Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program analysis
biblio
Symbolic Execution for Attribution and Attack Synthesis in Neural Networks
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
DNN validation
Symbolic Execution
pubcrawl
program analysis
neural nets
Metrics
Importance Analysis
Image resolution
image classification
Human behavior
adversarial attacks
DNN
DeepCheck lightweight symbolic analysis
deep neural networks
core ideas
composability
attribution
attack synthesis
adversarial generation
biblio
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
static analysis challenge
program compilers
program diagnostics
pubcrawl
resilience
Resiliency
security of data
Semantics
Software
static analysis
program behavioral problems
static code analysis
static detection
static vulnerability detection
static vulnerability detectors
Training
vulnerabilities
vulnerability detection
vulnerable program
graph embedding
composability
Computer bugs
Compositionality
control-flow
control-flow-related vulnerabilities
Convolutional codes
feature extraction
general static analysis solutions
graph convolutional network
CFR vulnerabilities
graph embedding approach
graph theory
high-level control-flow information
high-level control-flow related vulnerabilities
Human behavior
learning (artificial intelligence)
machine-learning-based approaches
program analysis
biblio
Software Ecosystem Call Graph for Dependency Management
Submitted by aekwall on Mon, 03/04/2019 - 9:49am
popular form
ecosystem-level
Ecosystems
Equifax data breach
external libraries
fine-grained dependency network
impact
indicative information
leftpad package removal
open source software libraries
packages
developers
program analysis
public domain software
software development management
software ecosystem
software libraries
software reusability
Software reuse
workspace
Automated Secure Software Engineering
call graphs
security
Software
Resiliency
pubcrawl
composability
tools
Libraries
software engineering
automated tools
security of data
centralized code repositories
client-server systems
Computer bugs
core package
counter measure
dependencies
dependency checkers
Dependency management
dependency networks
biblio
Gamifying Static Analysis
Submitted by grigby1 on Fri, 02/22/2019 - 3:10pm
composability
Gamification
Human behavior
Integrated Environments
program analysis
pubcrawl
Resiliency
static code analysis
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 10:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
file
Improving Run-Time Bug Detection in Aviation Software Using Program Slicing
Submitted by Samuel Guyer on Tue, 01/22/2019 - 4:50pm. Contributors:
Hu Huang
Samuel Z. Guyer
Jason H. Rife
bug detection
program analysis
Posters (Sessions 8 & 11)
1836942
CPS-PI Meeting 2018
2018
Poster
biblio
Spatio-temporal Context Reduction: A Pointer-analysis-based Static Approach for Detecting Use-after-free Vulnerabilities
Submitted by grigby1 on Mon, 12/10/2018 - 10:39am
bug detection
composability
defense
Metrics
program analysis
pubcrawl
resilience
Resiliency
use-after-free
Zero day attacks
biblio
Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis
Submitted by grigby1 on Thu, 08/23/2018 - 10:43am
intelligent data processing
taxonomy
software vulnerability analysis
Software Vulnerability
Software
security vulnerability
security patterns
security of data
security
pubcrawl
program analysis
Analytical models
intelligent data analysis
intelligent data
Industries
Databases
Data models
Cryptography
computational intelligence
Compositionality
composability
biblio
Combining the Logical and the Probabilistic in Program Analysis
Submitted by grigby1 on Wed, 05/09/2018 - 1:48pm
Compositionality
logic
Markov logic network
Maximum Satisfiability
Metrics
probability
program analysis
pubcrawl
resilience
Resiliency
Scalability
scalable verification
biblio
A Program Optimization for Automatic Database Result Caching
Submitted by grigby1 on Mon, 03/26/2018 - 11:53am
database result caching
Metrics
program analysis
pubcrawl
resilience
Resiliency
Scalability
SQL
web applications
Web Caching
« first
‹ previous
1
2
3
next ›
last »