Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild., , , , and . TrustCom, page 315-322. IEEE, (2022)Securing Your Crypto-API Usage Through Tool Support - A Usability Study., , , , , , , , and . SecDev, page 14-25. IEEE, (2023)Algebraic Replicated Data Types: Programming Secure Local-First Software (Artifact)., , , and . Dagstuhl Artifacts Ser., 9 (2): 26:1-26:4 (2023)Large-Scale Manual Validation of Bug Fixing Commits: A Fine-grained Analysis of Tangling., , , , , , , , , and 38 other author(s). CoRR, (2020)Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild., , , and . TrustCom, page 410-417. IEEE, (2020)Algebraic Replicated Data Types: Programming Secure Local-First Software., , , and . ECOOP, volume 263 of LIPIcs, page 14:1-14:33. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)Python Crypto Misuses in the Wild., , , and . ESEM, page 31:1-31:6. ACM, (2021)A dataset of parametric cryptographic misuses., , , , and . MSR, page 96-100. IEEE / ACM, (2019)Supporting Error Chains in Static Analysis for Precise Evaluation Results and Enhanced Usability., , , , , and . CoRR, (2024)UnGoML: Automated Classification of unsafe Usages in Go., , , , and . MSR, page 309-321. IEEE, (2023)