Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program transformation
biblio
Memory-Safe Elimination of Side Channels
Submitted by grigby1 on Mon, 03/14/2022 - 11:20am
maintenance engineering
Side Channel
program transformation
Information Leak
Transforms
contracts
Metrics
Policy Based Governance
Safe Coding
pubcrawl
Memory management
Runtime
Safety
optimization
Resiliency
resilience
Human Factors
Human behavior
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 10:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
biblio
More Accurate Recommendations for Method-Level Changes
Submitted by grigby1 on Thu, 05/24/2018 - 11:11am
Human behavior
Human Factors
program transformation
pubcrawl
recommendation system
recommender systems
Refactoring
resilience
Resiliency
Scalability
biblio
A Feasibility Study of Autonomically Detecting In-Process Cyber-Attacks
Submitted by grigby1 on Tue, 12/12/2017 - 12:22pm
Scalability
normal application behavior
off-line models
on-line models
perturbed applications
program transformation
pubcrawl
QoS requirements
quality-of-service requirements
Resiliency
Runtime
Monitoring
security
security of data
Software
software development process
software vulnerabilities
supervised training
Trusted Computing
trusted software application
unsafe actions
web applications
features extraction
application-agnostic cyber-attack detection system
Attack vectors
attacker
autonomic alert system
autonomic cyber-attack detection system
Autonomic Security
call graph
control flow
exemplar Web-based applications
feature extraction
application execution
heterogeneous software systems
in-process cyber-attacks
Instruments
Java
learning (artificial intelligence)
learning strategies
lightweight structures
machine learning techniques
Metrics
biblio
Symbolic Execution of High-level Transformations
Submitted by grigby1 on Wed, 03/29/2017 - 11:39am
automated white-box test generation
composability
Metrics
Model transformation
program transformation
pubcrawl
Resiliency
Symbolic Execution
white box
white box cryptography