[{"status":"public","publication":"2017 IEEE Symposium on Security and Privacy (SP)","type":"conference","language":[{"iso":"eng"}],"_id":"5725","user_id":"66173","year":"2017","citation":{"ieee":"P. Holzinger, B. Hermann, J. Lerch, E. Bodden, and M. Mezini, “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation,” in <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017.","chicago":"Holzinger, Philipp, Ben Hermann, Johannes Lerch, Eric Bodden, and Mira Mezini. “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/sp.2017.16\">https://doi.org/10.1109/sp.2017.16</a>.","ama":"Holzinger P, Hermann B, Lerch J, Bodden E, Mezini M. Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>","short":"P. Holzinger, B. Hermann, J. Lerch, E. Bodden, M. Mezini, in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.","bibtex":"@inproceedings{Holzinger_Hermann_Lerch_Bodden_Mezini_2017, title={Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Holzinger, Philipp and Hermann, Ben and Lerch, Johannes and Bodden, Eric and Mezini, Mira}, year={2017} }","mla":"Holzinger, Philipp, et al. “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>.","apa":"Holzinger, P., Hermann, B., Lerch, J., Bodden, E., &#38; Mezini, M. (2017). Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation. In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE. <a href=\"https://doi.org/10.1109/sp.2017.16\">https://doi.org/10.1109/sp.2017.16</a>"},"publication_identifier":{"isbn":["9781509055333"]},"publication_status":"published","title":"Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation","doi":"10.1109/sp.2017.16","publisher":"IEEE","date_updated":"2022-01-06T07:02:37Z","date_created":"2018-11-19T13:21:40Z","author":[{"full_name":"Holzinger, Philipp","last_name":"Holzinger","first_name":"Philipp"},{"first_name":"Ben","orcid":"0000-0001-9848-2017","last_name":"Hermann","id":"66173","full_name":"Hermann, Ben"},{"first_name":"Johannes","full_name":"Lerch, Johannes","last_name":"Lerch"},{"last_name":"Bodden","orcid":"0000-0003-3470-3647","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"first_name":"Mira","last_name":"Mezini","full_name":"Mezini, Mira"}]},{"main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/research/publications/sok-exploiting-network-printers/"}],"doi":"10.1109/sp.2017.47","title":"SoK: Exploiting Network Printers","author":[{"full_name":"Muller, Jens","last_name":"Muller","first_name":"Jens"},{"first_name":"Vladislav","full_name":"Mladenov, Vladislav","last_name":"Mladenov"},{"first_name":"Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","id":"83504"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_created":"2020-02-15T09:37:12Z","date_updated":"2022-01-06T06:52:39Z","citation":{"chicago":"Muller, Jens, Vladislav Mladenov, Juraj Somorovsky, and Jörg Schwenk. “SoK: Exploiting Network Printers.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017. <a href=\"https://doi.org/10.1109/sp.2017.47\">https://doi.org/10.1109/sp.2017.47</a>.","ieee":"J. Muller, V. Mladenov, J. Somorovsky, and J. Schwenk, “SoK: Exploiting Network Printers,” in <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017.","ama":"Muller J, Mladenov V, Somorovsky J, Schwenk J. SoK: Exploiting Network Printers. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>","apa":"Muller, J., Mladenov, V., Somorovsky, J., &#38; Schwenk, J. (2017). SoK: Exploiting Network Printers. In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2017.47\">https://doi.org/10.1109/sp.2017.47</a>","bibtex":"@inproceedings{Muller_Mladenov_Somorovsky_Schwenk_2017, title={SoK: Exploiting Network Printers}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, author={Muller, Jens and Mladenov, Vladislav and Somorovsky, Juraj and Schwenk, Jörg}, year={2017} }","short":"J. Muller, V. Mladenov, J. Somorovsky, J. Schwenk, in: 2017 IEEE Symposium on Security and Privacy (SP), 2017.","mla":"Muller, Jens, et al. “SoK: Exploiting Network Printers.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>."},"year":"2017","publication_status":"published","publication_identifier":{"isbn":["9781509055333"]},"language":[{"iso":"eng"}],"extern":"1","user_id":"83504","_id":"15895","status":"public","type":"conference","publication":"2017 IEEE Symposium on Security and Privacy (SP)"}]
