Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program analysis
biblio
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
testing
program testing
programming error
pubcrawl
public domain software
Resiliency
security
security of data
security unit testing approach
program diagnostics
unit test execution framework
Unit testing
untrusted data sanitization
Web Browser Security
Web page context
Web pages
XSS attacks
XSS vulnerability
grammar-based attack generator
Attack generation
automated unit testing
automatic programming
Browsers
cross-site scripting vulnerabilities detection
Data Sanitization
encoder
encoding
Cross Site Scripting
grammars
HTML
Human behavior
injection attacks
Java
Metrics
open source medical records application
program analysis
biblio
Automatic Web Security Unit Testing: XSS Vulnerability Detection
Submitted by grigby1 on Mon, 11/27/2017 - 11:30am
testing
pubcrawl
Resiliency
Sanitization evaluation
security
security of data
Security test harness
software developers
static analysis tools
program testing
Unit testing
vulnerability detection
Web application
Web pages
Web security unit testing
XSS attack strings
XSS vulnerability detection
encoding function
automatic testing approach
Browsers
command line injection
Compositionality
Context
Cross Site Scripting
Cross-site scripting (XSS)
encoding
Attack generation
HTML
Human behavior
Human Factors
internet
Metrics
program analysis
program diagnostics
biblio
Reducing Crash Recoverability to Reachability
Submitted by grigby1 on Tue, 05/16/2017 - 11:43am
Crash recovery
formal verification
program analysis
pubcrawl
Resiliency
System recovery
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 1:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory
file
Sadeghi_Taxonomy_Qual_Comparison_DG.pdf
Submitted by Jamie Presken on Mon, 01/09/2017 - 10:05am
Android platform
CMU
Jan'17
program analysis
security assessment
Taxonomy and Survey
biblio
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
Submitted by Jamie Presken on Mon, 01/09/2017 - 10:03am
Android platform
CMU
Jan'17
program analysis
security assessment
Taxonomy and Survey
CMU
Jan'17
biblio
Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning
Submitted by BrandonB on Tue, 05/05/2015 - 9:55am
Data models
empirical study
HTML
input validation and sanitization
program analysis
security
security measures
Semisupervised learning
Servers
Software
Training
Vulnerability prediction
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
« first
‹ previous
1
2
3