Johannes Lerch
Johannes Lerch
Verified email at cs.tu-darmstadt.de
TitleCited byYear
Intelligent code completion with Bayesian networks
S Proksch, J Lerch, M Mezini
ACM Transactions on Software Engineering and Methodology (TOSEM) 25 (1), 3, 2015
292015
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases
J Lerch, B Hermann, E Bodden, M Mezini
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014
262014
Finding duplicates of your yet unwritten bug report
J Lerch, M Mezini
2013 17th European Conference on Software Maintenance and Reengineering, 69-78, 2013
242013
CodeMatch: obfuscation won't conceal your repackaged app
L Glanz, S Amann, M Eichberg, M Reif, B Hermann, J Lerch, M Mezini
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
212017
Access-path abstraction: Scaling field-sensitive data-flow analysis with unbounded access paths (t)
J Lerch, J Späth, E Bodden, M Mezini
2015 30th IEEE/ACM International Conference on Automated Software …, 2015
192015
Call graph construction for java libraries
M Reif, M Eichberg, B Hermann, J Lerch, M Mezini
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
162016
Design your analysis: A case study on implementation reusability of data-flow functions
J Lerch, B Hermann
Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the …, 2015
52015
Reducing human factors in software security architectures
E Bodden, B Hermann, J Lerch, M Mezini, E Spride, FSIT Darmstadt
Future Security Conference (to appear, 2013
42013
Hardening Java’s access control by abolishing implicit privilege elevation
P Holzinger, B Hermann, J Lerch, E Bodden, M Mezini
2017 IEEE Symposium on Security and Privacy (SP), 1027-1040, 2017
32017
On the Scalability of Static Program Analysis to Detect Vulnerabilities in the Java Platform
J Lerch
Technische Universität Darmstadt, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–10