Stefan Krüger

ORCID: 0000-0003-0895-8830
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Software Engineering Research
  • Security and Verification in Computing
  • Software Testing and Debugging Techniques
  • Information and Cyber Security
  • Pneumonia and Respiratory Infections
  • Web Application Security Vulnerabilities
  • Sepsis Diagnosis and Treatment
  • Advanced Software Engineering Methodologies
  • Software System Performance and Reliability
  • Cardiac Imaging and Diagnostics
  • Lung Cancer Diagnosis and Treatment
  • Digital and Cyber Forensics
  • Heart Failure Treatment and Management
  • Renal function and acid-base balance
  • Lung Cancer Treatments and Mutations
  • Advanced MRI Techniques and Applications
  • Biomedical Text Mining and Ontologies
  • Business Process Modeling and Analysis
  • Technology Use by Older Adults
  • Software Reliability and Analysis Research
  • Logic, programming, and type systems
  • Sociology and Education Studies
  • Service-Oriented Architecture and Web Services
  • Electrolyte and hormonal disorders

Universität Greifswald
2022

Paderborn University
2017-2021

Technical University of Darmstadt
2016-2017

Software (Germany)
2016

RWTH Aachen University
2005-2014

Universitätsklinikum Aachen
2010-2014

Praxis für Humangenetik
2013

Charité - Universitätsmedizin Berlin
2013

University Hospital Ulm
2007-2009

Krüger (Germany)
2007

To protect sensitive data processed by current applications, developers, whether security experts or not, have to rely on cryptography. While cryptography algorithms become increasingly advanced, many breaches occur because developers do not correctly use the corresponding APIs. guide future research into practical solutions this problem, we perform an empirical investigation obstacles face while using Java APIs, tasks they APIs for, and kind of (tool) support desire. We triangulate from...

10.1145/2884781.2884790 article EN Proceedings of the 44th International Conference on Software Engineering 2016-05-13

Mutations in SACS, leading to autosomal-recessive spastic ataxia of Charlevoix-Saguenay (ARSACS), have been identified as a frequent cause recessive early-onset around the world. Here we aimed enlarge spectrum SACS mutations outside Quebec, establish pathogenicity novel variants, and expand clinical imaging phenotype.Sequencing 22 patients with unexplained ataxia, assessment variants 3.500 European control chromosomes extensive phenotypic investigations all carriers.We 11 index harbouring 17...

10.1186/1750-1172-8-41 article EN cc-by Orphanet Journal of Rare Diseases 2013-01-01

Previous research suggests that developers often struggle using low-level cryptographic APIs and, as a result, produce insecure code. When asked, desire, among other things, more tool support to help them use such APIs. In this paper, we present CogniCrypt, supports with the of CogniCrypt assists developer in two ways. First, for number common tasks, generates code implements respective task secure manner. Currently, tasks data encryption, communication over channels, and long-term...

10.1109/ase.2017.8115707 article EN 2017-10-01

Aim of this study was to evaluate the correlation inflammatory markers procalcitonin (PCT), C-reactive protein (CRP) and leukocyte count (WBC) with microbiological etiology CAP. We enrolled 1337 patients (62 ± 18 y, 45% f) proven Extensive workup performed. In all PCT, CRP, WBC CRB-65 score were determined. Patients classified according microbial diagnosis score. typical bacterial CAP, levels CRP significantly higher compared CAP atypical or viral etiology. There no significant differences...

10.1186/1465-9921-10-65 article EN cc-by Respiratory Research 2009-07-12

Various studies have empirically shown that the majority of Java and Android applications misuse cryptographic libraries, causing devastating breaches data security. It is crucial to detect such misuses early in development process. To cryptography misuses, one must <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">define</i> secure uses first, a process mastered primarily by experts but not developers. In this paper, we present <sc...

10.1109/tse.2019.2948910 article EN IEEE Transactions on Software Engineering 2019-10-23

<h3>Background</h3> Community-acquired pneumonia (CAP) is the most important clinical infection with a high long-term mortality rate. The aim of this study was to evaluate value biomarkers for prediction short-term and in CAP. <h3>Methods</h3> A total 1740 patients mean±SD age 60±18 years (45% female) proven CAP were enrolled study. Mid-regional pro-atrial natriuretic peptide (MR-proANP), C-terminal vasopressin (CT-proAVP), procalcitonin, C-reactive protein, leucocyte count (WBC) CRB-65...

