Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fuzzing
biblio
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
IoT firmware kernel greybox fuzzer
vulnerabilities discovery
static binary analysis.
security of data
Router Systems Security
resilience
real-world Linux-based IoT programs
program diagnostics
Metrics
Linux-based IoT program
Linux
IoT program greybox fuzzing
static analysis
Internet of Things
fuzzing
firmware
embedded security
effective vulnerability discovery technique
binary static analysis
Resiliency
composability
Human behavior
pubcrawl
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
library function identification approach
dynamic analysis framework
dynamic analysis techniques
embedded firmware source code
FIoT framework
firmware analysis
firmware images
fuzzing
fuzzing test
hardware architectures
IoT device operating systems
IoT industry
CFG recovery approach
lightweight IoT device firmware images
lightweight IoT firmware
memory corruption
memory corruption vulnerabilities
Microprogramming
Program slicing
security researchers
time 170.0 s
time 210.0 s
time 40.0 s
zero trust
firmware
Scalability
Internet of Things
security
performance evaluation
system monitoring
Resiliency
pubcrawl
policy-based governance
program testing
Libraries
static analysis
computer network security
program diagnostics
Human Factors
operating systems (computers)
program compilers
Loading
lightweight IoT devices
address determination analysis
backward slice approach
binary code snippets
Binary codes
binary firmware
file
Model-Based Grey-Box Fuzzing
Submitted by Katie Dey on Mon, 05/06/2019 - 3:24pm. Contributor:
David Greve
Presented as part of the
2019 HCSS conference
.
fuzzing
model-based design
Presentation
HCSS 2019
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
biblio
TIFF: Using Input Type Inference To Improve Fuzzing
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
composability
data-structure Identification
fuzzing
Metrics
pubcrawl
security
taint analysis
Taint-flow analysis
type inference
vulnerability/bug detection
biblio
Revery: From Proof-of-Concept to Exploitable
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
composability
exploit
fuzzing
Metrics
pubcrawl
Symbolic Execution
taint analysis
Vulnerability
biblio
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance
Submitted by grigby1 on Mon, 11/19/2018 - 12:13pm
augmented reality
cyber reasoning systems
fuzzing
human assistance
Human behavior
privacy
pubcrawl
resilience
Resiliency
Scalability
biblio
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing
Submitted by grigby1 on Wed, 05/30/2018 - 4:02pm
802.11
collaboration
edge detection
fuzzing
handshake
Human behavior
Human Factors
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
security
security weaknesses
testing
Wi-Fi
« first
‹ previous
1
2
3
4
5
6
next ›
last »