P. Parrend and S. Frénot, More vulnerabilities in the
URL : https://hal.archives-ouvertes.fr/inria-00322138

. Java, OSGi platform: a focus on bundle interactions, 2008.

S. Dabbs and H. , Component development for the Java platform, 2002.

A. Herzog and N. Shahmehri, PROBLEMS RUNNING UNTRUSTED SERVICES AS JAVA THREADS, Certification and Security in Inter-Organizational E- Services, pp.19-32, 2005.
DOI : 10.1007/11397427_2

P. Inc, Runtime process infection, Phrack, vol.59, 2002.

. Kodmaker, NTIllusion: A portable Win32 userland rootkit, 2004.

A. Herzog, Performance of the Java security manager, Computers & Security, vol.24, issue.3, pp.192-207, 2005.
DOI : 10.1016/j.cose.2004.08.006

U. Nist, Cve-2008-5353: Calendar deserialization issues, 2008.

U. Nist, Cve-2009-1103: Jdk and jre unspecified deserialization vulnerability, 2009.

S. Koivu, Cve-2010-0094: Sun Java runtime RMIConnectionImpl privileged context remote code execution vulnerability. Zero Day Initiative 10-51, 2010.

S. Koivu, Cve-2010-0840: Sun Java runtime environment trusted methods chaining remote code execution vulnerability. Zero Day Initiative, pp.10-56, 2010.

P. Parrend, Enhancing Automated Detection of Vulnerabilities in Java Components, 2009 International Conference on Availability, Reliability and Security, 2009.
DOI : 10.1109/ARES.2009.9

V. , B. Livshits, and M. S. Lam, Finding security vulnerabilities in Java applications with static analysis, SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium, pp.18-18, 2005.

}. Catch, IOException ex) { System.out.println( "File " + filename

}. Catch, Exception ex) { System.out.println( "File " + filename