Login / Signup
Binary Debloating for Security via Demand Driven Loading.
Girish Mururu
Chris Porter
Prithayan Barua
Santosh Pande
Published in:
CoRR (2019)
Keyphrases
</>
demand driven
access control
intrusion detection
information security
security issues
network security
security requirements
security mechanisms
load balance
fault tolerance
security policies
encryption scheme
security protocols