Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
memory corruption
biblio
A Monitoring Framework for Side-Channel Information Leaks
Submitted by grigby1 on Mon, 03/15/2021 - 12:10pm
monitor ambient light
side-channel sources
side-channel research
side-channel information leaks
side-channel detection
sensitive information
Resiliency
resilience
recent computer security research
pubcrawl
program security requirements
private information
privacy
popular memory safety
penetration testing tools
monitoring framework
classical exploitation techniques
Metrics
memory corruption
learning (artificial intelligence)
known design patterns
injection tools
indirect means
exploitation framework
data privacy
Cryptography
computer systems
computer network security
Computer Engineering
composability
command injection attacks
biblio
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
library function identification approach
dynamic analysis framework
dynamic analysis techniques
embedded firmware source code
FIoT framework
firmware analysis
firmware images
fuzzing
fuzzing test
hardware architectures
IoT device operating systems
IoT industry
CFG recovery approach
lightweight IoT device firmware images
lightweight IoT firmware
memory corruption
memory corruption vulnerabilities
Microprogramming
Program slicing
security researchers
time 170.0 s
time 210.0 s
time 40.0 s
zero trust
firmware
Scalability
Internet of Things
security
performance evaluation
system monitoring
Resiliency
pubcrawl
policy-based governance
program testing
Libraries
static analysis
computer network security
program diagnostics
Human Factors
operating systems (computers)
program compilers
Loading
lightweight IoT devices
address determination analysis
backward slice approach
binary code snippets
Binary codes
binary firmware
biblio
Cryptographically Secure Detection of Injection Attacks
Submitted by aekwall on Wed, 02/13/2019 - 10:59am
attestation
memory corruption
provable security
Resiliency
Human behavior
pubcrawl
composability
biblio
A red team blue team approach towards a secure processor design with hardware shadow stack
Submitted by grigby1 on Thu, 06/07/2018 - 2:02pm
private data access
Trusted Computing
software attacks
security of data
security
RISC-V
return oriented programming attack
Resiliency
resilience
reduced instruction set computing
red team blue team approach
pubcrawl
processor vulnerabilities
processor design security
processor architecture
composability
Payloads
openrisc
open processor architectures
object-oriented programming
object oriented security
Metrics
memory corruption
hardware-software codesign
hardware shadow stack
Hardware
embedded systems
embedded system security
Computer bugs
computer architecture
biblio
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
Submitted by grigby1 on Tue, 08/22/2017 - 10:31am
core dump
Human behavior
memory corruption
Metrics
multiple fault diagnosis
pubcrawl
Resiliency
Vulnerability Analysis