Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
compiler security
biblio
Hardware Design of Polynomial Multiplication for Byte-Level Ring-LWE Based Cryptosystem
Submitted by aekwall on Mon, 03/15/2021 - 11:10am
NIST PQC Standardization Process
BRAMs
byte-level modulus
byte-level ring-LWE based cryptosystem
computational time-consuming block
DSPs
high-level synthesis based hardware design methodology
ideal lattice
LAC
multiplication core
high level synthesis
polynomial multiplication
ring learning with error problem
ring LWE
time 4.3985 ns
time 5.052 ns
time 5.133 ns
Vivado HLS compiler
Xilinx Artix-7 family FPGA
NIST
Scalability
lattice-based cryptography
Cryptography
Hardware
Table lookup
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
field programmable gate arrays
post quantum cryptography
timing
polynomials
Software algorithms
Compositionality
program compilers
compiler security
logic design
biblio
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions
Submitted by aekwall on Mon, 03/15/2021 - 11:10am
Side Channel
BranchSpec attacks
called BranchSpec
Coffee Lake-based processors
existing speculative attacks
harness branch predictors
information leakage attacks
information leakage threat
microarchitectural attack
microarchitectural side channels
processor hardware vulnerabilities
processor microarchitectural components
processor microarchitecture
branch predictor
simpler code patterns
speculative branch executions
speculative branch instruction executions
speculative execution
speculative executions
speculative path
speculative state update
speculatively executed branches
Transient Execution Attack
transient execution attacks
transient executions
victim
microprocessor chips
Scalability
Conferences
telecommunication security
Hardware
attack surface
History
information security
Resiliency
pubcrawl
Metrics
security vulnerability
Transient analysis
security of data
Compositionality
Instruction sets
program compilers
microarchitecture
Spectre
compiler security
Surface treatment
sensitive information
computer architecture
parallel architectures
branch pattern history structure
branch prediction mechanisms
biblio
Improving Fuzzing through Controlled Compilation
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
beneficial compiler optimizations
standard compilers
rigorous evaluation methodology
qualitative coverage
program line
LLVM
Intermediate Representation
grey-box fuzzers
fuzzing strategy
fuzzing consistency
current coverage-based evaluation measures
coverage metrics
coverage mesaures
coverage
controlled compilation
concolic fuzzers
security of data
AFL's configuration
AFL
open source projects
source code
fuzzing
compiler security
program compilers
Compositionality
fuzzy set theory
program testing
Metrics
pubcrawl
Resiliency
Scalability
biblio
Securing Asynchronous Exceptions
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
Libraries
Theorem Proving
telecommunication security
Synchronization
security of data
security
Runtime system
Runtime
pubcrawl
programming language semantics
programming
program verification
program invariants
program diagnostics
program compilers
Metrics
pattern locks
language-based information-flow control techniques
language constructs
Instruction sets
IFC language
features asynchronous exceptions
different covert channels
data structures
Concurrent computing
concurrency control
Compositionality
compiler security
Resiliency
Scalability
Human behavior
biblio
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
Grounded Theory study
secure software
security tools
14 professional software developers
50 professional software developers
code security
developer preferences
developer security warnings
development tools
compiler security
Qualitative research
security checkers
security warning types
security warnings
static analysis engines
warning interactions
warning type
security of data
Compositionality
security issues
program diagnostics
software development
static analysis
software engineering
machine learning
tools
Metrics
pubcrawl
Resiliency
Software
security
Organizations
Scalability
biblio
BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers
Submitted by aekwall on Mon, 03/15/2021 - 11:08am
program compilers
STM32 NUCLEO F446RE microcontroller
memory safety
memory corruptions
low-end ARM Cortex-M microprocessors
compiler-based toolchain
Clang/LLVM compiler
Cats
backward edge control flow integrity
BackFlow
ARM instruction set
Europe
compiler security
compiler
Safety
Instruction sets
CFI
Compositionality
storage management
Benchmark testing
program diagnostics
microcontrollers
computer security
automation
Metrics
pubcrawl
Resiliency
Scalability
biblio
Security across abstraction layers: old and new examples
Submitted by aekwall on Mon, 03/15/2021 - 11:08am
Context modeling
successive layers
source programming language
source code level
single level
ISA
Instruction Set Architecture
ICT system
ICT application
higher level abstractions
cross-layer security issues
cross-layer nature
cross-layer issues
abstraction layers
operating systems
security
compiler security
secure compilation
Computer languages
program compilers
Instruction sets
Compositionality
security issues
Java
Metrics
pubcrawl
Resiliency
Hardware
Scalability
security of data
biblio
CheckMyCode: Assignment Submission System with Cloud-Based Java Compiler
Submitted by aekwall on Mon, 03/15/2021 - 11:08am
Java cloud based programming compiler
portability
assignment management system
CheckMyCode system
cloud based Java compiler
cloud compiler
Cloud System
computer science and engineering curriculum
educational courses
computer aided instruction
Java programming
learning system
mobile learning
PC browser
programming assignment submission system
programming language learning
smart device browser
Java
Scalability
programming
Task Analysis
Program processors
Resiliency
pubcrawl
Metrics
computer science education
Cloud Computing
Multimedia systems
Writing
Compositionality
program compilers
programming languages
compiler security
smart devices
biblio
Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity
Submitted by aekwall on Mon, 03/15/2021 - 11:07am
contracts
vulnerability patches
Solidity team
Solidity
security patches
real-world Solidity contracts
real-world Ethereum smart contracts
potentially vulnerable contracts
missing security patches
Ethereum smart contract developers
empirical study
smart contract security
Manuals
electronic commerce
compiler security
C++ language
security of data
program compilers
Compositionality
encoding
program diagnostics
smart contracts
security vulnerabilities
static analysis
software engineering
tools
Metrics
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
ComPy-Learn: A toolbox for exploring machine learning representations for compilers
Submitted by aekwall on Mon, 03/15/2021 - 11:07am
compilers
program compilers
Clang
LLVM
compiler security
empirical evaluation
Clang compiler
Code Representations
compiler heuristics
Compositionality
ComPy-Learn
developer productivity
graph representations
LLVM compiler backend
program code
software engineering tools
software performance
syntax-level language information
tools
Task Analysis
Program processors
learning (artificial intelligence)
Resiliency
pubcrawl
machine learning
Metrics
optimization
Scalability
Training
software engineering
public domain software
Vulnerability prediction
program diagnostics
Predictive models
Pipelines
« first
‹ previous
1
2
3
4
5
6
next ›
last »