Lifting Network Protocol Implementation to Precise Format Specification with Security Applications.
Qingkai ShiJunyang ShaoYapeng YeMingwei ZhengXiangyu ZhangPublished in: CCS (2023)
Keyphrases
- efficient implementation
- metadata
- security issues
- security requirements
- protocol specification
- security systems
- specification language
- statistical databases
- information security
- databases
- wavelet transform
- cyber security
- high level
- code generation
- security properties
- security problems
- encryption algorithms
- neural network