[{"publication_status":"published","publication_identifier":{"isbn":["9781509055333"]},"year":"2017","citation":{"ama":"Holzinger P, Hermann B, Lerch J, Bodden E, Mezini M. Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>","ieee":"P. Holzinger, B. Hermann, J. Lerch, E. Bodden, and M. Mezini, “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation,” in <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017.","chicago":"Holzinger, Philipp, Ben Hermann, Johannes Lerch, Eric Bodden, and Mira Mezini. “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE, 2017. <a href=\"https://doi.org/10.1109/sp.2017.16\">https://doi.org/10.1109/sp.2017.16</a>.","apa":"Holzinger, P., Hermann, B., Lerch, J., Bodden, E., &#38; Mezini, M. (2017). Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation. In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. IEEE. <a href=\"https://doi.org/10.1109/sp.2017.16\">https://doi.org/10.1109/sp.2017.16</a>","bibtex":"@inproceedings{Holzinger_Hermann_Lerch_Bodden_Mezini_2017, title={Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Holzinger, Philipp and Hermann, Ben and Lerch, Johannes and Bodden, Eric and Mezini, Mira}, year={2017} }","mla":"Holzinger, Philipp, et al. “Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, IEEE, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.16\">10.1109/sp.2017.16</a>.","short":"P. Holzinger, B. Hermann, J. Lerch, E. Bodden, M. Mezini, in: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, 2017."},"publisher":"IEEE","date_updated":"2022-01-06T07:02:37Z","author":[{"last_name":"Holzinger","full_name":"Holzinger, Philipp","first_name":"Philipp"},{"orcid":"0000-0001-9848-2017","last_name":"Hermann","id":"66173","full_name":"Hermann, Ben","first_name":"Ben"},{"full_name":"Lerch, Johannes","last_name":"Lerch","first_name":"Johannes"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden"},{"last_name":"Mezini","full_name":"Mezini, Mira","first_name":"Mira"}],"date_created":"2018-11-19T13:21:40Z","title":"Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation","doi":"10.1109/sp.2017.16","type":"conference","publication":"2017 IEEE Symposium on Security and Privacy (SP)","status":"public","_id":"5725","user_id":"66173","language":[{"iso":"eng"}]},{"date_created":"2020-02-15T09:37:12Z","author":[{"full_name":"Muller, Jens","last_name":"Muller","first_name":"Jens"},{"last_name":"Mladenov","full_name":"Mladenov, Vladislav","first_name":"Vladislav"},{"first_name":"Juraj","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","id":"83504","full_name":"Somorovsky, Juraj"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_updated":"2022-01-06T06:52:39Z","main_file_link":[{"url":"https://www.nds.ruhr-uni-bochum.de/research/publications/sok-exploiting-network-printers/"}],"doi":"10.1109/sp.2017.47","title":"SoK: Exploiting Network Printers","publication_status":"published","publication_identifier":{"isbn":["9781509055333"]},"citation":{"ama":"Muller J, Mladenov V, Somorovsky J, Schwenk J. SoK: Exploiting Network Printers. In: <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. ; 2017. doi:<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>","chicago":"Muller, Jens, Vladislav Mladenov, Juraj Somorovsky, and Jörg Schwenk. “SoK: Exploiting Network Printers.” In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017. <a href=\"https://doi.org/10.1109/sp.2017.47\">https://doi.org/10.1109/sp.2017.47</a>.","ieee":"J. Muller, V. Mladenov, J. Somorovsky, and J. Schwenk, “SoK: Exploiting Network Printers,” in <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017.","bibtex":"@inproceedings{Muller_Mladenov_Somorovsky_Schwenk_2017, title={SoK: Exploiting Network Printers}, DOI={<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>}, booktitle={2017 IEEE Symposium on Security and Privacy (SP)}, author={Muller, Jens and Mladenov, Vladislav and Somorovsky, Juraj and Schwenk, Jörg}, year={2017} }","mla":"Muller, Jens, et al. “SoK: Exploiting Network Printers.” <i>2017 IEEE Symposium on Security and Privacy (SP)</i>, 2017, doi:<a href=\"https://doi.org/10.1109/sp.2017.47\">10.1109/sp.2017.47</a>.","short":"J. Muller, V. Mladenov, J. Somorovsky, J. Schwenk, in: 2017 IEEE Symposium on Security and Privacy (SP), 2017.","apa":"Muller, J., Mladenov, V., Somorovsky, J., &#38; Schwenk, J. (2017). SoK: Exploiting Network Printers. In <i>2017 IEEE Symposium on Security and Privacy (SP)</i>. <a href=\"https://doi.org/10.1109/sp.2017.47\">https://doi.org/10.1109/sp.2017.47</a>"},"year":"2017","user_id":"83504","_id":"15895","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"2017 IEEE Symposium on Security and Privacy (SP)","status":"public"}]
