Treffer 1 - 20 von 25.652

1

Java Platform Security: a Behavioral Model for Speculative Execution Vulnerabilities
Parekh, Shikha
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-7 Sep, 2025

Konferenz
Merkliste
2

An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.

Computer Science - Crypt... Computer Science - Compu... Computer Science - Compu...
Report
Merkliste
3

Symmaries: Automatic Inference of Formal Security Summaries for Java Programs
Khakpour, Narges ; Berthier, Nicolas

Cryptography and Securit... Formal Languages and Aut... Programming Languages Software Engineering
Report
Merkliste
4

Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System
Seth, Aishwarya ; Bhattacharya, Saikath ; Elder, Sarah ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Merkliste
5

Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects
Schott, Stefan ; Ponta, Serena Elisa ; Fischer, Wolfram ; et al.

Software Engineering Cryptography and Securit...
Report
Merkliste
6

Classport: Designing Runtime Dependency Introspection for Java
Cofano, Serena ; Williams, Daniel ; Sharma, Aman ; et al.

Software Engineering Cryptography and Securit...
Report
Merkliste
7

Maven-Lockfile: High Integrity Rebuild of Past Java Releases
Schmid, Larissa ; Lundell, Elias ; Gamage, Yogya ; et al.

Software Engineering Cryptography and Securit...
Report
Merkliste
8

DALEQ -- Explainable Equivalence for Java Bytecode
Dietrich, Jens ; Hassanshahi, Behnaz

Cryptography and Securit...
Report
Merkliste
9

Taxonomy of Security Weaknesses in Java and Kotlin Android Apps
Mazuera-Rozo, Alejandro ; Escobar-Velásquez, Camilo ; Espitia-Acero, Juan ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Merkliste
10

Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java
Schneider, Simon ; Scandariato, Riccardo

Computer Science - Softw...
Report
Merkliste
11

Deserialization Gadget Chains are not a Pathological Problem in Android:an In-Depth Study of Java Gadget Chains in AOSP
Kreyssig, Bruno ; Riom, Timothée ; Houy, Sabine ; et al.

Computer Science - Crypt...
Report
Merkliste
12

A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications
Elrakaiby, Yehia ; Traon, Yves Le
2013 International Conference on Availability, Reliability and Security Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. :367-374 Sep, 2013

Konferenz
Merkliste
13

Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java Code
Alqaradaghi, M. ; Kozsik, T.
IEEE Access Access, IEEE. 12:55824-55842 2024

Fachzeitschrift
Merkliste
14

Teaching Java security to enhance cybersecurity education
Haywood, Adley ; Yu, Huiming ; Yuan, Xiaohong
2013 Proceedings of IEEE Southeastcon Southeastcon, 2013 Proceedings of IEEE. :1-6 Apr, 2013

Konferenz
Merkliste
15

Dieses Ergebnis kann Gästen nicht angezeigt werden.

16

Sleeping Giants -- Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes
Kreyssig, Bruno ; Houy, Sabine ; Riom, Timothée ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Merkliste
17

An evaluation of Java application containers according to security requirements
Herzog, A. ; Shahmehri, N.
14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) Enabling Technologies Infrastructure for Collaborative Enterprises Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on. :178-183 2005

Konferenz
Merkliste
18

Dynamic Taint Tracking using Partial Instrumentation for Java Applications
Thakur, Manoj RameshChandra

Computer Science - Crypt... Computer Science - Progr... Computer Science - Softw...
Report
Merkliste
19

Using class decompilers to facilitate the security of Java applications!
Tam, V. ; Gupta, R.K.
Proceedings of the First International Conference on Web Information Systems Engineering Web information systems engineering Web Information Systems Engineering, 2000. Proceedings of the First International Conference on. 1:153-158 vol.1 2000

Konferenz
Merkliste
20

Supporting real world security models in Java
Welch, I. ; Stroud, R.
Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems Distributed computing systems Distributed Computing Systems, 1999. Proceedings. 7th IEEE Workshop on Future Trends of. :155-159 1999

Konferenz
Merkliste

Filter