Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Unix
biblio
Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark
Submitted by grigby1 on Tue, 08/17/2021 - 2:56pm
Assembler
Certification Center
composability
DW
Linux
Linux operating system
Linux Operating System Security
Metrics
pubcrawl
resilience
Resiliency
trusted computing environment
Unix
biblio
MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware
Submitted by grigby1 on Fri, 08/14/2020 - 10:44am
orthogonal defense
global malware operations
law enforcement agencies
MALPITY
malware authors
malware families
malware spreading
malware tarpits
monetization techniques
command and control systems
POSIX
Sinkholing
Socket API
Tarpit
tarpit vulnerabilities
Unix
Winsock socket APIs
application programming interface
Dynamic Malware Analysis
Servers
pubcrawl
resilience
Resiliency
malware
invasive software
APIs
application program interfaces
Engines
Compositionality
network service
network operation
botnet
sockets
Grippers
botnet infrastructures
botnets
biblio
Analysis of the Noise Source Entropy Used in OpenSSL’s Random Number Generation Mechanism
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
operating systems
random key generation
Unix-like operating systems
TCP-IP layer
security protocol
secure socket layer
real-time clock
OpenSSL random number generation
open source library
noise source entropy
Noise
devrandom
cryptographic random numbers
cryptographic key generation
IP networks
OpenSSL
random number generation
Unix
public domain software
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
transport protocols
Cryptography
Scalability
biblio
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System
Submitted by aekwall on Mon, 03/18/2019 - 8:49am
Software Guard Extensions
PAM authentication framework
password
password file protection scheme
private memory regions
privileged code
sensitive applications
SGX enclave
Software Architecture
OS kernel
TCB
trusted computing base
UniSGX
Unix
Unix systems
untrusted operating system
BIOS Security
Human behavior
Scalability
authorisation
encryption
telecommunication security
Hardware
Program processors
Trusted Computing
Resiliency
security of data
pubcrawl
Metrics
authentication
Intel SGX
authentication credentials
BIOS
computational security
biblio
A Security Audit of the OpenPGP Format
Submitted by K_Hooper on Wed, 05/09/2018 - 9:56am
public domain software
OpenPGP
OpenPGP format
OpenPGP format specification
OpenPGP implementations
pattern classification
PGP
Production
Protocols
pubcrawl
open source Unix systems
Public key
Resiliency
Scalability
security audit
Security Audits
security vulnerabilities
Symantec PGP
Unix
email confidentiality
authorisation
computer security
context-free grammars
context-free languages
deterministic context free grammar
deterministic context free language
Electronic mail
email authenticity
authenticated package distributions
Formal Specification
GNU Privacy Guard
GnuPG
Grammar
Human behavior
language theoretical analysis
Language-theoretic security
malicious input data
biblio
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
integrated modelling language
UNIX operating systems
UNIX operating system
Unix
self-replicating malware
Resiliency
resilience
pwnPr3d modelling approach
pubcrawl
operating systems
Metrics
invasive software
Analytical models
ICT systems
hardware components
Hardware
cybersecurity analysis
computer security
computer architecture
composability
attack graphs
architectural cyber security analysis
Architectural Analysis
biblio
User identification through command history analysis
Submitted by BrandonB on Mon, 05/04/2015 - 1:35pm
learning (artificial intelligence)
user profile corpus
user identification
user corpora
user configuration
Unix user
Unix
standard algorithm
Semantics
Schonlau variant
Schonlau masquerading corpus
Schonlau corpus
natural language processing
natural language authorship attribution literature
Accuracy
Information analysis
History
feature set
feature extraction
Entropy
editor war
Decision trees
computer science
command-line history
command-line behavior
command history analysis
Cal Poly command history corpus