default search action
Karim Ali 0001
Person information
- affiliation: University of Alberta, Department of Computing Science, Edmonton, AB, Canada
- affiliation: TU Darmstadt, CASED, Germany
Other persons with the same name
- Karim Ali 0002 — Algocian (and 3 more)
- Karim Ali 0003 — American University in Cairo/Zewail City of Science and Technology, Cairo, Egypt
- Karim Ali 0004 — Data Storage Institute (DSI), A-STAR, Singapore
- Karim Ali 0005 — University of Stuttgart, ISW, Germany
- Karim Ali 0006 — University of Science and Technology Beijing, School of Computer and Communication Engineering, China
- Karim Ali 0007 (aka: Karim Ali Ahmed) — National University of Singapore, Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c25]Jeff Cho, Karim Ali:
Exploring Quality Assurance Practices and Tools for Indie Games. GAS 2023: 16-24 - [c24]Jiaqi He, Revan MacQueen, Natalie Bombardieri, Karim Ali, James R. Wright, Cristina Cifuentes:
Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities. ICSME 2023: 463-473 - [c23]Abdul Ali Bangash, Kalvin Eng, Jamal Qasim, Karim Ali, Abram Hindle:
Energy Consumption Estimation of API-usage in Smartphone Apps via Static Analysis. MSR 2023: 272-283 - [c22]Stefan Krüger, Michael Reif, Anna-Katharina Wickert, Sarah Nadi, Karim Ali, Eric Bodden, Yasemin Acar, Mira Mezini, Sascha Fahl:
Securing Your Crypto-API Usage Through Tool Support - A Usability Study. SecDev 2023: 14-25 - [e3]Karim Ali, Guido Salvaneschi:
37th European Conference on Object-Oriented Programming, ECOOP 2023, July 17-21, 2023, Seattle, Washington, United States. LIPIcs 263, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2023, ISBN 978-3-95977-281-5 [contents] - 2022
- [j12]Daniil Tiganov, Lisa Nguyen Quang Do, Karim Ali:
Designing UIs for static-analysis tools. Commun. ACM 65(2): 52-58 (2022) - [j11]Lisa Nguyen Quang Do, James R. Wright, Karim Ali:
Why Do Software Developers Use Static Analysis Tools? A User-Centered Study of Developer Needs and Motivations. IEEE Trans. Software Eng. 48(3): 835-847 (2022) - [c21]Mansur Gulami, Ajay Kumar Jha, Sarah Nadi, Karim Ali, Yee-Kang Chang, Emily Jiang:
A Human-in-the-loop Approach to Generate Annotation Usage Rules. CASCON 2022: 91-100 - [c20]Abdul Ali Bangash, Karim Ali, Abram Hindle:
Black Box Technique to Reduce Energy Consumption of Android Apps. ICSE (NIER) 2022: 1-5 - [e2]Karim Ali, Jan Vitek:
36th European Conference on Object-Oriented Programming, ECOOP 2022, June 6-10, 2022, Berlin, Germany. LIPIcs 222, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2022, ISBN 978-3-95977-225-9 [contents] - [d2]Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden:
Debugging Static Analysis. IEEE DataPort, 2022 - 2021
- [j10]Daniil Tiganov, Lisa Nguyen Quang Do, Karim Ali:
Designing UIs for Static Analysis Tools: Evaluating tool design guidelines with SWAN. ACM Queue 19(4): 97-118 (2021) - [j9]Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini:
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. IEEE Trans. Software Eng. 47(11): 2382-2400 (2021) - [j8]Karim Ali, Xiaoni Lai, Zhaoyi Luo, Ondrej Lhoták, Julian Dolby, Frank Tip:
A Study of Call Graph Construction for JVM-Hosted Languages. IEEE Trans. Software Eng. 47(12): 2644-2666 (2021) - [c19]Kristen Newbury, Karim Ali, Andrew Craik:
Hotfixing misuses of crypto APIs in Java programs. CASCON 2021: 73-82 - [c18]Erick Ochoa, Cijie Xia, Karim Ali, Andrew Craik, José Nelson Amaral:
U can't inline this! CASCON 2021: 173-182 - [c17]Abdul Ali Bangash, Daniil Tiganov, Karim Ali, Abram Hindle:
Energy Efficient Guidelines for iOS Core Location Framework. ICSME 2021: 320-331 - 2020
- [j7]Abdul Ali Bangash, Hareem Sahar, Abram Hindle, Karim Ali:
On the time-based conclusion stability of cross-project defect prediction models. Empir. Softw. Eng. 25(6): 5047-5083 (2020) - [j6]Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden:
Debugging Static Analysis. IEEE Trans. Software Eng. 46(7): 697-709 (2020) - [c16]Stefan Krüger, Karim Ali, Eric Bodden:
CogniCryptGEN: generating code for the secure usage of crypto APIs. CGO 2020: 185-198 - [c15]Daniil Tiganov, Jeff Cho, Karim Ali, Julian Dolby:
SWAN: a static analysis framework for swift. ESEC/SIGSOFT FSE 2020: 1640-1644 - [d1]Stefan Krüger, André Sonntag, Karim Ali, Eric Bodden:
CogniCrypt_GEN - Generating Code for the Secure Use of Crypto APIs (Artefact). Zenodo, 2020 - [i5]Revan MacQueen, Nicholas Bombardieri, James R. Wright, Karim Ali:
Game Theoretic Malware Detection. CoRR abs/2012.00817 (2020)
2010 – 2019
- 2019
- [j5]Johannes Späth, Karim Ali, Eric Bodden:
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems. Proc. ACM Program. Lang. 3(POPL): 48:1-48:29 (2019) - [c14]Artem Chikin, José Nelson Amaral, Karim Ali, Ettore Tiotto:
Toward an Analytical Performance Model to Select between GPU and CPU Execution. IPDPS Workshops 2019: 353-362 - [c13]Abdul Ali Bangash, Hareem Sahar, Shaiful Alam Chowdhury, Alexander William Wong, Abram Hindle, Karim Ali:
What do developers know about machine learning: a study of ML discussions on StackOverflow. MSR 2019: 260-264 - [i4]Abdul Ali Bangash, Hareem Sahar, Abram Hindle, Karim Ali:
On the Time-Based Conclusion Stability of Software Defect Prediction Models. CoRR abs/1911.06348 (2019) - 2018
- [j4]Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini:
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs (Artifact). Dagstuhl Artifacts Ser. 4(3): 06:1-06:4 (2018) - [c12]Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini:
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs. ECOOP 2018: 10:1-10:27 - [c11]Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden:
VISUFLOW: a debugging environment for static analyses. ICSE (Companion Volume) 2018: 89-92 - [i3]Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden:
Debugging Static Analysis. CoRR abs/1801.04894 (2018) - 2017
- [j3]Johannes Späth, Karim Ali, Eric Bodden:
IDEal: efficient and precise alias-aware dataflow analysis. Proc. ACM Program. Lang. 1(OOPSLA): 99:1-99:27 (2017) - [c10]Karim Ali, Andrew Craik, Bardia Mahjour, Gregor Richards:
Compiler-driven performance. CASCON 2017: 328 - [c9]Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, Emerson R. Murphy-Hill:
Cheetah: just-in-time taint analysis for Android apps. ICSE (Companion Volume) 2017: 39-42 - [c8]Lisa Nguyen Quang Do, Karim Ali, Benjamin Livshits, Eric Bodden, Justin Smith, Emerson R. Murphy-Hill:
Just-in-time static analysis. ISSTA 2017: 307-317 - [c7]Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, Ram Kamath:
CogniCrypt: supporting developers in using cryptography. ASE 2017: 931-936 - [c6]Mona Nashaat, Karim Ali, James Miller:
Detecting Security Vulnerabilities in Object-Oriented PHP Programs. SCAM 2017: 159-164 - [e1]Karim Ali, Cristina Cifuentes:
Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, SOAP@PLDI 2017, Barcelona, Spain, June 18, 2017. ACM 2017, ISBN 978-1-4503-5072-3 [contents] - [i2]Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini:
CrySL: Validating Correct Usage of Cryptographic APIs. CoRR abs/1710.00564 (2017) - [i1]Eddie A. Santos, Karim Ali:
Lifting the curse of stringly-typed code. PeerJ Prepr. 5: e2723 (2017) - 2016
- [j2]Johannes Späth, Lisa Nguyen Quang Do, Karim Ali, Eric Bodden:
Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (Artifact). Dagstuhl Artifacts Ser. 2(1): 12:1-12:2 (2016) - [c5]Johannes Späth, Lisa Nguyen Quang Do, Karim Ali, Eric Bodden:
Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java. ECOOP 2016: 22:1-22:26 - 2015
- [j1]Karim Ali, Marianna Rapoport, Ondrej Lhoták, Julian Dolby, Frank Tip:
Type-Based Call Graph Construction Algorithms for Scala. ACM Trans. Softw. Eng. Methodol. 25(1): 9:1-9:43 (2015) - [c4]Steven Arzt, Sarah Nadi, Karim Ali, Eric Bodden, Sebastian Erdweg, Mira Mezini:
Towards secure integration of cryptographic software. Onward! 2015: 1-13 - 2014
- [b1]Karim Ali:
The Separate Compilation Assumption. University of Waterloo, Ontario, Canada, 2014 - [c3]Karim Ali, Marianna Rapoport, Ondrej Lhoták, Julian Dolby, Frank Tip:
Constructing Call Graphs of Scala Programs. ECOOP 2014: 54-79 - 2013
- [c2]Karim Ali, Ondrej Lhoták:
Averroes: Whole-Program Analysis without the Whole Program. ECOOP 2013: 378-400 - 2012
- [c1]Karim Ali, Ondrej Lhoták:
Application-Only Call Graph Construction. ECOOP 2012: 688-712
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-13 00:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint