Software security: Vulnerabilities and countermeasures for two attacker models | IEEE Conference Publication | IEEE Xplore