Publisher
Information Processing Society of Japan
Reference11 articles.
1. [1] Ellison, R., Goodenough, J., Weinstock, C. and Woody, C.: Evaluating and Mitigating Software Supply Chain Security Risks, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, Technical Note, CMU/SEI-2010-TN-016 (2010).
2. [2] Hiesgen, R., Nawrocki, M., Schmidt, T.C. and Wählisch, M.: The Race to the Vulnerable: Measuring the Log4j Shell Incident, ArXiv (2022).
3. [3] Kaushik, K., Dass, A. and Dhankhar, A.: An approach for exploiting and mitigating Log4J using Log4Shell vulnerability, 2022 3rd International Conference on Computation, Automation and Knowledge Management (ICCAKM), pp.1-6, DOI: 10.1109/ICCAKM54721.2022.9990554 (2022).
4. [4] Alkhadra, R., Abuzaid, J., AlShammari, M. and Mohammad, N.: Solar Winds Hack: In-Depth Analysis and Countermeasures, 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp.1-7, DOI: 10.1109/ICCCNT51525.2021.9579611 (2021).
5. [5] Feng, S. and Lubis, M.: Defense-In-Depth Security Strategy in Log4j Vulnerability Analysis, 2022 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS), pp.1-4, DOI: 10.1109/ICADEIS56544.2022.10037384 (2022).