Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
binary code
biblio
Review on Trustworthy Analysis in binary code
Submitted by grigby1 on Tue, 08/02/2022 - 3:20pm
Android application
binary code
Binary codes
deep learning
Learning systems
malware
Medical services
programming
pubcrawl
resilience
Resiliency
Schedules
tools
trustworthy
Trustworthy Systems
biblio
Semantic Understanding of Source and Binary Code based on Natural Language Processing
Submitted by grigby1 on Thu, 03/10/2022 - 11:32am
Training
pubcrawl
Human behavior
resilience
Resiliency
Scalability
process control
natural language processing
Semantics
Syntactics
Binary codes
Transforms
binary code
LLVM IR
semantic understanding
source code
biblio
Introducing Code Assets of a New White-Box Security Modeling Language
Submitted by grigby1 on Thu, 03/04/2021 - 1:35pm
Metrics
white-box security modeling language
White-box security
WB security analysis
testing
specification languages
source code (software)
software protection technologies
software protection solutions
Software
Security modeling language
reverse engineer
Resiliency
resilience
pubcrawl
White Box Security
i-WBS
Data protection
Conferences
Computer crime
Computational modeling
composability
code security
code assets
Binary codes
binary code
attacker
Analytical models
security
white box
biblio
Establishing Trust in Binary Analysis in Software Development and Applications
Submitted by aekwall on Mon, 02/01/2021 - 10:41am
Binary codes
vulnerability reports
source security
software programmer trust
security vulnerability minimization
knowledge elicitations
knowledge acquisition
implementation risk assessment
binary release metadata
binary component
binary code components
binary code behavior
binary analysis tools
binary analysis techniques
human trust
security of data
binary code
data loss
trust
Binary Analysis
software development
software engineering
computer security
Libraries
tools
standards
pubcrawl
Human behavior
Trusted Computing
Software
biblio
Algebraic Patterns of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 1:42pm
sockets
symbolic modelling
rewriting rules
pattern creation
cyber reasoning systems
behaviour algebra
algebraic patterns
algebraic matching methods
algebraic matching
algebraic approach
algebra equations
Binary codes
binary code
Buffer overflows
Registers
Compositionality
Semantics
algebra
program diagnostics
pattern matching
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 1:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
Double-bit quantization and weighting for nearest neighbor search
Submitted by grigby1 on Mon, 06/11/2018 - 2:42pm
Metrics
weighted hamming distance
search problems
real-value signature conversion
Quantization (signal)
quantisation (signal)
pubcrawl
NN search
nearest neighbor search
binary code
Measurement
Indexes
double-bit quantization and weighting
Double-bit quantization
DBQW
binary embedding method
binary embedding
Binary codes
biblio
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Submitted by grigby1 on Thu, 06/07/2018 - 2:03pm
binary code
collaboration
cyber physical systems
Metrics
network coding
neural network
neural networks security
Policy
policy-based governance
Policy-Governed Secure Collaboration
pubcrawl
resilience
Resiliency
similarity detection
biblio
Software-Design for Internal Security Checks with Dynamic Integrity Measurement (DIM)
Submitted by grigby1 on Tue, 02/06/2018 - 12:58pm
security software tools
internal security checks
Kernel
kernel architecture
Linux
malicious components
Memory management
memory measurment
multiple related components
pubcrawl
Resiliency
integrity measurement architecture
software design
Software measurement
software tools
system components
system state verification
TCG
The Concise Binary Object Representation (CBOR)
Trusted Platform Module (TPM)
trusted platform modules
DIM
attestation operations
binary code
Binary codes
central components
complex attestation strategies
composability
cooperation project
cryptographic hashes
Cryptography
data integrity
Aerospace electronics
DRA
dynamic integrity measurement
Dynamic Runtime Attestation
extensibility
extensible architecture
flexibility
flexible architecture
Guidelines
IMA
biblio
Deep Asymmetric Pairwise Hashing
Submitted by grigby1 on Wed, 01/10/2018 - 11:27am
asymmetric hashing
binary code
Compositionality
deep hashing
hash algorithms
pubcrawl
Resiliency