Bernhard J. Berger, Dr. rer. nat.

Research Interests

Optimisation, Static Code Analysis, Software Security, Machine Learning, Research Data Management

Position

Lecturer

Contact Details

Bernhard Johannes Berger
Dr. rer. nat.

Tel.: +49 (0) 40 42878-2832
Fax: +49 (0) 40 42878-2798
Mail: bernhard.berger(at)tuhh.de

Building E, Room 3.014
Directions

Consulting Hours

On appointment


Activities

Journals

SciCP ScienceDirect, Science of Computer Programming
  2021 – 2025, Reviewer for the Journal
TSE IEEE Transactions on Software Engineering
 

2017,2022,2023, Reviewer

Conferences

ARES International Conference on Availability, Reliability and Security
  2023 – 2026, Program Committee Member
DeMeSSA International Workshop on Designing and Measuring CyberSecurity in Software Architectures
  2022 – 2023, Program Committee Member 
EvoOSS

Open Source Software for Evolutionary Computation Workshop

  2025, Program Committee Member
ICPC

ACM/IEEE International Conference on Program Comprehension

  2023 – 2026, Program Committee Member
ISSTA ACM SIGSOFT International Symposium on Software Testing and Analysis
  2018, 2023, 2024, Artefact Evaluation Committee Member
MARESEC European Workshop on Maritime Systems Resilience and Security
  2022 – 2025, Program Committee Member
MSR ACM/IEEE Mining Software Repositories Conference
  2022 – 2026, Program Committee Member
PAISE Parallel AI and Systems for the Edge
  2024, Program Committee Member

Others

DAAD German Academic Exchange Service
  2023 – 2026, Reviewer and Participant of the Grant Election Committee
  2026 – 2029, Permanent Member of the Grant Election Committee

Publications

2025

[44] Srinidhi Rathnakar Ganiga, Bernhard J. Berger and Goerschwin FeyLeveraging the Benefits of Information Flow Tracking for Detecting Hardware Design Flaws. In 2025 Forum on Specification & Design Languages (FDL), St. Goar, Germany, 2025. accepted for publication

[43] Bernhard J. Berger and Christina PlumpAutomatic Security-Flaw Detection — Towards a Fair Evaluation and Comparison. In Software and Systems Modeling (SoSyM), Springer Science and Business Media LLC. ISSN 1619-1374. 06/2025. DOI

[42] Bernhard J. Berger and Christina Plump and Rolf DrechslerWhy less is sometimes more: Using Boolean literals to solve 2048. In it - Information Technology, Walter de Gruyter GmbH, ISSN: 2196-7032. February, 2025. DOI Online

2024

[41] Bernhard J. Berger, Christina Plump and Rolf DrechslerWhy Less is Sometimes More — Using Boolean Literals to Solve 2048. In 16th International Workshop on Boolean Problems, Bremen, Germany, 2024. (workshop contribution).

[40] Bernhard J. Berger, Christina Plump and Rolf DrechslerEvoAl2048. In GECCO’24 - The Genetic and Evolutionary Computation Conference Companion, Melbourne, Australia, 2024. (competition contribution)Online

[39] Bernhard J. Berger, Christina Plump, Lauren Paul and Rolf DrechslerEvoAl — Codeless Domain-Optimisation. In GECCO ‘24 Companion: Proceedings of the Genetic and Evolutionary Computation Conference Companion, Melbourne, Australia, 2024. DOI Online

[38] Christina Plump, Daniel C. Hoinkiss, Jörn Huber, Bernhard J. Berger, Matthias Günther, Christoph Lüth and Rolf DrechslerFinding the perfect MRI sequence for your patient — Towards an optimisation workflow for MRI-sequences. In IEEE World Congress on Computational Intelligence (IEEE WCCI 2024), Yokohama, Japan, 2024. DOI Online

2023

Bernhard J. Berger and Christina PlumpAutomatic Security-Flaw Detection - Replication and Comparison. In Proceedings of the 26th International Conference on Model Driven Engineering Languages and Systems, 2023. Material DOI DOI 11.1109/MODELS58315.2023.00027.

Christopher A. Metz, Christina Plump, Bernhard J. Berger and Rolf DrechslerHybrid PTX Analysis for GPU accelerated CNN inferencing aiding Computer Architecture Design. In 2023 Forum on Specification & Design Languages (FDL), Turin, Italy, 2023. DOI 10.1109/FDL59689.2023.10272088 Online Best Paper Award

Bernhard J. Beger and Goerschwin FeyInformatik für Ingenieure an der Technischen Universität Hamburg. In Interdisziplinäres Forschen und Lernen in der Ingenieurinformatik (II-WS2023), 2023 DOI 10.18420/inf2023_19 Online.

Lorenz Hüther, Karsten Sohr, Bernhard J. Berger, Hendrik Rothe and Stefan EdelkampMachine Learning for SAST: A Lightweight and Adaptable Approach. In 28th European Symposium on Research in Computer Security (ESORICS), 2023 DOI 10.1007/978-3-031-51482-1_5.

Fin Hendrik Bahnsen, Bernhard J. Berger and Goerschwin FeyGLRP: Guided by Layer-wise Relevance Propagation – Selecting Crucial Neurons in Artificial Neural Networks. In International Conference on Modern Circuits and Systems Technologies (MOCAST) on Electronics and Communications, 2023. DOI: 10.1109/MOCAST57943.2023.10176688

Christina Plump, Bernhard J. Berger and Rolf DrechslerRepetitive Processes and Their Surrogate-Model Congruent Encoding for Evolutionary Algorithms - A Theoretic ProposalThe Genetic and Evolutionary Computation Conference (GECCO Companion), 2023. DOI: 10.1145/3583133.3596389

Bernhard J. Berger, Christina Plump and Rolf DrechslerEvoAl: A domain-specific language-based approach to optimisation. In 2023 IEEE Congress on Evolutionary Computation (CEC), 2023. DOI: 10.1109/CEC53210.2023.10253985

Goerschwin Fey, Swantje Plambeck and Bernhard J. BergerQMESy: Towards Quality Measurement for Explanations in System DesignWorkshop on Intelligent Methods for Test and Reliability, 2023 (workshop contribution).

Christina Plump, Rolf Drechsler and Bernhard J. BergerKI-gestützte Optimierung repetitiver Prozesse - Eine Kodierungstechnik für repetitive Prozesse in der evolutionären Optimierung. Industrie 4.0 Management, 2023. DOI: 10.30844/IM_23-1_19-22

Bernhard J. Berger and Goerschwin FeyTowards: Threat Modeling in System Design. GI/GMM/ITG-Workshop für Testmethoden und Zuverlässigkeit von Schaltungen und Systemen (TUZ), 2023 (workshop contribution).

Fin Hendrik Bahnsen, Bernhard J. Berger and Goerschwin FeyDoCNeL: Detection of Crucial Neurons Guided by Layer-wise Relevance Propagation. GI/GMM/ITG-Workshop für Testmethoden und Zuverlässigkeit von Schaltungen und Systemen (TUZ), 2023 (workshop contribution).

2022

Lorenz Hüther, Bernhard J. Berger, Stefan Edelkamp, Sebastian Eken, Lara Luhrmann, Hendrik Rothe, Marcus-Sebastian Schröder and Karsten Sohr.Machine Learning in the Context of Static Application Security Testing - ML-SAST. Editor: Federal Office for Information Security, Online, 2022.

Christina Plump, Bernhard J. Berger and Rolf DrechslerUsing density of training data to improve evolutionary algorithms with approximative fitness functions. In 2022 IEEE Congress on Evolutionary Computation (CEC), DOI: 10.1109/CEC55065.2022.9870352, 2022.

Christina Plump, Bernhard J. Berger and Rolf DrechslerAdapting mutation and recombination operators to range-aware relations in real-world application data. In The Genetic and Evolutionary Computation Conference (GECCO Companion), DOI: 10.1145/3520304.3529066,2022.

Bernhard J. BergerAutomatic detection of architectural security flaws. Doctoral Thesis, DOI: 10.26092/elib/1453, 2022.

Christina Plump, Bernhard J. Berger and Rolf DrechslerChoosing the right technique for the right restriction - a domain-specific approach for enforcing search-space restrictions in evolutionary algorithms. In Proceedings of the 8th International Conference on Dynamics in Logistics – LDIC 2022DOI: 10.1007/978-3-031-05359-7_28, 2022.

2021

Marc Asendorf, Hasanur Jaman Seam, Christian Maeder, Salva Daneshgadeh Çakmakçı and Bernhard J. BergerWhere are my containers?. In Proceedings of the first European Workshop on Maritime Systems Resilience and Security (MARESEC 2021)DOI: 10.5281/zenodo.5604449, 2021.

Bernhard J. Berger, Christian Maeder and Salva Daneshgadeh ÇakmakçıThreat Modeling Knowledge for the Maritime Community. In Proceedings of the first European Workshop on Maritime Systems Resilience and Security (MARESEC 2021)DOI: 10.5281/zenodo.5604234, 2021.

Rodrigue W. Nguempnang, Bernhard J. Berger and Karsten SohreNYPD - Entry Points Detector - Jakarta Server Faces Use Case. In Proceedings of the 21th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), IEEE Computer Society Press, DOI: 10.1109/SCAM52516.2021.00013, 2021.

Christina Plump, Bernhard J. Berger, Rolf DrechslerImproving Evolutionary Algorithms by Enhancing an Approximative Fitness Function Through Prediction Intervals. In 2021 IEEE Congress on Evolutionary Computation (CEC)DOI: 10.1109/CEC45853.2021.9504722, 2021.

Christina Plump, Bernhard J. Berger, Rolf DrechslerDomain-driven Correlation-aware Recombination and Mutation Operators for Complex Real-world Applications. In 2021 IEEE Congress on Evolutionary Computation (CEC)DOI: 10.1109/CEC45853.2021.9504931, 2021.

2020

Bernhard J. Berger, Rodrigue W. Nguempnang, Karsten Sohr and Rainer KoschkeStatic Extraction of Enforced Authorization Policies - SeeAuthz. In Proceedings of the 20th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), IEEE Computer Society Press, DOI: 10.1109/SCAM51674.2020.00026, 2020.

2019

Bernhard J. Berger, Karsten Sohr, Rainer KoschkeThe Architectural Security Tool Suite - ArchSec. In Proceedings of the 19th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), Cleveland, Ohio, DOI: 10.1109/SCAM.2019.00035, 2019. Best Engineering Paper Award.

Bernhard J. Berger, Christian Maeder, Rodrigue W. Nguempnang, Karsten Sohr, Carlos E. Rubio-MedranoTowards Effective Verification of Multi-Model Access Control Properties. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019), Toronto, Kanada, DOI: 10.1145/3322431.3325105, 2019.

2018

Rainer Koschke, Urs-Bjoern Schmidt, Bernhard J. BergerBuilt-in Clone Detection in Meta Languages. In Proceedings of the Conference on Source Code Analysis and Manipulation (SCAM), IEEE Computer Society Press, DOI: 10.1109/SCAM.2018.00026, 2018.

2016

Bernhard J. Berger, Karsten Sohr and Rainer KoschkeAutomatically Extracting Threats from Extended Data Flow Diagrams. In Proceedings of the 8th International Symposium on Engineering Secure Software and Systems (ESSoS), London, April, DOI: 10.1007/978-3-319-30806-7_4, 2016.e

2015

Marc-Andre Laverdiere, Bernhard J. Berger and Ettore MerlotTaint Analysis of Manual Service Compositions using Cross-Application Call Graphs. In 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER), 2015, IEEE Computer Society Press, DOI: 10.1109/SANER.2015.7081882, 2015.

2014

Bernhard J. Berger and Karsten Sohr and Udo H. KalinnaArchitekturelle Sicherheitsanalyse für Android. In D-A-CH Security 2014: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven, SysSec, 2014.

Steffen Bartsch, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Jens Heider, Mehmet Kus, Sönke Maseberg, Karsten Sohr and Melanie VolkamerZertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. In GI Sicherheit 2014, Lecture Notes in Informatics, GI, 2014.

2013

Steffen Bartsch, Bernhard J. Berger, Michaela Bunke and Karsten SohrThe Transitivity-of-Trust Problem in Android Application Interaction. In Proceedings of the 8th International Conference on Availability, Reliability and SecurityDOI: 10.1109/ARES.2013.39, 2013.

Bernhard J. Berger, Karsten Sohr and Rainer KoschkeExtracting and Analyzing the Implemented Security Architecture of Business Applications. In Proceedings of the 17th European Conference on Software Maintenance and Reengineering, IEEE Computer Society Press, DOI: 10.1109/CSMR.2013.37, 2013.

2012

Bernhard J. Berger and Karsten SohrAn Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. In Information Security and Privacy Research - IFIP Advances in Information and Communication Technology, Volume 376/2012, Springer, DOI: 10.1007/978-3-642-30436-1_3, 2012.

2011

Bernhard J. Berger, Michaela Bunke and Karsten SohrAn Android Security Case Study with Bauhaus. In Proceedings of the 18th Working Conference on Reverse Engineering. IEEE Computer Society, DOI: 10.1109/WCRE.2011.29, 2011.

Bernhard J. Berger and Michaela BunkeSoftware Security Comprehension. In WSR 2011 / Softwaretechnik-Trends, 31(2), 2011.

2010

Karsten Sohr and Bernhard J. BergerIdea: Towards Architecture-Centric Security Analysis of Software. In Proceedings of the Second International Symposium on Engineering Secure Software and Systems (ESSoS). Springer, DOI: 10.1007/978-3-642-11747-3_6, 2010.

2008

Bernhard J. Berger, Rainer KoschkeReduzierung der Programmgröße durch Klonerkennung. In GI Jahrestagung(2). Gesellschaft für Informatik, 2008.

2007

Bernhard J. BergerKlonmanagement: Klonerkennung für eingebettete Systeme. Diploma Thesis, Universität Bremen, 2007.