With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security.
Ghada DessoukyTommaso FrassettoPatrick JauernigAhmad-Reza SadeghiEmmanuel StapfPublished in: IEEE Secur. Priv. (2020)
Keyphrases
- access control
- information security
- risk assessment
- intrusion detection
- security vulnerabilities
- buffer overflow
- computational complexity
- user friendly
- hardware implementation
- security risks
- security model
- space complexity
- penetration testing
- security threats
- cryptographic protocols
- security issues
- database
- decision problems
- data mining
- real time