Bernhard J. Berger, Dr. rer. nat.Research InterestsOptimisation, Static Code Analysis, Software Security, Machine Learning, Research Data Management | PositionLecturer |
Contact DetailsBernhard Johannes Berger |
Activities
2025
Program Committee member of the 33rd ACM/IEEE International Conference on Program Comprehension (ICPC 2025), 2025.
Program Committee member for the Mining Software Repositories Conference (MSR), 2025.
2024
Reviewer in a selection committee for the German Academic Exchange Service (DAAD), 2024.
Artifact Evaluation Committee member for the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2024.
Program Committee member of the 6th Workshop on Parallel AI and Systems for the Edge (PAISE), 2024.
Reviewer for the Journal Science of Computer Programming, ScienceDirect, 2024.
Reviewer for the German Academic Exchange Service (DAAD), 2024.
Program Committee member of the European Workshop on Maritime Systems Resilience and Security (MARESEC), 2024.
Program Committee member of the 19th International Conference on Availability, Reliability and Security (ARES 2024), 2024.
Program Committee member of the 32st ACM/IEEE International Conference on Program Comprehension (ICPC 2024), 2024.
2023
Deputy of the Election Verification Committee of the Hamburg University of Technology, 2023.
Session Chair at the IEEE 2023 Congress on Evolutionary Computation (CEC), 2023.
Program Committee member for the International Workshop on Designing and Measuring CyberSecurity in Software Architectures (DeMeSSA), 2023.
Sub-reviewer for the IEEE/ACM 2023 International Conference on Computer-Aidded Design (ICCAD), 2023.
Program Committee member for the 18th International Conference on Availability, Reliability and Security (ARES 2023), 2023.
Artifact Evaluation Committee member for the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2023.
Program Committee member for the European Workshop on Maritime Systems Resilience and Security (MARESEC), 2023.
Reviewer for the Journal Science of Computer Programming, ScienceDirect, 2023.
Member of the Working Group Cumulative Doctorate at the Hamburg University of Technology, 2023.
Reviewer for the Journal IEEE Transactions on Software Engineering, IEEE.
Program Committee member for the 31st ACM/IEEE International Conference on Program Comprehension (ICPC 2023), 2023 (Best Reviewer Award).
2022
Sub-reviewer for the IEEE/ACM 2022 International Conference on Computer-Aidded Design (ICCAD), 2022.
Program Committee member for the International Workshop on Designing and Measuring CyberSecurity in Software Architectures (DeMeSSA), 2022.
Reviewer for the Journal IEEE Transactions on Software Engineering, IEEE, 2022.
Reviewer for the Journal Science of Computer Programming, ScienceDirect, 2022.
Program Committee member at the European Workshop on Maritime Systems Resilience and Security (MARESEC), 2022.
Program Committee member at the Mining Software Repositories Conference (MSR), 2022.
2021
Reviewer for the Journal Science of Computer Programming, ScienceDirect, 2021.
2018
Artifact Evaluation Committee member at the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2018.
2017
Reviewer for the Journal IEEE Transactions on Software Engineering, IEEE.
Publications
2023
Bernhard J. Berger and Christina Plump. Automatic Security-Flaw Detection - Replication and Comparison. In Proceedings of the 26th International Conference on Model Driven Engineering Languages and Systems, 2023. Material DOI DOI 11.1109/MODELS58315.2023.00027.
Christopher A. Metz, Christina Plump, Bernhard J. Berger and Rolf Drechsler. Hybrid PTX Analysis for GPU accelerated CNN inferencing aiding Computer Architecture Design. In 2023 Forum on Specification & Design Languages (FDL), Turin, Italy, 2023. DOI 10.1109/FDL59689.2023.10272088 Online Best Paper Award
Bernhard J. Beger and Goerschwin Fey. Informatik für Ingenieure an der Technischen Universität Hamburg. In Interdisziplinäres Forschen und Lernen in der Ingenieurinformatik (II-WS2023), 2023 DOI 10.18420/inf2023_19 Online.
Lorenz Hüther, Karsten Sohr, Bernhard J. Berger, Hendrik Rothe and Stefan Edelkamp. Machine Learning for SAST: A Lightweight and Adaptable Approach. In 28th European Symposium on Research in Computer Security (ESORICS), 2023 DOI 10.1007/978-3-031-51482-1_5.
