Intelligent code completion with Bayesian networks S Proksch, J Lerch, M Mezini ACM Transactions on Software Engineering and Methodology (TOSEM) 25 (1), 1-31, 2015 | 129 | 2015 |
Finding duplicates of your yet unwritten bug report J Lerch, M Mezini 2013 17th European conference on software maintenance and reengineering, 69-78, 2013 | 85 | 2013 |
Call graph construction for java libraries M Reif, M Eichberg, B Hermann, J Lerch, M Mezini Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 63 | 2016 |
CodeMatch: obfuscation won't conceal your repackaged app L Glanz, S Amann, M Eichberg, M Reif, B Hermann, J Lerch, M Mezini Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 61 | 2017 |
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases J Lerch, B Hermann, E Bodden, M Mezini Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014 | 54 | 2014 |
Access-path abstraction: Scaling field-sensitive data-flow analysis with unbounded access paths (t) J Lerch, J Späth, E Bodden, M Mezini 2015 30th IEEE/ACM International Conference on Automated Software …, 2015 | 47 | 2015 |
Hardening java’s access control by abolishing implicit privilege elevation P Holzinger, B Hermann, J Lerch, E Bodden, M Mezini 2017 IEEE Symposium on Security and Privacy (SP), 1027-1040, 2017 | 13 | 2017 |
Design your analysis: A case study on implementation reusability of data-flow functions J Lerch, B Hermann Proceedings of the 4th ACM SIGPLAN International Workshop on State of the …, 2015 | 9 | 2015 |
Reducing human factors in software security architectures E Bodden, B Hermann, J Lerch, M Mezini, EC SPRIDE, FSIT Darmstadt Future Security Conference (to appear, 2013 | 8 | 2013 |
On the scalability of static program analysis to detect vulnerabilities in the java platform J Lerch Technische Universität Darmstadt, 2016 | 2 | 2016 |
DIAL-Ein Display-Dialog-Programmsystem zur Experimentdatenauswertung für die Siemens 305-306 J Lerch | | 1974 |