YoVDO

An In-Depth Study of More Than Ten Years of Java Exploitation

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Software Development Courses Cybersecurity Courses Vulnerability Analysis Courses Java Security Courses

Course Description

Overview

Explore a comprehensive analysis of Java exploitation spanning over a decade in this conference talk presented at CCS 2016. Delve into the research conducted by Philipp Holzinger, Stefan Triller, Alexandre Bartel, and Eric Bodden, examining the evolution and patterns of Java security vulnerabilities. Gain insights into the authors' findings from their in-depth study, which covers various aspects of Java exploitation techniques, trends, and potential mitigation strategies. Learn about the implications of these exploits on Java security and discover how this research contributes to improving the overall security landscape of the Java ecosystem.

Syllabus

CCS 2016 - An In-Depth Study of More Than Ten Years of Java Exploitation


Taught by

ACM CCS

Related Courses

1C:Enterprise Junior Developer Course
Moscow Institute of Physics and Technology via Coursera
A Beginner’s Guide to Docker
Packt via FutureLearn
A Beginner’s Guide to Scrum Project Management
Packt via FutureLearn
Google Professional Cloud DevOps Engineer Certification Path Introduction (GCP DevOps Engineer Track Part 1)
A Cloud Guru
Introduction to Amazon CodeGuru
A Cloud Guru