Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Utilizing DNS and VirusTotal for Automated Ad-Malware Detection

    In this paper, we present a novel approach to the automated detection of ad-malware. We efficiently crawl a vast set of websites and extensively fetch all HTTP requests embedded in these websites.Then we query...

    Florian Nettersheim, Stephan Arlt, Michael Rademacher in Web Engineering (2024)

  2. Article

    Open Access

    Secure corridor for infraacetabular screws in acetabular fracture fixation—a 3-D radiomorphometric analysis of 124 pelvic CT datasets

    Acetabular fracture surgery is directed toward anatomical reduction and stable fixation to allow for the early functional rehabilitation of an injured hip joint. Recent biomechanical investigations have shown ...

    Stephan Arlt, Hansrudi Noser, Andreas Wienke in Journal of Orthopaedic Surgery and Research (2018)

  3. No Access

    Chapter and Conference Paper

    The Gradual Verifier

    Static verification traditionally produces yes/no answers. It either provides a proof that a piece of code meets a property, or a counterexample showing that the property can be violated. Hence, the progress o...

    Stephan Arlt, Cindy Rubio-González, Philipp Rümmer, Martin Schäf in NASA Formal Methods (2014)

  4. No Access

    Chapter and Conference Paper

    Verification of GUI Applications: A Black-Box Approach

    In this paper, we propose to base the verification of a GUI application on a reference model used in black-box testing. The reference model is a formal model for the behavior of the GUI application. It is derived...

    Stephan Arlt, Evren Ermis, Sergio Feo-Arenis in Leveraging Applications of Formal Methods,… (2014)

  5. No Access

    Chapter and Conference Paper

    A Theory for Control-Flow Graph Exploration

    Detection of infeasible code has recently been identified as a scalable and automated technique to locate likely defects in software programs. Given the (acyclic) control-flow graph of a procedure, infeasible ...

    Stephan Arlt, Philipp Rümmer, Martin Schäf in Automated Technology for Verification and … (2013)

  6. No Access

    Chapter and Conference Paper

    Reconstructing Paths for Reachable Code

    Infeasible code has proved to be an interesting target for static analysis. It allows modular and scalable analysis, and at the same time, can be implemented with a close-to-zero rate of false warnings. The ch...

    Stephan Arlt, Zhiming Liu, Martin Schäf in Formal Methods and Software Engineering (2013)

  7. Chapter and Conference Paper

    Joogie: Infeasible Code Detection for Java

    We present Joogie, a tool that detects infeasible code in Java programs. Infeasible code is code that does not occur on feasible control-flow paths and thus has no feasible execution. Infeasible code comprises...

    Stephan Arlt, Martin Schäf in Computer Aided Verification (2012)

  8. Chapter and Conference Paper

    Parameterized GUI Tests

    GUI testing is a form of system testing where test cases are based on user interactions. A user interaction may be encoded by a sequence of events (e.g., mouse clicks) together with input data (e.g., string va...

    Stephan Arlt, Pedro Borromeo, Martin Schäf in Testing Software and Systems (2012)