Skip to main content

Information leakage happens whenever an application passes unauthorised information to the attacker. Developers, architects and designers of systems often forget this point when planning secure systems. The lecture describes different variants, explains how to find them and recommends possible countermeasures.

Datum
27.5.2009
Event
Software & Systems Quality Conferences 2009
Organiser
SQS
Location
Dortmund

Language

x