[go: up one dir, main page]

Brady, 2025 - Google Patents

POTSDAM: Pareto Optimization Targeting Security, Data, and Mediation

Brady, 2025

View PDF
Document ID
12678288603013952758
Author
Brady J
Publication year

External Links

Snippet

Given the growing amount and variety of data handled by modern systems, it is crucial to guarantee the accuracy and protection of input data without errors or malicious intentions. The need to improve security in software programs often conflicts with the assurance of …
Continue reading at digitalcommons.dartmouth.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis

Similar Documents

Publication Publication Date Title
Sekar et al. Model-carrying code: a practical approach for safe execution of untrusted applications
US11314862B2 (en) Method for detecting malicious scripts through modeling of script structure
Mayer et al. SELinux by example: using security enhanced Linux
US8239954B2 (en) Access control based on program properties
Arden et al. Sharing mobile code securely with information flow control
JP4789933B2 (en) Apparatus and method for developing, testing and monitoring secure software
Almorsy et al. Supporting automated vulnerability analysis using formalized vulnerability signatures
Ou A logic-programming approach to network security analysis
Majumdar et al. User-level runtime security auditing for the cloud
US20070157156A1 (en) Information models and the application life cycle
Mann et al. RADAR: Data protection in cloud-based computer systems at run time
Zhong A survey of prevent and detect access control vulnerabilities
Bugliesi et al. Gran: Model checking grsecurity RBAC policies
Al Rahat et al. AuthSaber: Automated Safety Verification of OpenID Connect Programs
Brady POTSDAM: Pareto Optimization Targeting Security, Data, and Mediation
Chowdhary et al. BeeGuard: Explainability-based policy enforcement of ebpf codes for cloud-native environments
Hafiz Security on demand
Walter et al. Tool-based attack graph estimation and scenario analysis for software architectures
Lincke Understanding software threats and vulnerabilities
Chen et al. Towards analyzing complex operating system access control configurations
Mookhey et al. Linux: Security, Audit and Control Features
Oldani Rafforzamento del perimetro di sicurezza e protezione dei dati di un'applicazione
de Paiva et al. A survey on Information Flow Control mechanisms in web applications
Louis Secure the Border and Build the Wall
Abbadini Sandboxing and Data Protection in Cloud Computing Environments