Author image not provided
 Johannes Lerch

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article2.57
Citation Count18
Publication count7
Publication years2013-2017
Available for download5
Average downloads per article257.20
Downloads (cumulative)1,286
Downloads (12 Months)581
Downloads (6 Weeks)58
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


7 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 7 of 7
Sort by:

1 published by ACM
August 2017 ESEC/FSE 2017: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 25,   Downloads (12 Months): 104,   Downloads (Overall): 104

Full text available: PDFPDF
An established way to steal the income of app developers, or to trick users into installing malware, is the creation of repackaged apps . These are clones of - typically -€“ successful apps. To conceal their nature, they are often obfuscated by their creators. But, given that it is a ...
Keywords: repackage detection, library detection, obfuscation, code analysis

2 published by ACM
November 2016 FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering
Publisher: ACM
Citation Count: 1
Downloads (6 Weeks): 12,   Downloads (12 Months): 211,   Downloads (Overall): 313

Full text available: PDFPDF
Today, every application uses software libraries. Yet, while a lot of research exists w.r.t. analyzing applications, research that targets the analysis of libraries independent of any application is scarce. This is unfortunate, because, for developers of libraries, such as the Java Development Kit (JDK), it is crucial to ensure that ...
Keywords: Libraries, Java, Call Graph Construction

3 published by ACM
December 2015 ACM Transactions on Software Engineering and Methodology (TOSEM): Volume 25 Issue 1, December 2015
Publisher: ACM
Citation Count: 4
Downloads (6 Weeks): 15,   Downloads (12 Months): 185,   Downloads (Overall): 508

Full text available: PDFPDF
Code completion is an integral part of modern Integrated Development Environments (IDEs). Developers often use it to explore Application Programming Interfaces (APIs). It is also useful to reduce the required amount of typing and to help avoid typos. Traditional code completion systems propose all type-correct methods to the developer. Such ...
Keywords: machine learning, evaluation, integrated development environments, productivity, code completion, code recommender, Content assist

November 2015 ASE '15: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)
Publisher: IEEE Computer Society
Citation Count: 1

Precise data-flow analyses frequently model field accesses through access paths with varying length. While using longer access paths increases precision, their size must be bounded to assure termination, and should anyway be small to enable a scalable analysis. We present Access-Path Abstraction, which for the first time combines efficiency with ...

5 published by ACM
June 2015 SOAP 2015: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis
Publisher: ACM
Citation Count: 1
Downloads (6 Weeks): 3,   Downloads (12 Months): 27,   Downloads (Overall): 119

Full text available: PDFPDF
The development of efficient data flow analyses is a complicated task. As requirements change and special cases have to be considered, implementations may get hard to maintain, test and reuse. We propose to design these analyses regarding the principle of separation of concerns. Therefore, in this paper we present a ...
Keywords: design, static analysis, ifds, Separation of concerns, flow function, ide

6 published by ACM
November 2014 FSE 2014: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering
Publisher: ACM
Citation Count: 6
Downloads (6 Weeks): 3,   Downloads (12 Months): 54,   Downloads (Overall): 242

Full text available: PDFPDF
Over the past years, widely used platforms such as the Java Class Library have been under constant attack through vulnerabilities that involve a combination of two taint-analysis problems: an integrity problem allowing attackers to trigger sensitive operations within the platform, and a confidentiality problem allowing the attacker to retrieve sensitive ...
Keywords: Taint analysis, IFDS, confused deputy

March 2013 CSMR '13: Proceedings of the 2013 17th European Conference on Software Maintenance and Reengineering
Publisher: IEEE Computer Society
Citation Count: 5

Software projects often use bug-tracking tools to keep track of reported bugs and to provide a communication platform to discuss possible solutions or ways to reproduce failures. The goal is to reduce testing efforts for the development team. However, often, multiple bug reports are committed for the same bug, which, ...
Keywords: stack trace, duplicate detection, bug report

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us