Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software security
biblio
N-version Obfuscation
Submitted by grigby1 on Mon, 11/20/2017 - 11:28am
composability
obfuscation
pubcrawl
resilience
Resiliency
reverse engineering
software security
Tamper resistance
Tamper-Resistance
biblio
Detecting and thwarting hardware trojan attacks in cyber-physical systems
Submitted by grigby1 on Mon, 11/13/2017 - 11:00am
thwarting hardware trojan attacks
Resiliency
security
security measures
smart grid application
Software component
software security
software-only attack
supervisory module
third-party soft IP cores
Reliability
Trojan horses
trust
trust enhancements
trust metric
trust specifications
Trusted Computing
trusted platform modules
verification
Hardware
composability
counter-measure
cyber-physical system integrity
cyber-physical systems
design
Diagnostics
Embedded System
field programmable gate arrays
attack vector models
hardware component
hardware security platform
hardware-only attack
invasive software
IP networks
isolated security primitives
Measurement
pubcrawl
biblio
Coverage-based Greybox Fuzzing As Markov Chain
Submitted by grigby1 on Mon, 11/13/2017 - 10:55am
foundations
fuzzing
Metrics
pubcrawl
Resiliency
Scalability
security
software security
testing efficiency
Time Frequency Analysis
vulnerability detection
biblio
Interface Diversification in IoT Operating Systems
Submitted by K_Hooper on Fri, 10/13/2017 - 9:33am
diversification
IoT
Metrics
pubcrawl
Resiliency
scalabilty
Securing Compilers
software security
biblio
Configuring Software and Systems for Defense-in-Depth
Submitted by grigby1 on Tue, 09/26/2017 - 11:38am
defense in depth
Human behavior
pubcrawl
Resiliency
Scalability
Security Audits
security configuration
software security
Systems Security
biblio
Configuring Software and Systems for Defense-in-Depth
Submitted by grigby1 on Fri, 08/18/2017 - 1:25pm
defense in depth
i-o systems security
i/o systems security
io systems security
pubcrawl
Scalability
security configuration
software security
Systems Security
biblio
Hacking the DBMS to Prevent Injection Attacks
Submitted by grigby1 on Mon, 05/22/2017 - 1:04pm
data privacy
dbms self-protection
Human behavior
injection attacks
Metrics
privacy
pubcrawl
Resiliency
security
software security
SQL injection
SQL injection attack
web applications
biblio
Evaluating and Comparing Complexity, Coupling and a New Proposed Set of Coupling Metrics in Cross-project Vulnerability Prediction
Submitted by grigby1 on Fri, 05/19/2017 - 12:48pm
acoustic coupling
complexity metrics
coupling metrics
cross-project
Metrics
pubcrawl
Security Metrics
software security
Vulnerability prediction
biblio
BlackBox: Lightweight Security Monitoring for COTS Binaries
Submitted by grigby1 on Thu, 05/18/2017 - 1:44pm
Binary Rewriting
composability
Control Flow Integrity
Dynamic Code Generation
Dynamical Systems
Metrics
network coding
Program Monitoring
pubcrawl
Resiliency
software security
biblio
Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks
Submitted by grigby1 on Thu, 04/20/2017 - 11:28am
anti-tampering
attestation
code splitting
Metrics
pubcrawl
Remote Attestation
Resiliency
software attestation
software security
tamper detection
tamper reaction
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »