).
Conference: NDSS Network and Distributed System Security Symposium

Obser, Sven
(2012) User-controlled Internet Connections in Android.
Masters thesis, Saarland University.

Fahl, Sascha and Harbach, Marian and Muders, Thomas and Baumgärtner, Lars and Freisleben, Bernd and Smith, Matthew
(2012) Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security.
In: Proceedings of the 2012 ACM Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas
(2011) AmazonIA: When Elasticity Snaps Back.
In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11).
Conference: CCS ACM Conference on Computer and Communications Security

Tippenhauer, Nils Ole and Pöpper, Christina and Rasmussen, Kasper Bonne and \vCapkun, Srdjan
(2011) On the Requirements for Successful GPS Spoofing Attacks.
In: Proceedings of the ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) CFI Goes Mobile: Control-Flow Integrity for Smartphones.
International Workshop on Trustworthy Embedded Devices (TrustED).

Backes, Michael and Gerling, Sebastian and Styp-Rekowsky, Philipp von
(2011) A Local Cross-Site Scripting Attack against Android Phones.

Davi, Lucas and Dmitrienko, Alexandra and Egele, Manuel and Fischer, Thomas and Holz, Thorsten and Hund, Ralf and Nürnberger, Stefan and Sadeghi, Ahmad-Reza
(2011) Poster: Control-flow Integrity for Smartphones.
In: 18th ACM conference on Computer and communications security (ACM CCS 2012).
Conference: CCS ACM Conference on Computer and Communications Security

Bugiel, Sven and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Sadeghi, Ahmad-Reza and Shastry, Bhargava
(2011) Practical and Lightweight Domain Isolation on Android.
In: 1st ACM CCS Workshop on Security and Privacy in Mobile Devices (SPSM'11).

Bugiel, Sven and Davi, Lucas and Schulz, Steffen
(2011) Scalable Trust Establishment with Software Reputation.
In: Workshop on Scalable Trusted Computing (STC'11).

Schuler, David and Zeller, Andreas
(2011) Assessing Oracle Quality with Checked Coverage.
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2011, Berlin, Germany, March 21-25, 2011.
Conference: ICST International Conference on Software Testing, Verification and Validation

Mileva, Yana Momchilova and Zeller, Andreas
(2011) Assessing modularity via usage changes.
In: Proceedings of the 10th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools, PASTE'11, Szeged, Hungary, September 5-9, 2011.

Schwarz, Birgit and Schuler, David and Zeller, Andreas
(2011) Breeding High-Impact Mutations.
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Berlin, Germany, 21-25 March, 2011, Workshop Proceedings.
Conference: ICST International Conference on Software Testing, Verification and Validation

Nam, Jaechang and Schuler, David and Zeller, Andreas
(2011) Calibrated Mutation Testing.
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Berlin, Germany, 21-25 March, 2011, Workshop Proceedings.
Conference: ICST International Conference on Software Testing, Verification and Validation

Fraser, Gordon and Zeller, Andreas
(2011) Exploiting Common Object Usage in Test Case Generation.
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2011, Berlin, Germany, March 21-25, 2011, Berlin, Germany.
Conference: ICST International Conference on Software Testing, Verification and Validation

Fraser, Gordon and Zeller, Andreas
(2011) Generating parameterized unit tests.
In: Proceedings of the 20th International Symposium on Software Testing and Analysis, ISSTA 2011, Toronto, ON, Canada, July 17-21, 2011.
Conference: ISSTA International Symposium on Software Testing and Analysis

Burger, Martin and Zeller, Andreas
(2011) Minimizing reproduction of software failures.
In: Proceedings of the 20th International Symposium on Software Testing and Analysis, ISSTA 2011, Toronto, ON, Canada, July 17-21, 2011.
Conference: ISSTA International Symposium on Software Testing and Analysis

Herzig, Kim and Zeller, Andreas
(2011) Mining Cause-Effect-Chains from Version Histories.
In: IEEE 22nd International Symposium on Software Reliability Engineering, ISSRE 2011, Hiroshima, Japan, November 29 - December 2, 2011.
Conference: ISSRE International Symposium on Software Reliability Engineering

Mileva, Yana Momchilova and Wasylkowski, Andrzej and Zeller, Andreas
(2011) Mining Evolution of Object Usage.
In: ECOOP 2011 - Object-Oriented Programming - 25th European Conference, Lancaster, UK, July 25-29, 2011 Proceedings.
Conference: ECOOP European Conference on Object-Oriented Programming

Wasylkowski, Andrzej and Zeller, Andreas
(2011) Mining temporal specifications from object usage.
Autom. Softw. Eng., 18 (3-4). 263–292.

Rößler, Jeremias and Orso, Alessandro and Zeller, Andreas
(2011) When Does My Program Fail?
In: Fourth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Berlin, Germany, 21-25 March, 2011, Workshop Proceedings.
Conference: ICST International Conference on Software Testing, Verification and Validation

Backes, Michael and Müller-Quade, Jörn and Unruh, Dominique
(2006) On the Necessity of Rewinding in Secure Multiparty Computation.
UNSPECIFIED
.

This list was generated on Sat Apr 20 08:22:04 2024 CEST.