{"department":[{"_id":"76"}],"publication_identifier":{"isbn":["978-1-4503-4139-4"]},"_id":"20719","title":"An In-Depth Study of More Than Ten Years of Java Exploitation","keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"],"citation":{"apa":"Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–790. http://doi.acm.org/10.1145/2976749.2978361","mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–90, doi:http://doi.acm.org/10.1145/2976749.2978361.","ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS ’16. ; 2016:779-790. doi:http://doi.acm.org/10.1145/2976749.2978361","ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790, doi: http://doi.acm.org/10.1145/2976749.2978361.","chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–90. CCS ’16, 2016. http://doi.acm.org/10.1145/2976749.2978361.","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.","bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={http://doi.acm.org/10.1145/2976749.2978361}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }"},"user_id":"5786","date_created":"2020-12-14T11:58:33Z","status":"public","year":"2016","author":[{"first_name":"Philipp","last_name":"Holzinger","full_name":"Holzinger, Philipp"},{"full_name":"Triller, Stefan","last_name":"Triller","first_name":"Stefan"},{"first_name":"Alexandre","full_name":"Bartel, Alexandre","last_name":"Bartel"},{"full_name":"Bodden, Eric","id":"59256","last_name":"Bodden","first_name":"Eric","orcid":"0000-0003-3470-3647"}],"series_title":"CCS '16","doi":"http://doi.acm.org/10.1145/2976749.2978361","page":"779-790","publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","date_updated":"2022-01-06T06:54:34Z","language":[{"iso":"eng"}]}