-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathindex.html
327 lines (291 loc) · 29 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="description" content="">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
<!-- The above 4 meta tags *must* come first in the head; any other head content must come *after* these tags -->
<!-- Title -->
<title>Goran Piskachev</title>
<!-- Favicon -->
<link rel="icon" href="img/core-img/favicon.ico">
<!-- Core Stylesheet -->
<link rel="stylesheet" href="style.css">
<!-- Latest compiled and minified CSS-->
<script src="https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script>
<script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js"></script>
</head>
<body>
<!-- Navigacion start -->
<div id="custom-bootstrap-menu" class="navbar navbar-default navbar-fixed-top" role="navigation">
<div class="container-fluid">
<div class="navbar-header"><a class="navbar-brand" href="#"><img style="margin-top: -8px;" /></a>
<button type="button" class="navbar-toggle" data-toggle="collapse" data-target=".navbar-menubuilder"><span class="sr-only">Toggle navigation</span><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span>
</button>
</div>
<div class="collapse navbar-collapse navbar-menubuilder">
<ul class="nav navbar-nav navbar-left">
<li><a class="active" href="#">Home</a></li>
<li><a href="index.html#about-section">About</a></li>
<li><a href="index.html#edu-section">Edu</a></li>
<li><a href="index.html#work-section">Work Experience</a></li>
<li><a href="index.html#publications-section">Publications</a></li>
<li><a href="index.html#talks-section">Talks</a></li>
<li><a href="index.html#service-section">Service</a></li>
<li><a href="index.html#teaching-section">Teaching</a></li>
<li><a href="index.html#contact-section">Contact</a></li>
</ul>
</div>
</div>
</div>
<!-- Navigation end -->
<!--- About start -->
<div class="about" >
<div class="container about" id="about-section">
<h1>Goran Piskachev</h1>
<p>I am an applied scientist at Amazon Web Services in Berlin, Germany. I hold a PhD degree from Paderborn University under the supervision of Prof. Dr. <a href="https://www.bodden.de/">Eric Bodden</a>. My research is in the area of program analysis and its practical applications in the domains of security and privacy. In my <a href="https://digital.ub.uni-paderborn.de/doi/10.17619/UNIPB/1-1665">PhD thesis</a>, I developed techniques that bring the application of taint analysis for detecting security vulnerabilities closer to software developers.</p>
<h5>Research Areas of Interest:</h5>
<ul>
<li>Static Code Analysis</li>
<li>Domain-specific Languages</li>
<li>Machine-learning for Code Analysis</li>
<li>Application Security</li>
<li>Privacy Engineering</li>
<li>Empirical Software Engineering</li>
</ul>
<h3>
<a href="https://github.com/piskachev"> <img src="img/github_icon.png" width="48" height="48" title="Github" alt="Github Logo"></a>
<a href="https://www.linkedin.com/in/goran-piskachev-28959194/"> <img src="img/linkedin-logo.png" width="48" height="48" title="LinkedIn" alt="LinkedIn Logo"></a>
<a href="https://www.instagram.com/piskachev/"> <img src="img/insta_icon.png" width="48" height="48" title="Instagram" alt="Instagram Logo"></a>
</h3>
<!---<a href="about.html" class="btn btn-action"><strong>Learn More</strong></a>-->
<!---<div class="about-image">
<a href="#header-image">
<img src="img/process.jpg" class="image responsive thumbnail">
</a>
<div>
<a href="#_" class="lightbox image" id="header-image">
<img src="img/process.jpg" >
