Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program testing
biblio
Enhanced Automated-Scripting Method for Improved Management of SQL Injection Penetration Tests on a Large Scale
Submitted by grigby1 on Mon, 02/10/2020 - 10:24am
resilience
SQLiAutoScript method
SQLi penetration tests
SQL injection test
SQL injection penetration tests
SQL injection
SQL detection
SQL
security of data
Resiliency
collaboration
pubcrawl
program testing
privacy
policy-based governance
penetration tests
Metrics
large-scale SQL injections
Human behavior
enhanced automated-scripting method
biblio
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
library function identification approach
dynamic analysis framework
dynamic analysis techniques
embedded firmware source code
FIoT framework
firmware analysis
firmware images
fuzzing
fuzzing test
hardware architectures
IoT device operating systems
IoT industry
CFG recovery approach
lightweight IoT device firmware images
lightweight IoT firmware
memory corruption
memory corruption vulnerabilities
Microprogramming
Program slicing
security researchers
time 170.0 s
time 210.0 s
time 40.0 s
zero trust
firmware
Scalability
Internet of Things
security
performance evaluation
system monitoring
Resiliency
pubcrawl
policy-based governance
program testing
Libraries
static analysis
computer network security
program diagnostics
Human Factors
operating systems (computers)
program compilers
Loading
lightweight IoT devices
address determination analysis
backward slice approach
binary code snippets
Binary codes
binary firmware
biblio
Vulnerability Prediction Based on Weighted Software Network for Secure Software Building
Submitted by grigby1 on Tue, 11/12/2019 - 3:25pm
security
weighted software network
vulnerable software modules
vulnerable classes
vulnerability prediction models
Software systems
software system
software security testing
Software Security Metrics
software metrics
security of data
Complexity theory
secure software building
secure communications software
public security vulnerabilities
pubcrawl
program testing
predictive security metrics
Predictive models
prediction model
Metrics
biblio
ROPMate: Visually Assisting the Creation of ROP-based Exploits
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
ROP chains
visual analytics system
visual analytics
visual aids
tools
Task Analysis
software reliability
semantically meaningful gadgets
semantically correct chains
security of data
security
Scalability
ROPMate
ROP-based exploits
ROP-based attacks
ROP Exploits
Buildings
rop attacks
return-oriented programming
return oriented programming
Resiliency
Registers
pubcrawl
programming
program testing
Malware Analysis
Human behavior
data visualisation
data analysis
composability
code reuse
biblio
Weak-Assert: A Weakness-Oriented Assertion Recommendation Toolkit for Program Analysis
Submitted by aekwall on Mon, 08/26/2019 - 9:07am
program weakness
tools
testing
Syntactics
Software
security weaknesses
security
resilience
pubcrawl
assertion recommendation
program testing
policy-based governance
pattern matching
Metrics
Human behavior
Hardware
formal program verifcation
biblio
Research of Industrial Control System Device Firmware Vulnerability Mining Technology Based on Taint Analysis
Submitted by grigby1 on Thu, 05/09/2019 - 9:46am
program testing
vulnerability mining
test efficiency
taint analysis technology
taint analysis
Software
security of data
security
scalable
Scalability
Resiliency
resilience
pubcrawl
component
Microprogramming
integrated circuits
Industrial Control Systems
industrial control system device firmware vulnerability mining technology
industrial control system
industrial control
Hardware
fuzzing test
firmware
device firmware
Data mining
biblio
FP -TESTER : Automated Testing of Browser Fingerprint Resilience
Submitted by grigby1 on Fri, 04/05/2019 - 9:27am
Browser Security
testing toolkit
software tools
privacy leaks
FP-TESTER
browser vendors
browser tracking
browser fingerprint resilience
Automated Testing
Resiliency
Statistics
Sociology
program testing
Compositionality
privacy
Fingerprint recognition
Browser Fingerprinting
online front-ends
Entropy
Browsers
Metrics
Human behavior
pubcrawl
resilience
testing
security of data
data privacy
internet
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 10:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
biblio
Vulnerability Detection on Mobile Applications Using State Machine Inference
Submitted by grigby1 on Mon, 01/21/2019 - 11:15am
Mobile Applications
vulnerability detection
testing methodology
testing
state machine learning
state machine inference
security violations
security of data
security
Resiliency
pubcrawl
program testing
model inference
mobile computing
Android (operating system)
mobile application security
Mobile Application
mobile Android applications
Metrics
machine learning
learning (artificial intelligence)
Inference algorithms
Humanoid robots
Human behavior
finite state machines
Compositionality
Androids
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »