Brady, 2025 - Google Patents
POTSDAM: Pareto Optimization Targeting Security, Data, and MediationBrady, 2025
View PDF- Document ID
- 12678288603013952758
- Author
- Brady J
- Publication year
External Links
Snippet
Given the growing amount and variety of data handled by modern systems, it is crucial to guarantee the accuracy and protection of input data without errors or malicious intentions. The need to improve security in software programs often conflicts with the assurance of …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sekar et al. | Model-carrying code: a practical approach for safe execution of untrusted applications | |
| US11314862B2 (en) | Method for detecting malicious scripts through modeling of script structure | |
| Mayer et al. | SELinux by example: using security enhanced Linux | |
| US8239954B2 (en) | Access control based on program properties | |
| Arden et al. | Sharing mobile code securely with information flow control | |
| JP4789933B2 (en) | Apparatus and method for developing, testing and monitoring secure software | |
| Almorsy et al. | Supporting automated vulnerability analysis using formalized vulnerability signatures | |
| Ou | A logic-programming approach to network security analysis | |
| Majumdar et al. | User-level runtime security auditing for the cloud | |
| US20070157156A1 (en) | Information models and the application life cycle | |
| Mann et al. | RADAR: Data protection in cloud-based computer systems at run time | |
| Zhong | A survey of prevent and detect access control vulnerabilities | |
| Bugliesi et al. | Gran: Model checking grsecurity RBAC policies | |
| Al Rahat et al. | AuthSaber: Automated Safety Verification of OpenID Connect Programs | |
| Brady | POTSDAM: Pareto Optimization Targeting Security, Data, and Mediation | |
| Chowdhary et al. | BeeGuard: Explainability-based policy enforcement of ebpf codes for cloud-native environments | |
| Hafiz | Security on demand | |
| Walter et al. | Tool-based attack graph estimation and scenario analysis for software architectures | |
| Lincke | Understanding software threats and vulnerabilities | |
| Chen et al. | Towards analyzing complex operating system access control configurations | |
| Mookhey et al. | Linux: Security, Audit and Control Features | |
| Oldani | Rafforzamento del perimetro di sicurezza e protezione dei dati di un'applicazione | |
| de Paiva et al. | A survey on Information Flow Control mechanisms in web applications | |
| Louis | Secure the Border and Build the Wall | |
| Abbadini | Sandboxing and Data Protection in Cloud Computing Environments |