</a>
</div>
</div>-->
</div>
</div>
<!--- About end -->
<!--- Edu start -->
<div class="about" >
<div class="container about" id="edu-section">
<h1>Education</h1>
<ul>
<li>[Jan 2016 - Dec 2022] <strong>PhD (Dr. rer. nat.),</strong> <a href="http://www.uni-paderborn.de/" target="_blank" rel="noopener">Paderborn University
</a> </li>
<li>[Oct 2012 - Jul 2015] <strong>MSc in Computer Science</strong>, <a href="http://www.uni-paderborn.de/" target="_blank" rel="noopener">Paderborn University
</a> </li>
<li>[Sep 2008 - Jun 2012]<strong> Degree in Electrical Engineering and Information Technologies</strong>, <a href="https://www.finki.ukim.mk" target="_blank" rel="noopener">Ss. Cyril and Methodius University Skopje
</a> </li>
<li>[Sep 2006 - Aug 2008]<strong> Inernational Baccalaureate Diplomma Program</strong>, <a href="http://ibo.org/" target="_blank" rel="noopener">Josip Broz Tito High School Skopje</a></li>
</ul>
</div>
</div>
<!--- Edu end -->
<!--- Work start -->
<div class="about" >
<div class="container about" id="work-section">
<h1>Work Experience</h1>
<ul>
<li>[Oct 2022 - today] <strong>Applied Scientist</strong> - AWS Privacy Engineering Group, Amazon Web Services, Berlin</li>
<li>[Apr 2024 - today] <strong>Associate Editor (Static Analysis, Programming Paradigms)</strong> - <a href="https://www.computer.org/csdl/magazine/so">IEEE Software Magazine</a></li>
<li>[Jan 2022 - Sep 2022] <strong>Team Manager</strong> - Development tools for secure services and apps, <a href="https://www.iem.fraunhofer.de/">Fraunhofer IEM</a>, Paderborn</li>
<li>[Jan 2021 - Apr 2021] <strong>Internship (applied scientist)</strong> - Automated Reasoning Group, Amazon Web Servoces </li>
<li>[Sep 2015 - Dec 2021] <strong>Research Associate</strong> - Software engineering group, <a href="https://www.iem.fraunhofer.de/">Fraunhofer IEM</a>, Paderborn</li>
<li>[Jan 2015 - Jul 2015] <strong>Student Research Assistant</strong> - Software engineering group, <a href="https://www.ipt.fraunhofer.de/">Fraunhofer IPT</a>, Paderborn</li>
<li>[Feb 2013 - Dec 2014] <strong>Student Research Assistant</strong> - <a href="https://www.hni.uni-paderborn.de/swt/" target="_blank" rel="noopener">Software engineering group, Heinz Nixdorf Institut</a>, Paderborn</li>
<li>[Jul 2012 - Aug 2012] <strong>Internship (research)</strong> - <a href="http://www.theosysbio.bio.ic.ac.uk/" target="_blank" rel="noopener">Theoretical systems biology group</a>, Imperial College London</li>
<li>[Feb 2012 - Jun 2012] <strong>Lab Demonstrator</strong> - <a href="https://www.finki.ukim.mk/en" target="_blank" rel="noopener">Faculty of Computer Science and Engineering</a>, <a href="http://www.ukim.edu.mk/">UKIM Skopje</a></li>
<li>[Aug 2011 - Oct 2011] <strong>Internship (software development)</strong> - <a href="http://www.koios-consulting.co.uk/" target="_blank" rel="noopener">Koios Savetovanje</a>, Zagreb</li>
<li>[Jul 2011 - Aug 2011] <strong>Internship (software development)</strong> - <a href="http://www.alvila.com/" target="_blank" rel="noopener">Alvila</a>, Prague</li>
</ul>
</div>
</div>
<!--- Work end -->
<!--- Publications start -->
<div class="about" >
<div class="container about" id="publications-section">
<h1>Publications</h1>
<ul>
<li>2024</li><ul>
<li><a href="https://ide-workshop.github.io/">Detecting Security-Relevant Methods using Multi-label Machine Learning</a>, Johnson Oshando, Piskachev Goran, Krishnamurthy Ranjith, and Bodden Eric, The IDE Workshop (collocated at ICSE), 2024 </li>
</ul>
<li>2023</li><ul>
