Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data flow analysis
biblio
Software Reuse Exploits in Node.js Web Apps
Submitted by grigby1 on Mon, 06/06/2022 - 12:10pm
security
Servers
pubcrawl
Resiliency
Safety
Ecosystems
Manuals
data flow analysis
Compositionality
code injection attacks
code reuse attacks
Inspection
codes
application-level DoS
private data leaks
Information Reuse
biblio
Privacy Smells: Detecting Privacy Problems in Cloud Architectures
Submitted by grigby1 on Thu, 07/08/2021 - 2:35pm
privacy
user privacy in the cloud
Quantifying privacy
privacy metrics
data flow analysis
Cloud Privacy
cloud
Measurement
user privacy
web services
computer architecture
Scalability
Resiliency
resilience
Metrics
pubcrawl
Monitoring
Cloud Computing
tools
biblio
Dynamic Information Flow Tracking for Embedded Binaries using SystemC-based Virtual Prototypes
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
Metrics
virtual prototyping
vehicle dynamics
SystemC-based virtual prototypes
security vulnerabilities
security related exploits
security policies
security of data
security
Resiliency
resilience
pubcrawl
Prototypes
accurate DIFT
existing DIFT approaches
Engines
embedded systems
embedded binaries
early DIFT
Dynamic Information Flow Tracking
DIFT engine
Data models
data flow analysis
composability
C++ languages
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 11:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Privacy Risk Assessment for Data Subject-Aware Threat Modeling
Submitted by aekwall on Mon, 03/09/2020 - 11:16am
data subject-aware threat modeling
Privacy Risk
privacy by design
Monte Carlo methods
GDPR
Context modeling
data flow diagram system models
data protection by design
data subject-aware privacy risk assessment model
Human Factors
General Data Protection Regulation
Monte Carlo simulations
privacy risk assessment
privacy threat modeling activities
risk estimation approach
threat modeling tool prototype
Security Risk Estimation
Threat Modeling
risk analysis
data privacy
risk assessment
risk management
Analytical models
Data protection
data flow analysis
Metrics
privacy
pubcrawl
Resiliency
Data models
security
Scalability
security of data
biblio
CFI: Control Flow Integrity or Control Flow Interruption?
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
return oriented programming
malicious code injection
modern Code Reuse Attacks
Monitoring
object-oriented programming
Payloads
programming
pubcrawl
Resiliency
Libraries
return-oriented programming
Runtime
runtime attacks
runtime memory vulnerabilities
Scalability
security of data
target system
rop attacks
Jump-Oriented Programming
interrupt requests
Human Factors
famous attack paradigms
execution flow
data flow analysis
data execution prevention
corrupt code pointers
control-flow integrity
Control Flow Integrity
computer security
composability
CFI-based defenses
CFI solutions
C++ languages
biblio
Tracking Sensitive Information and Operations in Integrated Clinical Environment
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
integrated Clinical Environment
sensitive information
complex ICE systems
data flow
data flow analysis framework
device interoperability
dynamic analysis
high-level supervisory apps
Ice
sensitive data
low-level communication middleware
medical cyber physical system
medical cyber-physical systems
medical devices
Publishing
sensitive operations
standardized framework
security
open systems
static analysis
medical information systems
middleware
interoperability
taint analysis
privacy
data flow analysis
standards
Metrics
composability
pubcrawl
performance evaluation
data privacy
security of data
biblio
Security Analysis for SmartThings IoT Applications
Submitted by aekwall on Mon, 01/27/2020 - 10:27am
program diagnostics
taint analysis
tainted flows
Taint-Things
Taint Static Analysis
SmartThings IoT applications
security auditors
IoT SmartHome Apps
fully automated static analysis approach
security of data
software security
Security analysis
public domain software
data flow analysis
Metrics
composability
pubcrawl
Internet of Things
biblio
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
security
program diagnostics
program verification
pubcrawl
resilience
Resiliency
restricted control transition intermediate language
Safe Coding
safe control flow recovery
program compilers
security mechanisms
security of data
security policies
Security Validation
Semantics
software fault tolerance
source code level
Explosions
Bianry Analysis
collaboration
Computational modeling
Conferences
Control Flow Recovery
control-flow recovery
data flow analysis
data-flow analyses
automatic analysis
Formal Specification
Human behavior
Human Factors
low-level object code
Memory management
Metrics
policy-based governance
biblio
Modeling, Analyzing, and Consistency Checking Privacy Requirements Using Eddy
Submitted by grigby1 on Mon, 07/24/2017 - 1:52pm
Control Theory
data flow analysis
model checking
privacy
pubcrawl
requirements engineering
Resiliency
1
2
next ›
last »