10.1136/thx.2009.121178 article EN Thorax 2010-03-01

Various studies have empirically shown that the majority of Java and Android apps misuse cryptographic libraries, causing devastating breaches data security. It is crucial to detect such misuses early in development process. To cryptography misuses, one must first define secure uses, a process mastered primarily by experts, not developers. In this paper, we present CrySL, definition language for bridging cognitive gap between experts developers. CrySL enables specify usage libraries they...

10.4230/lipics.ecoop.2018.10 article EN European Conference on Object-Oriented Programming 2018-01-01

Recently, C-terminal provasopressin (copeptin) turned out to be predictive for mortality in community-acquired pneumonia (CAP). The aim of this study was evaluate the influence antibiotic pre-treatment on copeptin levels CAP. We enrolled 370 hospitalized patients (66 ± 17 years; 42% females) with proven Venous blood samples were collected at time inclusion into and as soon possible after diagnosis Copeptin (B.R.A.H.M.S. AG, Henningsdorf, Germany) determined venous admission. Eighty-five had...

10.1093/jac/dkp148 article EN Journal of Antimicrobial Chemotherapy 2009-04-29

Background: Previous research has shown that crypto APIs are hard for developers to understand and difficult them use. They consequently rely on unvalidated boilerplate code from online resources where security vulnerabilities common.Aims method: We analyzed 2,324 open-source Java projects Cryptography Architecture (JCA) how used in practice, what factors account the performance of using these APIs.Results: found that, general, experience JCA does not correlate with their performance. In...

10.1109/esem.2019.8870184 article EN 2019-09-01

Early during the SARS-CoV-2 pandemic, national population-based seroprevalence surveys were conducted in some countries; however, this was not done Germany. In particular, no planned for summer of 2022. context IMMUNEBRIDGE project, GUIDE study carried out to estimate on and regional levels.To obtain an overview population-wide immunity against among adults Germany that would be as statistically robust possible, serological tests using self-sampling dried blood spot cards conjunction with...

10.3238/arztebl.m2023.0072 article EN Deutsches Ärzteblatt international 2023-04-05

To determine the prevalence of, and risk factors for, sleep apnoea in cardiac rehabilitation (CR) facilities Germany.1152 patients presenting for CR were screened sleep-disordered breathing with 2-channel polygraphy (ApneaLink™; ResMed). Parameters recorded included apnoea-hypopnoea index (AHI), number of desaturations per hour recording (ODI), mean minimum nocturnal oxygen saturation snoring episodes. Patients rated subjective quality on a scale from 1 (poor) to 10 (best) completed Epworth...

10.1177/2047487314537916 article EN European Journal of Preventive Cardiology 2014-05-30

Static analysis is increasingly used by companies and individual code developers to detect fix bugs security vulnerabilities. As programs grow more complex, the analyses have support new concepts, frameworks libraries. However, static-analysis itself also prone bugs. While complex are written in production systems every day, cost of debugging fixing them increases tremendously. To understand difficulties static analysis, we surveyed 115 writers. From their responses, determined core...

10.1109/tse.2018.2868349 article EN IEEE Transactions on Software Engineering 2018-09-03

Many software applications are insecure because they misuse cryptographic APIs. Prior attempts to address misuses focused on detecting them after the fact. However, avoiding such in first place would significantly reduce development cost.

10.1145/3368826.3377905 article EN 2020-02-21

Gender equality initiatives are often faced with a problem: In order to determine whether successful the gender of individuals in target group must be known. As self-identification inherently has problems that have respond and results may, therefore, biased incomplete, temptation use automated identification methods is evident. scientific literature, multiple sources ranging from individual's name, their social media choices, biological features (e.g., brain scans or fingerprints), texts...

10.1109/ge.2019.00012 article EN 2019-05-01

Software product lines are used to efficiently develop and verify similar software products. While they focus on reuse of artifacts between products, a line may also be reused itself in other lines. A challenge with such dependent is evolution; every change influence all With variability hiding, we aim hide certain features their In prior work, focused feature models implementation artifacts. We build this by discussing how hiding can extended specifications terms method contracts....

10.1145/2866614.2866628 article EN 2016-01-26

Software systems need to use cryptography protect any sensitive data they collect. However, there are various classes of cryptographic components (e.g., ciphers, digests, etc.), each suitable for a specific purpose. Additionally, class such comes with algorithms and configurations. Finding the right combination correct settings is often difficult. We believe that using variability modeling model these algorithms, their relationships, restrictions can help non-experts navigate this complex...

10.1145/2866614.2866629 article EN 2016-01-26
Coming Soon ...