[Abadi 1996] Martin Abadi and Roger Needham, Prudent Engineering Practice for Cryptographic Protocols,
IEEE Transactions on Software Engineering, Volume 22, Issue 1, 1996,
6 - 156–15.
Anchor |
---|
| AndroidAPI 13 |
---|
| AndroidAPI 13 |
---|
|
[Android API 2013]
Android API.
developer.android.com/reference Package Index, Android, 2013.
Anchor |
---|
| AndroidGuides 13 |
---|
| AndroidGuides 13 |
---|
|
[Android Guide 2013]
Android API Guides,
developer.android.com/guide/ Introduction to Android, Android
, 2013.
[Apache 2014]
Apache Tika: A Content Analysis Toolkit, Apache Software Foundation, 2014.
...
[API 2013]
Java Platform, Standard Edition 7 API Specification, Oracle
, 2012, 2013. [Arnold 2006] Ken Arnold, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed., Addison-Wesley, Boston, 2006.
[Austin 2000] Calvin Austin and Monica Pawlan,
Advanced Programming for the Java 2 Platform, Addison-Wesley Longman, Boston, 2000.
[Black 2004] Paul E. Black and Paul J. Tanenbaum,
partial order, in
Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology, December 17, 2004.
Available at http://xlinux.nist.gov/dads/HTML/partialorder.html. [Black 2006] Paul E. Black and Paul J. Tanenbaum,
total order, in
Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. March 30, 2006.
Available at http://xlinux.nist.gov/dads/HTML/totalorder.html. [Bloch 2001] Joshua Bloch,
Effective Java: Programming Language Guide, Addison-Wesley Professional, Boston, 2001.
...
[Bloch 2008] Joshua Bloch,
Effective JavaJava™: Programming Language Guide, 2nd ed., Addison-Wesley Professional, Boston, 2008.
...
[CCITT 1988]
International Telegraph and Telephone Consultative Committee (CCITT
).
CCITT Blue Book, Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework, International Telecommunication Union, Geneva, 1988.
[Chan 1999] Patrick Chan, Rosanna Lee, and Douglas Kramer,
The Java Class Libraries: Supplement for the Java 2 Platform,
v1Volume 1.2, 2nd ed.
, Volume 1, Prentice Hall, Upper Saddle River, NJ, 1999.
[Chess 2007] Brian Chess and Jacob West,
Secure Programming with Static Analysis, Addison-Wesley Professional, Boston,
MA, 2007.
[Chin 2011] Erika Chin, Adrienne Porter Felt, Kate Greenwood, and David Wagner,
Analyzing Inter-Application Communication in Android,
Proc. MobiSys '11: Proceedings of the 9th international conference International Conference on Mobile systemsSystems, applicationsApplications, and servicesServices, pp.
239-252239–252, ACM, New York
, NY, 2011.
Anchor |
---|
| Christudas 05 |
---|
| Christudas 05 |
---|
|
[Christudas 2005]
Internals of Java Class Loading, ONJava, 2005.
...
Anchor |
---|
| Conventions 09 |
---|
| Conventions 09 |
---|
|
[Conventions 2009]
Code Conventions for the Java Programming Language, Sun Microsystems, 2009.
[CVE 2011] Common Vulnerabilities and Exposures, MITRE Corporation, 2011. Available at http://cve.mitre.org. [Coomes 2007] John Coomes, Peter Kessler, and Tony Printezis,
Garbage Collection-Friendly Programming, Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference, 2007.
[Core Java 2004] Cay S. Horstmann and Gary Cornell,
Core Java™ 2, Volume I, Fundamentals, 7th ed., Prentice Hall PTR, Boston, 2004.
[Coverity 2007] Coverity Prevent User's Manual (3.3.0). Coverity, 2007. Anchor |
---|
| Cunningham 95 |
---|
| Cunningham 95 |
---|
|
[Cunningham 1995] Ward Cunningham, The CHECKS Pattern Language of Information Integrity, in
Pattern Languages of Program Design, James O
. Coplien and Douglas C
. Schmidt (eds.), Addison-Wesley Professional, Reading, MA, 1995
. [CVE 2011] Common Vulnerabilities and Exposures, MITRE Corporation, 2011.
