Java and Java Virtual Machine security vulnerabilities and their exploitation techniques
暂无分享,去创建一个
[1] Drew Dean,et al. The security of static typing with dynamic linking , 1997, CCS '97.
[2] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.
[3] Karen R. Sollins,et al. Expanding and Extending the Security Features of Java , 1998, USENIX Security Symposium.
[4] Gary McGraw,et al. Securing Java: getting down to business with mobile code , 1999 .
[5] Andrew W. Appel,et al. Formal aspects of mobile code security , 1999 .
[6] Vipin Chaudhary,et al. History-based access control for mobile code , 1998, CCS '98.
[7] Laurie J. Hendren,et al. SableVM: A Research Framework for the Efficient Execution of Java Bytecode , 2001, Java Virtual Machine Research and Technology Symposium.
[8] M. Hagiya,et al. Formalization and Analysis of Class Loading in Java , 2002, High. Order Symb. Comput..
[9] David A. Wheeler,et al. Secure Programming for Linux and Unix HOWTO , 2003 .