Johannes Lerch
Johannes Lerch
Verified email at
Cited by
Cited by
Intelligent code completion with Bayesian networks
S Proksch, J Lerch, M Mezini
ACM Transactions on Software Engineering and Methodology (TOSEM) 25 (1), 1-31, 2015
Finding duplicates of your yet unwritten bug report
J Lerch, M Mezini
2013 17th European conference on software maintenance and reengineering, 69-78, 2013
Call graph construction for java libraries
M Reif, M Eichberg, B Hermann, J Lerch, M Mezini
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
CodeMatch: obfuscation won't conceal your repackaged app
L Glanz, S Amann, M Eichberg, M Reif, B Hermann, J Lerch, M Mezini
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases
J Lerch, B Hermann, E Bodden, M Mezini
Proceedings of the 22nd ACM SIGSOFT international symposium on foundations …, 2014
Access-path abstraction: Scaling field-sensitive data-flow analysis with unbounded access paths (t)
J Lerch, J Späth, E Bodden, M Mezini
2015 30th IEEE/ACM International Conference on Automated Software …, 2015
Hardening java˘s access control by abolishing implicit privilege elevation
P Holzinger, B Hermann, J Lerch, E Bodden, M Mezini
2017 IEEE Symposium on Security and Privacy (SP), 1027-1040, 2017
Design your analysis: A case study on implementation reusability of data-flow functions
J Lerch, B Hermann
Proceedings of the 4th ACM SIGPLAN International Workshop on State of the …, 2015
Reducing human factors in software security architectures
E Bodden, B Hermann, J Lerch, M Mezini, EC SPRIDE, FSIT Darmstadt
Future Security Conference (to appear, 2013
On the scalability of static program analysis to detect vulnerabilities in the java platform
J Lerch
Technische Universität Darmstadt, 2016
DIAL-Ein Display-Dialog-Programmsystem zur Experimentdatenauswertung für die Siemens 305-306
J Lerch
The system can't perform the operation now. Try again later.
Articles 1–11