{"year":"2016","keyword":["ATTRACT","access control","exploits","java security","security analysis","ITSECWEBSITE"],"author":[{"last_name":"Holzinger","full_name":"Holzinger, Philipp","first_name":"Philipp"},{"last_name":"Triller","full_name":"Triller, Stefan","first_name":"Stefan"},{"first_name":"Alexandre","full_name":"Bartel, Alexandre","last_name":"Bartel"},{"first_name":"Eric","orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256"}],"department":[{"_id":"76"}],"status":"public","language":[{"iso":"eng"}],"page":"779-790","date_created":"2020-12-14T11:58:33Z","series_title":"CCS '16","type":"conference","user_id":"5786","doi":"http://doi.acm.org/10.1145/2976749.2978361","_id":"20719","date_updated":"2022-01-06T06:54:34Z","publication_identifier":{"isbn":["978-1-4503-4139-4"]},"citation":{"bibtex":"@inproceedings{Holzinger_Triller_Bartel_Bodden_2016, series={CCS ’16}, title={An In-Depth Study of More Than Ten Years of Java Exploitation}, DOI={http://doi.acm.org/10.1145/2976749.2978361}, booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, author={Holzinger, Philipp and Triller, Stefan and Bartel, Alexandre and Bodden, Eric}, year={2016}, pages={779–790}, collection={CCS ’16} }","ama":"Holzinger P, Triller S, Bartel A, Bodden E. An In-Depth Study of More Than Ten Years of Java Exploitation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS ’16. ; 2016:779-790. doi:http://doi.acm.org/10.1145/2976749.2978361","ieee":"P. Holzinger, S. Triller, A. Bartel, and E. Bodden, “An In-Depth Study of More Than Ten Years of Java Exploitation,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790, doi: http://doi.acm.org/10.1145/2976749.2978361.","short":"P. Holzinger, S. Triller, A. Bartel, E. Bodden, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–790.","apa":"Holzinger, P., Triller, S., Bartel, A., & Bodden, E. (2016). An In-Depth Study of More Than Ten Years of Java Exploitation. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–790. http://doi.acm.org/10.1145/2976749.2978361","mla":"Holzinger, Philipp, et al. “An In-Depth Study of More Than Ten Years of Java Exploitation.” Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 779–90, doi:http://doi.acm.org/10.1145/2976749.2978361.","chicago":"Holzinger, Philipp, Stefan Triller, Alexandre Bartel, and Eric Bodden. “An In-Depth Study of More Than Ten Years of Java Exploitation.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 779–90. CCS ’16, 2016. http://doi.acm.org/10.1145/2976749.2978361."},"title":"An In-Depth Study of More Than Ten Years of Java Exploitation","publication":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"}