<li><a href="https://www.amazon.science/publications/compositional-taint-analysis-for-enforcing-security-policies-at-scale">Compositional Taint Analysis for Enforcing Security and Privacy Policies at Scale</a>, Banerjee Subarno, Cui Siwei, Emmi Michael, Filieri Antonio, Hadarean Liana, Li Peixuan, Luo Linghui, Piskachev Goran, Rosner Nicolás, Sengupta Aritra, Tripp Omer, Tout Sean, Wang Jingbo, Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), 2023 </li>
<li><a href="https://link.springer.com/article/10.1007/s10664-023-10354-3">Can the configuration of static analyses make resolving security vulnerabilites more effective? - A user study</a>, Piskachev Goran, Becker Matthias, and Bodden Eric, Empirical Software Engineering Springer (EMSE), 2023 and Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), 2023<a href="https://research-sast-config.github.io/">[artifact]</a></li>
<li><a href="https://www.bodden.de/pubs/lpk23model.pdf">Model Generation For Java Frameworks</a>, Luo Linghui, Piskachev Goran, Krishnamurthy Ranjith, Dolby Julian, Bodden Eric, and Schäf Martin, International Conference on Software Testing, Verification and Validation (ICST), 2023</li>
<li><a href="https://www.amazon.science/publications/shifting-left-for-early-detection-of-machine-learning-bugs">Shifting left for early detection of machine-learning bugs</a>, Liblit Ben, Luo Linghui, Molina Ramirez Alejandro, Mukherjee Rajdeep, Patterson Zachary, Piskachev Goran, Schäf Martin, Tripp Omer, and Visser Willem, Formal Methods Industry Day (FM), 2023</li>
</ul>
<li>2022</li><ul>
<li><a href="https://www.bodden.de/pubs/thesis-piskachev.pdf">Adapting Taint Analyses for Detecting Security Vulnerabilities</a> Piskachev Goran, PhD thesis (<b>Summa cum laude</b>), Universität Paderborn, December 2022</li>
<li><a href="https://arxiv.org/abs/2208.06136">How far are German companies in improving security through static program analysis tools?</a>, Piskachev Goran, Dziwok Stefan, Koch Thorsten, Merschjohan Sven, and Bodden Eric, IEEE Secure Development Conference (secDev), Atlanta USA, October 2022, <a href="https://osf.io/k37c9/">[artifact]</a></li>
<li><a href="https://1drv.ms/b/s!Au3l-mM98H4ahL8hpiy7Drr8KvMTUw">To what extent can we analyze Kotlin programs using existing Java taint analysis tools?</a>, Krishnamurthy Ranjith, Piskachev Goran, and Bodden Eric, 22nd IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), Limassol Cyprus, October 2022 (<b>best engineering paper award</b>) <a href="https://arxiv.org/abs/2207.09379">[Extended version]</a> <a href="https://github.com/fraunhofer-iem/kotlin-micro-benchmark">[Artifact: Benchmark]</a> <a href="https://github.com/secure-software-engineering/secucheck/tree/feature/SecuCheck-Kotlin">[Artifact: Kotlin Taint Analysis]</a></li>
<li><a href="https://arxiv.org/abs/2204.03089">Fluently specifying taint-flow queries with fluentTQL</a>, Piskachev Goran, Späth Johannes, Budde Ingo, and Bodden Eric, Empirical Software Engineering Springer(EMSE), 2022 and Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), 2022<a href="https://fluenttql.github.io/">[artifact]</a></li>
<li><a href="https://t.co/49z3WgfzA1?amp=1">TaintBench: Automatic Real-World Malware Benchmarking of Android Taint Analyses</a>, Luo Linghui, Pauck Felix, Piskachev Goran, Benz Manuel, Pashchenko Ivan, Mory Martin, Bodden Eric, Hermann Ben, and Massacci Fabio, International Conference on Software Engineering (ICSE), Pittsburgh USA, May 2022 </li>
</ul>
<li>2021</li><ul>
