Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program verification
biblio
Design of Generic Verification Procedure for IIC Protocol in UVM
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
SDA(Serial data line)
Monitoring
policy-based governance
privacy
product development
program verification
protocol verification
Protocols
pubcrawl
SCL(Serial clock line)
Mentor graphic Questasim 10.4e
standard method
Synchronization
Universal Verification Methodology
UVC(Universal verification component)
UVM
UVM(Univeral verification methodology)
Verilog
Vivado
field buses
APB(Advanced peripheral bus)
bugs
Clocks
code coverage
collaboration
composability
Compositionality
Conferences
DUT(Design under test)
Aerospace electronics
functional coverage
generic verification procedure
hardware description languages
Hardware design languages
IIC bus protocol
IIC controller
IIC protocol
Libraries
biblio
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
security
program diagnostics
program verification
pubcrawl
resilience
Resiliency
restricted control transition intermediate language
Safe Coding
safe control flow recovery
program compilers
security mechanisms
security of data
security policies
Security Validation
Semantics
software fault tolerance
source code level
Explosions
Bianry Analysis
collaboration
Computational modeling
Conferences
Control Flow Recovery
control-flow recovery
data flow analysis
data-flow analyses
automatic analysis
Formal Specification
Human behavior
Human Factors
low-level object code
Memory management
Metrics
policy-based governance
biblio
Scalable Verification Framework for C Program
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalability issues
property-guided program slicing
pubcrawl
quality assurance
resilience
Resiliency
Safety
safety critical areas
Scalability
program verification problem
scalable verification
scalable verification framework
Software
Software systems
structural abstraction
Through-silicon vias
TSV
abstraction refinement
program verification
Program slicing
program compilers
optimization
model checking
Metrics
memory consumption
lines-of-code
extended structural abstraction
context aware software verification
Compositionality
Complexity theory
C program verifiers
C language
automatic software verification framework
biblio
Attack Modeling and Verification for Connected System Security
Submitted by aekwall on Wed, 05/01/2019 - 1:05pm
SysML connectivity profile
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
program verification
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
error propagation
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
Adaptation models
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
SD-card storage manager
Named Data Network Security
open-source designs
pattern classification
program debugging
program verification
pubcrawl
Registers
resilience
Resiliency
robotics controller
Scalability
Local area networks
security
security of data
sequential logic
SIMAREL
specification languages
storage management
STREAMS policies
unbounded input streams
user interfaces
Wires
Ethernet controller
automatically-synthesized relational invariants
circuit executions
core design C
debugging interface
declassification
digital signal processing chips
digital-signal processing module
Domain-Specific Language
DSP module
dynamic conditions
Algorithm design and analysis
field programmable gate arrays
flash memories
flash memory controller
flow security
Hardware
Hardware design languages
Human behavior
human computer interaction
information leaks
information-flow policies
biblio
Design, Verification and Implementation of a Lightweight Remote Attestation Protocol for Process Control Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Remote Attestation
policy-based collaboration
privacy
process control
process control systems
program verification
protocol implementation
protocol verification
Protocols
pubcrawl
Policy
remote network infrastructures
Romania
Scyther model checking tool
secure software integrity verification scheme
security
Software
software integrity
specialized components
industrial applications
commodity-off-the-shelf hardware
commodity-off-the-shelf software
Compositionality
COTS
Cryptographic Protocols
data integrity
formal verification
gas transportation network automation
Hardware
closed process control applications
industrial communications
industrial control
isolated components
lightweight remote attestation protocol
Nickel
PCS
Phoenix-Contact industrial controller
physically secured locations
biblio
Verifying and Synthesizing Constant-Resource Implementations with Types
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
programs verification
type inference algorithm
timing channels
Syntactics
static analysis
standards
side channel attacks
Semantics
resource-aware noninterference
resource consumption
resource aware ML
resource analysis
resource allocation
pubcrawl
AARA
programming
program verification
language-based security
information flow tracking
Information Flow
inference mechanisms
encryption
Cryptography
constant-resource behavior implementations
Compositionality
cognition
automatic amortized resource analysis
biblio
Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
secondary causes
program diagnostics
program verification
proximate causes
pubcrawl
related dynamic properties
resilience
Resiliency
rigorous definitions
Scalability
program debugging
soft-ware weaknesses
Software
software vulnerabilities
software weaknesses
taxonomy
tertiary causes
unambiguous definitions
verification bugs
VRF
cryptography related classes
authentication
attacks
bug classes
Bug taxonomy
bugs framework
clear descriptions
Computer bugs
Cryptography
cryptography classes
BF taxonomy
developed BF classes
ENC
encryption
Encryption bugs
Human behavior
key management
key management bugs
KMN
Metrics
« first
‹ previous
1
2
3
4
next ›
last »