Fin Hendrik Bahnsen, Bernhard J. Berger and Goerschwin Fey. GLRP: Guided by Layer-wise Relevance Propagation – Selecting Crucial Neurons in Artificial Neural Networks. In International Conference on Modern Circuits and Systems Technologies (MOCAST) on Electronics and Communications, 2023. DOI: 10.1109/MOCAST57943.2023.10176688
Christina Plump, Bernhard J. Berger and Rolf Drechsler. Repetitive Processes and Their Surrogate-Model Congruent Encoding for Evolutionary Algorithms - A Theoretic Proposal. The Genetic and Evolutionary Computation Conference (GECCO Companion), 2023. DOI: 10.1145/3583133.3596389
Bernhard J. Berger, Christina Plump and Rolf Drechsler. EvoAl: A domain-specific language-based approach to optimisation. In 2023 IEEE Congress on Evolutionary Computation (CEC), 2023. DOI: 10.1109/CEC53210.2023.10253985
Goerschwin Fey, Swantje Plambeck and Bernhard J. Berger. QMESy: Towards Quality Measurement for Explanations in System Design. Workshop on Intelligent Methods for Test and Reliability, 2023 (workshop contribution).
Christina Plump, Rolf Drechsler and Bernhard J. Berger. KI-gestützte Optimierung repetitiver Prozesse - Eine Kodierungstechnik für repetitive Prozesse in der evolutionären Optimierung. Industrie 4.0 Management, 2023. DOI: 10.30844/IM_23-1_19-22
Bernhard J. Berger and Goerschwin Fey. Towards: Threat Modeling in System Design. GI/GMM/ITG-Workshop für Testmethoden und Zuverlässigkeit von Schaltungen und Systemen (TUZ), 2023 (workshop contribution).
Fin Hendrik Bahnsen, Bernhard J. Berger and Goerschwin Fey. DoCNeL: Detection of Crucial Neurons Guided by Layer-wise Relevance Propagation. GI/GMM/ITG-Workshop für Testmethoden und Zuverlässigkeit von Schaltungen und Systemen (TUZ), 2023 (workshop contribution).
2022
Lorenz Hüther, Bernhard J. Berger, Stefan Edelkamp, Sebastian Eken, Lara Luhrmann, Hendrik Rothe, Marcus-Sebastian Schröder and Karsten Sohr.Machine Learning in the Context of Static Application Security Testing - ML-SAST. Editor: Federal Office for Information Security, Online, 2022.
Christina Plump, Bernhard J. Berger and Rolf Drechsler. Using density of training data to improve evolutionary algorithms with approximative fitness functions. In 2022 IEEE Congress on Evolutionary Computation (CEC), DOI: 10.1109/CEC55065.2022.9870352, 2022.
Christina Plump, Bernhard J. Berger and Rolf Drechsler. Adapting mutation and recombination operators to range-aware relations in real-world application data. In The Genetic and Evolutionary Computation Conference (GECCO Companion), DOI: 10.1145/3520304.3529066,2022.
Bernhard J. Berger. Automatic detection of architectural security flaws. Doctoral Thesis, DOI: 10.26092/elib/1453, 2022.
Christina Plump, Bernhard J. Berger and Rolf Drechsler. Choosing the right technique for the right restriction - a domain-specific approach for enforcing search-space restrictions in evolutionary algorithms. In Proceedings of the 8th International Conference on Dynamics in Logistics – LDIC 2022, DOI: 10.1007/978-3-031-05359-7_28, 2022.
2021
Marc Asendorf, Hasanur Jaman Seam, Christian Maeder, Salva Daneshgadeh Çakmakçı and Bernhard J. Berger. Where are my containers?. In Proceedings of the first European Workshop on Maritime Systems Resilience and Security (MARESEC 2021), DOI: 10.5281/zenodo.5604449, 2021.
Bernhard J. Berger, Christian Maeder and Salva Daneshgadeh Çakmakçı. Threat Modeling Knowledge for the Maritime Community. In Proceedings of the first European Workshop on Maritime Systems Resilience and Security (MARESEC 2021), DOI: 10.5281/zenodo.5604234, 2021.
Rodrigue W. Nguempnang, Bernhard J. Berger and Karsten Sohr. eNYPD - Entry Points Detector - Jakarta Server Faces Use Case. In Proceedings of the 21th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), IEEE Computer Society Press, DOI: 10.1109/SCAM52516.2021.00013, 2021.
Christina Plump, Bernhard J. Berger, Rolf Drechsler. Improving Evolutionary Algorithms by Enhancing an Approximative Fitness Function Through Prediction Intervals. In 2021 IEEE Congress on Evolutionary Computation (CEC), DOI: 10.1109/CEC45853.2021.9504722, 2021.
