What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?
Black-box
Announced
White-box
Grey-box
Submit