Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
source code (software)
biblio
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
Submitted by grigby1 on Tue, 12/12/2017 - 12:19pm
metadata
source code (software)
Servers
security-sensitive metadata
security of data
Scalability
Resistance
Resiliency
pubcrawl
Probes
Metadata Discovery Problem
address space layout randomization
Layout
labor-intensive source code inspection
hidden application-specific primitives
Entropy
crash-resistant primitive automated discovery
crash-resistant code primitives
Computer crashes
Compositionality
binary executables
ASLR
biblio
XSSDM: Towards detection and mitigation of cross-site scripting vulnerabilities in web applications
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
Reactive power
XSSDM
Web Application Security
Web application
static taint analysis
static analysis
standards
source code (software)
source code
Servers
Sensitivity
security vulnerability
security
Computer crime
pubcrawl170109
program diagnostics
pattern matching technique
pattern matching
internet
HTML
cyber crime
cross-site scripting vulnerability detection
Cross-site scripting (XSS)
context-sensitive approach
Context Sensitive
Context
biblio
"A Logic of Programs with Interface-Confined Code"
Submitted by grigby1 on Thu, 02/23/2017 - 1:27pm
safety properties
Web browsers
untrusted code
trusted computing system
Trusted Computing
System M program logic
step-indexed model
standards
source code (software)
Semantics
security-critical systems
sandbox
adversary-supplied code
Safety
Radiation detectors
pubcrawl170106
program logic
Memoir design
interface-confined code
interface confinement
Instruction sets
hypervisors
Computational modeling
cognition
biblio
Experience on applying software architecture recovery to automotive embedded systems
Submitted by BrandonB on Wed, 05/06/2015 - 1:53pm
Databases
architecture recovery
automobile industry
automotive embedded systems
Automotive engineering
automotive industry
Browsers
CAN signal level
comprehensive product architecture description
computer architecture
Software Architecture
distributed embedded systems
embedded systems
extracted representation
Scania CV AB
software architecture recovery
software engineering
source code
source code (software)
truck manufacturer
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context
biblio
Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Submitted by BrandonB on Tue, 05/05/2015 - 9:40am
SQLI
social communications
Software
software development life cycle
software maintenance
software reliability
source code
source code (software)
SQL
SQL injection
Servers
static analysi
static analysis
testing
vulnerabilitie
vulnerability detection
web applicatio
web applications
XSS
legacy Web applications
attack prevention
Cross Site Scripting
cross site scripting vulnerabilities
defensive programming
financial transaction
Guidelines
health problem
internet
Analytical models
malicious users
Manuals
program diagnostics
programming
programming mistakes
security of data
security vulnerabilities
security weaknesses
biblio
Choosing a profile length in the SCAP method of source code authorship attribution
Submitted by BrandonB on Mon, 05/04/2015 - 1:21pm
authorship attribution
C++ language
data set
frequency control
Frequency measurement
information retrieval
Java
Java language
plagiarism detection
profile length
RNA
SCAP method
software forensics
source code (software)
source code authorship attribution
biblio
Analysis of Field Data on Web Security Vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 2:03pm
security of data
XSS
Web security vulnerabilities
Web application vulnerabilities
vulnerability scanners
static code analyzers
SQL injection
SQL
source code (software)
source code
software faults
software fault tolerance
Software
security patches
attack injectors
security mechanisms
security
review and evaluation
realistic vulnerability
languages
Java
Intrusion Detection Systems
Internet applications
internet
field data analysis
code inspectors
Blogs
Awards activities
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
« first
‹ previous
1
2
3