The Security War in File Systems: An Empirical Study from A Vulnerability-centric Perspective.
Jinghan SunShaobo LiJun XuJian HuangPublished in: ACM Trans. Storage (2023)
Keyphrases
- file system
- security vulnerabilities
- unauthorized access
- risk assessment
- intrusion detection
- information security
- distributed data
- data transfer
- storage devices
- access patterns
- security issues
- buffer overflow
- search tools
- penetration testing
- multi tiered
- application specific
- access control
- storage systems
- security risks
- network security
- scalable distributed
- database systems
- user centric
- security problems
- continuous media
- anomaly detection
- data integrity
- flash memory
- statistical databases
- risk management