Tutorial: LLVM for Security Practitioners.
John CriswellEthan JohnsonColin PronovostPublished in: SecDev (2021)
Keyphrases
- intrusion detection
- information security
- cutting edge
- access control
- security policies
- security mechanisms
- security threats
- data mining
- information systems
- network security
- comprehensive reference
- real world
- information assurance
- security management
- functional requirements
- security requirements
- computer security
- security issues
- biometric systems
- data sets
- sensitive data
- key management
- security protocols
- data security
- security properties
- security problems
- statistical databases