Login / Signup
A Security Analysis of Labeling-Based Control-Flow Integrity Schemes.
David Demicco
Matthew Cole
Shengdun Wang
Aravind Prakash
Published in:
HiPCW (2022)
Keyphrases
</>
security analysis
control flow
data flow
smart card
security requirements
public key
software testing
security model
security properties
process model
user authentication
encryption scheme
mutual authentication
workflow management systems
modeling language
databases
authentication protocol
data integration
case study
authentication scheme