Sprungmarken

Servicenavigation

Fachbereich Informatik Institute for Software Technology
Institute für Software Technology

Research Group
Software Engineering

Hauptnavigation


Bereichsnavigation



Diese Seite existiert nicht auf Deutsch

Nebeninhalt

Contact

University of Koblenz-Landau

Department of Software Technology

Universitaetsstrasse 1
D-56070 Koblenz



Main Content


Paper Reading Group (PRG)

Idea

The PRG takes place every one or two weeks. Its two mains goal are: (i) to practice the critical reading and discussion of research papers, and (ii) to share interesting research among the participants.

Each meeting has a discussion leader, a role which rotates among the participants. The discussion leader selects the paper to be read. The discussion leader asks the participants for discussion points at the beginning of a meeting, and then makes sure that the majority of discussion points is addressed during the meeting.

All participants are supposed to read the selected paper carefully, writing down comments and questions they would like to discuss in the meeting.

The PRG is open to motivated students. If you are interested in participating, contact Daniel Strüber.

Meetings

  • July 18, 2018, 14:00. Discussion leader: Sven.
    Paper: Christian Hammer, Gregor Snelting: "Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs." International Journal of Information Security 8(6): 399-422 (2009) [ URL ]
  • July 11, 2018, 14:00. Discussion leader: Qusai.
    Paper: Mihai Herda, Shmuel Tyszberowicz, Bernhard Beckert. "Using Dependence Graphs to Assist Verification and Testing of Information-Flow Properties." International Conference on Tests and Proofs: 83-102 (2018) [ URL ]
  • July 4, 2018, 14:00. Discussion leader: Daniel.
    Paper: Xiaoyin Wang, Xue Qin, Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Jianwei Niu. "GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications." International Conference on Software Engineering (2018) [ URL ]
  • June 6, 2018, 14:00. Discussion leader: Jan.
    Paper: Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom: "Spectre Attacks: Exploiting Speculative Execution." Symposium on Security and Privacy (2019) [ URL ]
  • May 9, 2018, 14:00. Discussion leader: Qusai.
    Paper: Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing: "A Methodology for Information Flow Experiments." Computer Security Foundations Symposium: 554-568 (2015) [ URL ]
  • April 18, 2018, 14:00. Discussion leader: Daniel.
    Paper: Siegfried Rasthofer, Steven Arzt, Eric Bodden: "A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks." Annual Network and Distributed System Security Symposium (2014) [ URL ]
  • April 11, 2018, 14:00. Discussion leader: Daniel.
    Paper: Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick D. McDaniel: "IccTA: Detecting Inter-Component Privacy Leaks in Android Apps." International Conference on Software Engineering: 280-291. (2015) [ URL ]
  • March 28, 2018, 14:00. Discussion leader: Shayan.
    Paper: Omar Alam, Jörg Kienzle, Gunter Mussbacher: "Concern-Oriented Software Design." International Conference on Model Driven Engineering Languages and Systems: 604-621 (2013) [ URL ]
  • March 13, 2018, 14:00. Discussion leader: Sven.
    Paper: Michael Pradel, Thomas R. Gross: "Automatic Generation of Object Usage Specifications from Large Method Traces." International Conference on Automated Software Engineering: 371-382 (2009) [ URL ]
  • February 7, 2018, 14:00. Discussion leader: Sven.
    Paper: Owolabi Legunsen, Wajih Ul Hassan, Xinyue Xu, Grigore Rosu, Darko Marinov: "How good are the specs? a study of the bug-finding effectiveness of existing Java API specifications." International Conference on Automated Software Engineering: 602-613. (2016) [ URL ]
  • January 31, 2018, 14:00. Discussion leader: Jens.
    Paper: Muhammad Shoaib, Amna Basharat: "4th Generation Flexible Query Language for Ontology Querying." International Conference on Computer and Information Science: 345-350. (2011) [ URL ]
  • January 24, 2018, 14:00. Discussion leader: Katharina.
    Paper: Alistair Mavin, Philip Wilkinson, Sabine Teufl, Henning Femmer, Jonas Eckhardt, Jakob Mund: "Does Goal-Oriented Requirements Engineering Achieve Its Goal?" International Requirements Engineering Conference: 174-183. (2017) [ URL ]
