The Security War in File Systems: An Empirical Study from A Vulnerability-Centric Perspective.
Jinghan SunShaobo LiJun XuJian HuangPublished in: CoRR (2022)
Keyphrases
- file system
- security vulnerabilities
- unauthorized access
- information security
- access patterns
- risk assessment
- network security
- storage systems
- data transfer
- flash memory
- buffer overflow
- security risks
- penetration testing
- multi tiered
- access control
- security issues
- denial of service
- dos attacks
- security properties
- security problems
- security threats
- statistical databases
- security requirements
- distributed data
- scalable distributed
- key management
- application specific
- security mechanisms