[Abadi 1996] Abadi, Martin, and Roger Needham. Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering 22(1):6–15 (1996) [Apache 2014] Apache Tika: A Content Analysis Toolkit. The Apache Software Foundation (2014).
[API 2006]
Java Platform, Standard Edition 6 API Specification. , Oracle (2006
/2011).
[API 2011]
Java Platform, Standard Edition 7 API Specification. , Oracle (2011).
[API 2014] Java Platform, Standard Edition 8 API Specification, Oracle (2014). [Arnold 2006] Ken Arnold, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed., [Austin 2000] Austin, Calvin, and Monica Pawlan. Advanced Programming for the Java 2 Platform. Boston: Addison-Wesley
Longman (
20002006).
[Black 2004] Black, Paul E., and Paul J. Tanenbaum. "Partial order." In Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (2004ASVS 2019] OWASP Application Security Verification Standard Project (2019). [Black
20062004] Black, Paul E., and Paul J. Tanenbaum. "
Total Partial order." In
Dictionary of Algorithms and Data Structures [online]. Paul E. Black, ed., U.S. National Institute of Standards and Technology (
20062004).
[Bloch 2001] Bloch, Joshua.
Effective Java: Programming Language Guide. Boston: Addison-Wesley (2001).
[Bloch 2005] Bloch, Joshua, and Neal Gafter.
Java Puzzlers: Traps, Pitfalls, and Corner Cases. Upper Saddle River, NJ: Addison-Wesley (2005).
[Bloch
2005b2008] Bloch, Joshua
, and Neal Gafter. Yet More Programming Puzzlers. JavaOne Conference (2005. Effective Java, 2nd ed. Upper Saddle River, NJ: Addison-Wesley (2008).
Anchor |
---|
| Campione 96 |
---|
| Campione 96 | Bloch 07 | Bloch 07 |
---|
|
[
Bloch 2007] Bloch, Joshua. Effective Java™ Reloaded: This Time It's (Not) for Real. JavaOne Conference (2007Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996).
Anchor |
---|
| Chan 99 |
---|
| Chan 99 | Bloch 08 | Bloch 08 |
---|
|
[
Bloch 2008Chan 1999]
Bloch, Joshua. Effective Java, 2nd ed. Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ:
Addison-Wesley (2008Prentice Hall (1999).
Anchor |
---|
| Cohen 81 |
---|
| Cohen 81 | Bloch 09 | Bloch 09 |
---|
|
[
Bloch 2009Cohen 1981]
Bloch, Joshua, and Neal Gafter. Return of the Puzzlers: Schlock and Awe. JavaOne Conference (2009Cohen, D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48–54 (1981).
Anchor |
---|
| Conventions 09 |
---|
| Conventions 09 | Boehm 05 | Boehm 05 |
---|
|
[
Boehm 2005] Boehm, Hans-J. Finalization, Threads, and the Java™ Technology-Based Memory Model. JavaOne Conference (2005Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009).
Anchor |
---|
| Coomes 07 |
---|
| Coomes 07 | Campione 96 | Campione 96 |
---|
|
[
Campione 1996] Campione, Mary, and Kathy Walrath. The Java Tutorial: Object-Oriented Programming for the Internet. Reading, MA: Addison-Wesley (1996Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007).
[CCITT 1988] CCITT (International Telegraph and Telephone Consultative Committee). CCITT Blue Book: Recommendation X.509 and IS0 9594-8: The Directory-Authentication Framework. Geneva: International Telecommunication Union (1988). [Core Java 2004] Horstmann, Cay S., and Gary Cornell. Core Java™ 2, Vol. I: Fundamentals, 7th ed. Upper Anchor |
---|
Chan 99 | Chan 99 | [Chan 1999] Chan, Patrick, Rosanna Lee, and Douglas Kramer. The Java Class Libraries: Supplement for the Java 2 Platform, v1.2, 2nd ed., vol. 1. Upper Saddle River, NJ: Prentice Hall
PTR (
19992004).
Anchor |
---|
| Chess Coverity 07Chess |
---|
| Coverity 07 |
---|
|
[
Chess 2007] Chess, Brian, and Jacob West. Secure Programming with Static Analysis. Upper Saddle River, NJ: Addison-Wesley Professional Coverity 2007] Coverity Prevent User's Manual (3.3.0). Coverity (2007).
Anchor |
---|
| Daconta 03 |
---|
| Daconta 03 | Christudas 05 | Christudas 05 |
---|
|
[
Christudas 2005Daconta 2003]
ChristudasDaconta,
Binildas. Internals of Java Class Loading, ONJava (2005). Anchor |
---|
Cohen 81 | Cohen 81 | [Cohen 1981] Cohen, D. On Holy Wars and a Plea for Peace, IEEE Computer, 14(10):48–54 (1981Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls: 50 New Time-Saving Solutions and Workarounds. Indianapolis, IN: Wiley (2003).
