Effective tracking mechanism for run-time properties:control-flow and data-flow Patterns of security violation,pattern expression and matching Vulnerability Scanning Applicable for three categories of apps:web, native and hybrid Practical consideration,such as performance, accuracy,.… So-called best practices
• Effective tracking mechanism for run-time properties: control-flow and data-flow • Patterns of security violation, pattern expression and matching • Vulnerability Scanning • Applicable for three categories of apps: web, native and hybrid • Practical consideration, such as performance, accuracy, … • So-called best practices
Malware,softwares that exhibits malicious behavior, -virus,worm,Trojan horse
• Malware, softwaresthat exhibits malicious behavior, – virus, worm, Trojan horse