<li><a href="https://t.co/49z3WgfzA1?amp=1">TaintBench: Automatic Real-World Malware Benchmarking of Android Taint Analyses</a>, Luo Linghui, Pauck Felix, Piskachev Goran, Benz Manuel, Pashchenko Ivan, Mory Martin, Bodden Eric, Hermann Ben, and Massacci Fabio, Empirical Software Engineering Springer(EMSE), 2021 <a href="https://taintbench.github.io">[artifact]</a></li>
<li><a href="https://1drv.ms/b/s!Au3l-mM98H4ahKslwNAGieTe6RK9pA?e=F50VOr">SecuCheck: Engineering configurable taint analysis for software developers</a>, Piskachev Goran, Krishnamurthy Ranjith, and Bodden Eric, 21st IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM), 2021<a href="https://osf.io/qfu2t/">[artifact]</a></li>
<li><a href="https://1drv.ms/b/s!Au3l-mM98H4ahKI-dI6Uof23AxFkSw">Qualitative and Quantitative Analysis of Callgraph Algorithms for PYTHON</a>, Kummita Sriteja, Piskachev Goran, Spaeth Johannes, and Bodden Eric, The First International Conference on Code Quality, Moscow Russia, March 2021</li>
</ul>
<li>2020</li><ul>
<li><a href="https://1drv.ms/b/s!Au3l-mM98H4ahKI30xWiBKn9ppvLvQ"> Language-agnostic Injection Detection</a>, Hermerschmidt Lars, Straub Andreas, and Piskachev Goran, LangSec Workshop (IEEE S&P), San Francisco USA, May 2020</li>
</ul>
<li>2019</li><ul>
<li><a href="https://1drv.ms/b/s!Au3l-mM98H4ahKI4t1FF5eCB09s0fA"> SwanAssist: Semi-Automated Detection of Code-Specific, Security-Relevant Methods</a>, Piskachev Goran, Nguyen Quang Do Lisa, Johnson Oshando, and Bodden Eric, Demonstration Track at Automated Software Engineering (ASE), San Diego USA, November 2019</li>
<li><a href="https://staticanalysis.org/tapas2019/talks/TAPAS_2019_paper_8.pdf"> AuthCheck: Program-state Analysis for Access-control Vulnerabilities</a>, Piskachev Goran, Petrasch Tobias, Spaeth Johannes, and Bodden Eric, Workshop on Tools for Automatic Program Analysis (TAPAS), Porto Portugal, October 2019</li>
<li><a href="https://arxiv.org/abs/1907.02558">Integration of the Static Analysis Results Interchange Format in CogniCrypt</a> (Technical Report), Kummita Sriteja, Piskachev Goran, Heinz Nixdorf Institute, Paderborn Germany, June 2019</li>
<li><a href="https://1drv.ms/b/s!Au3l-mM98H4ahKI6GyHHbMIL6pTLgw">Codebase-Adaptive Detection of Security-Relevant Methods</a>, Piskachev Goran, Nguyen Lisa, Bodden Eric, International Symposium on Software Testing and Analysis (ISSTA) 2019, Beijing China, July 2019</li>
<li><a href="https://www.hni.uni-paderborn.de/publikationen/publikationen/?tx_hnippview_pi1%5Bpublikation%5D=9859">Codebase-Adaptive Detection of Security-Relevant Methods (Technical Report),</a> Piskachev Goran, Nguyen Lisa, Bodden Eric, Heinz Nixdorf Institute, Paderborn Germany, March 2019</li>
</ul>
<li>before 2019</li><ul>
<li><a href="https://conf.researchr.org/event/ecoop-issta-2018/ecoop-issta-2018-doctoral-symposium-transparent-static-analysis-for-the-detection-of-security-vulnerabilities">Transparent Static Analysis for the Detection of Security Vulnerabilities</a>, Piskachev Goran, ISSTA/ECOOP 2018 Doctoral Symposium, Amsterdam The Netherlands, July 2018</li>
<li><a href="https://www.hni.uni-paderborn.de/en/publications/publikationen/?tx_hnippview_pi1%5Bpublikation%5D=9478">The MechatronicUML Design Method: Process and Language for Platform-Independent Modeling</a> (Technical report), Dziwok Stefan, Pohlmann Uwe, Piskachev Goran, Schubert David, Thiele Sebastian, Gerking Christopher, Heinz Nixdorf Institute, Paderborn Germany, 2016</li>
