Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Layout
biblio
GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications
Submitted by aekwall on Mon, 11/11/2019 - 11:48am
Android mobile platform
User input
user data collection
private information
privacy-relevant app categories
privacy policy claims
privacy policy alignment
privacy leaks detection
Mobile privacy policy
Humanoid robots
graphical user interfaces
app producers
app code
Androids
Scalability
Android ecosystem
Android apps
Android applications
Android application
privacy protection
Privacy Policies
Layout
privacy
pubcrawl
Human behavior
mobile computing
Ontologies
data privacy
biblio
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
Submitted by grigby1 on Mon, 11/04/2019 - 12:34pm
ROP Defense
programming
pubcrawl
Randomization
Registers
resilience
return-oriented programming
return-oriented programming attack
rop attacks
OS
Scalability
security mechanisms
security of data
Software
software watermarking
Steganography
Watermarking
defense mechanisms
Compositionality
Resiliency
Benign Use of ROP
code integrity verification
code reuse attack
composability
computer security
Control Flow Integrity
Information Reuse and Security
extended ROP attack
frequency control
Human behavior
Human Factors
Layout
operating system
operating systems (computers)
biblio
Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Submitted by aekwall on Mon, 10/14/2019 - 10:19am
privacy
FOP gadgets
function-oriented programming
Human behavior
JOP
Jump-Oriented Programming
Layout
Linux
Linux x64 environment
malicious program behavior
object oriented security
object-oriented programming
FOP attack
proftpd1.3.0 server
pubcrawl
return oriented programming
return-oriented programming
ROP
Scalability
security
security of data
Servers
shadow stack technology
tools
code reuse attack
Compositionality
Resiliency
address space layout randomization
ASLR
C Applications
C languages
C program
CFI
coarse-grained CFI
coarse-grained control-flow integrity
code injection attacks
Information Reuse and Security
code reuse attacks
composability
Conferences
Control-hijacking attacks
COOP
Counterfeit Object-oriented Programming
data-execution prevention
DEP
existing function
fine-grained CFI technologies
FOP
biblio
Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity
Submitted by grigby1 on Wed, 05/09/2018 - 2:57pm
software errors
real-time systems
resilience
Resiliency
Safe Coding
safe diversity approach
safety-critical real-time systems
safety-critical software
security
security of data
real-time processes
software vulnerabilities
static WCET analysis
timing
timing guarantees
timing properties
unacceptable performance overheads
WCET
WCET-aware artificial diversity
worst case execution time
Layout
artificial software diversity
block-level diversity
code-reuse attacks
collaboration
cyber-physical systems
embedded systems
hardware resources
Human Factors
individual probability
Artificial Diversity
Metrics
movable instruction sequences
policy-based governance
Policy-Governed Secure Collaboration
probability
pubcrawl
real-time
real-time cyber-physical systems
biblio
Introducing TFUE: The Trusted Foundry and Untrusted Employee Model in IC Supply Chain Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
pubcrawl
VLSI
trusted foundry and untrusted employee model
Trojan horses
supply chain security
security
Scalability
Resiliency
resilience
double patterning lithography
mask development lines
lithography
Layout
Integrated circuit modeling
IC supply chain security
Human behavior
Foundries
fabrication
biblio
A Novel Hardware Trojan Detection with Chip ID Based on Relative Time Delays
Submitted by grigby1 on Wed, 04/11/2018 - 2:59pm
pubcrawl
Wires
Trojan horses
trojan horse detection
transient based post-layout simulation
time-delay
side-channel signal
sensor chains
sensor chain
security
RTD
Resiliency
resilience
relative time delays
chip ID
NMOS
Layout
Inverters
Integrated circuit modeling
Integrated circuit interconnections
hardware Trojan detection method
hardware trojan
Hardware
golden chip
delays
cyber physical systems
composability
biblio
A novel transition effect ring oscillator based true random number generator for a security SoC
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Metrics
true random number generator
transition effect ring oscillator
system-on-chip
security SoC
Ring oscillators
Resiliency
resilience
random number generator
random number generation
pubcrawl
Oscillators
Microelectronic Security
Stochastic Computing Security
Layout
Inverters
FPGA
field programmable gate arrays
entropy source
Entropy
delays
composability
CMOS ASIC process
balanced TERO TRNG
application specific integrated circuits
Altera Cyclone series FPGA platform
biblio
Anomaly Detection on Bipartite Graphs for Cyber Situational Awareness and Threat Detection
Submitted by grigby1 on Tue, 02/06/2018 - 2:07pm
Anomaly Detection
Bipartite graph
composability
cyber security
Force
graph analytics
IP networks
Layout
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Servers
situational awareness
biblio
VR City: Software Analysis in Virtual Reality Environment
Submitted by K_Hooper on Wed, 01/10/2018 - 11:11am
software metrics
VR City
visualize method
visualization
virtual reality environment
virtual reality
Urban areas
Three-dimensional displays
source code modifications
source code browsing feature
software visualization tool
software visualization
Software systems
software system
Buildings
software cities
software aspects
software analysis
Resiliency
pubcrawl
program execution
new layouting algorithm
modified city metaphor
Layout
immersive systems
Human behavior
data visualisation
composability
biblio
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
Submitted by grigby1 on Tue, 12/12/2017 - 1:19pm
metadata
source code (software)
Servers
security-sensitive metadata
security of data
Scalability
Resistance
Resiliency
pubcrawl
Probes
Metadata Discovery Problem
address space layout randomization
Layout
labor-intensive source code inspection
hidden application-specific primitives
Entropy
crash-resistant primitive automated discovery
crash-resistant code primitives
Computer crashes
Compositionality
binary executables
ASLR
« first
‹ previous
1
2
3
4
5
next ›
last »