An In-Depth Study of More Than Ten Years of Java Exploitation

P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.

Download
No fulltext has been uploaded.
Conference Paper | English
Author
; ; ;
Publishing Year
Proceedings Title
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Page
779-790
LibreCat-ID

Cite this

Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS ’16. ; 2016:779-790. doi:http://doi.acm.org/10.1145/2976749.2978361
Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 779–790). http://doi.acm.org/10.1145/2976749.2978361
@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={http://doi.acm.org/10.1145/2976749.2978361}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }
Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–90. CCS ’16, 2016. http://doi.acm.org/10.1145/2976749.2978361.
P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.
Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–90, doi:http://doi.acm.org/10.1145/2976749.2978361.

Export

Marked Publications

Open Data LibreCat

Search this title in

Google Scholar
ISBN Search