Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Binary Analysis
biblio
DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy
Submitted by aekwall on Fri, 04/28/2023 - 9:43am
security
Neural networks
Software
Scalability
optimization
Conferences
pubcrawl
Metrics
Resiliency
machine learning
Compositionality
codes
Binary Analysis
Compilation Options
compiler security
biblio
Inter-Language Static Analysis for Android Application Security
Submitted by aekwall on Fri, 08/12/2022 - 4:08pm
Conferences
tools
static analysis
pubcrawl
Mobile Security
malware
Java
Inter-language
Information systems
data-flow analysis
static code analysis
Computer Software and Theory
composabiity
Binary Analysis
application security
android
Resiliency
composability
Human behavior
file
Binary Software Composition Analysis with CodeSentry
Submitted by Katie Dey on Wed, 04/27/2022 - 8:56am. Contributors:
Antonio Flores Montoya
Drew DeHaas
Paul Anderson
Vineeth Kashyap
Abstract
Binary Analysis
N-day
SBOM
software composition analysis
vulnerabilities
HCSS'22
HCSS '22
biblio
Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications
Submitted by grigby1 on Mon, 11/29/2021 - 2:27pm
Binary Analysis
composability
dynamic programming
Explosions
Function Summaries
Metrics
Mobile Security
operating systems
Performance analysis
privacy
pubcrawl
static analysis
Symbolic Execution
taint analysis
tools
biblio
Binary Similarity Analysis for Vulnerability Detection
Submitted by aekwall on Tue, 05/18/2021 - 3:21pm
Binary Analysis
Binary Code Search
Binary codes
binary similarity
Compositionality
computer science
Human behavior
Measurement
Metrics
optimization
pubcrawl
Registers
Resiliency
Software
static analysis
vulnerability detection
biblio
Establishing Trust in Binary Analysis in Software Development and Applications
Submitted by aekwall on Mon, 02/01/2021 - 11:41am
Binary codes
vulnerability reports
source security
software programmer trust
security vulnerability minimization
knowledge elicitations
knowledge acquisition
implementation risk assessment
binary release metadata
binary component
binary code components
binary code behavior
binary analysis tools
binary analysis techniques
human trust
security of data
binary code
data loss
trust
Binary Analysis
software development
software engineering
computer security
Libraries
tools
standards
pubcrawl
Human behavior
Trusted Computing
Software
biblio
Automatic Analysis of Critical Sections for Efficient Secure Multi-Execution
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
Noninterference Enforcement
Switches
static code analysis
static analysis
Semantics
security of data
security
resource requirements
Resiliency
resilience
reachability analysis
pubcrawl
program testing
Security Policies Analysis
Multi Execution
Monitoring
manual binary analysis
Lattices
hypersafety security policies
Human behavior
fully automatic critical section analysis
demand-driven secure multiexecution
DDSME
composability
Binary Analysis
biblio
LEMNA: Explaining Deep Learning Based Security Applications
Submitted by aekwall on Mon, 12/16/2019 - 2:30pm
Internet of Things
cyber-physical systems
pubcrawl
Binary Analysis
resilience
deep recurrent neural networks
explainable AI
controller area network security
biblio
FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine Code
Submitted by aekwall on Mon, 08/05/2019 - 10:35am
Resiliency
composability
Cryptography
Neural networks
pubcrawl
Binary Analysis
feature extraction
Function Detection
expandability
biblio
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables
Submitted by aekwall on Mon, 03/04/2019 - 10:50am
Resiliency
pubcrawl
composability
Binary Analysis
Malware Analysis
software reverse engineering
Automated Secure Software Engineering
1
2
next ›
last »