Treffer 41 - 60 von 31.369

41

Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation
Cao, Sicong ; Sun, Xiaobing ; Wu, Xiaoxue ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
42

Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application
Elder, Sarah ; Zahan, Nusrat ; Shu, Rui ; et al.

Computer Science - Softw... Computer Science - Crypt... D.2.5
Report
Zu den Favoriten
43

CHERI JNI: Sinking the Java Security Model into the C
Chisnall, David ; Davis, Brooks ; Gudka, Khilan ; et al.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems. :569-583

46 Information and Compu... 0202 electrical engineer... 4604 Cybersecurity and P... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
44

ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing
Cao, Sicong ; He, Biao ; Sun, Xiaobing ; et al.

Computer Science - Crypt...
Report
Zu den Favoriten
45

Detecting Security Patches in Java Projects Using NLP Technology
Stefanoni, Andrea ; Girdzijauskas, Sarunas ; Jenkins, Christina ; et al.

E-Ressource
Zu den Favoriten
46

Challenges of Producing Software Bill Of Materials for Java
Balliu, Musard ; Baudry, Benoit ; Bobadilla, Sofia ; et al.
IEEE Security & Privacy, 2023

Computer Science - Softw... Computer Science - Crypt...
Report
Zu den Favoriten
47

Security arrests in Malaysia
Adam Matthew Digital (Firm), digitiser

Buch
Zu den Favoriten
48

An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities
Sayar, Imen ; Bartel, Alexandre ; Bodden, Eric ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
49

Java File Security System (JFSS) Evaluation Using Software Engineering Approaches
Kahanwal, Brijender ; Singh, Tejinder Pal
International Journal of Advanced Research in Computer Science & Software Engineering, 2(1), pp. 132-137, 2012

Computer Science - Softw...
Report
Zu den Favoriten
50

Example-Based Vulnerability Detection and Repair in Java Code
Zhang, Ying ; Xiao, Ya ; Kabir, Md Mahir Asef ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
51

A formal dynamic semantics of Java: an essential ingredient of Java security
Mourad Debbabi ; Nadia Tawbi ; Hamdi Yahyaoui
Journal of Telecommunications and Information Technology, Iss 4 (2002)

static analysis operational semantics Telecommunication security dynamic semantics TK5101-6720
Fachzeitschrift
Zu den Favoriten
52

To what extent can we analyze Kotlin programs using existing Java taint analysis tools? (Extended Version)
Krishnamurthy, Ranjith ; Piskachev, Goran ; Bodden, Eric

Computer Science - Progr... Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten
53

An experimental environment for teaching Java security
DENTI, ENRICO ; LASCHI, ROBERTO ; RICCIONI, ANNA
Proceedings of the 6th international symposium on Principles and practice of programming in Java. :13-22

JAVA CRYPTOGRAPHY EXTENS... COMPUTER ENGINEERING EDU... VIRTUAL LABORATORY 05 social sciences 0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
54

Java Card Virtual Machine Memory Organization: a Design Proposal
Bouffard, Guillaume ; Giraud, Vincent ; Gaspard, Léo

Computer Science - Crypt...
Report
Zu den Favoriten
55

Towards the Detection of Malicious Java Packages
Ladisa, Piergiorgio ; Plate, Henrik ; Martinez, Matias ; et al.

Computer Science - Crypt...
Report
Zu den Favoriten
56

Water security on Java island*.
Hasan, Mohamad ; Ridwan, Dadang
Irrigation & Drainage. Jul2021, Vol. 70 Issue 3, p370-379. 10p.

Water security Water supply Rice Land subsidence Private communities Indonesia
Fachzeitschrift
Zu den Favoriten
57

Security Matters: Safeguarding Java Applications in an Era of Increasing Cyber Threats
Pavani Surarapu
Asian Journal of Applied Science and Engineering. 6:169-176

Fachzeitschrift
Zu den Favoriten
58

Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks
Afrose, Sharmin ; Xiao, Ya ; Rahaman, Sazzadur ; et al.

Computer Science - Crypt...
Report
Zu den Favoriten
59

Exclusion, Inclusion and Social Security in Central Java
Koning, Juliette, author ; Koning, Juliette, editor ; Hüsken, Frans, editor
Ropewalking and Safety Nets: Local Ways of Managing Insecurities in Indonesia. :27-53

Buch
Zu den Favoriten
60

Data-Driven Vulnerability Detection and Repair in Java Code
Zhang, Ying ; Kabir, Mahir ; Xiao, Ya ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Zu den Favoriten

Filter