Anchor |
---|
| Davis 08 |
---|
| Davis 08 | Conventions 09 | Conventions 09 |
---|
|
[
Conventions 2009] Code Conventions for the Java Programming Language. Oracle (2009). Anchor |
---|
Coomes 07 | Coomes 07 | [Coomes 2007] Coomes, John, Peter Kessler, and Tony Printezis. Garbage Collection-Friendly Programming. Java SE Garbage Collection Group, Sun Microsystems, JavaOne Conference (2007). Anchor |
---|
Core Java 04 | Core Java 04 | [Core Java 2004] Horstmann, Cay S., and Gary Cornell. Core Java™ 2, Vol. I: Fundamentals, 7th ed. Upper Saddle River, NJ: Prentice Hall PTR (2004). Anchor |
---|
Cunningham 95 | Cunningham 95 | [Cunningham 1995] Cunningham, Ward. The CHECKS Pattern Language of Information Integrity. In Pattern Languages of Program Design, James O. Coplien and Douglas C. Schmidt, eds. Reading, MA: Addison-Wesley (1995). Anchor |
---|
CVE 08 | CVE 08 | [CVE 2008] MITRE Corporation. Common Vulnerabilities and Exposures (2008/2012). Anchor |
---|
Daconta 00 | Daconta 00 | [Daconta 2000] Daconta, Michael C. When Runtime.exec() Won't. JavaWorld.com (2000). Anchor |
---|
Daconta 03 | Daconta 03 | [Daconta 2003] Daconta, Michael C., Kevin T. Smith, Donald Avondolio, and W. Clay Richardson. More Java Pitfalls. Indianapolis: Wiley (2003). Anchor |
---|
Darwin 04 | Darwin 04 | [Darwin 2004] Darwin, Ian F. Java Cookbook, 2nd ed. Sebastopol, CA: OâReilly (2004). Anchor |
---|
Davis 08 | Davis 08 | [Davis 2008] Davis, Mark, and Ken Whistler. Unicode Standard Annex #15: Unicode Normalization Forms (2008). Anchor |
---|
Davis 08b | Davis 08b | [Davis 2008b] Davis, Mark, and Michel Suignard. Unicode Technical Report #36, Unicode Security Considerations (2008). Anchor |
---|
Dennis 1966 | Dennis 1966 | [Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155 (1966). doi: 10.1145/365230.365252. Anchor |
---|
DHS 06 | DHS 06 | [DHS 2006] U.S. Department of Homeland Security. Build Security In (2006/2011). Anchor |
---|
Dormann 08 | Dormann 08 | [Dormann 2008] Dormann, Will. Signed Java Applet Security: Worse Than ActiveX? CERT Vulnerability Analysis Blog (2008). Anchor |
---|
Doshi 03 | Doshi 03 | [Doshi 2003] Doshi, Gunjan. Best Practices for Exception Handling. ONJava (2003). Anchor |
---|
Dougherty 2009 | Dougherty 2009 | [Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-Davis 2008] Davis, Mark, and Ken Whistler (Ed.). Unicode Standard Annex #15: Unicode Normalization Forms (2008). [Dennis 1966] Dennis, Jack B., and Earl C. Van Horn. 1966. Programming Semantics for Multiprogrammed Computations. Communications of the ACM, 9(3):143–155 (1966). doi: 10.1145/365230.365252. Anchor |
---|
| Dougherty 2009 |
---|
| Dougherty 2009 |
---|
|
[Dougherty 2009] Dougherty, Chad, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. Secure Design Patterns. CMU/SEI-2009-TR-010 (2009).[ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005). [FindBugs 2008] FindBugs Bug Descriptions (2008/2011). [Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005). [Fortify 2014] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2014).[GNU 2013] GNU Coding Standards, §5.3, "Clean Use of C Constructs." Richard Stallman and other GNU Project volunteers (2013). [Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004).[Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Boston: Addison-Wesley Professional (2006). [Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2007). [Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Boston: Addison-Wesley (2003).
[Goodliffe 2007] Pete Goodliffe. Code Craft: The Practice of Writing Excellent Code. San Francisco: No Starch Press (2007). [Grand 2002] Grand, Mark. Patterns in Java, Vol. 1: A Catalog of Reusable Design Patterns Illustrated with UML, 2nd ed. Indianapolis, IN: Wiley (2002).[Grubb 2003] Penny Grubb, and Armstrong A. Takang. Software Maintenance Concepts and Practice, 2nd ed. River Edge, NJ: World Scientific (2003). Anchor |
---|
| Guillardoy 12 |
---|
| Guillardoy 12 |
---|
|
[Guillardoy 2012] Guillardoy, Esteban. Java 0-day Analysis (CVE-2012-4681) (2012).[Hatton 1995] Hatton, Les. Safer C: Developing Software for High-Integrity and Safety-Critical Systems. New York: McGraw-Hill (1995).[Havelund 2009] Havelund, Klaus, and Al Niessner. JPL Coding Standard, Version 1.1 (2009) [Hawtin 2006] Hawtin, Thomas. [drlvm][kernel_classes] ThreadLocal Vulnerability. MarkMail (2006). Anchor |
---|
| Hirondelle 13 |
---|
| Hirondelle 13 |
---|
|
[Hirondelle 2013] Hirondelle Systems. Passwords Never Clear in Text (2013). [ISO/IEC 9126-1:2001] Software Engineering—Product Quality—Part 1, Quality Model (ISO/IEC 9126-1:2001). Geneva, Switzerland: International Organization for Standardization (2001). [ISO/IEC 24765:2010] Systems and Software Engineering—Vocabulary (ISO/IEC 24765:2010). Geneva, Switzerland: International Organization for Standardization (2010). [JLS 2013] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2013). Anchor |
---|
| Jovanovic 06 |
---|
| Jovanovic 06 |
---|
|
[Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258–263, May 21–24, Oakland, CA (2006). [JPL 2006] Arnold, Ken, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed. Reading, MA: Addison-Wesley Professional (2006).[JVMSpec 1999] The Java Virtual Machine Specification. Sun Microsystems (1999). [JVMSpec 2013] The Java Virtual Machine Specification: Java SE 7 Edition. Oracle America (2013). [Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009). Anchor |
---|
| Kalinovsky 04 |
---|
| Kalinovsky 04 |
---|
|
[Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004). Anchor |
---|
| Knoernschild 02 |
---|
| Knoernschild 02 |
---|
|
