Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program testing
biblio
Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery
Submitted by aekwall on Thu, 04/08/2021 - 4:34pm
Payloads
vulnerability discovery
information foraging
automatic exploit generation
automatic attack generation
antivirus tool
Information Reuse and Security
security testing
security auditing
Trojan detection
Compositionality
anti-virus
security
computer viruses
Trojan horses
Data mining
Analytical models
program testing
tools
software security
pubcrawl
Resiliency
Data models
malware detection
biblio
Extracting Taint Specifications for JavaScript Libraries
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
static analysis tools
pubcrawl
resilience
Resiliency
security
security of data
security vulnerabilities
software engineering
static analysis
program testing
taint sinks
taint specifications
test suites
testing
third-party libraries
tools
Writing
JavaScript applications
access path mechanism
authoring languages
command injection attacks
composability
cross-site scripting
dynamic analysis
Entry points
exit points
taint analysis
JavaScript libraries
Libraries
Metrics
Node.js platform
npm repository
package dependency structure
program diagnostics
biblio
Improving Fuzzing through Controlled Compilation
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
beneficial compiler optimizations
standard compilers
rigorous evaluation methodology
qualitative coverage
program line
LLVM
Intermediate Representation
grey-box fuzzers
fuzzing strategy
fuzzing consistency
current coverage-based evaluation measures
coverage metrics
coverage mesaures
coverage
controlled compilation
concolic fuzzers
security of data
AFL's configuration
AFL
open source projects
source code
fuzzing
compiler security
program compilers
Compositionality
fuzzy set theory
program testing
Metrics
pubcrawl
Resiliency
Scalability
biblio
Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems
Submitted by aekwall on Tue, 03/09/2021 - 12:04pm
inferred states
automated software engineering tasks
Black-box Model Inference
black-box systems
black-box techniques
black-box third-party libraries
C code
detection techniques
entire source code
existing dynamic model inference techniques
hybrid deep neural network
infer state models
888 random recent system-level test cases
inferring behavior model
program comprehension
recurrent layers
run-time traces
running software system
Specification Mining
state change points
state classification algorithm
traditional time series change
UAV auto-pilot solution
white-box
Anomaly Detection
Time measurement
Classification algorithms
learning (artificial intelligence)
Resiliency
pubcrawl
composability
Metrics
neural nets
pattern classification
program testing
testing
Task Analysis
software engineering
black box encryption
aerospace computing
deep learning
Instruments
inference mechanisms
time series
convolutional neural network
Time series analysis
recurrent neural network
convolutional layers
biblio
Can We Predict the Quality of Spectrum-based Fault Localization?
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
fault diagnosis
work factor metrics
static test suite
static test metrics
spectrum-based fault localization
prediction model
potential effectiveness
fault-related metrics
fault localization techniques
fault localization effectiveness
effective fault localization
dynamic test suite
dynamic test metrics
debugging
automated fault localization
Scalability
Couplings
software fault tolerance
software metrics
program debugging
Predictive models
Complexity theory
Measurement
machine learning
program testing
tools
Metrics
pubcrawl
Resiliency
Electronic mail
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
Mobile bootloader with security features
Submitted by grigby1 on Tue, 11/17/2020 - 2:40pm
program testing
Operating systems security
software design
security features
modern mobile operating systems
mobile development
mobile bootloader
excessive information
device internal storage
described problem
bootloading stage
bootloader
Booting
Software Testing
security of data
operating systems (computers)
resilience
software engineering
computer security
smart phones
mobile computing
composability
information security
Cryptography
Resiliency
Metrics
pubcrawl
system logs
biblio
Two-Stage Architectures for Resilient Lightweight PUFs
Submitted by aekwall on Mon, 11/16/2020 - 2:59pm
reverse engineering
Resilient Security Architectures
Product codes
physical unclonable function (PUF)
Maximum likelihood decoding
integrated circuit reliability
Differential Comparator PUF
Current Mirror PUF
arbiter PUF
Transistors
Threshold voltage
Binary codes
security of data
resilience
Decoding
program testing
machine learning
pubcrawl
Resiliency
invasive software
security
Internet of Things
field programmable gate arrays
biblio
Cloud-based Labs and Programming Assignments in Networking and Cybersecurity Courses
Submitted by grigby1 on Wed, 11/04/2020 - 2:02pm
learning activities
teaching
Servers
Security Programming
security of data
public cloud
pubcrawl
Programming profession
programming languages
programming assignments
program testing
program debugging
private cloud
privacy
networking course
Network Programming
Cloud Computing
Laboratories
innovative design
innovate practice
Hands-On Laboratory
educational courses
education
cybersecurity education
cybersecurity course
cyber physical systems
course learning objectives
computer security
computer science education
computer aided instruction
cloud-based labs
biblio
Gathering Insights from Teenagers’ Hacking Experience with Authentic Cybersecurity Tools
Submitted by grigby1 on Wed, 11/04/2020 - 2:01pm
Games
tools
serious games (computing)
science-popularizing program
realistic virtual network infrastructure
pubcrawl
program testing
professional game
privacy
Penetration Testing
Hacking
active learning
further education
education
cybersecurity tools
cybersecurity game
cybersecurity education
cyber physical systems
Conferences
Computer crime
computer aided instruction
authentic cybersecurity
1
2
3
4
5
6
7
next ›
last »