Inferring Patterns for Taint-Style Vulnerabilities With Security Patches.
Tingyu SongXiaohong LiZhiyong FengGuangquan XuPublished in: IEEE Access (2019)
Keyphrases
- security patterns
- buffer overflow
- security policies
- information security
- security vulnerabilities
- security issues
- security requirements
- security mechanisms
- security risks
- network security
- security problems
- security breaches
- natural images
- pattern mining
- intrusion detection
- access control
- smart card
- information flow
- data mining techniques
- computer security
- dos attacks
- security threats
- security flaws
- denial of service
- information systems
- malware detection
- security properties
- security systems
- visual patterns
- formal model
- cloud computing
- distributed systems
- e government