Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
source code (software)
biblio
Introducing Code Assets of a New White-Box Security Modeling Language
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
Metrics
white-box security modeling language
White-box security
WB security analysis
testing
specification languages
source code (software)
software protection technologies
software protection solutions
Software
Security modeling language
reverse engineer
Resiliency
resilience
pubcrawl
White Box Security
i-WBS
Data protection
Conferences
Computer crime
Computational modeling
composability
code security
code assets
Binary codes
binary code
attacker
Analytical models
security
white box
biblio
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
Submitted by aekwall on Mon, 11/09/2020 - 12:11pm
Layout
Vulnerability
source code (software)
software reusability
Software
security of data
security
Resiliency
relative memory
pubcrawl
Position-Independent Code-Reuse Attacks
Payloads
multiple position-independent ROP
Memory management
address-space layout randomization
just-in-time code-reuse attacks
Information Reuse and Security
information disclosure mitigation
information disclosure detection
exploitation
Electronic mail
computer science
Compositionality
code pointers
code gadgets
code addresses
ASLR
advanced attacker
biblio
Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics
Submitted by grigby1 on Wed, 11/04/2020 - 12:35pm
object-oriented methods
vulnerable source code
source code (software)
software vulnerabilities
software security
software quality metrics
software quality
software metrics
Software
security of data
Security Metrics
security
secure software
pubcrawl
PHP security
object-oriented PHP application
Availability Score
Object oriented modeling
national vulnerability database
metrics testing
Metrics
Measurement
Integrity Score
CVSS
Couplings
Correlation
Confidentiality Score
Complexity theory
code metrics
Code Characteristics
CIA Model
biblio
Towards a TRansparent I/O Solution
Submitted by aekwall on Mon, 06/01/2020 - 9:49am
source code
preceding graph
pubcrawl
Regulated I/O
resilience
Resiliency
reusable components
security
security of data
Semantics
software reusability
policy-based governance
source code (software)
storage back-end
storage platforms
Strips
Transparent I/O
transparent I/O solution
Web service scenario security
web services
workload diversity
in-transit processing
complex storage solutions
composability
cost reduction
custom code
data distribution
data lands
encryption
graph chain
In transit engine
application behaviors
infrastructure level
infrastructure setup
infrastructure-related changes
Libraries
Logic gates
management code
metadata
middleware
middleware security
biblio
Prototype Container-Based Platform for Extreme Quantum Computing Algorithm Development
Submitted by aekwall on Mon, 03/30/2020 - 10:41am
Docker container environment
quantum computing security
rapid prototype development
quantum simulators
quantum computing hardware platforms
quantum computing devices
quantum computing algorithm development
quantum computer
Qiskit source codes
prototype environment
prototype container-based platform
prototype container system
prototype container based system
IBM Q Experience Web site
IBM Q Experience
Docker Containers
Cloud Computing
computer security challenges
cloud computing system
cloud computing software environment
Prototypes
Predictive Metrics
quantum computing
Containers
source code (software)
Libraries
composability
pubcrawl
Resiliency
Software
Hardware
Scalability
biblio
MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks
Submitted by grigby1 on Fri, 03/27/2020 - 10:38am
sandboxing
mitigation method
MicroGuard
microcontrollers
Internet of Things devices
Data protection
component-level sandboxing
bare-metal microcontrollers
bare-metal micro controllers
automated code randomization
Internet of Things
source code (software)
code randomization
code-reuse attacks
composability
IoT devices
policy-based governance
pubcrawl
collaboration
security of data
biblio
An Approach of Code Pointer Hiding Based on a Resilient Area
Submitted by grigby1 on Mon, 03/23/2020 - 2:58pm
Information systems
source code (software)
Software
security of data
security
Scalability
rop attacks
resilient area
resilience
pubcrawl
pointer hiding
Payloads
memory disclosure vulnerability
Layout
Information Reuse and Security
information system security
Human Factors
Human behavior
flow graphs
Diversity methods
composability
code reuse attack
code reuse
code randomization
code pointer hiding
attack scenario
Resiliency
Compositionality
biblio
Hardware Trojans Detection at Register Transfer Level Based on Machine Learning
Submitted by grigby1 on Wed, 02/26/2020 - 3:37pm
Libraries
Trojan horses
trojan horse detection
training database
Training
supply chain security
source code (software)
shift registers
server-client mechanism
RTL source codes
Resiliency
resilience
register transfer level
pubcrawl
machine-learning-based detection method
circuit features extraction
learning (artificial intelligence)
invasive software
integrated circuits design process
Integrated circuit modeling
integrated circuit design
Hardware Trojans library
Hardware Trojans detection
Hardware
flip-flops
feature extraction
electronic engineering computing
database management systems
cyber physical systems
biblio
Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics
Submitted by aekwall on Mon, 02/10/2020 - 11:11am
software quality
software assurance
technical debt principal
technical consequences
static analysis techniques
source code maintenance
SecDevOps
malicious external attacks
malicious attack tactics
external cybersecurity attacks
external attack tactics
exploitable source code vulnerabilities
cybersecurity attack tactics
Common Weakness Enumerations
system weaknesses
technical debt
security of data
quality assurance
Scalability
program diagnostics
source code (software)
software maintenance
static analysis
computer security
Cybersecurity
tools
composability
pubcrawl
Software measurement
Software
Organizations
biblio
Identification of the Impacts of Code Changes on the Security of Software
Submitted by aekwall on Mon, 02/10/2020 - 11:09am
electronic commerce
software assurance
software lifetime
software code
security state
security assurance cases
security assurance case
security assessment time
open-source ERP software application
open-source e-commerce software application
Open Source Software
monitored security functions
incremental development
enterprise resource planning
code change impact
assurance case elements
Monitoring
security requirements
Scalability
safety-critical software
Java
code review
source code (software)
software maintenance
Unified modeling language
public domain software
tools
software security
composability
pubcrawl
security
1
2
3
next ›
last »