<li><a href="https://1drv.ms/b/s!Au3l-mM98H4ahKI6GyHHbMIL6pTLgw">LAFORE: Domain Specific Language for Reconfiguration</a> (Master thesis), Piskachev Goran, Paderborn Germany, July 2015</li>
<li><a href="https://www.hni.uni-paderborn.de/fileadmin/Fachgruppen/Softwaretechnik/Lehre/PG_Cybertron/PG_Cybertron_Final_Document.pdf">Cybertron, Project Group</a>, (Final Document) Paderborn Germany, 2015</li>
<li><a href="https://www.hni.uni-paderborn.de/publikationen/publikationen/?tx_hnippview_pi1%5bpublikation%5d=9118">Concerns, Views, Viewpoints, and Stakeholders in the Holistic Mechatronic UML Process</a> (Seminar thesis), Piskachev Goran, Paderborn Germany, 2015</li>
<li><a href="http://www.performance-symposium.org/fileadmin/user_upload/palladio-conference/2014/slides/11_StaticSpotter.pdf">Static Spotter for Scalability Anti-Patterns Detection</a> (Tutorial), Yu Jinying, Piskachev Goran, Symposium on Software Performance, Stuttgart Germany, 2014</li>
<li><a href="http://ieeexplore.ieee.org/document/6143832/">Performance modeling for a Web GRID architecture</a>, Bajrami Agim, Zdraveski Vladimir, Filiposka Sonja, Piskachev Goran, Trajanov Dimitar, Telecommunications Forum (TELEFOR), Belgrade Serbia, 2011</li>
<li><a href="https://1drv.ms/b/s!Au3l-mM98H4ahKI9SAwazaNJmr2TRw">Novel consensus approach for protein active sites detection</a>, Piskachev Goran, Mirceva Georgina, Davcev Danco, International Scientific Conference, Computer Science, Ohrid Macedonia, July 2011</li>
</ul>
</ul>
</div>
</div>
<!--- Publications end -->
<!--- Talks start -->
<div class="about" >
<div class="container about" id="talks-section">
<h1>Talks</h1>
<ul>
<li><a href="https://2022.ecoop.org/home/pride-2022#About">PRIDE Workshop</a>, (invited talk) ECOOP Berlin, June 2022</li>
<li><a href="https://www.hni.uni-paderborn.de/sse/lehre/oberseminar-ss2021/">Research seminar</a>, Paderborn University, Replicability of software engineering artifacts, October 2021</li>
<li><a href="https://icsme2021.github.io/program/ROSE.html">ROSE Festival (Recognizing and Rewarding Open Science in SE)</a>, Luxembourg (virtual), Open Science Contribution: Artifact SecuCheck, September 2021</li>
<li>Guest lecture at <a href="https://www.hni.uni-paderborn.de/sse/lehre/oberseminar-ss2021/">DECA 2</a>, Paderborn University, July 2021 <a href="https://www.youtube.com/watch?v=Zrkzm9an5S0&list=PLamk8lFsMyPVfDVLbD_ofhTiOoHP3x7lZ">Part 1</a>, <a href="https://www.youtube.com/watch?v=BLv21JM2SLY&list=PLamk8lFsMyPVfDVLbD_ofhTiOoHP3x7lZ">Part 2</a>, <a href="https://www.youtube.com/watch?v=5aMVcmO9I1Q&list=PLamk8lFsMyPVfDVLbD_ofhTiOoHP3x7lZ">Part 3</a>, <a href="https://www.youtube.com/watch?v=hPjZxzefi7o&list=PLamk8lFsMyPVfDVLbD_ofhTiOoHP3x7lZ">Part 4</a></li>
<li><a href="https://www.meetup.com/de-DE/IT-Security-Kassel/events/265209415/"> Kassel Security Meetup</a> Configuring Static Analysis Tools, Kassel, January 2020, <a href="https://www.youtube.com/watch?v=nTpTSOVXSTU">video link</a></li>
<li><a href="https://www.heise-devsec.de/lecture.php?id=8883&source=0"> Heise devSec</a> How to configure static analysis configuration through machine-learning, Heidelberg, September 2019</li>
</ul>
</div>
</div>
<!--- Talks end -->
<!--- Projects start
<div class="about" >
<div class="container about" id="projects-section">
<div class="container">
<h1>Selected Projects</h1>
<ul>
<li><a href="https://secucheck.github.io/">SecuCheck</a></li> -
<li><a href="https://appsecure.nrw/">AppSecure.NRW</a></li> is a
<li><a href="https://www.iem.fraunhofer.de/en/research/research-projects/identification-security-vulnerabilities-software-engineering-phase.html">ATTRACT: Secure Software Engineering</a></li>
