Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computer bugs
biblio
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization
Submitted by grigby1 on Tue, 07/27/2021 - 11:31am
Computer bugs
fuzzing
Instruments
Libraries
pubcrawl
resilience
Resiliency
Runtime
Scalability
security
Security by Default
tools
biblio
Krace: Data Race Fuzzing for Kernel File Systems
Submitted by grigby1 on Tue, 06/01/2021 - 1:44pm
security
pubcrawl
Metrics
resilience
Resiliency
composability
delays
fuzzing
Kernel
Computer bugs
Synchronization
Instruction sets
Concurrent computing
Concurrency
biblio
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process
Submitted by grigby1 on Wed, 05/05/2021 - 11:23am
Computer bugs
Hardware
Memory management
pubcrawl
Scalability
Scalable Security
security
Software
testing
biblio
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information
Submitted by aekwall on Tue, 04/27/2021 - 12:36pm
Scalability
security
Software
Resiliency
pubcrawl
privacy
tools
Data mining
Computer bugs
program analysis
fuzzing
Security Heuristics
predictability
Automated Testing
biblio
Fluid Intelligence Doesn't Matter! Effects of Code Examples on the Usability of Crypto APIs
Submitted by grigby1 on Wed, 01/20/2021 - 3:20pm
Libraries
usability
Task Analysis
software engineering
security
Resiliency
resilience
pubcrawl
Particle measurements
API
intelligence
Example Code
Cryptography
Computer bugs
Compositionality
application programming interface
APIs
biblio
Checking Security Properties of Cloud Service REST APIs
Submitted by grigby1 on Wed, 01/20/2021 - 3:19pm
modern cloud
web services
test generation
stateful REST API fuzzer
security rules
security of data
security
REST APIs
Resiliency
resilience
rendering (computer graphics)
pubcrawl
Production
Office365 cloud services
active property checkers
fuzzing
formal verification
Computer bugs
Compositionality
cloud service REST
Cloud Computing
Cloud and Web services
checking security properties
capture desirable properties
application programming interface
application program interfaces
APIs
API
biblio
Empirical Methodology of Testing Using FMEA and Quality Metrics
Submitted by grigby1 on Wed, 11/04/2020 - 12:34pm
pubcrawl
testers
structured metrics
Software Testing
software metrics
software engineering
Software
security
science
risk metrics
risk items
risk areas
risk analysis
Quality metrics
Computer bugs
program testing
metrics testing
Metrics
Measurement
indispensable part
FMEA technique
FMEA
failure analysis
engineering discipline
empirical methodology
efficient metrics
effective testing process
Conferences
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
Scalability
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
microarchitectural security threat
security
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
I-O Systems
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
advanced Memway algorithm
i-o systems security
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
biblio
The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment
Submitted by aekwall on Mon, 10/12/2020 - 10:45am
experimental controls
traditional CTF events
Task Analysis
red team
pubcrawl
psychology
military computing
human performance
Human Factors
Human Behavior and Cybersecurity
Human behavior
human attacker
future cyber operations studies
capture the flag
deeply rooted human component
Data collection
cyber testing
cyber deception experiment
controlled human-subject experiment
computer-security-computer-networks-computer-hacking-cyber-defense-research-and-development-humans-testing-deception
computer security
Computer crime
Computer bugs
cognitive testing
cognition
biblio
Security Related Technical Debt in the Cyber-Physical Production Systems Engineering Process
Submitted by aekwall on Mon, 10/12/2020 - 10:37am
pubcrawl
Technical Debt in the context of Security
technical debt
systems engineering
standards
software reliability
software maintenance
Software
security related technical debt
security related issues
security of data
security
Scalability
Resiliency
False Data Detection
Production systems
production engineering computing
product quality
maintainability
Human behavior
gold standard
Expert Systems and Security
cyber-physical systems
cyber-physical production systems engineering
cyber physical production systems
Computer bugs
best practices
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »