Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Software
file
Data-Dependent Instruction Timing Channels
Submitted by Hovav Shacham on Thu, 10/17/2019 - 2:32pm. Contributors:
Hovav Shacham
Ranjit Jhala
Sorin Lerner
Posters
Applied Privacy
Formal Methods and Language-based Security
Software
Systems
1514435
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
API Blindspot: Why Experienced Developers Write Vulnerable Code
Submitted by Daniela Oliveira on Thu, 10/17/2019 - 2:32pm. Contributors:
Daniela Oliveira
Muhammad Sajidur Rahman
Tian Lin
Rad Akefirad
Donovan Ellis
Eliany Perez
Lois Anne Delong
Justin Cappos
Yuriy Brun
Natalie Ebner
Posters
Software
Usability and Human Interaction
1513572
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
A Systematic Study of Comparing Traditional Machine Learning and Deep Learning for Security Vetting of Android Apps
Submitted by xinmingou on Thu, 10/17/2019 - 2:32pm. Contributors:
Xinming Ou
Doina Caragea
Sankardas Roy
Guojun Liu
Emily Alfs
Dewan Chaulagain
Posters
Software
1717862
1717871
1718214
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Machine Learning for Real-Time Data-Driven Security Practices
Submitted by grigby1 on Tue, 10/15/2019 - 2:41pm
Scalability
national vulnerability database
optimum system parameters
pubcrawl
real-time data-driven security practices
real-time systems
recommender systems
resilience
Resiliency
Memory-Based Collaborative Filtering technique
security of data
similarity-based ranking
Software
user-based
User-Based technique
vulnerability breach
vulnerable organisations
AUC evaluation metric
memory-based
Measurement
learning (artificial intelligence)
Item-Based technique
Item-Based approaches
item-based
Human Factors
damage
cyber-security vulnerability information
cyber-attacks
cyber security information utilising
cyber security
cosine similarity measure
collaborative filtering
collaboration
biblio
Hardware-Based Adversary-Controlled States Tracking
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Pipelines
target tracking
software security challenges
Software
security of data
Scalability
rop attacks
return oriented programming
Resiliency
Registers
pubcrawl
programming
program diagnostics
classic dynamic taint analysis method
memory vulnerabilities
memory data
Linux applications
Linux
Human behavior
HAST
Hardware-based Adversary-controlled States
Hardware
dynimic taint analysis
control flow
composability
code-reuse attack
biblio
Compiler-Assisted Code Randomization
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Scalability
Prototypes
pubcrawl
randomized variants
Resiliency
return oriented programming
return-oriented programming
Robustness
Runtime
program compilers
security
security of data
Software
software distribution models
software distribution norms
software diversification
software engineering
transformation-assisting metadata
composability
applied code transformation
CCR
code randomization
code uniformity
compiler level protection
compiler-assisted code randomization
compiler-rewriter cooperation
compiler security
address space layout randomization
Compositionality
fine-grained code randomization
fine-grained code transformation
Hardware
Human behavior
LLVM compiler toolchain
metadata
Metrics
file
Shielding Software From Privileged Side-Channel Attacks
Submitted by John Criswell on Fri, 10/11/2019 - 12:11pm. Contributors:
Xiaowan Dong
Zhuojia Shen
John Criswell
Alan L. Cox
Posters
Formal Methods and Language-based Security
Hardware Security Architecture
Software
Systems
1652280
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
SecureMCMR: Privacy-Preserving Computation Outsourcing for MapReduce Applications
Submitted by Ana Milanova on Fri, 10/11/2019 - 12:10pm. Contributors:
Ana Milanova
Lindsey Kennard
Posters
Applied cryptography
Software
Systems
1814898
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Evaluating Performance and Security of Executable Steganography for Surreptitious Programs
Submitted by William Mahoney on Fri, 10/11/2019 - 12:10pm. Contributors:
William Mahoney
Jeffrey McDonald
Posters
Applied Privacy
Software
1811560
1811578
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
CRII: SaTC: Creating and Managing Structurally- Morphing IT Systems-Moving Targets
Submitted by alexbardas on Fri, 10/11/2019 - 12:10pm. Contributor:
Alexandru G. Bardas
Posters
Software
Systems
1850406
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
« first
‹ previous
…
55
56
57
58
59
60
61
62
63
…
next ›
last »