An Approach to Analyze Vulnerability of Information Flow in Software Architecture

Current research on software vulnerability analysis mostly focus on source codes or executable programs. But these methods can only be applied after software is completely developed when source codes are available. This may lead to high costs and tremendous difficulties in software revision. On the...

Full description

Bibliographic Details
Main Authors: Tingyang Gu, Minyan Lu, Luyi Li, Qiuying Li
Format: Article
Language:English
Published: MDPI AG 2020-01-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/10/1/393