[{"publication":"2017 IEEE Symposium on Security and Privacy (SP)","type":"conference","status":"public","_id":"5725","user_id":"66173","language":[{"iso":"eng"}],"publication_identifier":{"isbn":["9781509055333"]},"publication_status":"published","year":"2017","citation":{"mla":"Holzinger, Philipp, et al. “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>.","bibtex":"@inproceedings{Holzinger_Hermann_Lerch_Bodden_Mezini_2017, title={Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Holzinger, Philipp and Hermann, Ben and Lerch, Johannes and Bodden, Eric and Mezini, Mira}, year={2017} }","short":"P. Holzinger, B. Hermann, J. Lerch, E. Bodden, M. Mezini, in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017.","apa":"Holzinger, P., Hermann, B., Lerch, J., Bodden, E., &#38; Mezini, M. (2017). Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation. In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE. <a href=\"https://doi.org/10.1109/sp.2017.16\">https://doi.org/10.1109/sp.2017.16</a>","ama":"Holzinger P, Hermann B, Lerch J, Bodden E, Mezini M. Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>","ieee":"P. Holzinger, B. Hermann, J. Lerch, E. Bodden, and M. Mezini, “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation,” in <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017.","chicago":"Holzinger, Philipp, Ben Hermann, Johannes Lerch, Eric Bodden, and Mira Mezini. “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/sp.2017.16\">https://doi.org/10.1109/sp.2017.16</a>."},"date_updated":"2022-01-06T07:02:37Z","publisher":"IEEE","author":[{"last_name":"Holzinger","full_name":"Holzinger, Philipp","first_name":"Philipp"},{"first_name":"Ben","full_name":"Hermann, Ben","id":"66173","last_name":"Hermann","orcid":"0000-0001-9848-2017"},{"first_name":"Johannes","full_name":"Lerch, Johannes","last_name":"Lerch"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","id":"59256","full_name":"Bodden, Eric","first_name":"Eric"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"}],"date_created":"2018-11-19T13:21:40Z","title":"Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation","doi":"10.1109/sp.2017.16"},{"title":"SoK: Exploiting Network Printers","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/research/publications/sok-exploiting-network-printers/"}],"doi":"10.1109/sp.2017.47","date_updated":"2022-01-06T06:52:39Z","author":[{"last_name":"Muller","full_name":"Muller, Jens","first_name":"Jens"},{"last_name":"Mladenov","full_name":"Mladenov, Vladislav","first_name":"Vladislav"},{"orcid":"0000-0002-3593-7720","last_name":"Somorovsky","id":"83504","full_name":"Somorovsky, Juraj","first_name":"Juraj"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"date_created":"2020-02-15T09:37:12Z","year":"2017","citation":{"ieee":"J. Muller, V. Mladenov, J. Somorovsky, and J. Schwenk, “SoK: Exploiting Network Printers,” in <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017.","chicago":"Muller, Jens, Vladislav Mladenov, Juraj Somorovsky, and Jörg Schwenk. “SoK: Exploiting Network Printers.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017. <a href=\"https://doi.org/10.1109/sp.2017.47\">https://doi.org/10.1109/sp.2017.47</a>.","ama":"Muller J, Mladenov V, Somorovsky J, Schwenk J. SoK: Exploiting Network Printers. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>","bibtex":"@inproceedings{Muller_Mladenov_Somorovsky_Schwenk_2017, title={SoK: Exploiting Network Printers}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, author={Muller, Jens and Mladenov, Vladislav and Somorovsky, Juraj and Schwenk, Jörg}, year={2017} }","mla":"Muller, Jens, et al. “SoK: Exploiting Network Printers.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>.","short":"J. Muller, V. Mladenov, J. Somorovsky, J. Schwenk, in: 2017 IEEE Symposium on Security and Privacy (SP), 2017.","apa":"Muller, J., Mladenov, V., Somorovsky, J., &#38; Schwenk, J. (2017). SoK: Exploiting Network Printers. In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2017.47\">https://doi.org/10.1109/sp.2017.47</a>"},"publication_status":"published","publication_identifier":{"isbn":["9781509055333"]},"language":[{"iso":"eng"}],"extern":"1","_id":"15895","user_id":"83504","status":"public","type":"conference","publication":"2017 IEEE Symposium on Security and Privacy (SP)"}]
