A security policy oracle: detecting security holes using multiple API implementations.
Varun SrivastavaMichael D. BondKathryn S. McKinleyVitaly ShmatikovPublished in: PLDI (2011)
Keyphrases
- security policies
- access control
- security requirements
- network security
- security management
- security concerns
- security architecture
- network management
- access control systems
- cyber attacks
- distributed systems
- access control policies
- security measures
- unauthorized access
- home network
- database security
- security analysis
- database
- security mechanisms
- information security
- intrusion detection