Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer bugs
biblio
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
Submitted by grigby1 on Tue, 04/12/2022 - 12:20pm
Limiting
tools
Static-Analysis
security
Resiliency
resilience
pubcrawl
privacy
Mobile Applications
composability
IoT
Human behavior
fuzzing
firmware-analysis
dynamic-analysis
Data Sanitization
Computer bugs
Compositionality
biblio
Bypassing memory safety mechanisms through speculative control flow hijacks
Submitted by aekwall on Mon, 03/14/2022 - 1:35pm
programming
rop attacks
Transient Execution
Speculative ROP
side channels
operating system security
Memory Safety Mechanisms
Buffer overflows
Computer bugs
Runtime
Force
process control
composability
Resiliency
Scalability
pubcrawl
Human Factors
Hardware Security
Software
biblio
Investigating Automatic Code Generation for Network Packet Parsing
Submitted by grigby1 on Mon, 03/14/2022 - 12:22pm
security
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
internet
Protocols
Computer bugs
Safe Coding
Buildings
Policy Based Governance
Metrics
Syntactics
Solids
biblio
Towards Reliable Spatial Memory Safety for Embedded Software by Combining Checked C with Concolic Testing
Submitted by grigby1 on Mon, 03/14/2022 - 12:22pm
operating systems
Virtual Prototype
RIOT
memory safety
embedded software
concolic testing
Checked C
codes
RISC-V
Writing
software reliability
pubcrawl
Metrics
Policy Based Governance
Safe Coding
Computer bugs
Runtime
Safety
Resiliency
resilience
Human Factors
Human behavior
biblio
Performing Security Proofs of Stateful Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 12:29pm
interactive-theorem-proving
tools
stateful-security-protocols
specification languages
pubcrawl
protocol verification
Protocols
privacy
policy-based collaboration
automated-verification
Computer bugs
Computational modeling
Compositionality
composability
Complexity theory
collaboration
automation
biblio
Metamorphic Detection of Repackaged Malware
Submitted by aekwall on Mon, 02/07/2022 - 5:05pm
Mobile Apps
Training
Support vector machines
Resiliency
repackaged malware
pubcrawl
privacy
Predictive Metrics
Neural networks
Computer bugs
Mobile Applications
malware detection
malware classification
malware
Index Terms—machine learning
Human behavior
feature extraction
biblio
AngErza: Automated Exploit Generation
Submitted by grigby1 on Tue, 01/25/2022 - 4:54pm
computer architecture
tools
pubcrawl
resilience
Resiliency
Software
composability
Computer bugs
Publishing
Symbolic Execution
buffer overflow
Buffer overflows
Automated Secure Software Engineering
angr
Automated Exploit GeneraTION(AEG)
codes
biblio
Practitioner Perception of Vulnerability Discovery Strategies
Submitted by grigby1 on Tue, 01/25/2022 - 4:53pm
Computer bugs
strategy
bug report
Automated Secure Software Engineering
survey
perception
Open Source Software
Task Analysis
Vulnerability
pubcrawl
computer security
composability
Industries
Software
Conferences
Resiliency
resilience
biblio
FireBugs: Finding and Repairing Cryptography API Misuses in Mobile Applications
Submitted by grigby1 on Mon, 12/20/2021 - 11:30am
Conferences
Software
security
Resiliency
resilience
pubcrawl
program analysis
Mobile Applications
maintenance engineering
Insurance
Cryptography
API
Computer bugs
Compositionality
composability
Companies
Automated Program Repair
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
API misuses
biblio
Resilient System-on-Chip Designs With NoC Fabrics
Submitted by grigby1 on Thu, 09/16/2021 - 1:10pm
computer architecture
Computer bugs
Fabrics
IP networks
NoC security
pubcrawl
resilience
Resiliency
resilient architecture
Resilient Security Architectures
security
SoC Security
system-on-chip
trusted SoC
untrusted IPs
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »