Security bugs in embedded interpreters.
Haogang ChenCody CutlerTaesoo KimYandong MaoXi WangNickolai ZeldovichM. Frans KaashoekPublished in: APSys (2013)
Keyphrases
- security vulnerabilities
- network security
- statistical databases
- access control
- information security
- security requirements
- security issues
- security policies
- computer security
- intrusion detection
- security measures
- security systems
- security protocols
- key management
- functional requirements
- information systems
- source code
- static analysis
- security mechanisms
- database
- description language
- data security
- security model
- cryptographic protocols
- test cases
- neural network