Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
reliable systems
biblio
Eliminating Input-Based Attacks by Deriving Automated Encoders and Decoders from Context-Free Grammars
Submitted by grigby1 on Thu, 02/15/2018 - 10:44am
Resiliency
Human Factors
input based attack elimination
McHammerCoder
Nails
parsers
Protocols
pubcrawl
reliable systems
resilience
human factor
Scalability
secure systems
security of data
security vulnerabilities
Software systems
SQL
textual languages
unparsers
custom language
automated decoders
automated encoders
binary languages
communication language
context-free grammars
correct parsing
Cross Site Scripting
Cross Site Scripting (XSS)
cross-site scripting
arbitrary code execution
data encoding
encoding
encoding generation
formal languages
Generators
Grammar
grammars
Human behavior
file
Iyer NSA mtg UMD System Resiliency nov 2014
Submitted by awhitesell on Wed, 11/16/2016 - 11:07am
Architectures
Science of Security
Architectures
Data Driven Security Models and Analysis
Intrusion/Anomaly Detection and Malware Mitigation
NSA SoS Lablets Materials
predictive security metrics
reliable systems
Resiliency
Science of Security
UIUC
UIUC
Intrusion/Anomaly Detection and Malware Mitigation
NSA SoS Lablets Materials
Data Driven Security Models and Analysis
biblio
Resiliency Survey: Challenges Going Forward
Submitted by awhitesell on Wed, 11/16/2016 - 11:07am
Architectures
Science of Security
Architectures
Data Driven Security Models and Analysis
Intrusion/Anomaly Detection and Malware Mitigation
NSA SoS Lablets Materials
predictive security metrics
reliable systems
Resiliency
Science of Security
UIUC
UIUC
Intrusion/Anomaly Detection and Malware Mitigation
NSA SoS Lablets Materials
Data Driven Security Models and Analysis