Java Reference
In-Depth Information
[Guillardoy 2012]
Guillardoy, Esteban. Java 0Day Analysis (CVE-2012-4681). (2012).
[Hatton 1995]
Hatton, Les.
Safer C: Developing Software for High-integrity and Safety-
critical Systems
. New York, NY: McGraw-Hill, (1995).
[Hawtin 2006]
Hawtin, Thomas. [drlvm][kernel_classes] ThreadLocal Vulnerability.
MarkMail (2006).
http://markmail.org/message/4scermxmn5oqhyi
[Havelund 2009]
Havelund, Klaus, and Al Niessner. JPL Coding Standard, Version
1.1. California Institute of Technology (2009).
http://lars-lab.jpl.nasa.gov/
[Hirondelle 2013]
Passwords Never Clear in Text. Hirondelle Systems (2013).
[ISO/IEC 9126-1:2001]
Software Engineering—Product Quality, Part 1, Quality Model
(ISO/IEC 9126-1:2001). Geneva, Switzerland: International Organization for Standardiz-
ation (2001).
[ISO/IEC/IEEE 24765:2010]
Software Engineering—Product Quality, Part 1, Quality
Model
(ISO/IEC/IEEE 24765:2010). Geneva, Switzerland: International Organization for
Standardization (2010).
[JLS 2013]
Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley.
The Java Language Specification: Java SE 7 Edition. Oracle America, Inc. (2013).
ht-
[JVMSpec 1999]
The Java
™
Virtual Machine Specification, Second Edition. Sun Mi-
crosystems, Inc. (1999).
http://docs.oracle.com/javase/specs/
[Kalinovsky 2004]
Kalinovsky, Alex.
Covert Java
™
: Techniques for Decompiling,
Patching, and Reverse Engineering
. Indianapolis, IN: SAMS (2004).
[Knoernschild 2002]
Knoernschild, Kirk.
Java
™
Design: Objects, UML, and Process
.
Boston, MA: Addison-Wesley (2002).
[Lea 2000]
Lea, Doug.
Concurrent Programming in Java
™
: Design Principles and Pat-
terns, Second Edition
. Boston, MA: Addison-Wesley (2000).
[Lo 2005]
Lo,Chia-TienDan,WitawasSrisa-an,andJ.MorrisChang.“SecurityIssuesin
Garbage Collection.”
STSC Crosstalk
(2005).
www.eng.auburn.edu/users/hamilton/secur-
STSC%20CrossTalk%20-%20Security%20Issues%20in%20Garbage%20Collection%20-%20Oct%a02005.pdf