[Daconta 2000] Michael C. Daconta,
When Runtime.exec() Won't, JavaWorld.com, 2000.
[Daconta 2003] Michael C. Daconta, Kevin T. Smith, Donald Avondolio, and W. Clay Richardson,
More Java Pitfalls, Wiley
Publishing, New York, 2003.
[Darwin 2004] Ian F. Darwin,
Java Cookbook, O'Reilly, Sebastopol, CA, 2004.
...
[Dennis 1966] Jack B. Dennis and Earl C. Van Horn,
Programming Semantics for Multiprogrammed Computations,
Communications of the ACM, Volume 9, Issue 3, March 1966, pp.
143-155143–155, DOI=10.1145/365230.365252.
...
[Eclipse 2008] The Eclipse Platform, 2008.
[Egele 2013] Manuel Egele, David Brumley, Yanick Fratantonio, and Christopher Kruegel. An Empirical Study of Cryptographic Misuse in Android Applications, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp.73-8473–84, 2013.
[EMA 2011]
Java SE 6 Documentation, Extension Mechanism Architecture, Sun Microsystems, 2011.
[Enck 2009] William Enck, Machigar Ongtang, Patrick Drew McDaniel, and others. Understanding Android Security, IEEE Security & Privacy, vol. 7, 1, p. 50-5750–57, 2009.
[Encodings 2006]
Supported Encodings, Sun Microsystems, 2006.
Anchor |
---|
| Enterprise 03 |
---|
| Enterprise 03 |
---|
|
...
[ESA 2005]
Java Coding Standards, prepared by European Space Agency (ESA) Board for Software Standardisation and Control (BSSC), 2005.
[Fahl 2012] Fahl, Sascha, et al. "Why Eve and Mallory love Android: An analysis of Android SSL (in) security." Proceedings of the 2012 ACM conference Conference on Computer and communications securityCommunications Security. ACM, 2012.
[Fairbanks 2007]
Design Fragments, Defense Technical Information Center, Ft. Belvoir, VA, 2007.
...
[Fisher 2003] Maydene Fisher, Jon Ellis, and Jonathan Bruce,
JDBC API Tutorial and Reference, 3rd ed., Addison-Wesley, Boston,
MA, 2003.
[Flanagan 2005] David Flanagan,
Java in a Nutshell, 5th ed., O'Reilly, Sebastopol, CA, 2005.
...
[Fortify
20082014]
A Taxonomy of Coding Errors that That Affect Security, Java/JSP, Fortify Software,
20082014.
[Fox 2001] Joshua Fox,
When Is a Singleton Not a Singleton?, Sun Developer Network, 2001.
...
[Gamma 1995] Erich Gamma, Richard Helm, Ralph Johnson, and John M. Vlissides,
Design Patterns: Elements of Reusable Object-Oriented Software, Addison-Wesley Professional, Boston
, MA, 1995.
[Garfinkel 1996] Simson Garfinkel and Gene Spafford,
Practical UNIX & Internet Security, 2nd ed., O'Reilly, Sebastopol, CA, 1996.
[Garms 2001] Jess Garms and Daniel Somerfield,
Professional Java Security, Wrox Press, Chicago, 2001.
[GNU 2013] GNU Coding Standards, Section 5.3, "Clean Use of C Constructs," Richard Stallman and other GNU Project volunteers, 2013 [Goetz 2002] Brian Goetz,
Java Theory and Practice: Don't Let the "this" Reference Escape during Construction, IBM developerWorks (Java technology), 2002.
...
[Goetz 2006a] Brian Goetz, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea,
Java Concurrency in Practice, Addison-Wesley Professional, Boston
, MA, 2006.
[Goetz 2006b] Brian Goetz,
Java Theory and Practice: Good Housekeeping Practices, IBM developerWorks (Java technology), 2006.
...
