An In-Depth Study of More Than Ten Years of Java Exploitation
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a comprehensive analysis of Java exploitation spanning over a decade in this conference talk presented at CCS 2016. Delve into the research conducted by Philipp Holzinger, Stefan Triller, Alexandre Bartel, and Eric Bodden, examining the evolution and patterns of Java security vulnerabilities. Gain insights into the authors' findings from their in-depth study, which covers various aspects of Java exploitation techniques, trends, and potential mitigation strategies. Learn about the implications of these exploits on Java security and discover how this research contributes to improving the overall security landscape of the Java ecosystem.
Syllabus
CCS 2016 - An In-Depth Study of More Than Ten Years of Java Exploitation
Taught by
ACM CCS
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network