Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program verification
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
Securing Asynchronous Exceptions
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
Libraries
Theorem Proving
telecommunication security
Synchronization
security of data
security
Runtime system
Runtime
pubcrawl
programming language semantics
programming
program verification
program invariants
program diagnostics
program compilers
Metrics
pattern locks
language-based information-flow control techniques
language constructs
Instruction sets
IFC language
features asynchronous exceptions
different covert channels
data structures
Concurrent computing
concurrency control
Compositionality
compiler security
Resiliency
Scalability
Human behavior
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
observable actions
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
ad-hoc sub-class
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
program verification
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
security of data
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
biblio
Mixed-Trust Computing for Real-Time Systems
Submitted by grigby1 on Wed, 12/02/2020 - 1:14pm
Runtime
VM hosting
virtual machines
untrusted components
trusted hypervisor
Trusted Computing
trust
traditional verification methods
timing guarantees
timing
Task Analysis
scheduling
safety-critical software
safety-critical autonomous features
Safety
complex cyber-physical systems
real-time systems
real-time mixed-trust computing framework
Raspberry Pi 3 implementation
pubcrawl
program verification
Human Factors
Human behavior
framework design
drone application
CPS critical functions
Computing Theory
Computational modeling
Complexity theory
biblio
Modeling and Analysis Cyber Threats in Power Systems Using Architecture Analysis Design Language (AADL)
Submitted by aekwall on Mon, 11/16/2020 - 1:58pm
Power Grid
Resilient Security Architectures
switching attack
Power systems security
power system information models
Model-based analysis
FDI attack
false data injection attacks
cyber-physical modeling capabilities
cyber-physical model
cyber-grid components
Architecture Analysis & Design Language
AADL
specification languages
security of data
verification techniques
cyber threats
power systems
program verification
power grids
power system security
power engineering computing
Software Architecture
cyber-physical security
pubcrawl
Resiliency
cyber-physical systems
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 1:51pm
attack graph
Resilient Security Architectures
Unity software
system resiliency
security property
Resiliency
resilience level assessment
program visualisation
possible attack instances
JKind model checker integrated tool
generated network models
generated attack sequences
generated attack scenarios
cyber-physical-systems
architecture analysis-&-design language
AADL
security of data
faults
attack graphs
stability
Local area networks
Stability analysis
program verification
resilience
Communication networks
cyber-attacks
Analytical models
tools
graph theory
pubcrawl
security
biblio
Runtime Verification of Hyperproperties for Deterministic Programs
Submitted by grigby1 on Mon, 11/02/2020 - 10:39am
pubcrawl
system monitoring
software doping
Software
security policies
security of data
security
Scalability
safety hyperproperty
Safety
runtime verification problem
runtime verification monitors
runtime verification
Runtime
data minimality
program verification
parametric monitor
noninterference
Monitoring
information-flow policies
information-flow
i/o systems security
i-o systems security
finite element analysis
Doping
deterministic input-output programs
deterministic algorithms
biblio
Security Checking Experiments with Mobile Services
Submitted by grigby1 on Mon, 11/02/2020 - 10:39am
mobile services
software security
software behavior
Software
security of data
security checking experiments
security checking
security
Scalability
pubcrawl
program verification
Androids
mobile computing
JPF-mobile
Java Path Finder verifier
Java
input/output parameters
i/o systems security
i-o systems security
Humanoid robots
Electron devices
automata
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
Incorporating Robustness and Resilience into Mixed-Criticality Scheduling Theory
Submitted by grigby1 on Tue, 10/06/2020 - 12:40pm
pubcrawl
worst-case execution time
WCET
Task Analysis
Scheduling algorithms
scheduling
Robustness
Resiliency
resilience
Computing Theory
program verification
pre-runtime verification
mixed-criticality scheduling theory
mixed-criticality scheduling algorithms
Measurement
MCSh
LO-criticality workload
1
2
3
4
next ›
last »