[Gong 2003] Li Gong, Gary Ellison, and Mary Dageforde,
Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed., Prentice Hall, Boston
, MA, 2003.
[Goodliffe 2014] Pete Goodliffe, Code Craft: The Practice of Writing Excellent Code, No Starch Press, San Francisco, 2007 [Grand 2002] Mark Grand,
Patterns in Java, Volume 1, 2nd ed., Wiley, New York, 2002.
...
[Grosso 2001] William Grosso,
Java RMI, O'Reilly, Sebastopol, CA, 2001.
[Grubb 2003] Penny Grubb and Armstrong A. Takang, Software Maintenance: Concepts and Practice, 2nd ed., World Scientific, River Edge, NJ, 2003. Anchor |
---|
| Guillardoy 12 |
---|
| Guillardoy 12 |
---|
|
[Guillardoy 2012] Esteban Guillardoy, Java 0Day Analysis (CVE-2012-4681), 2012. [Gupta [Gupta 2005] Satish Chandra Gupta and Rajeev Palanki,
Java Memory Leaks - Catch Me If You Can, 2005.
...
[Haggar 2000] Peter Haggar,
Practical Java™ Programming Language Guide, Addison-Wesley Professional, Boston,
MA, 2000.
[Halloway 2000] Stuart Halloway,
Java Developer Connection Tech Tips, March 28, 2000.
...
[Harold 2006] Elliotte Rusty Harold,
Java I/O, 2nd ed., O'Reilly, Sebastopol, CA,
20062006. [Hatton 1995] Les Hatton, Safer C: Developing Software for High-Integrity and Safety-Critical Systems, McGraw-Hill, New York, 1995.
[Hawtin 2008] Thomas Hawtin, Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities, Sun Microsystems, Make it Fly 2008, London. 2008, 2008.
[Havelund 2009] Klaus Havelund and Al Niessner, JPL Coding Standard, version 1.1, California Institute of Technology, 2009.
[Heffley 2004] J. Heffley and P. Meunier, Can Source Code Auditing Software Identify Common Vulnerabilities and Be Used to Evaluate Software Security?
Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS–04), Track 9, Volume 9, IEEE Computer Society, January 2004.
[Henney 2003] Kevlin Henney,
Null Object, Something for Nothing, 2003
. Anchor |
---|
| Hirondelle 13 |
---|
| Hirondelle 13 |
---|
|
[Hirondelle 2013] Passwords Never Clear in Text, Hirondelle Systems, 2013.
[Hitchens 2002] Ron Hitchens, Java™ NIO, O'Reilly, Sebastopol, CA, 2002.
...
[JPL 2006] Ken Arnold, James Gosling, and David Holmes,
The Java™ Programming Language, 4th ed., Addison-Wesley Professional, Boston
, MA, 2006.
[JSR-133 2004]
JSR-133: Java™ Memory Model and Thread Specification, 2004.
...
Anchor |
---|
| Kalinovsky 04 |
---|
| Kalinovsky 04 |
---|
|
[Kalinovsky 2004] Alex Kalinovsky,
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering, SAMS Publishing, Boston, 2004.
...
Anchor |
---|
| Knoernschild 01 |
---|
| Knoernschild 01 |
---|
|
[Knoernschild 2001] Kirk Knoernschild,
Java™ Design: Objects, UML, and Process, Addison-Wesley Professional, Boston
, MA, 2001.
...
[Laplante 2005] Phillip A. Laplante, Colin J. Neill,
Antipatterns: Identification, Refactoring, and Management, Auerbach Publications,
Boca Raton, FL, 2005.
[Lea 2000a] Doug Lea,
Concurrent Programming in Java, 2nd ed., Addison-Wesley Professional, Boston
, MA, 2000.
[Lea 2000b] Doug Lea and William Pugh,
Correct and Efficient Synchronization of Java™ Technology based Threads, JavaOne Conference, 2000.
...
[MITRE 2011] MITRE Corporation,
Common Weakness Enumeration, 2011
. Available at http://cwe.mitre.org/. [Mocha 2007]
Mocha, the Java Decompiler, 2007.
...
[Neward 2004] Ted Neward,
Effective Enterprise Java, Addison-Wesley Professional, Boston,
MA, 2004.
Anchor |
---|
| Nisewanger 07 |
---|
| Nisewanger 07 |
---|
|
[Nisewanger 2007] Jeff Nisewanger,
Avoiding Antipatterns, JavaOne Conference, 2007.
...
[Oracle 2011c]
Package javax.servelt.http,
Oracle Corporation, Oracle 2011.
[Oracle 2011d]
Permissions in the Java™ SE 6 Development Kit (JDK), Oracle, 2011.
...
[Philion 2003] Paul Philion,
Beware the dangers Dangers of generic Generic Exceptions, JavaWorld.com, 2003.
...
[Pistoia 2004] Marco Pistoia, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin, Enterprise
Java Security: Building Secure J2EE Applications, Addison-Wesley Professional, Boston
, MA, 2004.
[Policy 2002] Sun Microsystems,
Default Policy Implementation and Policy File Syntax, Document revision 1.6, 2002.
...
[Saltzer 1974] J. H. Saltzer, Protection and the Control of Information Sharing in Multics.
Communications of the ACM 17, 7 (July 1974):
388---402388–402.
[Saltzer 1975] J. H. Saltzer and M. D. Schroeder, The Protection of Information in Computer Systems,
Proceedings of the IEEE, Volume 63, Issue 9, 1975,
1278-13081278–1308.
Available at
http://web.mit.edu/Saltzer/www/publications/protection/.
...
[SDN 2008] Sun Microsystems,
SUN Developer Network,
1994-20081994–2008.
[Seacord 2005] Robert C. Seacord,
Secure Coding in C and C++, Addison-Wesley Professional, Boston
, MA, 2005.
[Seacord 2008] Robert C. Seacord,
The CERT C Secure Coding Standard, Addison-Wesley Professional, Boston,
MA, 2008.
[Seacord 2010] Robert C. Seacord, William Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch, Source Code Analysis Laboratory (SCALe) for energy delivery systems, CMU/SEI-2010-TR-021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, December 2010.
[Seacord 2013] Seacord, Robert C.
Secure Coding in C and C++, 2nd ed.
Boston: Addison-Wesley
, Boston, 2013.
[SecArch 2006] Sun Microsystems,
Java 2 Platform Security Architecture, 2006.
...
[Security 2006]
Java Security Guides, Sun Microsystems,
Inc2006.
(2006) Anchor |
---|
| SecuritySpec 08 |
---|
| SecuritySpec 08 |
---|
|
[SecuritySpec 2008] Sun Microsystems,
Java Security Architecture, 2008.
...
[Steele 1977] G.L. Steele,
Arithmetic Shifting Considered Harmful,
ACM SIGPLAN Notices, Volume 12, Issue 11 (1977),
61-6961–69.
[Steinberg 2005] Daniel H. Steinberg,
Java Developer Connection Tech Tips Using the Varargs Language Feature, January 4, 2005.
...
[Sun 2002]
Reflection, Sun Microsystems, 2002
). [Sun 2003] Sun Microsystems,
Sun ONE Application Server 7 Performance Tuning Guide, 2003.
...
[Techtalk 2007] Josh Bloch and William Pugh,
The PhantomReference Menace. Attack of the Clone. Revenge of the Shift., JavaOne Conference, 2007.
...
[Venners 2003] Bill Venners,
Failure and Exceptions, A Conversation with James Gosling, Part II, Artima.com, 2003
.[Vermeulen 2000] Allan Vermeulen, Scott W.
Ambler, Greg Bumgardner, Eldon Metz, Trevor Misfeldt, Jim Shur, and Patrick Thompson. The Elements of Java™ Style. Cambridge University Press, New York, 2000 [W3C 2008] Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and
François François Yergeau,
Extensible Markup Language (XML) 1.0, 5th ed., W3C Recommendation, 2008.
...