Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Buffer overflows
biblio
Scalable Cloud-Based Tool to Empirically Detect Vulnerable Code Patterns in Large-Scale System
Submitted by grigby1 on Wed, 05/05/2021 - 12:41pm
Buffer overflows
collaboration
Human behavior
Human Factors
Linux
Metrics
Open Source Software
policy-based governance
pubcrawl
resilience
Resiliency
Safe Coding
security
tools
XML
biblio
FIXER: Flow Integrity Extensions for Embedded RISC-V
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
integrated Rocket Custom Coprocessor
program compilers
security framework
RISC-V
buffer overflow
Code injection
coprocessors
fine-grained control-flow integrity
FIXER
flow integrity extensions for embedded RISC-V
return oriented programming
low-power embedded devices
open source architecture
RISC-V architecture
RISC-V processor core
RISC-V SoC platform
RISC-V toolchains
Rockets
security extension
shadow stack
Buffer overflows
Scalability
Internet of Things
data integrity
Hardware
security
embedded systems
reduced instruction set computing
system-on-chip
computer architecture
security of data
Resiliency
pubcrawl
composability
software reusability
Software Architecture
Bars
Human Factors
code reuse attacks
ROP
biblio
Algebraic Patterns of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
sockets
symbolic modelling
rewriting rules
pattern creation
cyber reasoning systems
behaviour algebra
algebraic patterns
algebraic matching methods
algebraic matching
algebraic approach
algebra equations
Binary codes
binary code
Buffer overflows
Registers
Compositionality
Semantics
algebra
program diagnostics
pattern matching
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
An overview of cyber-attack vectors on SCADA systems
Submitted by aekwall on Wed, 02/13/2019 - 12:00pm
pubcrawl
transport protocols
TCP/IP based protocols
supervisory control and data acquisition systems
Software
security of data
security
Scalability
SCADA systems
SCADA
Resiliency
Attack vectors
Protocols
Monitoring
Industrial Control Systems
Human behavior
cyber-attack vectors
cyber-attack
critical infrastructures
critical infrastructure
Buffer overflows
biblio
Predicting buffer overflow using semi-supervised learning
Submitted by grigby1 on Mon, 11/27/2017 - 12:30pm
Human Factors
vulnerability detection
taxonomy
software security
Semisupervised learning
semi-supervised learning
security of data
Resiliency
pubcrawl
pattern classification
Metrics
machine learning
learning (artificial intelligence)
Indexes
22-dimension vector extraction
Human behavior
Compositionality
Complexity theory
Clustering algorithms
classifier training
C/C++ source files
Buffer storage
Buffer overflows
buffer overflow vulnerability prediction
buffer overflow
AST
arrays
Antlr
biblio
Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses
Submitted by K_Hooper on Fri, 10/13/2017 - 10:33am
Buffer overflows
Compile-time code instrumentation
illegal memory accesses
Metrics
pubcrawl
Resiliency
scalabilty
Securing Compilers
biblio
Heap Bounds Protection with Low Fat Pointers
Submitted by K_Hooper on Fri, 10/13/2017 - 10:33am
Buffer overflows
low-fat pointers
memory safety
Metrics
pubcrawl
Resiliency
scalabilty
Securing Compilers
biblio
Towards Improving Web Attack Detection: Highlighting the Significant Factors
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
internet
XSS
Web attack detection
Web application vulnerabilities
Web Application Security
Web application protection
Uniform resource locators
session management
pubcrawl170109
Monitoring
IP networks
Intrusion Detection
broken authentication
injection
information management
information access
hackers
e-business
denial of service attack
Data protection
cyber attack
cross-site scripting
Computer crime
Buffer overflows
« first
‹ previous
1
2