Security slicing for auditing common injection vulnerabilities.
Julian ThoméLwin Khin SharDomenico BianculliLionel C. BriandPublished in: J. Syst. Softw. (2018)
Keyphrases
- information security
- security vulnerabilities
- security issues
- access control
- statistical databases
- security mechanisms
- security breaches
- inference control
- security risks
- malicious code detection
- security patterns
- security flaws
- intrusion detection
- countermeasures
- security requirements
- network security
- buffer overflow
- security systems
- security problems
- smart grid
- security properties
- security level
- computer security
- cryptographic protocols
- information systems
- network administrators
- information flow
- database systems