Treffer 1 - 20 von 219.249

1

Java Platform Security: a Behavioral Model for Speculative Execution Vulnerabilities
Parekh, Shikha
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-7 Sep, 2025

Konferenz
Merkliste
2

An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.

Computer Science - Crypt... Computer Science - Compu... Computer Science - Compu...
Report
Merkliste
3

Symmaries: Automatic Inference of Formal Security Summaries for Java Programs
Khakpour, Narges ; Berthier, Nicolas

Cryptography and Securit... Formal Languages and Aut... Programming Languages Software Engineering
Report
Merkliste
4

Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System
Seth, Aishwarya ; Bhattacharya, Saikath ; Elder, Sarah ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Merkliste
5

Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects
Schott, Stefan ; Ponta, Serena Elisa ; Fischer, Wolfram ; et al.

Software Engineering Cryptography and Securit...
Report
Merkliste
6

Classport: Designing Runtime Dependency Introspection for Java
Cofano, Serena ; Williams, Daniel ; Sharma, Aman ; et al.

Software Engineering Cryptography and Securit...
Report
Merkliste
7

Maven-Lockfile: High Integrity Rebuild of Past Java Releases
Schmid, Larissa ; Lundell, Elias ; Gamage, Yogya ; et al.

Software Engineering Cryptography and Securit...
Report
Merkliste
8

DALEQ -- Explainable Equivalence for Java Bytecode
Dietrich, Jens ; Hassanshahi, Behnaz

Cryptography and Securit...
Report
Merkliste
9

Taxonomy of Security Weaknesses in Java and Kotlin Android Apps
Mazuera-Rozo, Alejandro ; Escobar-Velásquez, Camilo ; Espitia-Acero, Juan ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Merkliste
10

Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java
Schneider, Simon ; Scandariato, Riccardo

Computer Science - Softw...
Report
Merkliste
11

A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications
Elrakaiby, Yehia ; Traon, Yves Le
2013 International Conference on Availability, Reliability and Security Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. :367-374 Sep, 2013

Konferenz
Merkliste
12

Deserialization Gadget Chains are not a Pathological Problem in Android:an In-Depth Study of Java Gadget Chains in AOSP
Kreyssig, Bruno ; Riom, Timothée ; Houy, Sabine ; et al.

Computer Science - Crypt...
Report
Merkliste
13

Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java Code
Alqaradaghi, M. ; Kozsik, T.
IEEE Access Access, IEEE. 12:55824-55842 2024

Fachzeitschrift
Merkliste
14

Teaching Java security to enhance cybersecurity education
Haywood, Adley ; Yu, Huiming ; Yuan, Xiaohong
2013 Proceedings of IEEE Southeastcon Southeastcon, 2013 Proceedings of IEEE. :1-6 Apr, 2013

Konferenz
Merkliste
15

Dieses Ergebnis kann Gästen nicht angezeigt werden.

16

Sleeping Giants -- Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes
Kreyssig, Bruno ; Houy, Sabine ; Riom, Timothée ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Merkliste
17

An evaluation of Java application containers according to security requirements
Herzog, A. ; Shahmehri, N.
14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) Enabling Technologies Infrastructure for Collaborative Enterprises Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on. :178-183 2005

Konferenz
Merkliste
18

Java security: from HotJava to Netscape and beyond
Dean, D. ; Felten, E.W. ; Wallach, D.S.
Proceedings 1996 IEEE Symposium on Security and Privacy Security and privacy Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on. :190-200 1996

Konferenz
Merkliste
19

An evaluation of the Java security model
Sterbenz, A.
Proceedings 12th Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 1996., 12th Annual. :2-14 1996

Konferenz
Merkliste
20

Java Security: A Ten Year Retrospective
Gong, Li
2009 Annual Computer Security Applications Conference Computer Security Applications Conference, 2009. ACSAC '09. Annual. :395-405 Dec, 2009

Konferenz
Merkliste

Filter