Treffer 1 - 20
von 219.249
Java Platform Security: a Behavioral Model for Speculative Execution Vulnerabilities
Parekh, Shikha
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-7 Sep, 2025
An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.
Symmaries: Automatic Inference of Formal Security Summaries for Java Programs
Khakpour, Narges ; Berthier, Nicolas
Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System
Seth, Aishwarya ; Bhattacharya, Saikath ; Elder, Sarah ; et al.
Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects
Schott, Stefan ; Ponta, Serena Elisa ; Fischer, Wolfram ; et al.
Classport: Designing Runtime Dependency Introspection for Java
Cofano, Serena ; Williams, Daniel ; Sharma, Aman ; et al.
Maven-Lockfile: High Integrity Rebuild of Past Java Releases
Schmid, Larissa ; Lundell, Elias ; Gamage, Yogya ; et al.
DALEQ -- Explainable Equivalence for Java Bytecode
Dietrich, Jens ; Hassanshahi, Behnaz
Taxonomy of Security Weaknesses in Java and Kotlin Android Apps
Mazuera-Rozo, Alejandro ; Escobar-Velásquez, Camilo ; Espitia-Acero, Juan ; et al.
Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java
Schneider, Simon ; Scandariato, Riccardo
A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications
Elrakaiby, Yehia ; Traon, Yves Le
2013 International Conference on Availability, Reliability and Security Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. :367-374 Sep, 2013
Deserialization Gadget Chains are not a Pathological Problem in Android:an In-Depth Study of Java Gadget Chains in AOSP
Kreyssig, Bruno ; Riom, Timothée ; Houy, Sabine ; et al.
Comprehensive Evaluation of Static Analysis Tools for Their Performance in Finding Vulnerabilities in Java Code
Alqaradaghi, M. ; Kozsik, T.
IEEE Access Access, IEEE. 12:55824-55842 2024
Teaching Java security to enhance cybersecurity education
Haywood, Adley ; Yu, Huiming ; Yuan, Xiaohong
2013 Proceedings of IEEE Southeastcon Southeastcon, 2013 Proceedings of IEEE. :1-6 Apr, 2013
Sleeping Giants -- Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes
Kreyssig, Bruno ; Houy, Sabine ; Riom, Timothée ; et al.
An evaluation of Java application containers according to security requirements
Herzog, A. ; Shahmehri, N.
14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) Enabling Technologies Infrastructure for Collaborative Enterprises Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on. :178-183 2005
Java security: from HotJava to Netscape and beyond
Dean, D. ; Felten, E.W. ; Wallach, D.S.
Proceedings 1996 IEEE Symposium on Security and Privacy Security and privacy Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on. :190-200 1996
An evaluation of the Java security model
Sterbenz, A.
Proceedings 12th Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 1996., 12th Annual. :2-14 1996
Java Security: A Ten Year Retrospective
Gong, Li
2009 Annual Computer Security Applications Conference Computer Security Applications Conference, 2009. ACSAC '09. Annual. :395-405 Dec, 2009