[Knoernschild 2002] Knoernschild, Kirk. Java™ Design: Objects, UML, and Process. Boston: Addison-Wesley Professional (2002).[Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Boston: Addison-Wesley (2000). [Lo 2005] Lo, Chia-Tien Dan, Witawas Srisa-an, and J. Morris Chang. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October). [Long 2012] Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and David Svoboda. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Boston: Addison-Wesley (2012).[Manion 2013] Manion, Art. Anatomy of Java Exploits, CERT/CC Blog (January 15, 2013).[Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57–62 (1996).[McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code, 2nd ed. New York: Wiley (1999). [Mettler 2010] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, DOI: 10.1145/1814217.1814224, 2010. [Miller 2009] Miller, Alex. Java™ Platform Concurrency Gotchas. JavaOne Conference (2009). [Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74–88 (1992). [NIST 2017] NIST Special Publication 800-63 (2017).[Oaks 2001] Oaks, Scott. Java Security010 (2009). Anchor |
---|
Eclipse 08 | Eclipse 08 | [Eclipse 2008] Eclipse Platform, The Eclipse Foundation (2008). Anchor |
---|
Encodings 06 | Encodings 06 | [Encodings 2006] Supported Encodings, Oracle (2006/2011). Anchor |
---|
Enterprise 03 | Enterprise 03 | [Enterprise 2003] Eckstein, Robert. Java Enterprise Best Practices. Sebastopol, CA: O'Reilly (2003). Anchor |
---|
ESA 05 | ESA 05 | [ESA 2005] ESA (European Space Agency). Java Coding Standards. Prepared by ESA Board for Software Standardisation and Control (BSSC) (2005). Anchor |
---|
Fairbanks 07 | Fairbanks 07 | [Fairbanks 2007] Fairbanks, George. Design Fragments. PhD thesis, Carnegie Mellon University (2007). Anchor |
---|
FindBugs 08 | FindBugs 08 | [FindBugs 2008] FindBugs Bug Descriptions (2008/2011). Anchor |
---|
Fisher 03 | Fisher 03 | [Fisher 2003] Fisher, Maydene, Jon Ellis, and Jonathan Bruce. JDBC API Tutorial and Reference, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2003). Anchor |
---|
Flanagan 05 | Flanagan 05 | [Flanagan 2005] Flanagan, David. Java in a Nutshell, 5th ed. Sebastopol, CA: O'Reilly Media (2005). Anchor |
---|
Fortify 08 | Fortify 08 | [Fortify 2008] Fortify Software Security Research Group with Gary McGraw. A Taxonomy of Coding Errors That Affect Security (see Java/JSP) (2008/2011). Anchor |
---|
Fox 01 | Fox 01 | [Fox 2001] Fox, Joshua. When Is a Singleton Not a Singleton? JavaWorld (2001). Anchor |
---|
FT 08 | FT 08 | [FT 2008] Function Table: Class FunctionTable, Field Detail, public static FuncLoader m_functions. Apache XML Project (2008). Anchor |
---|
Gafter 06 | Gafter 06 | [Gafter 2006] Gafter, Neal. Neal Gafter's blog (2006). Anchor |
---|
Gamma 95 | Gamma 95 | [Gamma 1995] Gamma, Erich, Richard Helm, Ralph Johnson, and John M. Vlissides. Design Patterns: Elements of Reusable Object-Oriented Software. Reading, MA: Addison-Wesley (1995). Anchor |
---|
Garms 01 | Garms 01 | [Garms 2001] Garms, Jess, and Daniel Somerfield. Professional Java Security. Birmingham, UK: Wrox Press (2001). Anchor |
---|
Goetz 02 | Goetz 02 | [Goetz 2002] Goetz, Brian. Java Theory and Practice: Safe Construction Techniques: Don't Let the "this" Reference Escape during Construction. IBM developerWorks (2002). Anchor |
---|
Goetz 04 | Goetz 04 | [Goetz 2004] Goetz, Brian. Java Theory and Practice: Garbage Collection and Performance: Hints, Tips, and Myths about Writing Garbage Collection-Friendly Classes. IBM developerWorks (2004). Anchor |
---|
Goetz 04b | Goetz 04b | [Goetz 2004b] Goetz, Brian. Java Theory and Practice: The Exceptions Debate: To Check, or Not to Check? IBM developerWorks (2004). Anchor |
---|
Goetz 04c | Goetz 04c | [Goetz 2004c] Goetz, Brian. Java Theory and Practice: Going Atomic: The New Atomic Classes Are the Hidden Gems of java.util.concurrent. IBM developerWorks (2004). Anchor |
---|
Goetz 05 | Goetz 05 | [Goetz 2005] Goetz, Brian. Java Theory and Practice: Be a Good (Event) Listener, Guidelines for Writing and Supporting Event Listeners. IBM developerWorks (2005). Anchor |
---|
Goetz 05b | Goetz 05b | [Goetz 2005b] Goetz, Brian. Java Theory and Practice: Plugging Memory Leaks with Weak References: Weak References Make It Easy to Express Object Lifecycle Relationships. IBM developerWorks (2005). Anchor |
---|
Goetz 06 | Goetz 06 | [Goetz 2006] Goetz, Brian, Tim Peierls, Joshua Bloch, Joseph Bowbeer, David Holmes, and Doug Lea. Java Concurrency in Practice. Upper Saddle River, NJ: Addison-Wesley Professional (2006). Anchor |
---|
Goetz 06b | Goetz 06b | [Goetz 2006b] Goetz, Brian. Java Theory and Practice: Good Housekeeping Practices. IBM developerWorks (2006). Anchor |
---|
Goetz 07 | Goetz 07 | [Goetz 2007] Goetz, Brian. Java Theory and Practice: Managing Volatility: Guidelines for Using Volatile Variables. IBM developerWorks (2006). Anchor |
---|
Goldberg 91 | Goldberg 91 | [Goldberg 1991] Goldberg, David. What Every Computer Scientist Should Know About Floating-Point Arithmetic. Sun Microsystems (1991/2000). Anchor |
---|
Gong 03 | Gong 03 | [Gong 2003] Gong, Li, Gary Ellison, and Mary Dageforde. Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd ed. Upper Saddle River, NJ: Prentice Hall (2003). Anchor |
---|
Grand 02 | Grand 02 | [Grand 2002] Grand, Mark. Patterns in Java, Vol. 1, 2nd ed. New York: Wiley (2002). Anchor |
---|
Greanier 00 | Greanier 00 | [Greanier 2000] Greanier, Todd. Discover the Secrets of the Java Serialization API. Sun Developer Network (2000). Anchor |
---|
Green 08 | Green 08 | [Green 2008] Green, Roedy. Canadian Mind Products Java & Internet Glossary (2008/2012). Anchor |
---|
Grigg 06 | Grigg 06 | [Grigg 2006] Grigg, Jeffery. Reflection on Inner Classes (2006). Anchor |
---|
Grosso 01 | Grosso 01 | [Grosso 2001] Grosso, William. Java RMI. Sebastopol, CA: O'Reilly (2001).
