Showing 1 - 20 of 31,369

1

An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.

Computer Science - Crypt... Computer Science - Compu... Computer Science - Compu...
Report
Save to List
2

Symmaries: Automatic Inference of Formal Security Summaries for Java Programs
Khakpour, Narges ; Berthier, Nicolas

Cryptography and Securit... Formal Languages and Aut... Programming Languages Software Engineering
Report
Save to List
3

An Investigation into Misuse of Java Security APIs by Large Language Models
Zahra Mousavi ; Chadni Islam ; Kristen Moore ; et al.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. :1299-1315

FOS: Computer and inform... Computer Science - Compu... Computer Science - Crypt... Computer Science - Compu... Computers and Society (c... Cryptography and Securit...
Academic journal
Save to List
6

Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects
Schott, Stefan ; Ponta, Serena Elisa ; Fischer, Wolfram ; et al.

Software Engineering Cryptography and Securit...
Report
Save to List
7

Classport: Designing Runtime Dependency Introspection for Java
Cofano, Serena ; Williams, Daniel ; Sharma, Aman ; et al.

Software Engineering Cryptography and Securit...
Report
Save to List
8

Maven-Lockfile: High Integrity Rebuild of Past Java Releases
Schmid, Larissa ; Lundell, Elias ; Gamage, Yogya ; et al.

Software Engineering Cryptography and Securit...
Report
Save to List
9

DALEQ -- Explainable Equivalence for Java Bytecode
Dietrich, Jens ; Hassanshahi, Behnaz

Cryptography and Securit...
Report
Save to List
10

Taxonomy of Security Weaknesses in Java and Kotlin Android Apps
Mazuera-Rozo, Alejandro ; Escobar-Velásquez, Camilo ; Espitia-Acero, Juan ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Save to List
12
13

Sleeping Giants -- Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes
Kreyssig, Bruno ; Houy, Sabine ; Riom, Timothée ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Save to List
14

Detecting Security Patches in Java Projects Using NLP Technology
Andrea Stefanoni ; Šarūnas Girdzijauskas ; Christina Jenkins ; et al.

Natural Language Process... Security Code analysis Java Transformer LSTM
Conference
Save to List
15

Dynamic Taint Tracking using Partial Instrumentation for Java Applications
Thakur, Manoj RameshChandra

Computer Science - Crypt... Computer Science - Progr... Computer Science - Softw...
Report
Save to List
16

Concurrent Programs, Finalizers and Cleaners in Java - Security Problems
Jerzy Krawiec ; Piotr Gorny ; Maciej Kiedrowicz
Communications in Computer and Information Science ISBN: 9783031628429

Book
Save to List
17

Practical Bootcamp JWT authentication with Java and SpringBoot
API security: JWT & SpringBoot

Packt Publishing, publisher, production company. ; Pandey, Ranjan, speaker, instructor.

Video Recording
Save to List
18

From Struggle to Simplicity with a Usable and Secure API for Encryption in Java
Firouzi, Ehsan ; Mansuri, Ammar ; Ghafari, Mohammad ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Save to List
19

Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics
Paramitha, Ranindya ; Feng, Yuan ; Massacci, Fabio ; et al.

Computer Science - Softw... Computer Science - Crypt... D.2.8, D.3.2, D.2.0
Report
Save to List
20

A Java Data Security Framework (JDSF) and its Case Studies
Mokhov, Serguei A. ; Huynh, Lee Wei ; Li, Jian ; et al.

Computer Science - Crypt... Computer Science - Softw...
Report
Save to List

Filter