Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authoring languages
biblio
Extracting Taint Specifications for JavaScript Libraries
Submitted by grigby1 on Mon, 03/15/2021 - 12:10pm
static analysis tools
pubcrawl
resilience
Resiliency
security
security of data
security vulnerabilities
software engineering
static analysis
program testing
taint sinks
taint specifications
test suites
testing
third-party libraries
tools
Writing
JavaScript applications
access path mechanism
authoring languages
command injection attacks
composability
cross-site scripting
dynamic analysis
Entry points
exit points
taint analysis
JavaScript libraries
Libraries
Metrics
Node.js platform
npm repository
package dependency structure
program diagnostics
biblio
Biometric System of Access to Information Resources
Submitted by aekwall on Tue, 03/09/2021 - 10:57am
internet
webhost web server
web resource
unauthorized access
structural schematic diagram
software and hardware complex
Scalability
Resiliency
pubcrawl
phpMyAdmin database server
PHP scripting language
personal data
online front-ends
Metrics
JavaScript
Java
biometric encryption
information resourses
information resources
information resource
Identification
hypermedia markup languages
HTML hypertext markup language
hardware complex
Google Chrome extension
fingerprint
embedded scripts
developed complex
C language
biometric system
authorisation
authoring languages
biblio
Hardening Firefox against Injection Attacks
Submitted by grigby1 on Wed, 02/10/2021 - 12:22pm
real-world security vulnerabilities
user interfaces
Web pages
Browser Security
information retrieval
CSS
Firefox
Hardening
injection attacks
HTML
Universal Cross-site Scripting
untrusted Web content
user interface
Web browsers display content
web security
Web security model
Cross Site Scripting
online front-ends
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Runtime
security of data
JavaScript
World Wide Web
authoring languages
Browsers
operating systems
Web sites
hypermedia markup languages
biblio
Research and Implementation of Cross-site Scripting Defense Method Based on Moving Target Defense Technology
Submitted by aekwall on Mon, 12/16/2019 - 1:17pm
moving target defense technology
XSS defense method
Web pages
Web application
security of data
security check function
Scalability
resilience
Reactive power
random processes
random attribute
pubcrawl
programmable logic arrays
online front-ends
MTD
authoring languages
moving target defense
JavaScript engine
JavaScript code
Java
internet
hypertext markup language
hypermedia markup languages
Human behavior
HTML
Engines
cross-site scripting attack
cross-site scripting
Cross Site Scripting
Browsers
biblio
Formally Verified Cryptographic Web Applications in WebAssembly
Submitted by aekwall on Mon, 12/02/2019 - 11:08am
verification
Protocols
pubcrawl
public domain software
Resiliency
Scalability
security-critical software
Servers
Signal
sophisticated custom cryptographic components
standard protocols
standards
toolchain
program verification
verification techniques
verification-oriented programming languages
verified cryptographic Web applications
verified HACL cryptographic library
verified implementation
verified-software
web-security
Webassembly
WebAssembly compilers
WebAssembly version
whatsapp
formal verification
Browsers
CoMP
compilation pipeline
compiler
compiler security
Compositionality
cryptographic code
Cryptographic Protocols
cryptographic-library
cryptographic-protocol-verification
Cryptography
authoring languages
high-assurance cryptographic libraries
high-profile attacks
instruction set
Java
JavaScript runtimes
Libraries
low-level subset
Metrics
modern Web applications
program compilers
program diagnostics
biblio
A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
Submitted by grigby1 on Mon, 12/10/2018 - 10:38am
pubcrawl
malicious JavaScript detection
malicious JS code detection
malicious JS codes
Metrics
neural nets
neural network model
Neural networks
pattern classification
plugin software
Predictive models
machine learning
resilience
Resiliency
Support vector machines
Vectors
web applications
Web site
Web sites
Zero day attacks
Zero-day attacks
drive-by-download attacks
Browsers
classifier model
composability
Context modeling
cyberattacks
Cybersecurity
D3M Dataset
defense
Doc2Vec
Doc2Vec features
authoring languages
Drive-by-Download Data
feature extraction
feature learning
features extraction
fixed length vector representation
invasive software
Java
JavaScript
learning (artificial intelligence)
biblio
Zero-Collateral Lotteries in Bitcoin and Ethereum
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
Human behavior
zero-collateral lotteries
tournament bracket construction
scripting language
Scalability
pubcrawl
Protocols
privacy
off-chain setup phase
Human Factors
human factor
authoring languages
Europe
Ethereum-based implementation
electronic money
Cryptographic Protocols
cryptocurrency-based lottery protocols
contracts
bitcoin security
Bitcoin implementation
bitcoin
biblio
Automated Test Generation from Vulnerability Signatures
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
insecure Web applications
web services
vulnerability signatures
validation and sanitization
transition
testing
string analysis
static string analysis undecidability
state
security
scripting languages
program testing
program diagnostics
path coverage
Algorithm design and analysis
HTML
digital signatures
Databases
automatic vulnerability signature computation
automated test case generation
automata-based test generation
automata-based static string analysis techniques
automata theory
automata
authoring languages
attack string discovery
Approximation methods