{"id":1742,"date":"2015-06-22T18:13:56","date_gmt":"2015-06-22T16:13:56","guid":{"rendered":"http:\/\/sseblog.ec-spride.de\/?p=1742"},"modified":"2015-06-22T18:13:56","modified_gmt":"2015-06-22T16:13:56","slug":"new-sse-papers-accepted","status":"publish","type":"post","link":"https:\/\/blogs.uni-paderborn.de\/sse\/2015\/06\/22\/new-sse-papers-accepted\/","title":{"rendered":"New SSE Papers Accepted"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_1742 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_1742')){$('.twoclick_social_bookmarks_post_1742').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blogs.uni-paderborn.de\\\/sse\\\/2015\\\/06\\\/22\\\/new-sse-papers-accepted\\\/\",\"post_id\":1742,\"post_title_referrer_track\":\"New+SSE+Papers+Accepted\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p>Several new papers written by members of the Secure Software Engineering Group have now been accepted at renowned international venues. The papers cover topics such as the reduction of false positives in static data flow analysis, the in-depth analysis of modern, sophisticated malware applications, and the challenges of developing secure software using agile techniques.<\/p>\n<p><!--more--><\/p>\n<p>The paper &#8220;<a href=\"https:\/\/www.informatik.tu-darmstadt.de\/fileadmin\/user_upload\/Group_EC-Spride\/Publikationen\/AndroidSymbolicExecution.pdf\">Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis<\/a>&#8221; describes a technique for pruning false alarms from the result list of static data flow analysis tools such as FlowDroid. It will appear at the 4th ACM SIGPLAN International Workshop on the\u00a0State Of the Art in Program Analysis\u00a0(SOAP 2015), co-located with PLDI 2015 in Portland, Oregon.<\/p>\n<p>The paper &#8220;An Investigation of the Android\/BadAccents Malware which Exploits a new Android Tapjacking Attack&#8221; describes in detail a new and sophisticated malware application for Android. This malware has infected\u00a0about 20,000 Korean users and stole banking details from their smartphones. The paper has been accepted for publication at The 9th WISTP International Conference on Information Security Theory and Practice (WISTP&#8217;2015).<\/p>\n<p>In a paper called &#8220;Analysis of the Challenges of Developing Secure Software Using the Agile Approach&#8221;, researchers from the Secure Software Engineering Group investigate the key\u00a0challenges that arise when using modern agile software development processes for security-critical applications. The paper will be presented at The First International Workshop on Agile Secure Software Development (ASSD) at ARES 2015.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Several new papers written by members of the Secure Software Engineering Group have now been accepted at renowned international venues. The papers cover topics such as the reduction of false positives in static data flow analysis, the in-depth analysis of &hellip; <a href=\"https:\/\/blogs.uni-paderborn.de\/sse\/2015\/06\/22\/new-sse-papers-accepted\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6601,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1742","post","type-post","status-publish","format-standard","hentry","category-general"],"_links":{"self":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts\/1742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/users\/6601"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/comments?post=1742"}],"version-history":[{"count":0,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/posts\/1742\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/media?parent=1742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/categories?post=1742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uni-paderborn.de\/sse\/wp-json\/wp\/v2\/tags?post=1742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}