Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Binary codes
biblio
Review on Trustworthy Analysis in binary code
Submitted by grigby1 on Tue, 08/02/2022 - 3:20pm
Android application
binary code
Binary codes
deep learning
Learning systems
malware
Medical services
programming
pubcrawl
resilience
Resiliency
Schedules
tools
trustworthy
Trustworthy Systems
biblio
Efficient Binary Static Code Data Flow Analysis Using Unsupervised Learning
Submitted by grigby1 on Thu, 07/28/2022 - 1:07pm
Industries
tools
static code analysis
static analysis
Resiliency
resilience
pubcrawl
Manuals
machine learning
Binary codes
Human behavior
fault diagnosis
encoding
Efficient Static Analysis
composability
Code Inspection
code analysis
biblio
Semantic Understanding of Source and Binary Code based on Natural Language Processing
Submitted by grigby1 on Thu, 03/10/2022 - 11:32am
Training
pubcrawl
Human behavior
resilience
Resiliency
Scalability
process control
natural language processing
Semantics
Syntactics
Binary codes
Transforms
binary code
LLVM IR
semantic understanding
source code
biblio
Binary Similarity Analysis for Vulnerability Detection
Submitted by aekwall on Tue, 05/18/2021 - 2:21pm
Binary Analysis
Binary Code Search
Binary codes
binary similarity
Compositionality
computer science
Human behavior
Measurement
Metrics
optimization
pubcrawl
Registers
Resiliency
Software
static analysis
vulnerability detection
biblio
Scalable and Accurate Binary Code Search Method Based on Simhash and Partial Trace
Submitted by grigby1 on Wed, 05/05/2021 - 11:21am
Binary Code Search
Binary codes
distortion
Filtering
malware
Malware Homology Analysisi
Partial Trace
pubcrawl
Scalability
Scalable Security
security
simHash
Syntactics
tools
biblio
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return Addresses**Thanks to all the reviewers for their valuable comments. This research is supported by an Australian Research Council grant (DP180104069).
Submitted by aekwall on Mon, 05/03/2021 - 12:05pm
return oriented programming
Benchmark testing
Binary codes
composability
Control Flow Integrity
Human Factors
programming
pubcrawl
Resiliency
return-oriented programming
rop attacks
Runtime
Runtime Rerandomization
Scalability
shadow stack
biblio
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Submitted by aekwall on Thu, 04/08/2021 - 3:34pm
rewriting systems
system-level security facilities
rewriting-based randomization
quantitative assessment
legacy software systems
legacy software
legacy binaries
fine-grained randomization tools
code-reuse attacks
Binary Rewriting
advanced security attacks
Information Reuse and Security
security of data
source code
Binary codes
code-reuse attack
fine-grained code randomization
code randomization
Compositionality
software maintenance
risk assessment
pubcrawl
Resiliency
biblio
Hash Retrieval Method for Recaptured Images Based on Convolutional Neural Network
Submitted by aekwall on Mon, 03/29/2021 - 11:08am
advertising data processing
retrieving algorithm
retrieval performance
recaptured image retrieval
recaptured advertising images
outdoor advertising market researching
hashing method
hash retrieval method
hash layer
binary hash code output
AD images
Convolutional codes
hash algorithms
Cryptography
advertising
Binary codes
Compositionality
image retrieval
visualization
pubcrawl
convolutional neural networks
convolutional neural network
Training
Robustness
Resiliency
feature extraction
biblio
Introducing Code Assets of a New White-Box Security Modeling Language
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
Metrics
white-box security modeling language
White-box security
WB security analysis
testing
specification languages
source code (software)
software protection technologies
software protection solutions
Software
Security modeling language
reverse engineer
Resiliency
resilience
pubcrawl
White Box Security
i-WBS
Data protection
Conferences
Computer crime
Computational modeling
composability
code security
code assets
Binary codes
binary code
attacker
Analytical models
security
white box
biblio
Binarized Attributed Network Embedding via Neural Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:36pm
Hamming space
Knowledge engineering
autoencoder
attribute similarity penalizing term
Attributed Network
binary code learning
data reduction
dimension reduction
feature aggregation
network coding
learned binary representation vectors
network embedding
node classification
node clustering
relaxation-quantization method
unsupervised neural based binarized attributed network embedding
Weisfeiler-Lehman Proximity Matirx
Weisfeiler-Lehman proximity matrix
composability
feature extraction
Neural networks
pubcrawl
Metrics
resilience
Resiliency
matrix algebra
optimization
learning (artificial intelligence)
Data mining
pattern classification
neural nets
Task Analysis
network theory (graphs)
pattern clustering
Binary codes
neural network training
1
2
3
next ›
last »