Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Linux
biblio
OWL: Understanding and Detecting Concurrency Attacks
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
Computer bugs
Predictive Metrics
Concurrency
Software Testing
single-threaded programs
OWL source code
OWL
knowledge representation languages
concurrency bug detectors
concurrency attack exploit scripts
Concurrency Attack
bug-inducing inputs
Concurrent computing
concurrency control
security
cyber-physical system
cyber-physical systems
Instruction sets
program debugging
public domain software
Linux
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
A Dynamic Detection Technique for XSS Vulnerabilities
Submitted by aekwall on Mon, 12/16/2019 - 1:17pm
internet
XSS vulnerabilities
web applications
Uniform resource locators
tools
testing
simulated attack
Servers
security of data
Scalability
resilience
Python language
Python
pubcrawl
Linux
attacks simulation
Human behavior
feature extraction
dynamic detection process
dynamic detection
detection tool
cross-site scripting(XSS)
cross-site scripting attack
cross-site scripting
Cross Site Scripting
Crawlers
crawler module
black-box testing
black box vulnerabilities detection
biblio
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers
Submitted by grigby1 on Tue, 11/26/2019 - 2:35pm
Kernel
Scalability
runtime analysis approach
runtime analysis
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
pattern locks
Monitoring
Linux driver patches
Linux
concurrency control
Instruments
inconsistent lock protection
Human Factors
human factor
Human behavior
driver execution
DILP
device drivers
device driver
data race
Concurrent computing
biblio
Secure and Efficient Approach to Prevent Ad Hoc Network Attacks Using Intrusion Detection System
Submitted by grigby1 on Mon, 11/04/2019 - 11:39am
mobile computing
Wireless communication
Ubuntu OS
telecommunication network topology
self-organizing
self-maintenance
security of data
security
secure mechanism
Router Systems Security
Resiliency
resilience
pubcrawl
NS 2.35 software
Ad hoc network attacks
mobile ad hoc networks
Metrics
MAES
Linux
intrusion detection system
Intrusion Detection
hybrid system
Elliptic curve cryptography
ECC
dynamic topology features
Conferences
Ad hoc networks
biblio
Hardware-Based Adversary-Controlled States Tracking
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Pipelines
target tracking
software security challenges
Software
security of data
Scalability
rop attacks
return oriented programming
Resiliency
Registers
pubcrawl
programming
program diagnostics
classic dynamic taint analysis method
memory vulnerabilities
memory data
Linux applications
Linux
Human behavior
HAST
Hardware-based Adversary-controlled States
Hardware
dynimic taint analysis
control flow
composability
code-reuse attack
biblio
Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Resiliency
x64-based Linux platform
W ⊕ X security model
Task Analysis
security of data
security
scratch registers
scratch register
Scalability
ROP malicious code
rop attacks
ROP attack
Return-oriented Programming attacks
return oriented programming
return instructions
binary instrumentation
Registers
pubcrawl
programming
parameter registers
object-oriented programming
malware
Linux
Kernel
Instruction sets
Human behavior
composability
code reuse attack
calling convention
biblio
Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Submitted by aekwall on Mon, 10/14/2019 - 9:19am
privacy
FOP gadgets
function-oriented programming
Human behavior
JOP
Jump-Oriented Programming
Layout
Linux
Linux x64 environment
malicious program behavior
object oriented security
object-oriented programming
FOP attack
proftpd1.3.0 server
pubcrawl
return oriented programming
return-oriented programming
ROP
Scalability
security
security of data
Servers
shadow stack technology
tools
code reuse attack
Compositionality
Resiliency
address space layout randomization
ASLR
C Applications
C languages
C program
CFI
coarse-grained CFI
coarse-grained control-flow integrity
code injection attacks
Information Reuse and Security
code reuse attacks
composability
Conferences
Control-hijacking attacks
COOP
Counterfeit Object-oriented Programming
data-execution prevention
DEP
existing function
fine-grained CFI technologies
FOP
biblio
Context-Aware File Discovery System for Distributed Mobile-Cloud Apps
Submitted by aekwall on Wed, 09/04/2019 - 10:16am
Linux
Servers
Scalability
Resiliency
pubcrawl
peer-to-peer solutions
Peer-to-peer computing
Monte Carlo methods
Mobile handsets
mobile computing
mobile cloud computing
middleware
Metadata Discovery Problem
metadata
meta data
android
image file
File discovery service
distributed mobile-cloud apps
Distributed databases
Decision trees
Decision Tree
context-aware file discovery system
context-aware file discovery service
Computation offloading
composability
cloud-based metadata server
Cloud Computing
CAFDS
Android (operating system)
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
MSRR: Measurement Framework For Remote Attestation
Submitted by aekwall on Wed, 02/13/2019 - 10:59am
Measurement
composability
pubcrawl
Human behavior
Resiliency
system monitoring
Software measurement
run-time measurement
remote untrusted host
remote system
remote attestation system
query languages
MSRR robust querying language
security of data
Linux
general-purpose measurement framework
dynamic RA system
dynamic program state
core measurement functionality
application-specific measurement policies
Time measurement
Kernel
Current measurement
Trusted Computing
attestation
Monitoring
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »