{"status":"public","date_created":"2020-12-14T11:58:33Z","user_id":"5786","doi":"http://doi.acm.org/10.1145/2976749.2978361","department":[{"_id":"76"}],"publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"],"type":"conference","date_updated":"2022-01-06T06:54:34Z","year":"2016","publication_identifier":{"isbn":["978-1-4503-4139-4"]},"language":[{"iso":"eng"}],"title":"An In-Depth Study of More Than Ten Years of Java Exploitation","_id":"20719","series_title":"CCS '16","citation":{"chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–90. CCS ’16, 2016. http://doi.acm.org/10.1145/2976749.2978361.","mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–90, doi:http://doi.acm.org/10.1145/2976749.2978361.","ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790, doi: http://doi.acm.org/10.1145/2976749.2978361.","apa":"Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–790. http://doi.acm.org/10.1145/2976749.2978361","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.","ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS ’16. ; 2016:779-790. doi:http://doi.acm.org/10.1145/2976749.2978361","bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={http://doi.acm.org/10.1145/2976749.2978361}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }"},"author":[{"full_name":"Holzinger, Philipp","first_name":"Philipp","last_name":"Holzinger"},{"full_name":"Triller, Stefan","first_name":"Stefan","last_name":"Triller"},{"first_name":"Alexandre","last_name":"Bartel","full_name":"Bartel, Alexandre"},{"last_name":"Bodden","first_name":"Eric","full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647"}],"page":"779-790"}