[{"language":[{"iso":"eng"}],"keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"],"department":[{"_id":"76"}],"user_id":"5786","series_title":"CCS '16","_id":"20719","status":"public","publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","doi":"http://doi.acm.org/10.1145/2976749.2978361","title":"An In-Depth Study of More Than Ten Years of Java Exploitation","date_created":"2020-12-14T11:58:33Z","author":[{"last_name":"Holzinger","full_name":"Holzinger, Philipp","first_name":"Philipp"},{"first_name":"Stefan","last_name":"Triller","full_name":"Triller, Stefan"},{"first_name":"Alexandre","last_name":"Bartel","full_name":"Bartel, Alexandre"},{"id":"59256","full_name":"Bodden, Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"}],"date_updated":"2022-01-06T06:54:34Z","page":"779-790","citation":{"ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>. CCS ’16. ; 2016:779-790. doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>","chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–90. CCS ’16, 2016. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–790, doi: <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 2016, pp. 779–90, doi:<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>.","bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={<a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.","apa":"Holzinger, P., Triller, S., Bartel, A., &#38; Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. <i>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</i>, 779–790. <a href=\"http://doi.acm.org/10.1145/2976749.2978361\">http://doi.acm.org/10.1145/2976749.2978361</a>"},"year":"2016","publication_identifier":{"isbn":["978-1-4503-4139-4"]}}]
