An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection.
Hakan TemizAhmet BuyukekePublished in: CoRR (2023)
Keyphrases
- access control
- role based access control
- access control mechanism
- api calls
- third party
- security policies
- malware detection
- detection method
- detection algorithm
- automatic detection
- false alarms
- database systems
- data security
- resource management
- detection accuracy
- access control policies
- resource allocation
- false positives
- object detection
- database
- detection rate
- privacy policies
- operating system
- optimal resource allocation