</ul>
</div>
</div>
</div>
<!--- Projects end -->
<!--- Service start -->
<div class="about" >
<div class="container about" id="service-section">
<div class="container">
<h1>Service</h1>
<ul>
<li><em><a href="https://2025.splashcon.org/home/sas-2025">Static Analysis Symposium 2025</a> (SAS) 2025</em> - PC Member </li>
<li><em><a href="https://conf.researchr.org/track/mobilesoft-2025/mobilesoft-2025-research-track">International Conference on Mobile Software Engineering and Systems 2025</a> (MOBILESoft) 2025</em> - PC Member </li>
<li><em><a href="https://conf.researchr.org/track/icse-2025/icse-2025-artifact-evaluation">International Conference on Software Engineering </a> (ICSE) 2025</em> - Artifact Evaluation Committee </li>
<li><em><a href="https://ide-workshop.github.io/">The IDE Workshop</a> (collocated at ICSE) 2025</em> - PC Member </li>
<li><em><a href="https://dl.acm.org/journal/tosem">ACM Transactions on Software Engineering and Methodology</a> 2024</em> - Reviewer </li>
<li><em><a href="https://conf.researchr.org/track/ase-2024/ase-2024-industry-showcase">IEEE/ACM International Conference on Automated Software Engineering</a> (ASE) 2024</em> - PC Member Industry Track </li>
<li><em><a href="https://i-cav.org/2024/">International Conference on Computer Aided Verification</a> (CAV) 2024</em> - PC Sub-reviewer </li>
<li><em><a href="https://secdev.ieee.org/2024/home">IEEE Secure Development Conference</a> (secDev) 2024</em> - PC Member </li>
<li><em><a href="https://link.springer.com/journal/10515">Automated Software Engineering Springer Journal</a> 2024</em> - Reviewer </li>
<li><em><a href="https://link.springer.com/journal/42979">SN Computer Science Springer Journal</a> 2024</em> - Reviewer </li>
<li><em><a href="https://link.springer.com/journal/10586">Cluster Computing Springer Journal</a> 2024</em> - Reviewer </li>
<li><em><a href="https://pldi24.sigplan.org/">Conference on Programming Language Design and Implementation </a> (PLDI) 2024</em> - Artifact Evaluation Committee</li>
<li><em><a href="https://conf.researchr.org/home/saner-2024">IEEE International Conference on Software Analysis, Evolution and Reengineering </a> (SANER) 2024</em> - PC Member Tool Track </li>
<li><em><a href="https://conf.researchr.org/track/icse-2024/icse-2024-artifact-evaluation">International Conference on Software Engineering </a> (ICSE) 2024</em> - Artifact Evaluation Committee </li>
<li><em><a href="https://secdev.ieee.org/2023/home">IEEE Secure Development Conference</a> (secDev) 2023</em> - PC Member </li>
<li><em><a href="http://www.i-cav.org/2023/artifact-evaluation/">International Conference on Computer Aided Verification</a> (CAV) 2023</em> - Artifact Evaluation Committee</li>
<li><em><a href="https://pldi23.sigplan.org/">Conference on Programming Language Design and Implementation </a> (PLDI) 2023</em> - Artifact Evaluation Committee</li>
<li><em><a href="https://etaps.org/2023/esop?id=541">European Symposium on Programming </a> (ESOP) 2023</em> - Artifact Evaluation Committee</li>
<li><em><a href="https://dl.acm.org/journal/tosem">ACM Transactions on Software Engineering and Methodology</a> (TOSEM) 2022</em> - Reviewer</li>
<li><em><a href="https://www.springer.com/journal/10664/">Empirical Software Engineering</a> (EMSE) 2022</em> - Reviewer</li>
<li><em><a href="https://www.usenix.org/conference/usenixsecurity22/call-for-artifacts">USENIX Security</a> 2022</em> - Artifact Evaluation Committee</li>