  • January 10, 2018, 14:00. Discussion leader: Volker.
    Paper: Nan Niu, Amy Koshoffer, Linda Newman, Charu Khatwani, Chatura Samarasinghe, Juha Savolainen: "Advancing Repeated Research in Requirements Engineering: A Theoretical Replication of Viewpoint Merging." International Requirements Engineering Conference: 186-195. (2016) [ URL ]
  • December 6, 2017, 15:00. Discussion leader: Qusai.
    Paper: Sainyam Galhotra, Yuriy Brun, Alexandra Meliou: "Fairness testing: testing software for discrimination." Joint Meeting of the European Software Engineering Conference and the Symposium on the Foundations of Software Engineering: 498-510 (2017) [ URL ]
  • November 22, 2017, 14:00. Discussion leader: Katharina.
    Paper: Sven Türpe: "The Trouble with Security Requirements." International Requirements Engineering Conference: 122-133. (2017) [ URL ]
  • November 8, 2017, 14:00. Discussion leader: Shayan.
    Paper: Michalis Pavlidis, Haralambos Mouratidis, Emmanouil Panaousis, Nikolaos Argyropoulos: "Selecting Security Mechanisms in Secure Tropos." International Conference on Trust, Privacy and Security in Digital Business: 99-114 (2017) [ URL ]
  • October 28, 2017, 14:00. Discussion leader: Sven.
    Paper: Hugo Bruneliere, Erik Burger, Jordi Cabot, Manuel Wimmer: "A feature-based survey of model view approaches." Journal of Software and Systems Modeling: online first (2017) [ URL ]
  • October 11, 2017, 14:00. Discussion leader: Daniel.
    Paper: Philipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden: "An In-Depth Study of More Than Ten Years of Java Exploitation." ACM Conference on Computer and Communications Security: 779-790 (2016) [ URL ]
  • October 04, 2017, 14:00. Discussion leader: Jens.
    Paper: Eric Yuan, Naeem Esfahani, Sam Malek: "Automated mining of software component interactions for self-adaptation." International Symposium on Software Engineering for Adaptive and Self-Managing Systems: 27-36 (2014) [ URL ]
  • July 12, 2017, 14:00. Discussion leader: Volker.
    Paper: Marcel Robeer, Garm Lucassen, Jan Martijn E. M. van der Werf, Fabiano Dalpiaz, Sjaak Brinkkemper: "Automated Extraction of Conceptual Models from User Stories via NLP." International Requirements Engineering Conference: 196-205 (2016) [ URL ]
  • July 05, 2017, 14:00. Discussion leader: Daud.
    Paper: Phu Hong Nguyen, Koen Yskout, Thomas Heyman, Jacques Klein, Riccardo Scandariato, Yves Le Traon: "SoSPa: A system of Security design Patterns for systematically engineering secure systems." International Conference on Model Driven Engineering Languages and Systems: 246-255 (2015) [ URL ]
  • June 21, 2017, 14:00. Discussion leader: Katharina.
    Paper: Stefan Farfeleder, Thomas Moser, Andreas Krall, Tor Stålhane, Inah Omoronyia, Herbert Zojer: "Ontology-Driven Guidance for Requirements Elicitation." Extended Semantic Web Conference: 212-226 (2011) [ URL ]
  • June 06, 2017, 14:00. Discussion leader: Qusai.
    Paper: Kristian Beckers, Stephan Faßbender, Maritta Heisel, Rene Meis. "A Problem-Based Approach for Computer-Aided Privacy Threat Identification." Annual Privacy Forum: 1-16 (2012). [ URL ]
  • May 31, 2017, 14:00. Discussion leader: Shayan.
    Paper: Swapneel Sheth, Gail Kaiser, Walid Maalej. "Us and Them: A Study of Privacy Requirements Across North America, Asia, and Europe." International Conference on Software Engineering: 859-870 (2014) [ URL ]
    Supplementary material: "The power of privacy - Documentary" @ youtube [ URL ]
  • May 24, 2017, 14:00. Discussion leader: Sven.
    Paper: Donn B. Parker, "Towards a new Framework for Information Security", in Michel E. Kabay and Eric Whyn (Eds.), "Computer Security Handbook", 6th ed, Vol. 1, 3.1-3.23 (2014) [ URL ]
  • May 17, 2017, 14:00. Discussion leader: Jens.
    Paper: Tong Li, Jennifer Horkoff, John Mylopoulos. "Holistic security requirements analysis for socio-technical systems." Software & Systems Modeling: 1-33 (2016, online first) [ URL ]
  • May 03, 2017, 14:00. Discussion leader: Daniel.
    Paper: Jon Whittle, John Edward Hutchinson, Mark Rouncefield. "The State of Practice in Model-Driven Engineering." IEEE Software 31(3): 79-85 (2014) [ URL ]