[{"status":"public","publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","language":[{"iso":"eng"}],"keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"],"department":[{"_id":"76"}],"series_title":"CCS '16","user_id":"5786","_id":"20719","page":"779-790","citation":{"bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.","mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–90, doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","apa":"Holzinger, P., Triller, S., Bartel, A., &#38; Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–790. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>","chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–90. CCS ’16, 2016. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–790, doi: <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>. CCS ’16. ; 2016:779-790. doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>"},"year":"2016","publication_identifier":{"isbn":["978-1-4503-4139-4"]},"doi":"http://doi.acm.org/10.1145/2976749.2978361","title":"An In-Depth Study of More Than Ten Years of Java Exploitation","date_created":"2020-12-14T11:58:33Z","author":[{"full_name":"Holzinger, Philipp","last_name":"Holzinger","first_name":"Philipp"},{"full_name":"Triller, Stefan","last_name":"Triller","first_name":"Stefan"},{"full_name":"Bartel, Alexandre","last_name":"Bartel","first_name":"Alexandre"},{"first_name":"Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647","full_name":"Bodden, Eric","id":"59256"}],"date_updated":"2022-01-06T06:54:34Z"}]