<li><em><a href="https://pldi22.sigplan.org/track/pldi-2022-PLDI-Research-Artifacts">Conference on Programming Language Design and Implementation </a> (PLDI) 2022</em> - Artifact Evaluation Committee</li>
<li><em><a href="https://etaps.org/2022/esop">European Symposium on Programming </a> (ESOP) 2022</em> - Artifact Evaluation Committee</li>
<li><em><a href="https://conf.researchr.org/home/icse-2022">International Conference on Software Engineering </a> (ICSE) 2022</em> - Subreviewer</li>
<li><em><a href="https://www.ieee-security.org/TC/SP2021/index.html">IEEE Symposium on Security and Privacy </a> (IEEE SP) 2021</em> - Subreviewer</li>
<li><em><a href="https://pldi21.sigplan.org/track/pldi-2021-PLDI-Research-Artifacts">Conference on Programming Language Design and Implementation </a> (PLDI) 2021</em> - Artifact Evaluation Committee</li>
<li><em><a href="https://2021.msrconf.org/track/msr-2021-shadow-pc">Mining Software Repositories Conference </a> (MSR) 2021</em> - ShadowPC Member</li>
<li><em><a href="https://onlinelibrary.wiley.com/journal/1097024x">Software: Practice and Experience</a> (SPE) 2020</em> - Reviewer</li>
<li><em><a href="https://www.springer.com/journal/10664/">Empirical Software Engineering</a> (EMSE) 2020</em> - Reviewer</li>
<li><em><a href="https://www.usenix.org/conference/usenixsecurity20/call-for-artifacts">USENIX Security</a> 2020</em> - Artifact Evaluation Committee</li>
<li><em><a href="https://pldi20.sigplan.org/track/pldi-2020-PLDI-Research-Artifacts">Conference on Programming Language Design and Implementation </a> (PLDI) 2020 </em> - Artifact Evaluation Committee</li>
<li><em><a href="https://2020.ecoop.org/home">European Conference on Object-Oriented Programming</a> (ECOOP)</em> 2020 - <a href="https://2020.ecoop.org/track/ecoop-2020-doctoral-symposium">Doctoral Symposium</a> PC Member</li>
<li><em><a href="https://2020.ecoop.org/home">European Conference on Object-Oriented Programming</a> (ECOOP)</em> 2020 - Poster Session Co-Chair</li>
<li><em><a href="https://2019.ecoop.org/home">European Conference on Object-Oriented Programming</a> (ECOOP)</em> 2019 - Doctoral Symposium Co-Chair</li>
<li><span class="st"><a href="https://conf.researchr.org/home/ecoop-issta-2018">ACM SIGSOFT <em>International Symposium on Software Testing and Analysis</em></a> (<wbr /><em>ISSTA</em>)</span> 2018 - Artifact Evaluation Committee</li>
<li><span class="st"><a href="https://conf.researchr.org/home/issta-2017">ACM SIGSOFT <em>International Symposium on Software Testing and Analysis</em></a> (<wbr /><em>ISSTA</em>)</span> 2017 - Artifact Evaluation Committee</li>
</ul>
</div>
</div>
</div>
<!--- Service end -->
<!--- Teaching start -->
<div class="about" >
<div class="container about" id="teaching-section">
<div class="container">
<h1>Teaching</h1>
At Paderborn University, I suppervised the following theses
<ul>
<li>[2023] Master thesis - Explorative research on using LLVM and PhASAR to run data-flow analyses on SWIFT</li>
<li>[2022] <a href="https://www.hni.uni-paderborn.de/sse/lehre/seminar-secure-systems-engineering-ws-2021/">Seminar Secure Systems Engineering</a> (WS21/22) - Understanding and evaluating MarianaTrench</li>
<li>[2022] Master thesis - Explorative research on taint analysis for Kotlin</li>
<li>[2021] Master thesis - Soot-based configuration generator for analysis writers (co-supervised)</li>
<li>[2021] Master thesis - Extending fluentTQL: Specifying taint-flows through a domain-specific language </li>
