Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating system kernels
biblio
Design and Implementation of Azalea unikernel file IO offload
Submitted by grigby1 on Fri, 10/30/2020 - 11:18am
Libraries
unikernel transfers
unikernel
Telecommunications
storage management
software libraries
security
Scalability
pubcrawl
operating systems (computers)
operating systems
operating system kernels
Offloading
Linux
azalea unikernel file IO offload
Kernel
Io offload
input-output programs
i-o systems security
I-O Systems
File systems
file system
file servers
file server
file organisation
file IO result
file IO command
biblio
Performance Enhancement of Snort IDS through Kernel Modification
Submitted by aekwall on Mon, 10/26/2020 - 10:47am
NAPI throughput
telecommunication traffic
Task Analysis
Snort performance
snort packet handling capacity
Snort IDS
security of data
Resiliency
pubcrawl
Predictive Metrics
performance enhancement metrics
performance enhancement
Packet loss
operating system kernels
open-source intrusion detection system
composability
NAPI packet reception mechanism
Monitoring
Metrics
Measurement
Linux Operating System Security
Linux key parameters
Linux kernel networking subsystem
Linux
Kernel subsystem
kernel modifications
Kernel modification
Kernel
Intrusion Detection
high traffic load
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
A Novel Approach of Unprivileged Keylogger Detection
Submitted by grigby1 on Fri, 09/04/2020 - 2:17pm
Keyboards
BIOS Security
userspace keylogger detection
unprivileged keylogger detection
surveillance software
spyware
privileged
operating system kernels
monitoring software
malware packages
keystroke simulation
keystroke logger
Keylogger userspace
Kernel keylogger
confidential data stealing
authorisation
microsoft windows
Human Factors
Kernel
Computers
resilience
Resiliency
Metrics
pubcrawl
mobile computing
security
invasive software
Scalability
Monitoring
biblio
Hardening the Core: Understanding and Detection of XNU Kernel Vulnerabilities
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
Compositionality
iOS Security
XNU kernel vulnerability
XNU kernel vulnerabilities
macOS/iOS kernel XNU
KInspector framework
feedback-based fuzzing techniques
feedback based fuzzing
common application vulnerabilities
statistical analysis
Manuals
operating system kernels
fuzzing
security of data
empirical study
Instruments
Human Factors
Engines
security vulnerabilities
vulnerability detection
Metrics
pubcrawl
Resiliency
Kernel
security
biblio
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Submitted by grigby1 on Fri, 04/17/2020 - 10:28am
system monitoring
OS kernel
OS resource management
pubcrawl
Registers
resilience
Resiliency
rootkit
run-time features
security of data
OS
target kernel module
TF-IDF method
user-mode rootkit detection
Virtual machine monitors
virtual machines
virtualisation
Virtualization
windows kernel rootkits
Windows Operating System Security
kernel space
feature extraction
Hardware
hardware assisted virtualization technology
invasive software
Kernel
kernel rootkit
kernel rootkit detection approach
kernel rootkit detection solution
kernel rootkit detection system
composability
learning (artificial intelligence)
machine learning
machine learning techniques
malicious kernel module
Metrics
operating system
operating system kernels
operating systems (computers)
biblio
Undertow: An Intra-Kernel Isolation Mechanism for Hardware-Assisted Virtual Machines
Submitted by grigby1 on Fri, 04/17/2020 - 9:24am
isolation
bug-prone
commodity operating system
critical data
EPT violations
flexible cloud servers
guest kernel
guest virtual machine
Hardware virtualization
hardware-assisted isolation mechanism
hardware-assisted virtual machines
Intel processors
intra-kernel isolation mechanism
isolated environment
boot time
Kernel Protection
multiple restricted Extended Page Table
nested kernel
popular paths
pre-defined EPT
read-only protection
system calls
unpopular paths
untrusted code
untrusted outter kernel
virtualization exception
VMFUNC
virtualization privacy
composability
Cloud Computing
security
Trusted Computing
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data privacy
sensitive data
privacy
storage management
security threats
authorisation
invasive software
Linux
Switches
virtualisation
Virtual machining
Kernel
operating system kernels
Virtual machine monitors
virtual machines
Virtualization
Metrics
security policies
bare-metal machines
biblio
HyperPS: A Hypervisor Monitoring Approach Based on Privilege Separation
Submitted by grigby1 on Fri, 03/27/2020 - 10:28am
security of data
policy-based governance
privilege separation
pubcrawl
Registers
resilience
Resiliency
Safe Coding
security
operating system kernels
security-sensitive system resources
system monitoring
system software error
Trusted Computing
trusted environment
Virtual machine monitors
virtual machines
Virtualization
Kernel
cloud environment
collaboration
guest virtual machine security
Human behavior
Human Factors
HyperPS
hypervisor monitoring
hypervisor security
Cloud Computing
KVM hypervisor
Linux
Logic gates
Metrics
microhypervisor reducing attack surface
Monitoring
monolithic operating system
biblio
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection
Submitted by grigby1 on Mon, 03/09/2020 - 12:25pm
pubcrawl
virtualisation
virtual-machine-introspection-based security monitors
Virtual machining
virtual machines
virtual machine security
Virtual machine monitors
virtual machine introspection
tools
system monitoring
storage management
Semantics
security of data
security
Cloud Computing
page-level monitoring
page-level monitor
page-level memory monitor
out-of-virtual-machine security tools
operating system kernels
Monitoring
monitor target kernel objects
memory pages
memory page
low-overhead kernel object monitoring
kernel object modification monitoring
Kernel
dentry object monitoring
biblio
Micro-Kernel OS Architecture and its Ecosystem Construction for Ubiquitous Electric Power IoT
Submitted by aekwall on Mon, 02/10/2020 - 10:58am
security
operating system kernels
POSIX standard API
power engineering computing
power systems
process based fine-grained real-time scheduling algorithm
pubcrawl
real-time OS
real-time systems
Resiliency
Scalability
scheduling
operating system
security mechanism design
security of data
service process binding
sigma0 efficient message channel
Task Analysis
Trusted Computing
Ubiquitous Computing Security
ubiquitous electric power Internet of Things
ubiquitous electric power IoT
Virtualization
Linux
Containers
ecosystem construction
embedded virtualization
functional security
Human Factors
information security
intelligent interconnection technology
intelligent NARI microkernel
Internet of Things
IoT
IoT OS
computer architecture
Linux Container
Made in China 2025
Metrics
microkernel
microkernel OS architecture
mimicry defense
multicore computing security
NARI microkernel OS
native process sandbox
network security
1
2
next ›
last »