Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.
Bruno P. S. RochaSruthi BandhakaviJerry den HartogWilliam H. WinsboroughSandro EtallePublished in: IEEE Symposium on Security and Privacy (2010)
Keyphrases
- third party
- legacy software
- reverse engineering
- information flow
- real time
- flow patterns
- automatic programming
- dynamic analysis
- intermediate level
- information retrieval
- privacy preserving
- neural network
- relational databases
- expert systems
- computer programs
- image segmentation
- social networks
- legacy systems
- search engine