Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program analysis
biblio
Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications
Submitted by grigby1 on Tue, 12/20/2022 - 6:33pm
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Conferences
Software
Production
JavaScript
Browsers
Compositionality
Web Browser Security
program analysis
Crawlers
web security
biblio
Dynamic Filtering and Prioritization of Static Code Analysis Alerts
Submitted by aekwall on Fri, 11/18/2022 - 2:25pm
software reliability
Conferences
pubcrawl
Resiliency
Human behavior
composability
Performance analysis
automation
knowledge based systems
Filtering
codes
static code analysis
program analysis
Code reviews
processing alarms/warnings/alerts
Prolog
biblio
Study of Security Weaknesses in Android Payment Service Provider SDKs
Submitted by enck on Fri, 07/01/2022 - 8:53am
mobile payment security
program analysis
android
Policy-Governed Secure Collaboration
NCSU
Reasoning about Accidental and Malicious Misuse via Formal Methods
2022: April
biblio
HashMTI: Scalable Mutation-based Taint Inference with Hash Records
Submitted by aekwall on Thu, 05/19/2022 - 12:37pm
Software
Scalability
Conferences
pubcrawl
Metrics
composability
Hash functions
Prototypes
fuzzing
Memory management
taint analysis
program analysis
Software Testing
biblio
Scalable Call Graph Constructor for Maven
Submitted by grigby1 on Tue, 03/15/2022 - 11:13am
tools
security
pubcrawl
resilience
Resiliency
Scalability
Ecosystems
Libraries
Metrics
Compositionality
software engineering
Logic and Verification
Pragmatics
program analysis
Theory of computation
scalable verification
biblio
FireBugs: Finding and Repairing Cryptography API Misuses in Mobile Applications
Submitted by grigby1 on Mon, 12/20/2021 - 10:30am
Conferences
Software
security
Resiliency
resilience
pubcrawl
program analysis
Mobile Applications
maintenance engineering
Insurance
Cryptography
API
Computer bugs
Compositionality
composability
Companies
Automated Program Repair
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
API misuses
biblio
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information
Submitted by aekwall on Tue, 04/27/2021 - 12:36pm
Scalability
security
Software
Resiliency
pubcrawl
privacy
tools
Data mining
Computer bugs
program analysis
fuzzing
Security Heuristics
predictability
Automated Testing
biblio
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Submitted by grigby1 on Fri, 12/11/2020 - 1:31pm
Robustness
Metrics
mobile computing
mobile malware scanning
privacy
program analysis
program diagnostics
pubcrawl
resilience
Resiliency
market-wide malware scanning
semantic features
Semantics
social networking (online)
social-network-based centrality analysis
static analysis
syntax-based features
transformation attacks
zero-day malware including malware samples
graph theory
Android (operating system)
Android malware
Android Malware Detection
API Centrality
fault-tolerant representation
feature extraction
Google-Play app market
graph semantics
Analysis of variance
Human behavior
invasive software
Lightweight feature
lightweight graph-based approach
MalScan
malware
Malware Analysis
Market-wide
biblio
Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
software debugging
commit frauds
common programming error
Cross Site Scripting attacks
cross site scripting(XSS)
cross-site scripting vulnerabilities
detecting vulnerable web pages
dynamic program analysis
injection attacks
open source medical record application
application vulnerable
suggested encoder
Unit testing
untrusted data
untrusted dynamic content
vulnerability repair
vulnerable codes
XSS vulnerability
Cross Site Scripting
program analysis
Scalability
Resiliency
Human behavior
pubcrawl
internet
web applications
Web sites
program testing
security of data
software maintenance
program diagnostics
software reliability
online front-ends
Web pages
sensitive information
fraud
static program analysis
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 10:33am
novel automated machine-learning approach SWAN
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
program debugging
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
machine learning
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
security
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
1
2
3
next ›
last »