Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security vulnerabilities
biblio
Hardware malicious circuit identification using self referencing approach
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
post-silicon testing
Trojan horses
testing
Test vector generation
Temporal Self Referencing
side channel analysis
sequential Trojans
Sequential trojan
self referencing approach
security vulnerabilities
Robust Trojans
Resiliency
resilience
pubcrawl
Power measurement
composability
Payloads
outsourced products
Microelectronic Security
Metrics
malicious inclusions
logic testing
leakage power
invasive software
hardware Trojan detection sensitivity
hardware malicious circuit identification
Hardware
delays
Cryptography
biblio
Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars
Submitted by grigby1 on Thu, 02/15/2018 - 11:44am
Resiliency
Human Factors
input based attack elimination
McHammerCoder
Nails
parsers
Protocols
pubcrawl
reliable systems
resilience
human factor
Scalability
secure systems
security of data
security vulnerabilities
Software systems
SQL
textual languages
unparsers
custom language
automated decoders
automated encoders
binary languages
communication language
context-free grammars
correct parsing
Cross Site Scripting
Cross Site Scripting (XSS)
cross-site scripting
arbitrary code execution
data encoding
encoding
encoding generation
formal languages
Generators
Grammar
grammars
Human behavior
biblio
Considerations for secure and resilient satellite architectures
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
Resiliency
aerospace computing
Aerospace electronics
architectural design considerations
artificial satellites
cyber-physical systems)
data confidentiality
data integrity
ground segment
notional satellite architecture
Orbits
potential attack vectors
potential security risks
Propulsion
pubcrawl
Vulnerability Analysis
resilient satellite architectures
Resilient Security Architectures
risk analysis
satellite architecture
Satellite broadcasting
Satellites
secure satellite architectures
security
security of data
security vulnerabilities
Space vehicles
spacecraft systems
systems-level approach
uplink/downlink components
biblio
Evaluating micro patterns and software metrics in vulnerability prediction
Submitted by grigby1 on Thu, 12/28/2017 - 1:30pm
source code
pubcrawl
security
security of data
security vulnerabilities
Software
software metrics
software quality
software security
program testing
source code (software)
stand-alone Java web applications
time effective software testing
traditional class-level software metrics
traditional software metrics
vulnerability prediction model
vulnerable classes
vulnerable code
Java
Apache Tomcat
class-level patterns
class-level traceable patterns
Complexity theory
cost effective software testing
Design patterns
early detection
internet
Apache Camel
learning (artificial intelligence)
machine learning techniques
Metrics
micropatterns evaluation
Object oriented modeling
Predictive Metrics
Predictive models
predictive security metrics
biblio
Source File Set Search for Clone-and-Own Reuse Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Software reuse
Resiliency
security
security vulnerabilities
SHA-1 file hash
Software
software ecosystem
software packages
software reusability
pubcrawl
source code repositories
source code reuse
source code search
source code (software)
source files
source file set search
version control system
Android (operating system)
origin analysis
Information Reuse
Firefox source code
file clone detection
efficient file similarity computation
directory names
Debian Linux package
Debian GNU package
Data mining
Cryptography
component extraction
Cloning
clone-and-own reuse analysis
b-bit minwise hashing technique
Android source code
biblio
Is Newer Always Better?: The Case of Vulnerability Prediction Models
Submitted by grigby1 on Mon, 06/05/2017 - 12:53pm
composability
prediction models
pubcrawl
Scalability
security vulnerabilities
software assurance
biblio
Static Detection of User-specified Security Vulnerabilities in Client-side JavaScript
Submitted by grigby1 on Wed, 05/17/2017 - 1:47pm
composability
declarative
graph queries
Human behavior
JavaScript
pubcrawl
Resiliency
Security by Default
security vulnerabilities
static analysis
static code analysis
biblio
Weak Keys Remain Widespread in Network Devices
Submitted by grigby1 on Mon, 04/03/2017 - 11:54am
composability
Metrics
network control systems
network control systems security
networked control systems
networked devices
pubcrawl
random key generation
Resiliency
security
security vulnerabilities
security weaknesses
biblio
A Study of Security Vulnerabilities on Docker Hub
Submitted by enck on Fri, 03/31/2017 - 12:48pm
Apr'17
Docker Images
NCSU
Resilient Architectures
security vulnerabilities
Smart Isolation in Large-Scale Production Computing Infrastructures
Vulnerability Propagation
Resilient Architectures
NCSU
Smart Isolation in Large-Scale Production Computing Infrastructures
Apr'17
file
Vanciu_Comparative_Evaluation.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:10pm
CMU
comparative evaluation
July'14
security vulnerabilities
static analysis
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »