Skip to main content

Information leakage happens whenever an application passes unauthorised information to the attacker. Developers, architects and designers of systems often forget this point when planning secure systems. The lecture describes different variants, explains how to find them and recommends possible countermeasures.

Authors
Alexander Schinner
Event
Software & Systems Quality Conferences 2009
Host
SQS
Location
Dortmund, German
Published
27.05.2009
x