[{"language":[{"iso":"eng"}],"_id":"5725","user_id":"66173","status":"public","publication":"2017 IEEE Symposium on Security and Privacy (SP)","type":"conference","title":"Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation","doi":"10.1109/sp.2017.16","publisher":"IEEE","date_updated":"2022-01-06T07:02:37Z","author":[{"last_name":"Holzinger","full_name":"Holzinger, Philipp","first_name":"Philipp"},{"full_name":"Hermann, Ben","id":"66173","orcid":"0000-0001-9848-2017","last_name":"Hermann","first_name":"Ben"},{"first_name":"Johannes","last_name":"Lerch","full_name":"Lerch, Johannes"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"}],"date_created":"2018-11-19T13:21:40Z","year":"2017","citation":{"ieee":"P. Holzinger, B. Hermann, J. Lerch, E. Bodden, and M. Mezini, “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation,” in <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017.","chicago":"Holzinger, Philipp, Ben Hermann, Johannes Lerch, Eric Bodden, and Mira Mezini. “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/sp.2017.16\">https://doi.org/10.1109/sp.2017.16</a>.","ama":"Holzinger P, Hermann B, Lerch J, Bodden E, Mezini M. Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>","bibtex":"@inproceedings{Holzinger_Hermann_Lerch_Bodden_Mezini_2017, title={Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Holzinger, Philipp and Hermann, Ben and Lerch, Johannes and Bodden, Eric and Mezini, Mira}, year={2017} }","short":"P. Holzinger, B. Hermann, J. Lerch, E. Bodden, M. Mezini, in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.","mla":"Holzinger, Philipp, et al. “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>.","apa":"Holzinger, P., Hermann, B., Lerch, J., Bodden, E., &#38; Mezini, M. (2017). Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation. In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE. <a href=\"https://doi.org/10.1109/sp.2017.16\">https://doi.org/10.1109/sp.2017.16</a>"},"publication_identifier":{"isbn":["9781509055333"]},"publication_status":"published"},{"status":"public","publication":"2017 IEEE Symposium on Security and Privacy (SP)","type":"conference","extern":"1","language":[{"iso":"eng"}],"user_id":"83504","_id":"15895","citation":{"apa":"Muller, J., Mladenov, V., Somorovsky, J., &#38; Schwenk, J. (2017). SoK: Exploiting Network Printers. In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2017.47\">https://doi.org/10.1109/sp.2017.47</a>","bibtex":"@inproceedings{Muller_Mladenov_Somorovsky_Schwenk_2017, title={SoK: Exploiting Network Printers}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, author={Muller, Jens and Mladenov, Vladislav and Somorovsky, Juraj and Schwenk, Jörg}, year={2017} }","mla":"Muller, Jens, et al. “SoK: Exploiting Network Printers.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>.","short":"J. Muller, V. Mladenov, J. Somorovsky, J. Schwenk, in: 2017 IEEE Symposium on Security and Privacy (SP), 2017.","ama":"Muller J, Mladenov V, Somorovsky J, Schwenk J. SoK: Exploiting Network Printers. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>","chicago":"Muller, Jens, Vladislav Mladenov, Juraj Somorovsky, and Jörg Schwenk. “SoK: Exploiting Network Printers.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017. <a href=\"https://doi.org/10.1109/sp.2017.47\">https://doi.org/10.1109/sp.2017.47</a>.","ieee":"J. Muller, V. Mladenov, J. Somorovsky, and J. Schwenk, “SoK: Exploiting Network Printers,” in <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017."},"year":"2017","publication_identifier":{"isbn":["9781509055333"]},"publication_status":"published","doi":"10.1109/sp.2017.47","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/research/publications/sok-exploiting-network-printers/"}],"title":"SoK: Exploiting Network Printers","date_created":"2020-02-15T09:37:12Z","author":[{"first_name":"Jens","full_name":"Muller, Jens","last_name":"Muller"},{"first_name":"Vladislav","last_name":"Mladenov","full_name":"Mladenov, Vladislav"},{"id":"83504","full_name":"Somorovsky, Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","first_name":"Juraj"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_updated":"2022-01-06T06:52:39Z"}]
