Secure Untrusted Binaries - Provably!.
Simon WinwoodManuel M. T. ChakravartyPublished in: Formal Aspects in Security and Trust (2005)
Keyphrases
- sensitive data
- source code
- third party
- security issues
- authentication scheme
- case study
- privacy preserving
- control flow
- security requirements
- reverse engineering
- data storage
- security mechanisms
- security policies
- open source software
- data sharing
- lightweight
- covert channel
- data sets
- information security
- information systems
- neural network