Anchor |
---|
| Oracle 08 |
---|
| Oracle 08 | Gupta 05 | Gupta 05 |
---|
|
[
Gupta 2005] Gupta, Satish Chandra, and Rajeev Palanki. Java Memory Leaks—Catch Me If You Can: Detecting Java Leaks Using IBM Rational Application Developer 6.0. IBM developerWorks (2005). Anchor |
---|
Haack 06 | Haack 06 | [Haack 2006] Haack, Christian, Erik Poll, Jan Schäfer, and Aleksy Schubert. Immutable Objects in Java. Research report, Radboud University Nijmegen (2006). Anchor |
---|
Haggar 00 | Haggar 00 | [Haggar 2000] Haggar, Peter. Practical Java™ Programming Language Guide. Reading, MA: Addison-Wesley Professional (2000). Anchor |
---|
Halloway 00 | Halloway 00 | [Halloway 2000] Halloway, Stuart. Java Developer Connection Tech Tips, March 28, 2000. Sun Microsystems (2000). Anchor |
---|
Halloway 01 | Halloway 01 | [Halloway 2001] Halloway, Stuart. Java Developer Connection Tech Tips, January 30, 2001. Sun Microsystems (2001). Anchor |
---|
Harold 97 | Harold 97 | [Harold 1997] Harold, Elliotte Rusty. Java Secrets. Foster City, CA: IDG Books Worldwide (1997). Anchor |
---|
Harold 99 | Harold 99 | [Harold 1999] Harold, Elliotte Rusty. Java I/O. Sebastopol, CA: O'Reilly (1999). Anchor |
---|
Harold 06 | Harold 06 | [Harold 2006] Harold, Elliotte Rusty. Java I/O, 2nd ed. Sebastopol, CA: O'Reilley (2006). Anchor |
---|
Hatton 95 | Hatton 95 | [Hatton 1995] Hatton, Les. Safer C: Developing Software for High-Integrity and Safety-Critical Systems. New York: McGraw-Hill, 1995 (ISBN 0-07-707640-0). Anchor |
---|
Hawtin 08 | Hawtin 08 | [Hawtin 2008] Hawtin, Thomas. Secure Coding Antipatterns: Preventing Attacks and Avoiding Vulnerabilities. Sun Microsystems, Make It Fly, London (2008). Anchor |
---|
Henney 03 | Henney 03 | [Henney 2003] Henney, Kevlin. Null Object, Something for Nothing (2003). Anchor |
---|
Hitchens 02 | Hitchens 02 | [Hitchens 2002] Hitchens, Ron. Java™ NIO. Cambridge, MA: O'Reilly (2002). Anchor |
---|
Hornig 07 | Hornig 07 | [Hornig 2007] Hornig, Charles. Advanced Java™ Globalization. JavaOne Conference (2007). Anchor |
---|
Hovemeyer 07 | Hovemeyer 07 | [Hovemeyer 2007] Hovemeyer, David, and William Pugh. Finding More Null Pointer Bugs, But Not Too Many. In Proceedings of the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE), San Diego (2007). Anchor |
---|
Hunt 98 | Hunt 98 | [Hunt 1998] Hunt, J., and F. Long. Java's Reliability: An Analysis of Software Defects in Java. IEE Proceedings: Software 145(2/3):41–50 (1998). Anchor |
---|
IEC 60812 2006 | IEC 60812 2006 | [IEC 60812 2006] IEE (International Electrotechnical Commission). Analysis Techniques for System Reliability: Procedure for Failure Mode and Effects Analysis (FMEA), 2nd ed. Geneva: IEC (2006). Anchor |
---|
IEEE 754 2006 | IEEE 754 2006 | [IEEE 754 2006] IEEE (Institute of Electrical and Electronics Engineers). Standard for Binary Floating-Point Arithmetic (IEEE 754-1985). New York: IEEE (2006). Anchor |
---|
ISO/IEC 9899 2011 | ISO/IEC 9899 2011 | [ISO/IEC 9899:2011] ISO/IEC. Programming Languages—C, 3rd ed (ISO/IEC 9899:2011). Geneva, Switzerland: International Organization for Standardization (2011). Anchor |
---|
ISO/IEC TR 24772 13 | ISO/IEC TR 24772 13 | Oracle 2008] Permissions in the Java™ SE 6 Development Kit (JDK). Oracle (2008). [Oracle 2010a] Java SE 6 HotSpot™ Virtual Machine Garbage Collection Tuning. Oracle (2010). [Oracle 2010b] New I/O APIs. Oracle (2010). [Oracle 2011a] Java PKI Programmer's Guide, Oracle, 2011. [Oracle 2011b] Java Platform™, Standard Edition 6 Documentation, Oracle, 2011. [Oracle 2011c] Package javax.servelt.http, Oracle 2011. [Oracle 2011d] Permissions in the Java™ SE 6 Development Kit (JDK), Oracle, 2011. [Oracle 2012a] API for Privileged Blocks. Oracle (1993/2012). [Oracle 2012b] "Reading ASCII Passwords from an InputStream Example," Java Cryptography Architecture (JCA) Reference Guide. Oracle (2012). [Oracle 2012c] Java Platform Standard Edition 7 Documentation. Oracle (2012). [Oracle 2013a] API for Privileged Blocks, Oracle, 1993/2013. [Oracle 2013b] Reading ASCII Passwords from an InputStream Example, Java Cryptography Architecture (JCA) Reference Guide, Oracle, 2013. [Oracle 2013c] Java Platform Standard Edition 7 Documentation, Oracle, 2013. [Oracle 2013d] Oracle Security Alert for CVE-2013-0422, Oracle, 2013. [OWASP 2005] OWASP (Open Web Application Security Project). A Guide to Building Secure Web Applications and Web Services (2005). [OWASP 2008] OWASP. Open Web Application Security Project homepage (2008). [OWASP 2009] OWASP. Session Fixation in Java (2009). [OWASP 2011] OWASP. Cross-site Scripting (XSS) (2011). [OWASP 2012] OWASP. "Why Add Salt?" Hashing Java (2012). [OWASP 2013] OWASP. OWASP Guide Project (2011).
[Paar 2010] Paar, Christof, and Jan Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. New York: Springer (2009). (Companion website contains online cryptography course that covers hash functions.)
[Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004). [Policy 2010] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Oracle (2010).[Reddy 2000] Reddy, Achut. Java Coding Style Guide. (2000). [Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner, and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000). [SCG 2010] Secure Coding Guidelines for the Java Programming Language, version 4.0. Oracle (2010). [Seacord 2009] Seacord, Robert C. The CERT C Secure Coding Standard. Boston: Addison-Wesley (2009).[Seacord 2012] Seacord, Robert, Will Dormann, James McCurley, Philip Miller, Robert Stoddard, David Svoboda, and Jefferson Welch. Source Code Analysis Laboratory (SCALe) (CMU/SEI-2012-TN-013). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2012. http://www.sei.cmu.edu/library/abstracts/reports/12tn013.cfm. [Seacord 2013] Seacord, Robert C. Secure Coding in C and C++, 2nd ed. Boston: Addison-Wesley (2013). See http://www.cert.org/books/secure-coding for news and errata. Anchor |
---|
| SecuritySpec 08 |
---|
| SecuritySpec 08 |
---|
|
Anchor |
---|
| SecuritySpec 10 |
---|
| SecuritySpec 10 |
---|
|
[SecuritySpec 2010] Java Security Architecture. Oracle (2010). [Sen 2007] Sen, Robi. Avoid the Dangers of XPath Injection. IBM developerWorks (2007). [Sethi 2009] Sethi, Amit. Proper Use of Java's SecureRandom. Cigital Justice League Blog (2009).[Steinberg 2008] Steinberg, Daniel H. Using the Varargs Language Feature. Java Developer Connection Tech Tips (2008). [Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai. Secure Coding Antipatterns: Avoiding Vulnerabilities. JavaOne Conference (2006).[Sun 2006] Java™ Platform, Standard Edition 6 Documentation. Oracle (2006). Anchor |
---|
| Sutherland 10 |
---|
| Sutherland 10 |
---|
|
[Sutherland 2010] Sutherland, Dean F., and William L. Scherlis. Composable Thread Coloring. In Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. New York: ACM (2010[ISO/IEC TR 24772:2013] ISO/IEC TR 24772:2013. Information Technology—Programming Languages—Guidance to Avoiding Vulnerabilities in Programming Languages through Language Selection and Use. Geneva, Switzerland: International Organization for Standardization (March 2013). Anchor |
---|
J2SE 00 | J2SE 00 | [J2SE 2000] JavaTM 2 SDK, Standard Edition Documentation, J2SE Documentation version 1.3. Sun Microsystems/Oracle (2000/2010). Anchor |
---|
JarSpec 08 | JarSpec 08 | [JarSpec 2008] J2SE Documentation version 1.5, Jar File Specification. Oracle (2008/2010). Anchor |
---|
Java 06 | Java 06 | [Java 2006] java: The Java Application Launcher. Oracle (2006/2011). Anchor |
---|
Java2NS 99 | Java2NS 99 | [Java2NS 1999] Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok K. Ramani. Java 2 Network Security. Upper Saddle River, NJ: Prentice Hall (1999). Anchor |
---|
JavaGenerics 04 | JavaGenerics 04 | [JavaGenerics 2004] Java Generics. Oracle (2004). Anchor |
---|
JavaThreads 99 | JavaThreads 99 | [JavaThreads 1999] Oaks, Scott, and Henry Wong. Java Threads, 2nd ed. Sebastopol, CA: O'Reilly (1999). Anchor |
---|
JavaThreads 04 | JavaThreads 04 | [JavaThreads 2004] Oaks, Scott, and Henry Wong. Java Threads, 3rd ed. Sebastopol, CA: O'Reilly (2004). Anchor |
---|
JDK7 08 | JDK7 08 | [JDK7 2008] Java™ Platform, Standard Edition 7 Documentation. Oracle (2008). Anchor |
---|
JLS 05 | JLS 05 | [JLS 2005] Gosling, James, Bill Joy, Guy Steele, and Gilad Bracha. Java Language Specification, 3rd ed. Upper Saddle River, NJ: Prentice Hall (2005). Anchor |
---|
JLS 11 | JLS 11 | [JLS 2011] Gosling, James, Bill Joy, Guy Steele, Gilad Bracha, and Alex Buckley. Java Language Specification: Java SE 7 Edition. Oracle America (2011). Anchor |
---|
JMX 06 | JMX 06 | [JMX 2006] Monitoring and Management for the Java Platform. Oracle (2006). Anchor |
---|
JMXG 06 | JMXG 06 | [JMXG 2006] Java SE Monitoring and Management Guide. Oracle (2006). Anchor |
---|
JNI 06 | JNI 06 | [JNI 2006] Java Native Interface. Oracle (2006). Anchor |
---|
Jovanovic 06 | Jovanovic 06 | [Jovanovic 2006] Jovanovic, Nenad, Christopher Kruegel, and Engin Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 258–263, May 21–24, Oakland, CA (2006). Anchor |
---|
JPDA 04 | JPDA 04 | [JPDA 2004] Java Platform Debugger Architecture (JPDA). Oracle (2004). Anchor |
---|
JPL 06 | JPL 06 | [JPL 2006] Arnold, Ken, James Gosling, and David Holmes. The Java™ Programming Language, 4th ed. Reading, MA: Addison-Wesley Professional (2006). Anchor |
---|
JSR-133 04 | JSR-133 04 | [JSR-133 2004] JSR-133: Java™ Memory Model and Thread Specification (2004). Anchor |
---|
JVMTI 06 | JVMTI 06 | [JVMTI 2006] Java Virtual Machine Tool Interface (JVM TI). Oracle (2006). Anchor |
---|
JVMSpec 99 | JVMSpec 99 | [JVMSpec 1999] The Java Virtual Machine Specification. Oracle (1999). Anchor |
---|
JVMSpec 12 | JVMSpec 12 | [JVMSpec 2012] The Java Virtual Machine Specification Java SE 7 Edition. Oracle (2012). Anchor |
---|
Kabanov 09 | Kabanov 09 | [Kabanov 2009] Kabanov, Jevgeni. The Ultimate Java Puzzler (2009). Anchor |
---|
Kabutz 01 | Kabutz 01 | [Kabutz 2001] Kabutz, Heinz M. The Java Specialists' Newsletter. (2001). Anchor |
---|
Kalinovsky 04 | Kalinovsky 04 | [Kalinovsky 2004] Kalinovsky, Alex. Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. Indianapolis: SAMS (2004). Anchor |
---|
Knoernschild 01 | Knoernschild 01 | [Knoernschild 2001] Knoernschild, Kirk. Java™ Design: Objects, UML, and Process. Boston: Addison-Wesley Professional (2001). Anchor |
---|
Lai 08 | Lai 08 | [Lai 2008] Lai, Charlie. Java Insecurity: Accounting for Subtleties That Can Compromise Code. IEEE Software 25(1):13–19 (2008). Anchor |
---|
Langer 08 | Langer 08 | [Langer 2008] Langer, Angelica, trainer and consultant. http://www.angelikalanger.com/GenericsFAQ/FAQSections/ProgrammingIdioms.html (2008). Anchor |
---|
Lea 00 | Lea 00 | [Lea 2000] Lea, Doug. Concurrent Programming in Java: Design Principles and Patterns, 2nd ed. Reading, MA: Addison-Wesley (2000). Anchor |
---|
Lea 00b | Lea 00b | [Lea 2000b] Lea, Doug, and William Pugh. Correct and Efficient Synchronization of Java™ Technology–based Threads. JavaOne Conference (2000). Anchor |
---|
Lea 08 | Lea 08 | [Lea 2008] Lea, Doug. The JSR-133 Cookbook for Compiler Writers (2008/2011). Anchor |
---|
Lee 09 | Lee 09 | [Lee 2009] Lee, Sangjin, Mahesh Somani, and Debashis Saha, eBay Inc. Robust and Scalable Concurrent Programming: Lessons from the Trenches. JavaOne Conference (2009). Anchor |
---|
Liang 97 | Liang 97 | [Liang 1997] Liang, Sheng. The Java™ Native Interface: Programmer's Guide and Specification. Reading, MA: Addison-Wesley (1997). Anchor |
---|
Liang 98 | Liang 98 | [Liang 1998] Liang, Sheng, and Gilad Bracha. Dynamic Class Loading in the Java™ Virtual Machine. In Proceedings of the 13th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, New York (1998). Anchor |
---|
Lieberman 86 | Lieberman 86 | [Lieberman 1986] Lieberman, Henry. Using Prototypical Objects to Implement Shared Behavior in Object-Oriented Systems. In Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, pp. 214–223, Portland, OR (1986). Anchor |
---|
Lo 05 | Lo 05 | [Lo 2005] Lo, Chia-Tien Dan, Witawas Srisa-an, and J. Morris Chang. Security Issues in Garbage Collection. STSC Crosstalk, (2005, October). Anchor |
---|
Long 05 | Long 05 | [Long 2005] Long, Fred. Software Vulnerabilities in Java. CMU/SEI-2005-TN-044 (2005). Anchor |
---|
Long 11 | Long 11 | [Long 2011] Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and David Svoboda. The CERT Oracle Secure Coding Standard for Java, SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley (2011) Anchor |
---|
Low 97 | Low 97 | [Low 1997] Low, Douglas. Protecting Java Code via Obfuscation. Crossroads 4(3):21–23 (1997). Anchor |
---|
Macgregor 98 | Macgregor 98 | [Macgregor 1998] MacGregor, Robert, Dave Durbin, John Owlett, and Andrew Yeomans. Java Network Security. Upper Saddle River, NJ: Prentice Hall PTR (1998). Anchor |
---|
Mahmoud 02 | Mahmoud 02 | [Mahmoud 2002] Mahmoud, H. Qusay. Compressing and Decompressing Data Using Java APIs. Oracle (2002). Anchor |
---|
Mak 02 | Mak 02 | [Mak 2002] Mak, Ronald. Java Number Cruncher: The Java Programmer's Guide to Numerical Computing. Upper Saddle River, NJ: Prentice Hall (2002). Anchor |
---|
Manson 04 | Manson 04 | [Manson 2004] Manson, Jeremy, and Brian Goetz. JSR 133 (Java Memory Model) FAQ (2004). Anchor |
---|
Manson 06 | Manson 06 | [Manson 2006] Manson, Jeremy, and William Pugh. The Java™ Memory Model: The Building Block of Concurrency. JavaOne Conference (2006). Anchor |
---|
Martin 96 | Martin 96 | [Martin 1996] Martin, Robert C. Granularity. The C++ Report 8(10):57–62 (1996). Anchor |
---|
McCluskey 01 | McCluskey 01 | [McCluskey 2001] McCluskey, Glen. Java Developer Connection Tech Tips. (2001, April 10). Anchor |
---|
McGraw 99 | McGraw 99 | [McGraw 1999] McGraw, Gary, and Edward W. Felten. Securing Java: Getting Down to Business with Mobile Code. New York: Wiley (1999). Anchor |
---|
McGraw 98 | McGraw 98 | [McGraw 1998] McGraw, Gary, and Edward W. Felten. Twelve Rules for Developing More Secure Java Code. JavaWorld.com (1998). Anchor |
---|
Mettler 10a | Mettler 10a | [Mettler 2010a] Adrian Mettler, David Wagner, and T. Close, Joe-E: A Security-Oriented Subset of Java, 17th Network & Distributed System Security Symposium, 2010. Anchor |
---|
Mettler 10b | Mettler 10b | [Mettler 2010b] Adrian Mettler and David Wagner, Class Properties for Security Review in an Object-Capability Subset of Java, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10). ACM, Article 7, doi: 10.1145/1814217.1814224, 2010. Anchor |
---|
Miller 09 | Miller 09 | [Miller 2009] Miller, Alex. Java™ Platform Concurrency Gotchas. JavaOne Conference (2009). Anchor |
---|
MISRA 04 | MISRA 04 | [MISRA 2004] MISRA Limited. MISRA C: 2004 Guidelines for the Use of the C Language in Critical Systems. Warwickshire, UK: MIRA Limited, October 2004 (ISBN 095241564X). Anchor |
---|
MITRE 09 | MITRE 09 | [MITRE 2009] MITRE Corporation. Common Weakness Enumeration (2009). Anchor |
---|
Mocha 07 | Mocha 07 | [Mocha 2007] Mocha, the Java Decompiler (2007). Anchor |
---|
Monsch 06 | Monsch 06 | [Monsch 2006] Monsch, Jan P. Ruining Security with java.util.Random, Version 1.0 (2006). Anchor |
---|
MSDN 09 | MSDN 09 | [MSDN 2009] Microsoft. Using SQL Escape Sequences (2009). Anchor |
---|
Muchow 01 | Muchow 01 | [Muchow 2001] Muchow, John W. MIDlet Packaging with J2ME. ONJava (2001). Anchor |
---|
Muller 02 | Muller 02 | [Müller 2002] Müller, Andreas, and Geoffrey Simmons. Exception Handling: Common Problems and Best Practice with Java 1.4. Sun Microsystems (2002). Anchor |
---|
Naftalin 06 | Naftalin 06 | [Naftalin 2006] Naftalin, Maurice, and Philip Wadler. Java Generics and Collections. Sebastopol, CA: O'Reilly (2006). Anchor |
---|
