Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Microprogramming
biblio
Efficient Partial Firmware Update for IoT Devices with Lua Scripting Interface
Submitted by grigby1 on Fri, 06/19/2020 - 10:34am
IoT devices
Wireless communication
updatable fragments
security
Resiliency
resilience
relocatable code
radio spectrum management
pubcrawl
Microprogramming
Metrics
Lua scripting interface
Lua
LoRaWAN
lora
Layout
air update
IoT
invokable native code
Internet of Things
GCC
FOTA
forward error correction
firmware
energetic efficiency
efficient partial firmware update
dedicated memory layout
computer network security
composability
batteries
API extension
biblio
Enhanced Uptime and Firmware Cybersecurity for Grid-Connected Power Electronics
Submitted by aekwall on Mon, 02/17/2020 - 1:22pm
hardware-assisted monitor
distributed energy resource prototype
embedded Linux
encrypted serial communication
firmware cybersecurity
firmware integrity
firmware run-time integrity security
firmware run-time security feature
firmware updating
Grid Security
grid-connected power electronics
digital signal processors
Heart beat
multi-mission controls
operational technology security
power electronics security
power electronics uptime
power flow
run-time security
security techniques
uptime
firmware
Monitoring
Hardware
security
Linux
Resiliency
pubcrawl
composability
Metrics
Cybersecurity
privacy
security of data
power engineering computing
power system security
control systems
power grids
signal processing security
digital signal processing chips
Microprogramming
power electronics
security features
biblio
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
library function identification approach
dynamic analysis framework
dynamic analysis techniques
embedded firmware source code
FIoT framework
firmware analysis
firmware images
fuzzing
fuzzing test
hardware architectures
IoT device operating systems
IoT industry
CFG recovery approach
lightweight IoT device firmware images
lightweight IoT firmware
memory corruption
memory corruption vulnerabilities
Microprogramming
Program slicing
security researchers
time 170.0 s
time 210.0 s
time 40.0 s
zero trust
firmware
Scalability
Internet of Things
security
performance evaluation
system monitoring
Resiliency
pubcrawl
policy-based governance
program testing
Libraries
static analysis
computer network security
program diagnostics
Human Factors
operating systems (computers)
program compilers
Loading
lightweight IoT devices
address determination analysis
backward slice approach
binary code snippets
Binary codes
binary firmware
biblio
Formal Security Verification of Concurrent Firmware in SoCs Using Instruction-Level Abstraction for Hardware*
Submitted by grigby1 on Tue, 12/17/2019 - 11:21am
resilience
Metrics
microprocessor chips
Microprogramming
multi-threading
multithreaded program verification problem
Predictive Metrics
program verification
pubcrawl
intellectual property security
Resiliency
Secure Boot design
security of data
SoC security verification
software verification techniques
system-on-chip
Systems-on-Chip
cyber-physical systems
architecture level
bit-precise reasoning
cognition
composability
Concurrency
concurrency (computers)
concurrent firmware
cyber-physical system
Access Control
firmware
firmware-visible behavior
formal security verification
Frequency modulation
Hardware
Instruction-Level Abstraction
intellectual property blocks
biblio
Research of Industrial Control System Device Firmware Vulnerability Mining Technology Based on Taint Analysis
Submitted by grigby1 on Thu, 05/09/2019 - 9:46am
program testing
vulnerability mining
test efficiency
taint analysis technology
taint analysis
Software
security of data
security
scalable
Scalability
Resiliency
resilience
pubcrawl
component
Microprogramming
integrated circuits
Industrial Control Systems
industrial control system device firmware vulnerability mining technology
industrial control system
industrial control
Hardware
fuzzing test
firmware
device firmware
Data mining
biblio
CVSSA: Cross-Architecture Vulnerability Search in Firmware Based on Support Vector Machine and Attributed Control Flow Graph
Submitted by grigby1 on Tue, 05/01/2018 - 10:38am
function level features
vulnerability function
Training
third-party code bases
SVM
suspicious functions
Support vector machines
support vector machine
Software
security of data
Resiliency
resilience
real-world firmware images
pubcrawl
Microprogramming
Metrics
ACFG
flow graphs
firmware security
firmware
feature extraction
CVSSA
cross-architecture vulnerability search methods
cross-architecture
computer architecture
Computational modeling
composability
bipartite matching
binary firmware
basic-block level features
attributed control flow graph
biblio
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
Libraries
vulnerability detection
vulnerabilities
tools
third-party libraries
string matching
string feature matching
security
Resiliency
public domain software
pubcrawl
power grid vulnerability analysis
normalized compression distance
Microprogramming
Metrics
Binary difference analysis
Internet of Things
Human behavior
homology analysis
fuzzy set theory
fuzz hash
firmware vulnerability
firmware
File systems
file organisation
feature extraction
embedded device
development kits
Compositionality
code reuse
biblio
Security challenges for open embedded systems
Submitted by grigby1 on Fri, 02/02/2018 - 12:17pm
Resiliency
pubcrawl
Microprogramming
Metrics
Internet of Things
embedded systems
Embedded System
Device Security
composability
authentication
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory
« first
‹ previous
1
2