Home  Sitemap  Kontakt 





 


TZI

---------------
 
 
Home

Publications of B. Berger

Conference and Workshop Articles

  • BIB

    B. Berger, K. Sohr, R. Koschke. Automatically Extracting Threats from Extended Data Flow Diagrams. J. Caballero, E. Bodden, E. Athanasopoulos, editors, International Symposium on Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6–8, 2016. Proceedings, Springer Verlag, 2016; 56–71.

    @inproceedings{Berger:ESSOS:16,
      author    = {Bernhard Berger and Karsten Sohr and Rainer Koschke},
      editor    = {Juan Caballero and Eric Bodden and Elias Athanasopoulos},
      publisher = {Springer Verlag},
      isbn      = {978-3-319-30806-7},
      title     = {Automatically Extracting Threats from Extended Data Flow Diagrams},
      series    = {Lecture Notes in Computer Science},
      booktitle = {International Symposium on Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6--8, 2016. Proceedings},
      year      = {2016},
      pages     = {56--71},
    }
  • BIB

    S. Bartsch, B. Berger, E. Bodden, A. Brucker, J. Heider, M. Kus, S. \"Maseberg, K. Sohr, M. Volkamer. Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. V. Stefan, E. Weippl, editors, Sicherheit 2014 Sicherheit, Schutz und Zuverlässigkeit, volume 228 of LNI, GI, 2014; 283–291.

    @inproceedings{Bartsch:GI:2014,
      author    = {Steffen Bartsch and Bernhard Berger and Eric Bodden and Achim Brucker and Jens Heider and Mehmet Kus and S{\"o}nke Maseberg and Karsten Sohr and Melanie Volkamer},
      editor    = {Volkmar Stefan and Edgar Weippl},
      publisher = {GI},
      isbn      = {978-3-88579-622-0},
      title     = {Zertifizierte Datensicherheit f{\"u}r Android-Anwendungen auf Basis statischer Programmanalysen},
      series    = {LNI},
      booktitle = {Sicherheit 2014 Sicherheit, Schutz und Zuverl{\"a}ssigkeit},
      volume    = {228},
      year      = {2014},
      pages     = {283--291},
    }
  • BIB

    S. Bartsch, B. Berger, M. Bunke, K. Sohr. The Transitivity-of-Trust Problem in Android Application Interaction. Eighth International Conference on Availability, Reliability and Security (ARES), 2013, IEEE Computer Society Press, 2013; 291–296.

    @inproceedings{Bartsch:ARES:2013,
      author    = {Steffen Bartsch and Bernhard Berger and Michaela Bunke and Karsten Sohr},
      publisher = {IEEE Computer Society Press},
      booktitle = {Eighth International Conference on Availability, Reliability and Security (ARES), 2013},
      year      = {2013},
      pages     = {291--296},
      title     = {The Transitivity-of-Trust Problem in Android Application Interaction},
    }
  • BIB DOI

    B. Berger, K. Sohr, R. Koschke. Extracting and Analyzing the Implemented Security Architecture of Business Applications. A. Cleve, F. Ricca, M. Cerioli, editors, European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, 2013; 285–294.

    @inproceedings{berger:csmr:13,
      author    = {Bernhard Berger and Karsten Sohr and Rainer Koschke},
      editor    = {Anthony Cleve and Fillipo Ricca and Maura Cerioli},
      publisher = {IEEE Computer Society Press},
      doi       = {http://dx.doi.org/10.1109/CSMR.2013.37},
      isbn      = {978-0-7695-4948-4},
      title     = {Extracting and Analyzing the Implemented Security Architecture of Business Applications},
      booktitle = {European Conference on Software Maintenance and Reengineering},
      issn      = {1534-5351},
      year      = {2013},
      keywords  = {reverse engineering;software security;static analysis;threat modeling},
      pages     = {285--294},
    }
  • BIB

    B. Berger, K. Sohr. An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. D. Gritzalis, S. Furnell, M. Theoharidou, editors, Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, volume 376 of IFIP Advances in Information and Communication Technology, Springer Verlag, 2012; 25–36.

    @inproceedings{Berger:SEC:12,
      author    = {Bernhard Berger and Karsten Sohr},
      editor    = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou},
      publisher = {Springer Verlag},
      isbn      = {978-3-642-30435-4},
      title     = {An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling},
      series    = {IFIP Advances in Information and Communication Technology},
      booktitle = {Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings},
      volume    = {376},
      year      = {2012},
      pages     = {25--36},
    }
  • BIB

    B. Berger, M. Bunke, K. Sohr. An Android Security Case Study with Bauhaus. Working Conference on Reverse Engineering, IEEE Computer Society Press, 2011; 179–183.

    @inproceedings{Berger:WCRE:11,
      author    = {Bernhard Berger and Michaela Bunke and Karsten Sohr},
      publisher = {IEEE Computer Society Press},
      booktitle = {Working Conference on Reverse Engineering},
      year      = {2011},
      pages     = {179--183},
      title     = {An Android Security Case Study with Bauhaus},
    }
  • BIB

    K. Sohr, B. Berger. Idea: Towards Architecture-Centric Security Analysis of Software. F. Massacci, D. Wallach, N. Zannone, editors, International Symposium on Engineering Secure Software and Systems, volume 5965 of Lecture Notes in Computer Science, Springer Verlag, 2010; 70–78.

    @inproceedings{Sohr:ESSOS:2010,
      author    = {Karsten Sohr and Bernhard Berger},
      editor    = {Fabio Massacci and Dan Wallach and Nicola Zannone},
      publisher = {Springer Verlag},
      isbn      = {978-3-642-11746-6},
      title     = {Idea: Towards Architecture-Centric Security Analysis of Software},
      series    = {Lecture Notes in Computer Science},
      booktitle = {International Symposium on Engineering Secure Software and Systems},
      volume    = {5965},
      year      = {2010},
      pages     = {70--78},
    }
  • BIB

    B. Berger, R. Koschke. Reduzierung der Programmgrö\sse durch Klonerkennung. Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft für Informatik, GI Lecture Notes for Informatics, 2008.

    @inproceedings{Berger:WASE:08,
      author    = {Bernhard Berger and Rainer Koschke},
      publisher = {GI Lecture Notes for Informatics},
      booktitle = {Workshop Automotive Software Engineering, Tagungsband zur Jahrestagung der Gesellschaft f{\"u}r Informatik},
      year      = {2008},
      title     = {{Reduzierung der Programmgr{\"o}{\ss}e durch Klonerkennung}},
    }

Further Publications

  • BIB

    B. Berger, M. Bunke. Software Security Comprehension. Softwaretechnik Trends may 2011; 31(2):30–31.

    @article{Berger:WSR:2011,
      author   = {Bernhard Berger and Michaela Bunke},
      title    = {Software Security Comprehension},
      journal  = {Softwaretechnik Trends},
      number   = {2},
      month    = {may},
      volume   = {31},
      year     = {2011},
      pages    = {30--31},
    }





Arbeitsgruppe

Forschung

Lehre

Publikationen

Service

Kontakt

 

---------
BEDIENUNG
---------


SEITENINHALT DRUCKEN

LESEZEICHEN SETZEN

ENGLISH VERSION  






  SEITENANFANG
Hier geht es zur Homepage des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Informatik des Fachbereiches 03 der Universität Bremen Hier geht es zur Homepage der Universität Bremen