Naftalin 06b | Naftalin 06b | [Naftalin 2006b] Naftalin, Maurice, and Philip Wadler. Java™ Generics and Collections: Tools for Productivity. JavaOne Conference (2007). Anchor |
---|
Netzer 92 | Netzer 92 | [Netzer 1992] Netzer, Robert H. B., and Barton P. Miller. What Are Race Conditions? Some Issues and Formalization. ACM Letters on Programming Languages and Systems 1(1):74–88 (1992). Anchor |
---|
Neward 04 | Neward 04 | [Neward 2004] Neward, Ted. Effective Enterprise Java. Boston: Addison-Wesley (2004). Anchor |
---|
Nisewanger 07 | Nisewanger 07 | [Nisewanger 2007] Nisewanger, Jeff. Avoiding Antipatterns. JavaOne Conference (2007). Anchor |
---|
Nolan 04 | Nolan 04 | [Nolan 2004] Nolan, Godfrey. Decompiling Java. Berkeley, CA: Apress (2004). Anchor |
---|
Oaks 01 | Oaks 01 | [Oaks 2001] Oaks, Scott. Java Security. Sebastopol, CA: O'Reilly (2001). Anchor |
---|
Oracle 10 | Oracle 10 | [Oracle 2010a] Java SE 6 HotSpot[tm] Virtual Machine Garbage Collection Tuning. Oracle (2010). Anchor |
---|
Oracle 11 | Oracle 11 | [Oracle 2011] Package javax.servlet.http. Oracle (2011). Anchor |
---|
Oracle 12a | Oracle 12a | [Oracle 2012a] API for Privileged Blocks. Oracle (©1993, 2012). Anchor |
---|
Oracle 12b | Oracle 12b | [Oracle 2012b] Java Platform Standard Edition 7 Documentation. Oracle (2012). Anchor |
---|
OWASP 05 | OWASP 05 | [OWASP 2005] OWASP (Open Web Application Security Project). A Guide to Building Secure Web Applications and Web Services (2005). Anchor |
---|
OWASP 07 | OWASP 07 | [OWASP 2007] OWASP (Open Web Application Security Project). OWASP Top 10 for JAVA EE (2007). Anchor |
---|
OWASP 08 | OWASP 08 | [OWASP 2008] OWASP (Open Web Application Security Project). (2008). Anchor |
---|
OWASP 09 | OWASP 09 | [OWASP 2009] OWASP (Open Web Application Security Project). Session Fixation in Java (2009). Anchor |
---|
OWASP 11 | OWASP 11 | [OWASP 2011] OWASP (Open Web Application Security Project). Cross-site Scripting (XSS) (2011). Anchor |
---|
Permissions 08 | Permissions 08 | [Permissions 2008] Permissions in the Java™ SE 6 Development Kit (JDK). Oracle (2008). Anchor |
---|
Philion 03 | Philion 03 | [Philion 2003] Philion, Paul. Beware the Dangers of Generic Exceptions. JavaWorld.com (2003). Anchor |
---|
Phillips 05 | Phillips 05 | [Phillips 2005] Phillips, Addison P. Are We Counting Bytes Yet? Writing Encoding Converters Using Java NIO. Paper presented at the 27th Internationalization and Unicode Conference, April 6–8, Berlin (2005). Anchor |
---|
Pistoia 04 | Pistoia 04 | [Pistoia 2004] Pistoia, Marco, Nataraj Nagaratnam, Larry Koved, and Anthony Nadalin. Enterprise Java Security: Building Secure J2EE Applications. Boston: Addison-Wesley (2004). Anchor |
---|
Policy 02 | Policy 02 | [Policy 2002] Default Policy Implementation and Policy File Syntax, Document revision 1.6, Sun Microsystems/Oracle (2002/2010). Anchor |
---|
Pugh 04 | Pugh 04 | [Pugh 2004] Pugh, William. The Java Memory Model (discussions reference). Discussion based on work supported by the National Science Foundation under Grant No. 0098162 (2004). Anchor |
---|
Pugh 08 | Pugh 08 | [Pugh 2008] Pugh, William. Defective Java Code: Turning WTF Code into a Learning Experience. JavaOne Conference (2008). Anchor |
---|
Pugh 09 | Pugh 09 | [Pugh 2009] Pugh, William. Defective Java Code: Mistakes That Matter. JavaOne Conference (2009). Anchor |
---|
Reasoning 03 | Reasoning 03 | [Reasoning 2003] Reasoning Inspection Service Defect Data: Tomcat v 1.4.24 (2003). Anchor |
---|
Reddy 00 | Reddy 00 | [Reddy 2000] Achut Reddy. Java Coding Style Guide (2000). Anchor |
---|
Reflect 06 | Reflect 06 | [Reflect 2006] Reflection. Oracle (2006). Anchor |
---|
Rogue 00 | Rogue 00 | [Rogue 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner, and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000). Anchor |
---|
Rotem 08 | Rotem 08 | [Rotem 2008] Rotem-Gal-Oz, Arnon. Fallacies of Distributed Computing Explained (white paper) (2008). Anchor |
---|
Roubtsov 03 | Roubtsov 03 | [Roubtsov 2003] Roubtsov, Vladimir. Breaking Java Exception-Handling Rules Is Easy. JavaWorld.com (2003). Anchor |
---|
Roubtsov 03b | Roubtsov 03b | [Roubtsov 2003b] Roubtsov, Vladimir. Into the Mist of Serialization Myths. JavaWorld.com (2003). Anchor |
---|
Saltzer 74 | Saltzer 74 | [Saltzer 1974] Saltzer, J. H. Protection and the Control of Information Sharing in Multics. Communications of the ACM 17(7):388–402 (1974). Anchor |
---|
Saltzer 75 | Saltzer 75 | [Saltzer 1975] Saltzer, J. H., and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE 63(9):1278–1308. Anchor |
---|
SCG 07 | SCG 07 | [SCG 2007] Secure Coding Guidelines for the Java Programming Language, version 2.0. Sun Microsystems (2007). Anchor |
---|
SCG 09 | SCG 09 | [SCG 2009] Secure Coding Guidelines for the Java Programming Language, version 3.0. Oracle (2009). Anchor |
---|
SCG 10 | SCG 10 | [SCG 2010] Secure Coding Guidelines for the Java Programming Language, version 4.0. Oracle (2010). Anchor |
---|
Schildt 07 | Schildt 07 | [Schildt 2007] Schildt, Herb. Herb Schildt's Java Programming Cookbook. New York: McGraw-Hill (2007). Anchor |
---|
Schneier 00 | Schneier 00 | [Schneier 2000] Schneier, Bruce. Secrets and Lies—Digital Security in a Networked World. New York: Wiley (2000). Anchor |
---|
Schoenefeld 04 | Schoenefeld 04 | [Schoenefeld 2004] Java Vulnerabilities in Opera 7.54 BUGTRAQ Mailing List (bugtraq@securityfocus.com) (2004, November). Anchor |
---|
Schwarz 04 | Schwarz 04 | [Schwarz 2004] Schwarz, Don. Avoiding Checked Exceptions. ONJava (2004). Anchor |
