Login / Signup
Maintaining Authorization Hook Placements Across Program Versions.
Nirupama Talele
Divya Muthukumaran
Frank Capobianco
Trent Jaeger
Gang Tan
Published in:
SecDev (2016)
Keyphrases
</>
access control
genetic algorithm
security policies
computer programs
real time
data sets
information systems
database systems
hidden markov models
fine grained
conflict resolution
static analysis