Sign in

Practical taint-based protection using demand emulation.

Alex HoMichael A. FettermanChristopher ClarkAndrew WarfieldSteven Hand
Published in: EuroSys (2006)
Keyphrases
  • real world
  • artificial intelligence
  • decision making
  • databases
  • neural network
  • data mining
  • search engine
  • security policies
  • privacy protection
  • control flow