Login / Signup
GLITCH: an Intermediate-Representation-Based Security Analysis for Infrastructure as Code Scripts.
Nuno Saavedra
João F. Ferreira
Published in:
CoRR (2022)
Keyphrases
</>
security analysis
intermediate representation
smart card
public key
security requirements
intermediate level
source code
tightly coupled
authentication protocol
user authentication
encryption scheme
image processing
information flow