<li>[2020] Master thesis - Evaluation of Call Graph Construction for Python (co-supervised)</li>
<li>[2020] Master thesis - Transformation of Taint and Typestate Specifications (co-supervised)</li>
<li>[2020] <a href="https://www.hni.uni-paderborn.de/sse/lehre/vorlesungsarchiv/ws-201920/seminar-secure-systems-engineering/">Seminar Secure Systems Engineering</a> (WS19/20) - Transforming Taint flow Specifications into Correct Usage of APIs (co-supervised) </li>
<li>[2020] <a href="https://www.hni.uni-paderborn.de/sse/lehre/vorlesungsarchiv/ws-201920/seminar-secure-systems-engineering/">Seminar Secure Systems Engineering</a> (WS19/20) - Survey on Domain Specific Languages for Taint Analysis </li>
<li>[2019] <a href="https://www.hni.uni-paderborn.de/swt/lehre/proseminar-softwareentwicklung-fuer-software-intensive-systeme-ss2019/">Pro-Seminar Softwareentwicklung fuer software-intensive Systeme</a> (SS19) - Representing Source Code in Machine Leraning for Code Analysis</li>
<li>[2019] <a href="https://cs.uni-paderborn.de/dbis/lehre/veranstaltungen/ss-2019/seminar-advanced-software-engineering-concepts/general/">Seminar Advanced Software Engineering Contepts</a> (SS19) - Integrating Feedback in the IDE</li>
<li>[2019] Master thesis - Detection of methods of interest for security based on software documentation</li>
<li>[2019] <a href="https://www.hni.uni-paderborn.de/swt/lehre/seminar-secure-systems-engineering-ws-20182019/">Seminar Secure Systems Engineering</a> (WS18/19) - Survey on adaptive static analysis</li>
<li>[2018] Bachelor thesis - Authentication and authorization checker for Java web systems</li>
<li>[2018] Bachelor thesis - Evaluation of machine learning algorithms for automatic detection of security-relevant methods</li>
<li>[2018] <a href="https://www.hni.uni-paderborn.de/swt/lehre/seminar-secure-systems-engineering-ws-20172018/">Seminar Secure Systems Engineering</a> (WS17/18) - Inferring specifications for taint-style vulnerabilities</li>
<li>[2017] <a href="https://www.hni.uni-paderborn.de/swt/lehre/vorlesungsarchiv/ws-201617/seminar-secure-systems-engineering-ws-201617/">Seminar Secure Systems Engineering</a> (WS16/17) - Security vulnerabilities in Android's inter-app communication</li>
</ul>
<h5>Teaching assistance</h5>
<ul>
<li><a href="https://www.hni.uni-paderborn.de/sse/lehre/seminar-replicability-of-software-engineering-artifacts-ss-2021/">Seminar: Replicability of software engineering artifacts</a> (SS21)</li>
<li><a href="https://www.hni.uni-paderborn.de/swt/lehre/vorlesungsarchiv/ss2017/modellbasierte-softwareentwicklung-ss2017/">Model-based software development</a> (SS17)</li>
<li><a href="https://www.hni.uni-paderborn.de/swt/lehre/vorlesungsarchiv/ws-201617/model-driven-software-development-ws20162017/">Model-driven software development</a> (WS16/17)</li>
<li><a href="https://www.hni.uni-paderborn.de/swt/lehre/vorlesungsarchiv/ws-201516/model-driven-software-development-ws20152016/">Model-driven software development</a> (WS15/16)</li>
</ul>
</div>
</div>
</div>
<!--- Teaching end -->
<!--- Contact start -->
<div class="about" >
<div class="container about" id="contact-section">
<h1>Contact</h1>
<p><strong>e-Mail:</strong> <a href="mailto:[email protected]">goran(at)piskachev.com</a></p>
<br/>
</div>
</div>
<!--- Contact end -->
<script type="text/javascript">
$(document).ready(function() {
// get current URL path and assign 'active' class
var pathname = window.location.pathname;
$('.nav > li > a[href="'+pathname+'"]').parent().addClass('active');
})
</script>
</body>
</html>