---|
Schweisguth 03 | Schweisguth 03 | [Schweisguth 2003] Schweisguth, Dave. Java Tip 134: When Catching Exceptions, Don't Cast Your Net Too Wide. JavaWorld.com (2003). Anchor |
---|
SDN 08 | SDN 08 | [SDN 2008] Sun Developer Network. Sun Microsystems (1994/2008). Anchor |
---|
Seacord 05 | Seacord 05 | [Seacord 2005] Seacord, Robert C. Secure Coding in C and C++. Boston: Addison-Wesley (2005). See http://www.cert.org/books/secure-coding for news and errata. Anchor |
---|
Seacord 13 | Seacord 13 | [Seacord 2013] Seacord, Robert C. Secure Coding in C and C++, 2nd ed. Boston: Addison-Wesley (2005). See http://www.cert.org/books/secure-coding for news and errata. Anchor |
---|
SecArch 06 | SecArch 06 | [SecArch 2006] Java 2 Platform Security Architecture. Oracle (2006). Anchor |
---|
Security 06 | Security 06 | [Security 2006] Java Security Guides. Oracle (2006). Anchor |
---|
SecuritySpec 08 | SecuritySpec 08 | [SecuritySpec 2008] Java Security Architecture. Oracle (2008/2010). Anchor |
---|
Sen 07 | Sen 07 | [Sen 2007] Sen, Robi. Avoid the Dangers of XPath Injection. IBM developerWorks (2007). Anchor |
---|
Steel 05 | Steel 05 | [Steel 2005] Steel, Christopher, Ramesh Nagappan, and Ray Lai. Core Security Patterns: Best Practices and Strategies for J2EE™, Web Services, and Identity Management. Upper Saddle River, NJ: Prentice Hall PTR (2005). Anchor |
---|
Steele 1977 | Steele 1977 | [Steele 1977] Steele, Guy Lewis. Arithmetic Shifting Considered Harmful. SIGPLAN Notices 12(11):61–69 (1977). Anchor |
---|
Steinberg 05 | Steinberg 05 | [Steinberg 2005] Steinberg, Daniel H. Java Developer Connection Tech Tips: Using the Varargs Language Feature. (2005, January 4). Anchor |
---|
Sterbenz 06 | Sterbenz 06 | [Sterbenz 2006] Sterbenz, Andreas, and Charlie Lai. Secure Coding Antipatterns: Avoiding Vulnerabilities. JavaOne Conference (2006). Anchor |
---|
Steuck 02 | Steuck 02 | [Steuck 2002] Steuck, Gregory. XXE (Xml eXternal Entity) Attack. SecurityFocus (2002). Anchor |
---|
Sun 04 | Sun 04 | [Sun 1999] Why Are Thread.stop, Thread.suspend, Thread.resume and Runtime.runFinalizersOnExit Deprecated? Oracle (1999). Anchor |
---|
Sun 03 | Sun 03 | [Sun 2003] Sun ONE Application Server 7 Performance Tuning Guide. Oracle (2003). Anchor |
---|
Sun 06 | Sun 06 | [Sun 2006] Java™ Platform, Standard Edition 6 Documentation. Oracle (2006). Anchor |
---|
Sun 08 | Sun 08 | [Sun 2008] Java™ Plug-in and Applet Architecture. Oracle (2008). Anchor |
---|
Sutherland 10 | Sutherland 10 | [Sutherland 2010] Sutherland, Dean F., and William L. Scherlis. Composable Thread Coloring. In Proceedings of the 15th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. New York: ACM (2010). Anchor |
---|
Tanenbaum 03 | Tanenbaum 03 | [Tanenbaum 2003] Tanenbaum, Andrew S., and Maarten Van Steen. Distributed Systems: Principles and Paradigms, 2nd. ed. Upper Saddle River, NJ: Prentice Hall. Anchor |
---|
Techtalk 07 | Techtalk 07 | [Techtalk 2007] Bloch, Josh, and William Pugh. The Phantom-Reference Menace, Attack of the Clone, Revenge of the Shift. JavaOne Conference (2007). Anchor |
---|
Tomcat 09 | Tomcat 09 | [Tomcat 2009] Tomcat Documentation: Changelog and Security Fixes. Apache Software Foundation (2009).
[Tools 2011]
JDK Tools and Utilities Specification. Oracle (2011).
[Tutorials
20082013]
The Java Tutorials. Oracle (
20082013).
[Unicode 2009] The Unicode Consortium. The Unicode Standard, Version 5.2.0, defined by
The Unicode Standard, Version 5.2. Mountain View, CA: The Unicode Consortium (2009).
Anchor |
---|
| Unicode 13 |
---|
| Unicode 13 | Venners 97 | Venners 97 |
---|
|
[
Venners 1997] Venners, Bill. Security and the Class Loader Architecture. Java World.com (1997Unicode 2013] The Unicode Consortium. The Unicode Standard, Version 6.2.0, defined by Unicode 6.2.0. Mountain View, CA: The Unicode Consortium (2013).
Anchor |
---|
| Vermeulen 00 |
---|
| Vermeulen 00 | Venners 03 | Venners 03 |
---|
|
[
Venners 2003] Venners, Bill. Failure and Exceptions: A Conversation with James Gosling, Part II. (2003Vermeulen 2000] Vermeulen, Allan, Scott W. Ambler, Greg Bumgardner, and Eldon Metz. The Elements of Java Style. New York: Cambridge University Press (2000).
Anchor |
---|
| Viega 05 |
---|
| Viega 05 | W3C 08 | W3C 08 |
---|
|
[
W3C 2008Viega 2005]
Bray, Tim, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler, and François Yergeau. Extensible Markup Language (XML) 1.0, 5th ed. W3C Recommendation (2008Viega, John. CLASP Reference Guide, Volume 1.1. Secure Software (2005). [W3C 2003] The World Wide Web Security FAQ. World Wide Web Consortium (W3C) (2003).
[Ware 2008] Ware, Michael S.
Writing Secure Java Code: A Taxonomy of Heuristics and an Evaluation of Static Analysis Tools (thesis). James Madison University (2008). Anchor |
---|
Weber 09 | Weber 09 | [Weber 2009] Weber, Chris. Exploiting Unicode-Enabled Software. CanSecWest (2009 (thesis). James Madison University (2008).
Anchor |
---|
| Wheeler White 03Wheeler |
---|
| White 03 |
---|
|
[
Wheeler White 2003]
Wheeler, David A. Secure Programming for Linux and UNIX HOWTO White, Tom. Memoization in Java Using Dynamic Proxy Classes. O'Reilly onJava.com (2003).
[Zadegan 2009] Zadegan, Bryant.
A Lesson on Infinite Loops (2009
). Anchor |
---|
Zukowski 04 | Zukowski 04 | [Zukowski 2004] Zukowski, John. Java Developer Connection Tech Tips: Creating Custom Security Permissions (2004).