Java Reference
In-Depth Information
[Long 2012]
Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and
David Svoboda.
The CERT
®
Oracle
®
Secure Coding Standard for Java
™
. Boston, MA:
Addison-Wesley (2012).
[Manion 2013]
Manion, Art. “Anatomy of Java Exploits,” CERT/CC Blog (2013).
[McGraw 1999]
McGraw,Gary,andEdFelten.
Securing Java: Getting Down to Business
with Mobile Code, Second Edition
. New York, NY: Wiley (1999).
[Mettler 2010]
Mettler,Adrian,andDavidWagner.“ClassPropertiesforSecurityReview
inanObject-CapabilitySubsetofJava.”
Proceedings of the 5th ACM SIGPLAN Workshop
on Programming Languages and Analysis for Security (PLAS '10)
. New York, NY:
ACM
(2010).
DOI:
10.1145/1814217.1814224.
[Miller 2009]
Miller, Alex. Java
™
Platform Concurrency Gotchas. JavaOne Conference
(2009).
[Netzer 1992]
Netzer, Robert H. B., and Barton P. Miller. “What Are Race Conditions?
Some Issues and Formalization.”
ACM Letters on Programming Languages and Systems
1(1):74-88 (1992).
http://dl.acm.org/citation.cfm?id=130616.130623
[Oaks 2001]
Oaks, Scott.
Java
™
Security
. Sebastopol, CA: O'Reilly (2001).
[Oracle 2010a]
JavaSE6HotSpot
™
VirtualMachineGarbageCollection Tuning.Oracle
[Oracle 2010b]
New I/O APIs. Oracle (2010).
http://docs.oracle.com/javase/1.5.0/docs/
[Oracle 2011b]
Java SE 6 Documentation. Oracle (2011).
http://docs.oracle.com/javase/
[Oracle 2011c]
Packagejavax.servlet.http.Oracle(2011).
http://docs.oracle.com/javaee/6/
[Oracle 2011d]
Permissions in the Java
™
SE 6 Development Kit (JDK). Oracle (2011).
[Oracle 2013a]
API for Privileged Blocks. Oracle (2013).
http://download.java.net/jdk8/
[Oracle 2013b]
“ReadingASCIIPasswordsfromanInputStreamExample,”Java
™
Cryp-
tography Architecture (JCA) Reference Guide. Oracle (2013).
http://docs.oracle.com/