Christina Plump, Bernhard J. Berger, Rolf Drechsler. Domain-driven Correlation-aware Recombination and Mutation Operators for Complex Real-world Applications. In 2021 IEEE Congress on Evolutionary Computation (CEC), DOI: 10.1109/CEC45853.2021.9504931, 2021.
2020
Bernhard J. Berger, Rodrigue W. Nguempnang, Karsten Sohr and Rainer Koschke. Static Extraction of Enforced Authorization Policies - SeeAuthz. In Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), IEEE Computer Society Press, DOI: 10.1109/SCAM51674.2020.00026, 2020.
2019
Bernhard J. Berger, Karsten Sohr, Rainer Koschke. The Architectural Security Tool Suite - ArchSec. In Proceedings of the 19th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), Cleveland, Ohio, DOI: 10.1109/SCAM.2019.00035, 2019. Best Engineering Paper Award.
Bernhard J. Berger, Christian Maeder, Rodrigue W. Nguempnang, Karsten Sohr, Carlos E. Rubio-Medrano. Towards Effective Verification of Multi-Model Access Control Properties. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019), Toronto, Kanada, DOI: 10.1145/3322431.3325105, 2019.
2018
Rainer Koschke, Urs-Bjoern Schmidt, Bernhard J. Berger. Built-in Clone Detection in Meta Languages. In Proceedings of the Conference on Source Code Analysis and Manipulation (SCAM), IEEE Computer Society Press, DOI: 10.1109/SCAM.2018.00026, 2018.
2016
Bernhard J. Berger, Karsten Sohr and Rainer Koschke. Automatically Extracting Threats from Extended Data Flow Diagrams. In Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), London, April, DOI: 10.1007/978-3-319-30806-7_4, 2016.e
2015
Marc-Andre Laverdiere, Bernhard J. Berger and Ettore Merlot. Taint Analysis of Manual Service Compositions using Cross-Application Call Graphs. In 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015, IEEE Computer Society Press, DOI: 10.1109/SANER.2015.7081882, 2015.
2014
Bernhard J. Berger and Karsten Sohr and Udo H. Kalinna. Architekturelle Sicherheitsanalyse für Android. In D-A-CH Security 2014: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven, SysSec, 2014.
Steffen Bartsch, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Jens Heider, Mehmet Kus, Sönke Maseberg, Karsten Sohr and Melanie Volkamer. Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. In GI Sicherheit 2014, Lecture Notes in Informatics, GI, 2014.
2013
Steffen Bartsch, Bernhard J. Berger, Michaela Bunke and Karsten Sohr. The Transitivity-of-Trust Problem in Android Application Interaction. In Proceedings of the 8th International Conference on Availability, Reliability and Security, DOI: 10.1109/ARES.2013.39, 2013.
Bernhard J. Berger, Karsten Sohr and Rainer Koschke. Extracting and Analyzing the Implemented Security Architecture of Business Applications. In Proceedings of the 17th European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, DOI: 10.1109/CSMR.2013.37, 2013.
2012
Bernhard J. Berger and Karsten Sohr. An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. In Information Security and Privacy Research - IFIP Advances in Information and Communication Technology, Volume 376/2012, Springer, DOI: 10.1007/978-3-642-30436-1_3, 2012.
2011
Bernhard J. Berger, Michaela Bunke and Karsten Sohr. An Android Security Case Study with Bauhaus. In Proceedings of the 18th Working Conference on Reverse Engineering. IEEE Computer Society, DOI: 10.1109/WCRE.2011.29, 2011.
Bernhard J. Berger and Michaela Bunke. Software Security Comprehension. In WSR 2011 / Softwaretechnik-Trends, 31(2), 2011.
2010
Karsten Sohr and Bernhard J. Berger. Idea: Towards Architecture-Centric Security Analysis of Software. In Proceedings of the Second International Symposium on Engineering Secure Software and Systems (ESSoS). Springer, DOI: 10.1007/978-3-642-11747-3_6, 2010.
2008
Bernhard J. Berger, Rainer Koschke. Reduzierung der Programmgröße durch Klonerkennung. In GI Jahrestagung(2). Gesellschaft für Informatik, 2008.
2007
Bernhard J. Berger. Klonmanagement: Klonerkennung für eingebettete Systeme. Diploma Thesis, Universität Bremen, 2007.