LPET - Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior.
Can HuangXinhui HanGuorui YuPublished in: CCS (2020)
Keyphrases
- graphic user interface
- software architecture
- monitoring system
- software systems
- computer systems
- security vulnerabilities
- software tools
- software development
- text mining
- knowledge discovery
- graphical user interfaces
- user interaction
- source code
- network monitoring
- interactive data mining
- software repositories
- search based software testing
- software design
- software maintenance
- software developers
- mining algorithm
- data mining
- information security
- case study
- sequential patterns
- computer graphics
- website
- software projects
- control center
- user interface
- data mining techniques
- health monitoring
- decision support
- itemsets
- requirements engineering
- security issues
- design tools
- human behavior