{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:25:05Z","timestamp":1771064705282,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ase.2017.8115707","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T22:03:57Z","timestamp":1511474637000},"page":"931-936","source":"Crossref","is-referenced-by-count":68,"title":["CogniCrypt: Supporting developers in using cryptography"],"prefix":"10.1109","author":[{"given":"Stefan","family":"Kruger","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Nadi","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Reif","sequence":"additional","affiliation":[]},{"given":"Karim","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Mira","family":"Mezini","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Gopfert","sequence":"additional","affiliation":[]},{"given":"Felix","family":"Gunther","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Weinert","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Demmler","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Kamath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.38"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568292"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v24i1.7503","article-title":"Towards an intelligent code search engine","author":"kim","year":"2010","journal-title":"Int Conference on Artificial Intelligence (AAAI)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637237"},{"key":"ref15","author":"liang","year":"2016","journal-title":"Choco solver - A Backend for Clafer using the Choco4 solver"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_21"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.98"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2866614.2866629"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614629"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46423-9_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-014-0441-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262471"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227140"},{"key":"ref8","article-title":"The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard)","author":"dierks","year":"2008","journal-title":"Updated by RFCs 5746 5878 6176"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref2","article-title":"Towards secure integration of cryptographic software","author":"arzt","year":"2015","journal-title":"Symp on New Ideas New Paradigms Reflections on Programming and Software"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"ref1","first-page":"305","article-title":"On the security of RC4 in TLS","author":"alfardan","year":"2013","journal-title":"Usenix Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766522"},{"key":"ref22","year":"2017","journal-title":"Oracle Java Secure Socket Extension (JSSE) Reference Guide"},{"key":"ref21","year":"2016","journal-title":"Oracle Java Cryptography Architecture (JCA)"},{"key":"ref24","year":"2016","journal-title":"Saxonica The SAXON XSLT and XQuery Processor"},{"key":"ref23","year":"2017","journal-title":"Oracle Cipher Implementations in SunJCE Provider"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"ref25","first-page":"75","article-title":"Modelling analysis and auto-detection of cryptographic misuse in android applications","author":"shao","year":"2014","journal-title":"IEEE International Conference on Dependable Autonomic andSecure Computing (DASC)"}],"event":{"name":"2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","location":"Urbana, IL","start":{"date-parts":[[2017,10,30]]},"end":{"date-parts":[[2017,11,3]]}},"container-title":["2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106906\/8115603\/08115707.pdf?arnumber=8115707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T01:13:44Z","timestamp":1693271624000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8115707\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ase.2017.8115707","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}