Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
i-o systems security
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
Scalability
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
microarchitectural security threat
security
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
I-O Systems
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
advanced Memway algorithm
i-o systems security
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
biblio
SwitchMan: An Easy-to-Use Approach to Secure User Input and Output
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
SwitchMan
pubcrawl
resilience
Resiliency
Scalability
secure protocol
secure user input
security
Servers
Switches
Protocols
usability
usability analysis
user I-O paths
user interfaces
user protected account
user regular account
user screen output
user-level APIs
user-level malware attacks
invasive software
automatic account switching
BIOS Security
computer architecture
computer security
Human Factors
I-O Systems
i-o systems security
information sharing
Input/Output Security
application program interfaces
Keyboards
Linux
mac
malware
Metrics
operating systems
operating systems (computers)
performance evaluation
personal computers
biblio
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Pulse width modulation
malware
Metrics
OpenPLC software
particular state
Pins
PLCs
predefined states
programmable controllers
Protocols
Prototypes
pubcrawl
malicious disruption
pulse width modulation pins
PWM
Raspberry Pi
Registers
resilience
Resiliency
Scalability
security
signature shares
uncorrupted PLC
group-signature
\$-threshold signature scheme
Anomaly Detection
BIOS Security
compromised state
control engineering computing
corrupted PLC
cyber security awareness week-2017 competition
digital signatures
electro-mechanical processes
finite state machine
finite state machines
(k
Human Factors
I-O Systems
i-o systems security
I/O pin configuration attack
input-output mechanism
IO pin configuration attack
l)-threshold signature scheme
Legacy PLC system
legacy PLCs
malicious code
biblio
Data-Driven Insights from Vulnerability Discovery Metrics
Submitted by grigby1 on Mon, 03/09/2020 - 2:38pm
natural language feedback
vulnerability discovery metrics
Vulnerability
threshold
software metrics
security of data
Security Metrics
pubcrawl
Programming Language
I-O Systems
metric
interpretation
data-driven insights
Chromium project
application domain
security
i-o systems security
biblio
Information-Flow Preservation in Compiler Optimisations
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
Scalability
optimization
passive side-channel attacks
program optimisations
Program processors
program transformations
program verification
pubcrawl
Resiliency
optimising compilers
Semantics
side-channel
side-channel attacks
source program
standard compiler passes
standards
target program
I-O Systems
Micromechanical devices
Metrics
information-flow preserving program transformation
information-flow preservation
information-flow leaks
Information Flow
IFP
correct compilers
Compositionality
compiler security
compiler optimisations
compiler
CompCert C compiler
security
i-o systems security
biblio
A Datalog Framework for Modeling Relationship-based Access Control Policies
Submitted by grigby1 on Wed, 07/18/2018 - 10:15am
datalog
I-O Systems
i-o systems security
pubcrawl
relationship-based access control
Scalability
security and privacy policies
biblio
Authentication Shutter: Alternative Countermeasure Against Password Reuse Attack by Availability Control
Submitted by grigby1 on Wed, 07/18/2018 - 10:15am
Availability
I-O Systems
i-o systems security
Password reuse attack
pubcrawl
Scalability
Security User authentication
self-control
Shutter
Web system
biblio
Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme
Submitted by grigby1 on Wed, 07/18/2018 - 10:15am
graphical passwords
guessing
I-O Systems
i-o systems security
pubcrawl
Scalability
security
shoulder-surfing
biblio
Control systems and the internet of things \#x2014; Shrinking the factory
Submitted by grigby1 on Wed, 07/18/2018 - 10:15am
pubcrawl
Logic gates
Monitoring
network capable computer
passive infrared detectors
powerful ARM processor
Production facilities
programmable I-O interface
programming interfaces
Lips
Radio network
Raspberry Pi
Scalability
sensor network
sensors
smart interconnected society
user interfaces
wireless LAN
feedback mechanisms
component
control loop
control systems
control-monitoring systems
domestic Internet solution
factory automation
factory control systems
Factory System
battery life
I-O Systems
i-o systems security
industrial control
infrared detectors
Interfaces
internet
Internet of Things
IoT
biblio
VM live migration time reduction using NAS based algorithm during VM live migration
Submitted by grigby1 on Wed, 07/18/2018 - 10:14am
unnecessary duplicated data transfer
Signal processing algorithms
SLA
storage data
storage management
Stress
system files
system maintenance
telecommunication traffic
Service Level Agreement
Virtual machine monitors
virtual machines
Virtual machining
virtualisation
Virtualization
virtualization environment
VM live migration time reduction
zero downtime
live virtual machine migration
computer centres
datacenters
file servers
hash map-based algorithm
I-O operations
I-O Systems
i-o systems security
live migration
Cloud Computing
NAS
NAS-based algorithm
network traffic
pubcrawl
Random access memory
random-access storage
Scalability
Servers
« first
‹ previous
1
2
3
4
5
6
next ›
last »