Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Instruction sets
biblio
Bytecode Heuristic Signatures for Detecting Malware Behavior
Submitted by aekwall on Mon, 03/09/2020 - 10:13am
virtual machines
predictability
Security Heuristics
signature
reactive security solutions
proactive behavior heuristics
proactive approaches
malicious applications
heuristic
hash-based signatures
bytecode heuristic signatures
bytecode
behavior based detection
behavior
response time
Instruction sets
Monitoring
Computer languages
low performance overhead
Prototypes
malware behavior
computational complexity
Virtual machining
digital signatures
pubcrawl
Resiliency
invasive software
malware detection
security
malware
Scalability
biblio
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors
Submitted by aekwall on Mon, 02/10/2020 - 10:57am
security of data
pubcrawl
Resiliency
SATIN
Scalability
secure introspection mechanism
secure world checking solutions
secure world introspection
security
operating systems (computers)
security policy violations
security protection
Trusted Computing
Trusted Execution Environment
trustworthy asynchronous introspection mechanism
Trustworthy Systems
TrustZone security extension
Mobile handsets
Asynchronous Introspection
composability
cyber physical systems
Evasion Attack
Instruction sets
Kernel
Metrics
microprocessor chips
ARM development board
multicore ARM processors
multicore ARM system
multicore computing security
Multicore processing
multiprocessing systems
normal world snapshot
normal-world evasion attack
biblio
Graphical User Interface for OpenThread
Submitted by aekwall on Mon, 01/13/2020 - 11:05am
graphical user interfaces
Threadgroup
Thread protocol
TCL/TK
OpenThread
Message systems
IPv6
Instruction sets
IEEE 802.15.4
IoT
6LoWPAN
Routing protocols
Peer-to-peer computing
composability
pubcrawl
Resiliency
Internet of Things
biblio
UFO: Predictive Concurrency Use-After-Free Detection
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
security of data
program diagnostics
program operating
provably higher detection capability
pubcrawl
rare thread schedules
resilience
Resiliency
Schedules
scheduling
program debugging
single observed execution trace
tools
UAF
UAF detection
UAF vulnerabilities
UFO
UFO scales
use-after-free vulnerabilities
vulnerabilities
cyber-physical system
Chromium
common attack vectors
composability
Concurrency
concurrency UAF
concurrency use-after-free detection
Concurrent computing
concurrent programs
critical software systems
Browsers
cyber-physical systems
encoding
extended maximal thread causality model
Instruction sets
larger thread scheduling space
Metrics
multi-threading
multithreaded execution trace
Predictive Metrics
biblio
OWL: Understanding and Detecting Concurrency Attacks
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
Computer bugs
Predictive Metrics
Concurrency
Software Testing
single-threaded programs
OWL source code
OWL
knowledge representation languages
concurrency bug detectors
concurrency attack exploit scripts
Concurrency Attack
bug-inducing inputs
Concurrent computing
concurrency control
security
cyber-physical system
cyber-physical systems
Instruction sets
program debugging
public domain software
Linux
composability
Resiliency
Metrics
pubcrawl
resilience
tools
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
pubcrawl
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
Metrics
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
Concurrent computing
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrency
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by grigby1 on Mon, 11/04/2019 - 11:35am
ROP-style code reuse attacks
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
Model driven development
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
Biomedical monitoring
Instruction sets
Human Factors
Human behavior
high level synthesis
hardware-based protection
Hardware Security
hardware runtime monitors
hardware monitor
Hardware
formal verification
embedded systems
embedded processor
embedded hardware
composability
building memory protection mechanisms
biblio
Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
Resiliency
x64-based Linux platform
W ⊕ X security model
Task Analysis
security of data
security
scratch registers
scratch register
Scalability
ROP malicious code
rop attacks
ROP attack
Return-oriented Programming attacks
return oriented programming
return instructions
binary instrumentation
Registers
pubcrawl
programming
parameter registers
object-oriented programming
malware
Linux
Kernel
Instruction sets
Human behavior
composability
code reuse attack
calling convention
biblio
Safe Automated Refactoring for Intelligent Parallelization of Java 8 Streams
Submitted by grigby1 on Thu, 09/26/2019 - 9:24am
semantics-preserving fashion
policy-based governance
pubcrawl
Refactoring
resilience
Resiliency
running operations
safe automated refactoring
Safe Coding
Semantics
Pipelines
sequential streams
software maintenance
static analysis
Stream API
stream code
stream operations
streams
typestate analysis
Writing
Instruction sets
automated refactoring approach
automatic parallelization
collaboration
data structures
finite data structures
Human behavior
Human Factors
Image color analysis
infinite data structures
application program interfaces
intelligent parallelization
Java
Java 8
lambda expression side-effects
mainstream object-oriented programming languages
MapReduce-style operations
Metrics
optimizing stream code
parallel streams
biblio
VM processes state detection by hypervisor tracing
Submitted by grigby1 on Mon, 01/21/2019 - 11:18am
virtualisation
security
Trace Compass
virtual machine
Virtual machine monitors
virtual machines
Virtual machining
Virtual Process
virtual Process State Detection algorithm
Resiliency
Virtualization
virtualization privacy
VM processes state detection
VM trace analysis algorithm
vPSD
Wait Analysis
wait state
Instruction sets
Cloud Computing
cloud environments
composability
Data collection
host hypervisor
host kernel tracing
Human behavior
hypervisor tracing
cloud
interactive trace viewer
Metrics
Monitoring
Performance analysis
physical host level
privacy
pubcrawl
« first
‹ previous
1
2
3
4
5
next ›
last »