{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T15:25:19Z","timestamp":1726413919070},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1007\/s11623-007-0286-7","type":"journal-article","created":{"date-parts":[[2007,12,26]],"date-time":"2007-12-26T23:27:28Z","timestamp":1198711648000},"page":"888-893","source":"Crossref","is-referenced-by-count":1,"title":["Automatisierter Code-Audit"],"prefix":"10.1007","volume":"31","author":[{"given":"Martin","family":"Johns","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Schreckling","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,12,1]]},"reference":[{"key":"286_CR1","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1090\/S0002-9947-1953-0053041-6","volume":"74","author":"H. G. Rice","year":"1953","unstructured":"H. G. Rice: Classes of recursively enumerable sets and their decision problems. Trans. Amer. Math. Soc., 74:358\u2013366, 1953.","journal-title":"Trans. Amer. Math. Soc."},{"key":"286_CR2","unstructured":"Flawfinder, http:\/\/www.dwheeler.com\/flawfinder"},{"key":"286_CR3","unstructured":"ITS4, http:\/\/www.cigital.com\/its4"},{"key":"286_CR4","unstructured":"Rats, http:\/\/www.securesoftware.com\/resources\/download_rats.html"},{"key":"286_CR5","unstructured":"Splint, http:\/\/www.splint.org"},{"key":"286_CR6","unstructured":"MOPS, http:\/\/www.cs.ucdavis.edu\/:_hchen\/mops"},{"key":"286_CR7","unstructured":"XGCC, http:\/\/metacomp.stanford.edu"},{"key":"286_CR8","unstructured":"BOON, http:\/\/www.cs.berkeley.edu\/:_daw\/boon"},{"key":"286_CR9","unstructured":"Benjamin Livshits: Using Eclipse to Detect Security Errors in Web Applications. Poster Presented at Eclipsecon\u2019 05, March 2005."},{"key":"286_CR10","unstructured":"F. Nielson, H. R. Nielson, C. Hankin: Principles of Program Analysis. 2nd Edition, Spinger, 2005"},{"key":"286_CR11","unstructured":"S. Chong, K. Vikram, and Andrew C. Myers. SIF: Enforcing Confidentiality and Integrity in Web Applications. USENIX Security 2007."},{"key":"286_CR12","unstructured":"CQual, http:\/\/www.cs.umd.edu\/:_jfoster\/cqual"},{"key":"286_CR13","unstructured":"Benjamin Schwarz et al.: Model Checking An Entire Linux Distribution for Security Violations, http:\/\/www.cs.ucdavis.edu\/:_hchen\/paper\/acsac05.pdf"},{"key":"286_CR14","unstructured":"Rob Johnson, David Wagner: Finding User\/Kernel Pointer Bugs With Type Inference, http:\/\/www.cs.berkeley.edu\/:_daw\/papers\/cquk-usenix04.ps"},{"key":"286_CR15","unstructured":"John Wilander, Mariam Kamkar: A Comparison of Publicly Available Tools for Static Intrusion Prevention. Nordsec 2002, November 2002"},{"key":"286_CR16","unstructured":"Secologic Projekt, http:\/\/www.secologic.org"},{"key":"286_CR17","unstructured":"CISAT, http:\/\/www.informatik.uni-hamburg.de\/SVS\/cisat"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0286-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0286-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0286-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:20:48Z","timestamp":1559413248000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0286-7"}},"subtitle":["Sicherheitsanalyse von Source Code in Theorie und Praxis"],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":17,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["286"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0286-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"type":"print","value":"1614-0702"},{"type":"electronic","value":"1862-2607"}],"subject":[],"published":{"date-parts":[[2007,12]]}}}