Information leakage happens whenever an application passes unauthorised information to the attacker. Developers, architects and designers of systems often forget this point when planning secure systems. The lecture describes different variants, explains how to find them and recommends possible countermeasures.
Authors
          Alexander Schinner
              Event
              Software & Systems Quality Conferences 2009
          Host
              SQS
          Location
              Dortmund, German
          Published
              27.05.2009
          Reprint