Introduction to Data Science and Machine Learning 2020
DOI: 10.5772/intechopen.86538
|View full text |Cite
|
Sign up to set email alerts
|

Software Design for Success

Abstract: Technical books focus most of the times in technical stuff, as one should expect. However, this creates the illusion that technology is somewhat free of bias, always neutral, thus fitting everyone. Reality, later on, when the product is already there, proofs us otherwise. Inclusion and representation are crucial from the design and modeling stages. Visibility of minorities or underrepresented groups is on the rise, yet so much of the way is left for us technicians to walk. In this chapter, we will analyze, fro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Taint tracking can also be performed purely in software. Data flow integrity is a form of taint tracking that protects software against non-control data attacks by using reaching definitions analysis [11]. Pointer tainting [65] is another defense against non-control data attacks that taints user input and detects an attack when a tainted value is dereferenced as a pointer.…”
Section: Related Workmentioning
confidence: 99%
“…Taint tracking can also be performed purely in software. Data flow integrity is a form of taint tracking that protects software against non-control data attacks by using reaching definitions analysis [11]. Pointer tainting [65] is another defense against non-control data attacks that taints user input and detects an attack when a tainted value is dereferenced as a pointer.…”
Section: Related Workmentioning
confidence: 99%
“…We make this assumption because using infoleak to bypass KASLR is usually a prerequisite for kernel control-flow hijacking. Because automated kernel infoleak exploit generation itself is challenging enough, we assume the kernel does not employ any mitigation technique that regulates data-flow, such as data-flow integrity [11]. We leave such undeployed mitigation bypassing for future work.…”
Section: Overviewmentioning
confidence: 99%