Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
obfuscation
biblio
A Unifying Logic Encryption Security Metric
Submitted by aekwall on Mon, 07/01/2019 - 10:14am
obfuscation
logic encryption
Security Metrics
Hardware Security
Metrics
pubcrawl
biblio
A Malware Analysis and Artifact Capture Tool
Submitted by aekwall on Mon, 06/24/2019 - 2:41pm
microsoft windows
Windows
tools
Syntactics
static states
static analysis
source code (software)
sandbox
Resiliency
pubcrawl
process flow
obfuscation techniques
obfuscation
multiple code paths
Monitoring
artifact capture tool
Metrics
malware behavior
malware artifacts
Malware Analysis
malware
invasive software
interactive malware analysis
Human behavior
handwriting recognition
dynamic states
dynamic control
Disassemblers
Decompilers
debuggers
biblio
The Android Malware Static Analysis: Techniques, Limitations, and Open Challenges
Submitted by grigby1 on Fri, 02/22/2019 - 4:11pm
malware
static code analysis
static analysis frameworks
static analysis
Semantics
semantic features
Resiliency
pubcrawl
program diagnostics
obfuscation techniques
obfuscation
meta data
manifest-based features
malware detection
android
malicious applications
invasive software
Human behavior
Hardware
feature extraction
Cryptography
composability
commercial antiviruses
code-based features
application metadata-based features
android malware static analysis
Android (operating system)
biblio
AEON: Android Encryption Based Obfuscation
Submitted by grigby1 on Thu, 01/31/2019 - 12:15pm
android encryption
Android security
Human behavior
Human Factors
Metrics
Mobile Security
obfuscation
pubcrawl
resilience
Resiliency
Scalability
software security
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
biblio
Profile hidden Markov model for malware classification \#x2014; usage of system call sequence for malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:55pm
obfuscation
Trojan horses
tools
system call sequence
system call
Resiliency
resilience
pubcrawl
proteins
protein sequences
profile hidden markov model
privacy
pattern classification
obfuscation technique
bioinformatics
microsoft windows
Metrics
malware technology
malware files
malware classification
malware
invasive software
Human behavior
Hidden Markov models
Grippers
DNA sequences
DNA
biological informatics
biblio
Enhanced Operating System Protection to Support Digital Forensic Investigations
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
operating systems (computers)
forensic-friendly OS design
Forensics
fully homomorphic encryption
Metrics
obfuscation
operating system extensions
operating system protection
operating systems
Forensic software
OS tamper-resistance
pubcrawl
resilience
Resiliency
security
system data recovery
White Box Encryption
white-box cryptography
Cryptography
CEF
Ciphers
component encryption
composability
computer systems
computing on encrypted data
computing with encrypted functions
criminal activity footprints
CED
data integrity
data provenance
data veracity
digital forensic investigations
Digital Forensics
encryption
evidence collection
biblio
Protecting JavaScript Apps from Code Analysis
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
collaboration
composability
Google Closure Compiler
Hybrid Apps
ip protection
JavaScript
obfuscation
Policy
policy-based governance
pubcrawl
Resiliency
biblio
Efficient distribution of fragmented sensor data for obfuscation
Submitted by grigby1 on Wed, 12/20/2017 - 1:01pm
Java
sensor security
sensors
Routing
Prototypes
emulation
Distributed databases
Data fragmentation
computer security
Metrics
Cryptography
composability
obfuscation
Human Factors
Human behavior
Resiliency
pubcrawl
biblio
N-version Obfuscation
Submitted by grigby1 on Mon, 11/20/2017 - 12:28pm
composability
obfuscation
pubcrawl
resilience
Resiliency
reverse engineering
software security
Tamper resistance
Tamper-Resistance
« first
‹ previous
1
2
3
4
next ›
last »