Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Binary Analysis
biblio
Block Oriented Programming: Automating Data-Only Attacks
Submitted by grigby1 on Fri, 02/08/2019 - 4:31pm
attack surface
Binary Analysis
block oriented programming
data only attacks
exploitation
Metrics
Program Synthesis
pubcrawl
resilience
Resiliency
Scalability
Security Heuristics
biblio
Parallelization of Machine Learning Applied to Call Graphs of Binaries for Malware Detection
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
program compilers
machine learning algorithms
malware
Malware Analysis
malware detection
Metrics
OpenMP version
parallelization
privacy
machine learning
pubcrawl
resilience
Resiliency
shortest path graph kernel
SPGK
support vector machine
Support vector machines
SVM
graph theory
Binary Analysis
byte-level n-grams
call graphs
compiler intermediate representations
compiler techniques
dynamic trace analysis
Engines
feature extraction
adaptive learning-based techniques
graph-based program representations
graphics processing units
Heterogeneous computing
Human behavior
invasive software
Kernel
learning (artificial intelligence)
biblio
The X86/64 Binary Code to Smart Intermediate Language Translation for Software Weakness
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
Binary Analysis
Binary code transition
collaboration
Human behavior
Human Factors
Intermediate language
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
security weaknesses
software weakness
biblio
Analysis of Exception-Based Control Transfers
Submitted by K_Hooper on Wed, 05/02/2018 - 10:44am
Binary Analysis
composability
dynamic information flow
Metrics
pubcrawl
Symbolic Execution
taint analysis
biblio
S2F: Discover Hard-to-Reach Vulnerabilities by Semi-Symbolic Fuzz Testing
Submitted by K_Hooper on Wed, 04/04/2018 - 9:58am
program testing
vulnerability detection tools
vulnerability detection
tools
test case generation
Symbolic Execution
Software Vulnerability
software tools
semisymbolic fuzz testing
Resiliency
pubcrawl
Prototypes
Binary Analysis
path explosion
Metrics
low frequency input
Human behavior
hard-to-reach vulnerabilities
fuzzy set theory
Fuzz Testing
fuzzing
Explosions
Computer bugs
Compositionality
file
Virtualization and Binary Centric Approach to Malware Analysis
Submitted by Katie Dey on Fri, 11/02/2012 - 9:56am. Contributor:
Heng Yin
ABSTRACT
SaTC Posters
Binary Analysis
Malware Analysis
Memory Forensics
Syracuse University
1054605
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
1
2