2021
DOI: 10.1007/978-3-030-80960-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Provenance-Based Security Audits and Its Application to COVID-19 Contact Tracing Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 30 publications
0
0
0
Order By: Relevance
“…We use the commit hash or snapshot ID as the code state. The relational model can also be used as an interface to other data mining and analysis tools, as the authors have shown for the combined analysis of vulnerability and provenance data [3]. Figure 2 shows the database schema.…”
Section: B Sast Databasementioning
confidence: 99%
See 3 more Smart Citations
“…We use the commit hash or snapshot ID as the code state. The relational model can also be used as an interface to other data mining and analysis tools, as the authors have shown for the combined analysis of vulnerability and provenance data [3]. Figure 2 shows the database schema.…”
Section: B Sast Databasementioning
confidence: 99%
“…Tool corresponds to a SAST tool, with a name, configuration and version number. Run corresponds to an execution of a tool on a given snapshot and confirms a success flag which confirms a successful tool run or indicate errors 3 . Warning is a collection of all SAST warnings encountered with a message, location as file path, severity (if available) and a duplicate check field.…”
Section: B Sast Databasementioning
confidence: 99%
See 2 more Smart Citations