Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
performance overhead
biblio
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks
Submitted by grigby1 on Tue, 02/18/2020 - 12:05pm
security
performance trade-offs
Probes
Protocols
pubcrawl
realistic evaluation
Reconnaissance
resilience
Resiliency
Scalability
performance overhead
security benefit
security techniques
Servers
Software Defined Network
software defined networking
Software Defined Networks
virtualisation
virtualised network
Moving Target Defence
comparison techniques
computer network security
Damage Assessment
flexible random virtual IP multiplexing
frequent address mutation
FRVM
IP multiplexing moving target defence
IP networks
Metrics
Analytical models
moving target defence technique
moving target defense
MTD techniques
Multiplexing
network attacks
network configurations
Network reconnaissance
Performance
biblio
Hiding the Long Latency of Persist Barriers Using Speculative Execution
Submitted by grigby1 on Wed, 05/09/2018 - 2:56pm
resilience
nonvolatile memory technology
NVMM
pcommit
performance bottleneck
performance overhead
persist barriers
persistence instructions
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
Random access memory
random-access storage
Nonvolatile memory
Resiliency
Safe Coding
Safety
significant execution time overhead
Software
speculative execution
Speculative Persistence
speculative persistence architecture
storage management
substantial performance boost
volatile caches
fail-safe code
checkpoint-based processing
checkpointing
clflushopt
clwb
collaboration
common data structures
consistent state
data structures
DRAM
DRAM chips
expensive fence operations
cache storage
Failure Safety
file system
Force
Human Factors
logging based transactions
long latency persistency operations
Metrics
modern systems reorder memory operations
non-volatile main memory
nonpersistent implementations
NonVolatile Main Memory
biblio
Preventing Client Side XSS with Rewrite Based Dynamic Information Flow
Submitted by BrandonB on Tue, 05/05/2015 - 10:49am
Semantics
JavaScript abstract syntax tree
JavaScript code
JSTFlow
online front-ends
performance overhead
rewrite based dynamic information flow
security
security of data
JavaScript
sensitive information leaks
Syntactics
taint engine
taint model
tainted information flow
web applications
XSS attacks
abstract intermediate representation
Java
internet
information security
information flow tracking framework
information flow analysis
fine-grained isolation
Engines
Data models
data flow analysis
cross-site scripting
code rewrite
client side XSS
Browsers
browser proxy
Abstracts
biblio
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks
Submitted by BrandonB on Tue, 05/05/2015 - 10:29am
ordered hierarchy
Virtual machine monitors
user-level applications
System software
supervisory programs
storage management
security of data
processor architecture
privileged system software
privilege level
permission mechanism
Permission
performance overhead
arbitrary malicious activities
operating systems
noninclusive memory permissions architecture
modern computer system protection
modern commodity systems
Memory management
hypervisor code
high-privileged software layer
hardware-supported page permission scheme
hardware complexity
Hardware
cross-layer attack protection
complex software stack protection