Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
compiler security
biblio
SoK: Fully Homomorphic Encryption Compilers
Submitted by grigby1 on Fri, 08/12/2022 - 1:10pm
tools
encryption
pubcrawl
Resiliency
privacy
composability
Metrics
resilience
Data Breach
Surges
SoK
usability
compiler security
compilers
FHE
Fully-Homomorphic-Encryption
biblio
When Function Signature Recovery Meets Compiler Optimization
Submitted by grigby1 on Fri, 08/12/2022 - 1:10pm
security
pubcrawl
Resiliency
optimization
privacy
composability
Program processors
Metrics
Task Analysis
compiler security
biblio
Split Compilation for Security of Quantum Circuits
Submitted by grigby1 on Fri, 08/12/2022 - 1:10pm
compiler security
Transpilation
Split
Overhead
obfuscation
Coupling Map
compilation
quantum computing
IP theft
reverse engineering
computer architecture
Software as a service
Metrics
Program processors
Routing
composability
Computers
Resiliency
pubcrawl
Logic gates
biblio
Gradual Security Types and Gradual Guarantees
Submitted by grigby1 on Fri, 08/12/2022 - 1:09pm
Monitoring
pubcrawl
Resiliency
composability
Runtime
computer security
Metrics
Semantics
noninterference
compiler security
Refining
annotations
gradual guarantees
gradual typing
Information Flow Control
biblio
Compiler-Assisted Hardening of Embedded Software Against Interrupt Latency Side-Channel Attacks
Submitted by grigby1 on Fri, 08/12/2022 - 1:09pm
pubcrawl
Resiliency
Prototypes
composability
Program processors
side-channel attacks
Metrics
microcontrollers
embedded systems
compiler security
Processor scheduling
codes
compiler hardening
controlled-channel attacks
biblio
SoC Trust Validation Using Assertion-Based Security Monitors
Submitted by grigby1 on Fri, 08/12/2022 - 1:09pm
automata
System Verilog Assertions
Security and Hardware Monitors
Property Specification Language
Assertion Based Verification
system-on-chip
fabrication
compiler security
Metrics
tools
Layout
Runtime
composability
Hardware
Resiliency
pubcrawl
security
biblio
Type-Centric Kotlin Compiler Fuzzing: Preserving Test Program Correctness by Preserving Types
Submitted by grigby1 on Fri, 08/12/2022 - 1:08pm
pubcrawl
Resiliency
Conferences
composability
Program processors
fuzzing
Computer bugs
Computer languages
Metrics
Degradation
compiler security
Focusing
compiler testing
program fuzzing
semantic fuzzing
biblio
CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities Principle
Submitted by grigby1 on Fri, 08/12/2022 - 1:08pm
pubcrawl
Resiliency
Safety
composability
Program processors
computer security
Metrics
secure compilation
full abstraction
compiler security
Picture archiving and communication systems
Capability machines
biblio
Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural Transformations
Submitted by grigby1 on Tue, 08/02/2022 - 3:20pm
Language theoretic security
Trustworthy Systems
tools
Systems architecture
Software algorithms
Software
Resiliency
resilience
pubcrawl
expert systems
Hardware
formal verification
formal synthesis
computer architecture
compiler security
Architecture modeling
privacy
biblio
CrypTFlow: Secure TensorFlow Inference
Submitted by aekwall on Mon, 03/15/2021 - 11:11am
compiler security
TensorFlow inference code
semihonest security
semihonest MPC protocol
Secure TensorFlow inference
secure multiparty computation protocols
Porthos
plaintext TensorFlow
malicious security
malicious secure MPC protocols
inference accuracy
improved semihonest 3-party protocol
ImageNet dataset
end-to-end compiler
CrypTFlow
Aramis
Scalability
program compilers
Compositionality
inference mechanisms
Benchmark testing
public key cryptography
Logistics
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Protocols
Cryptographic Protocols
Hardware
data privacy
« first
‹ previous
1
2
3
4
5
6
next ›
last »