Ben Hermann

557 total citations
34 papers, 299 citations indexed

About

Ben Hermann is a scholar working on Information Systems, Signal Processing and Software. According to data from OpenAlex, Ben Hermann has authored 34 papers receiving a total of 299 indexed citations (citations by other indexed papers that have themselves been cited), including 26 papers in Information Systems, 16 papers in Signal Processing and 16 papers in Software. Recurrent topics in Ben Hermann's work include Software Engineering Research (21 papers), Advanced Malware Detection Techniques (16 papers) and Software Testing and Debugging Techniques (11 papers). Ben Hermann is often cited by papers focused on Software Engineering Research (21 papers), Advanced Malware Detection Techniques (16 papers) and Software Testing and Debugging Techniques (11 papers). Ben Hermann collaborates with scholars based in Germany, United States and Italy. Ben Hermann's co-authors include Michael Eichberg, Mira Mezini, Eric Bodden, Michael Reif, Stefan Winter, Sven Amann, Janet Siegmund, Stefan Krüger, Charles Weir and Sascha Fahl and has published in prestigious journals such as Communications of the ACM, IEEE Transactions on Software Engineering and Empirical Software Engineering.

In The Last Decade

Ben Hermann

30 papers receiving 293 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ben Hermann Germany 11 203 176 136 101 56 34 299
Cristian-Alexandru Staicu Germany 9 246 1.2× 182 1.0× 114 0.8× 138 1.4× 55 1.0× 14 306
Ruian Duan United States 9 171 0.8× 176 1.0× 76 0.6× 71 0.7× 109 1.9× 10 269
Sergej Dechand Germany 7 279 1.4× 196 1.1× 101 0.7× 120 1.2× 91 1.6× 8 376
Michael J. Decker United States 9 296 1.5× 86 0.5× 181 1.3× 102 1.0× 73 1.3× 22 325
Hung Phan United States 8 263 1.3× 92 0.5× 105 0.8× 101 1.0× 76 1.4× 16 290
Moshi Wei Canada 6 220 1.1× 53 0.3× 200 1.5× 90 0.9× 62 1.1× 14 302
Alexandru Marginean United Kingdom 6 164 0.8× 49 0.3× 192 1.4× 55 0.5× 51 0.9× 7 254
Timofey Bryksin Russia 10 209 1.0× 62 0.4× 138 1.0× 87 0.9× 55 1.0× 43 312
Hayawardh Vijayakumar United States 11 206 1.0× 153 0.9× 58 0.4× 211 2.1× 85 1.5× 20 318
Dhavleesh Rattan India 6 339 1.7× 188 1.1× 213 1.6× 92 0.9× 110 2.0× 14 410

Countries citing papers authored by Ben Hermann

Since Specialization
Citations

This map shows the geographic impact of Ben Hermann's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ben Hermann with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ben Hermann more than expected).

Fields of papers citing papers by Ben Hermann

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ben Hermann. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ben Hermann. The network helps show where Ben Hermann may publish in the future.

Co-authorship network of co-authors of Ben Hermann

This figure shows the co-authorship network connecting the top 25 collaborators of Ben Hermann. A scholar is included among the top collaborators of Ben Hermann based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ben Hermann. Ben Hermann is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hermann, Ben, et al.. (2024). Total Recall? How Good Are Static Call Graphs Really?. TUbilio (Technical University of Darmstadt). 112–123.
2.
Hermann, Ben, et al.. (2023). DGMF: Fast Generation of Comparable, Updatable Dependency Graphs for Software Repositories. 115–119. 2 indexed citations
4.
Gazzillo, Paul, et al.. (2022). Static data-flow analysis for software product lines in C. Automated Software Engineering. 29(1). 10 indexed citations
5.
Hermann, Ben. (2022). What Has Artifact Evaluation Ever Done for Us?. IEEE Security & Privacy. 20(5). 96–99. 2 indexed citations
6.
Plate, Henrik, et al.. (2021). Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite. IEEE Transactions on Software Engineering. 48(9). 3613–3625. 15 indexed citations
7.
Pashchenko, Ivan, et al.. (2021). TaintBench: Automatic real-world malware benchmarking of Android taint analyses. Empirical Software Engineering. 27(1). 21 indexed citations
8.
Hermann, Ben, et al.. (2021). Lossless, Persisted Summarization of Static Callgraph, Points-To and Data-Flow Analysis. DROPS (Schloss Dagstuhl – Leibniz Center for Informatics). 8 indexed citations
9.
Weir, Charles, Ben Hermann, & Sascha Fahl. (2020). From Needs to Actions to Secure Apps?:The Effect of Requirements and Developer Practices on App Security. Lancaster EPrints (Lancaster University). 289–305. 12 indexed citations
10.
Hermann, Ben, Stefan Winter, & Janet Siegmund. (2020). Community expectations for research artifacts and evaluation processes. 469–480. 15 indexed citations
11.
Hermann, Ben, et al.. (2020). bhermann/artifact-survey: v3 - Post-Artifact Evaluation. Zenodo (CERN European Organization for Nuclear Research). 2 indexed citations
12.
Hermann, Ben, et al.. (2019). Know your analysis: how instrumentation aids understanding static analysis. 8–13. 4 indexed citations
13.
Reif, Michael, Michael Eichberg, Ben Hermann, & Mira Mezini. (2017). Hermes: assessment and creation of effective test corpora. 43–48. 8 indexed citations
14.
Hermann, Ben, et al.. (2017). Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation. Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft). 1027–1040. 9 indexed citations
15.
Müller, Patrick, et al.. (2017). SootKeeper: runtime reusability for modular static analysis. 19–24. 1 indexed citations
16.
Schmidt, Sebastian, et al.. (2015). A vulnerability's lifetime. 1–4. 5 indexed citations
17.
Hermann, Ben, Michael Reif, Michael Eichberg, & Mira Mezini. (2015). Getting to know you: towards a capability model for Java. 758–769. 4 indexed citations
18.
Eichberg, Michael, et al.. (2015). Hidden truths in dead software paths. 474–484. 10 indexed citations
19.
Hermann, Ben, et al.. (2014). FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases. Fraunhofer-Publica (Fraunhofer-Gesellschaft). 98–108. 26 indexed citations
20.
Bodden, Eric, et al.. (2013). Reducing human factors in software security architectures.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026