A Security Analysis of Labeling-Based Control-Flow Integrity Schemes.
David DemiccoMatthew ColeShengdun WangAravind PrakashPublished in: HiPCW (2022)
Keyphrases
- security analysis
- control flow
- data flow
- smart card
- security requirements
- public key
- software testing
- security model
- security properties
- process model
- user authentication
- encryption scheme
- mutual authentication
- workflow management systems
- modeling language
- databases
- authentication protocol
- data integration
- case study
- authentication scheme