Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
static analysis
biblio
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
Tainted data flow
static code analysis
static analysis-based security analysis approach
static analysis plugin
static analysis
SQL injection
software engineering
Software
security of data
Secure Software Development
Resiliency
resilience
pubcrawl
android
password
mobile software development
mobile computing
Mobile Applications
leak detection
Human Factors
Human behavior
Handheld computers
DroidPatrol
Conferences
computer science education
composability
Android Development Studio
biblio
Share, But Be Aware: Security Smells in Python Gists
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
recurrent coding patterns
tools
static code analysis
static analysis
software security
software maintenance
share code snippets
security weaknesses
security smell
security breaches
security
safety-critical software
Resiliency
resilience
composability
Python
publicly-available Python Gists
publicly-available GitHub Gists
pubcrawl
program diagnostics
password
insecure coding practices
Human behavior
hard-coded secrets
hard-coded passwords
GitHub
Gist
encoding
biblio
The Seven Sins: Security Smells in Infrastructure as Code Scripts
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
resilience
tools
static code analysis
static analysis
Software
smell
Servers
Security weakness
security smells
security of data
security linter tool
security linter for infrastructure as code scripts
security breaches
security
Resiliency
composability
puppet
pubcrawl
program diagnostics
program debugging
password
infrastructure as code
IaC scripts
Human behavior
hard-coded secret
hard-coded passwords
encoding
empirical study
devsecops
DevOps
biblio
Automatic Analysis of Critical Sections for Efficient Secure Multi-Execution
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
Noninterference Enforcement
Switches
static code analysis
static analysis
Semantics
security of data
security
resource requirements
Resiliency
resilience
reachability analysis
pubcrawl
program testing
Security Policies Analysis
Multi Execution
Monitoring
manual binary analysis
Lattices
hypersafety security policies
Human behavior
fully automatic critical section analysis
demand-driven secure multiexecution
DDSME
composability
Binary Analysis
biblio
Proactive Secure Coding for iOS Applications
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
operating systems (computers)
tools
Syntactics
static code analysis
static analysis
security of data
security
secure coding issues
secure APIs
Resiliency
resilience
proactive secure coding
iOS Security
iOS developers
iOS applications
ios
Human behavior
Force
encoding
Computer languages
composability
applications
application program interfaces
pubcrawl
biblio
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding
Submitted by grigby1 on Mon, 02/10/2020 - 11:35am
static analysis challenge
program compilers
program diagnostics
pubcrawl
resilience
Resiliency
security of data
Semantics
Software
static analysis
program behavioral problems
static code analysis
static detection
static vulnerability detection
static vulnerability detectors
Training
vulnerabilities
vulnerability detection
vulnerable program
graph embedding
composability
Computer bugs
Compositionality
control-flow
control-flow-related vulnerabilities
Convolutional codes
feature extraction
general static analysis solutions
graph convolutional network
CFR vulnerabilities
graph embedding approach
graph theory
high-level control-flow information
high-level control-flow related vulnerabilities
Human behavior
learning (artificial intelligence)
machine-learning-based approaches
program analysis
biblio
A Comparative Analysis of Static Code Analysis Tools That Check Java Code Adherence to Java Coding Standards
Submitted by grigby1 on Mon, 02/10/2020 - 11:34am
Java programming language
testing
style
static code analysis tool
static code analysis
static analysis
standards
software quality
software maintenance
software development
Resiliency
resilience
quality
pubcrawl
program diagnostics
JPL Coding Standards
Concurrency
Java Coding Standards Enforcing Tools
Java code analysis
Java code adherence
Java
International Java Coding Standards
Human behavior
exceptions
critical system
concurrency (computers)
composability
Comparative Analysis
Coding Standard Analyzers
analyzers
security
biblio
Multi-Platform Authorship Verification
Submitted by grigby1 on Mon, 01/27/2020 - 12:28pm
author attributing
dynamic analysis
Email messaging
Facebook messaging
Human behavior
Human Factors
Metrics
pubcrawl
SMS messaging
static analysis
stylometry
stylometry biometric
Twitter messaging
biblio
Tracking Sensitive Information and Operations in Integrated Clinical Environment
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
integrated Clinical Environment
sensitive information
complex ICE systems
data flow
data flow analysis framework
device interoperability
dynamic analysis
high-level supervisory apps
Ice
sensitive data
low-level communication middleware
medical cyber physical system
medical cyber-physical systems
medical devices
Publishing
sensitive operations
standardized framework
security
open systems
static analysis
medical information systems
middleware
interoperability
taint analysis
privacy
data flow analysis
standards
Metrics
composability
pubcrawl
performance evaluation
data privacy
security of data
biblio
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
library function identification approach
dynamic analysis framework
dynamic analysis techniques
embedded firmware source code
FIoT framework
firmware analysis
firmware images
fuzzing
fuzzing test
hardware architectures
IoT device operating systems
IoT industry
CFG recovery approach
lightweight IoT device firmware images
lightweight IoT firmware
memory corruption
memory corruption vulnerabilities
Microprogramming
Program slicing
security researchers
time 170.0 s
time 210.0 s
time 40.0 s
zero trust
firmware
Scalability
Internet of Things
security
performance evaluation
system monitoring
Resiliency
pubcrawl
policy-based governance
program testing
Libraries
static analysis
computer network security
program diagnostics
Human Factors
operating systems (computers)
program compilers
Loading
lightweight IoT devices
address determination analysis
backward slice approach
binary code snippets
Binary codes
binary firmware
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »