Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Libraries
biblio
In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild
Submitted by aekwall on Wed, 05/01/2019 - 12:37pm
Libraries
twist attacks
transport protocols
transport layer protocol
TLS handshake
standards
SSH hosts
Servers
server vulnerability
Scalability
Resiliency
pubcrawl
Protocols
Metrics
Cryptographic Protocols
IPsec
invalid curve attacks
internet-wide scans
internet scanning
internet
HTTPS hosts
Elliptic curves
elliptic curve parameter downgrade attack
Elliptic curve cryptography
CurveSwap attack
curve validity checks
curve twist attacks
biblio
Software Ecosystem Call Graph for Dependency Management
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
popular form
ecosystem-level
Ecosystems
Equifax data breach
external libraries
fine-grained dependency network
impact
indicative information
leftpad package removal
open source software libraries
packages
developers
program analysis
public domain software
software development management
software ecosystem
software libraries
software reusability
Software reuse
workspace
Automated Secure Software Engineering
call graphs
security
Software
Resiliency
pubcrawl
composability
tools
Libraries
software engineering
automated tools
security of data
centralized code repositories
client-server systems
Computer bugs
core package
counter measure
dependencies
dependency checkers
Dependency management
dependency networks
biblio
.Net library for SMS spam detection using machine learning: A cross platform solution
Submitted by aekwall on Mon, 02/25/2019 - 11:40am
short message service
Net library
online detection
pattern classification
pubcrawl
random forest algorithm
random processes
Scalability
security of data
Metrics
SMS
SMS spam detection
spam dataset classification
spam detection
spam filter
spam messages
tools
unsolicited e-mail
detection
classification
Classification algorithms
clustering
Clustering algorithms
cross platform .Net development
C\#
C\# languages
C\# library
Algorithms
electronic messaging
email spam detection
filtering algorithms
Human behavior
learning (artificial intelligence)
Libraries
machine learning
machine learning algorithms
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
biblio
Reducing Attack Surface via Executable Transformation
Submitted by grigby1 on Fri, 02/08/2019 - 4:32pm
security
office of naval research
ONR
overwhelming emphasis
Productivity
programmers productivity
pubcrawl
resilience
Resiliency
Scalability
obscure use cases
security of data
Software
software engineering
software engineering history
software maintenance
software reusability
telecommunication security
total platform cyber protection
TPCP
individual approaches
Binary
binary transformation
Complexity theory
Conferences
constant demands
de-bloat software binaries
Debloat
deployment practices
executable transformation
attack surface
individual decisions
Late Stage Customization
Libraries
maximal code reuse
Metrics
minimal developer effort
modern software development
Navy
biblio
Detection of DDoS attack via deep packet analysis in real time systems
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
known attack patterns
telecommunication traffic
Scalability
Resiliency
resilience
real-time systems
real time systems
Radiation detectors
pubcrawl
packet filtering
Monitoring
Libraries
Computer crime
Internet technologies
internet
Filtering
deep packet inspection
deep packet analysis
DDoS Attack
Databases
cyber security
Cyber Attacks
computer network security
biblio
Securing Concurrent Lazy Programs Against Information Leakage
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
information-flow control tools
concurrency control
Agda proof assistant
concurrent lazy programs security
covert channel
functional languages
functional programming
Haskell libraries
IFC libraries
IFC tools
Information Leakage
lazy calculus
lazy evaluation
lazy languages
lazyDup
Message systems
noninterference
security library MAC
software libraries
Writing
data structures
Theorem Proving
Haskell
Concurrency
cyber-physical systems
pubcrawl
composability
security of data
data privacy
Sensitivity
security
program diagnostics
resilience
Metrics
Libraries
Lattices
timing
Resiliency
software tools
biblio
The fuzzy control of trust establishment
Submitted by grigby1 on Thu, 08/23/2018 - 11:47am
model
unnecessary negotiation failure
Trusted Computing
trust establishment
trust
traditional ATN
strange entities
Servers
pubcrawl
process control
open network environment
negotiation strategy need
negotiation process
mutual trust
Access Control
Libraries
Human Factors
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy negotiation process
fuzzy control
Fuzzy
digital credentials
computer theory
Automated Trust Negotiation
authorisation
attribute certificate
biblio
Scalable Framework for Accurate Binary Code Comparison
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
maximum common subgraph
CG
comparison algorithm
empiric results heuristic method
exact matches
extensive binaries
forward slicing
functions matching process parallelization
heavily modified functions
high matching quality
IdaPro disassembler
main stages
matched vertices
matching process
call graph
old versions
PDG
practical applications
program dependence graph
programmatic changes
real world libraries
scalable framework
slightly modified functions
statically linked libraries
target program
unchanged modified functions
well-known bugs prevention
Libraries
graph theory
privacy
pubcrawl
Human behavior
invasive software
Algorithm design and analysis
tools
Semantics
Cloning
program diagnostics
Malware Analysis
resilience
Metrics
static analysis
Computer bugs
Resiliency
program debugging
Program slicing
Binary codes
accurate binary code comparison
backward slicing
binary code clone detection
Binary code comparison
binary files
Binnavi platform
calculated heuristics
biblio
Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph
Submitted by grigby1 on Wed, 06/20/2018 - 12:49pm
invasive software
static analysis approach
sensitive API call graph
Resiliency
resilience
pubcrawl
privacy
Mobile communication
Metrics
malware instances
Malware Analysis
malware
Libraries
Algorithm design and analysis
Humanoid robots
Human behavior
Heuristic algorithms
graph theory
graph similarity metric
call graph structures
application program interfaces
Androids
Android Malware family characteristic analysis
Android (operating system)
android
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »