Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
static analysis
file
Bagheri_COVERT_DG.pdf
Submitted by Jamie Presken on Tue, 12/06/2016 - 2:26pm
android
CMU
formal verification
Inter-App vulnerabilities
Jan'16
static analysis
biblio
Comparative Evaluation of Static Analyses that Find Security Vulnerabilities
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:10pm
CMU
comparative evaluation
July'14
security vulnerabilities
static analysis
CMU
July'14
file
Vanciu_Comparative_Evaluation.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 1:10pm
CMU
comparative evaluation
July'14
security vulnerabilities
static analysis
file
Vanciu_Extracting_Dataflow.pdf
Submitted by Jamie Presken on Mon, 12/05/2016 - 10:42am
architectural extraction
CMU
domainsensitivity
hierarchical object graphs
ownership types
static analysis
biblio
Extracting Dataflow Objects and other Flow Objects
Submitted by Jamie Presken on Mon, 12/05/2016 - 10:42am
architectural extraction
CMU
domainsensitivity
hierarchical object graphs
ownership types
static analysis
CMU
biblio
COVERT: Compositional Analysis of Android Inter-App Permission Leakage
Submitted by Jamie Presken on Mon, 02/15/2016 - 1:00pm
android
CMU
formal verification
Inter-App vulnerabilities
Jan'16
static analysis
CMU
Jan'16
file
User-aware privacy control via extended static-information-flow analysis
Submitted by amyclay on Tue, 11/17/2015 - 12:15pm
Science of Security
information flow analysis
Mobile Application
Privacy Control
static analysis
UIUC
Mobile Platform Security
UIUC
Information Flow Control
NSA SoS Lablets Materials
biblio
User-Aware Privacy Control via Extended Static-Information-Flow Analysis
Submitted by amyclay on Tue, 11/17/2015 - 12:15pm
Science of Security
information flow analysis
Mobile Application
Privacy Control
static analysis
UIUC
Mobile Platform Security
UIUC
Information Flow Control
NSA SoS Lablets Materials
biblio
Malicious data classification using structural information and behavioral specifications in executables
Submitted by BrandonB on Tue, 05/05/2015 - 11:55am
Software
malwares
NtTrace
obfuscation technology
pattern classification
program diagnostics
security devices
signature database
signature-based detection system
malware detection system efficiency improvement
static analysis
structural information
Syntactics
system calls
threat detection
threat mitigation
underground Internet economy
zero-day malware detection
internet
antivirus
automated malicious programs
behavioral specifications
Classification algorithms
dynamic analysis
executable file
feature extraction
Information systems
Algorithm design and analysis
invasive software
malicious behavior extraction
malicious data classification
malicious software detection
malicious software mitigation
malware
malware detection
malware detection system effectiveness improvement
biblio
A Practical Experience on the Impact of Plugins in Web Security
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
security of data
web security
Web pages
web applications
Web application plugin vulnerabilities
vulnerabilities
testing
static code analysis tools
static analysis
SQL injection vulnerabilities
content management
security
program diagnostics
plugins
Manuals
internet
false positive rates
Databases
Cross Site Scripting
content management system
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
next ›
last »