2005
DOI: 10.21236/ada443139
|View full text |Cite
|
Sign up to set email alerts
|

Software Vulnerabilities in Java

Abstract: Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder. Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is granted, provided the copyright and "No Warranty" statements are included with all reproductions and derivative works.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
2

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 0 publications
0
4
0
2
Order By: Relevance
“…Prior studies showed that API misuses caused security vulnerabilities [5], [7], [35], [46]- [50]. For instance, Lazar et al analyzed 369 published cryptographic vulnerabilities in the CVE database, and found that 83% of them were caused by API misuses [48].…”
Section: Related Work a Security Api Misusesmentioning
confidence: 99%
“…Prior studies showed that API misuses caused security vulnerabilities [5], [7], [35], [46]- [50]. For instance, Lazar et al analyzed 369 published cryptographic vulnerabilities in the CVE database, and found that 83% of them were caused by API misuses [48].…”
Section: Related Work a Security Api Misusesmentioning
confidence: 99%
“…Prior studies showed that the API misuse of cryptography, SSL, and Java reflection caused many security vulnerabilities [63,86,88,101]. For instance, Long identified several Java features whose misuse or improper implementation can compromise security [88].…”
Section: Analyzing Security Vulnerabilitiesmentioning
confidence: 99%
“…Bien que le langage Java ai été conçu pour être sécurisé, il comporte un certain nombre de vulnérabilités recensées dans la litérature (The Last Stage of Delirium. Research Group., 2002, Long, 2005, Lai, 2008. Les applications Java doivent donc être développées de manière à ce que ces vulnérabilités ne soient pas exploitables.…”
Section: Vulnerabilités Des Applications à Composants Javaunclassified
“…En particulier, un certain nombre de mécanismes standards du langage Java et de la JVM peuvent être exploités pour subvertir le système (Long, 2005) :…”
Section: Vulnerabilités Des Applications à Composants Javaunclassified