{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:25:48Z","timestamp":1730298348863,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/sp.2017.16","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T20:34:26Z","timestamp":1498509266000},"page":"1027-1040","source":"Crossref","is-referenced-by-count":8,"title":["Hardening Java\u2019s Access Control by Abolishing Implicit Privilege Elevation"],"prefix":"10.1109","author":[{"given":"Philipp","family":"Holzinger","sequence":"first","affiliation":[]},{"given":"Ben","family":"Hermann","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Lerch","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[]},{"given":"Mira","family":"Mezini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74810-6_5"},{"key":"ref32","article-title":"Access control based on execution history","author":"abadi","year":"2003","journal-title":"Proceedings of the Network and Distributed System Security Symposium NDSS 2003 San Diego California USA The Internet Society"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1140543.1140550"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796804005453"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.10"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363520"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"journal-title":"Secure coding guidelines for Java SE","year":"0","key":"ref11"},{"journal-title":"Security Explorations-SE-2012-01 Details","year":"0","key":"ref12"},{"key":"ref13","article-title":"User interaction design for secure systems","author":"yee","year":"2002","journal-title":"Computer Science Division (EECS) University of California Tech Rep"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.44"},{"journal-title":"National Vulnerability Database","year":"0","key":"ref16"},{"key":"ref17","article-title":"The Soot framework for Java program analysis: a retrospective","author":"lam","year":"2011","journal-title":"Cetus Users and Compiler Infrastructure Workshop"},{"key":"ref18","first-page":"174","article-title":"Javassist-a reflection-based programming wizard for java","author":"chiba","year":"1998","journal-title":"Proceedings of OOPSLA98 Workshop on Reflective Programming in C++ and Java"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1711506.1711508"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/641909.641912"},{"journal-title":"Cisco 2014 Annual Security Report","year":"2014","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/4236.735987"},{"journal-title":"2013 ciscc annual security report","year":"2013","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/54289.871709","article-title":"The confused deputy:(or why capabilities might have been invented)","volume":"22","author":"hardy","year":"1988","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.08.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978361"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_16"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00236-1"},{"journal-title":"Inside Java 2 Platform Security Architecture API Design and Implementation","year":"2003","author":"gong","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2771284.2771286"},{"journal-title":"About Java","year":"0","key":"ref1"},{"journal-title":"Security Explorations-Security vulnerability notice","year":"0","key":"ref20"},{"journal-title":"The dacapo benchmark suite-#80 jython generates npe with eager compilation","year":"0","key":"ref22"},{"journal-title":"OpenJDK source releases-build b132","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2095050.2095100"},{"journal-title":"JUnit Benchmarks","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582452"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134776"}],"event":{"name":"2017 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2017,5,22]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7957740\/7958557\/07958623.pdf?arnumber=7958623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T05:55:17Z","timestamp":1623131717000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7958623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/sp.2017.16","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}