Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies
Submitted by aekwall on Tue, 10/22/2019 - 8:54am
security policy implementation
expensive steps
flexible infrastructure IP
functional design flow
illustrative policies
industrial SoC
integrated circuit design
modern SoC design validation
off-the-shelf formal tools
Security Engine
efficient formal verification
simulation-based security verification
SoC Security
SoC security policies
SoC Verification
streamlined verification
system-level security policies
verification time
verification tools
Security Policies Analysis
Engines
Monitoring
IP networks
system-on-chip
pubcrawl
policy-based governance
Cryptography
tools
security architecture
Complexity theory
security of data
security policy
formal verification
alternative architecture
artifact
CAD
CAD flow
centralized infrastructure IP
complex steps
critical steps
biblio
ROPMate: Visually Assisting the Creation of ROP-based Exploits
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
ROP chains
visual analytics system
visual analytics
visual aids
tools
Task Analysis
software reliability
semantically meaningful gadgets
semantically correct chains
security of data
security
Scalability
ROPMate
ROP-based exploits
ROP-based attacks
ROP Exploits
Buildings
rop attacks
return-oriented programming
return oriented programming
Resiliency
Registers
pubcrawl
programming
program testing
Malware Analysis
Human behavior
data visualisation
data analysis
composability
code reuse
biblio
Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications
Submitted by aekwall on Mon, 10/14/2019 - 9:19am
privacy
FOP gadgets
function-oriented programming
Human behavior
JOP
Jump-Oriented Programming
Layout
Linux
Linux x64 environment
malicious program behavior
object oriented security
object-oriented programming
FOP attack
proftpd1.3.0 server
pubcrawl
return oriented programming
return-oriented programming
ROP
Scalability
security
security of data
Servers
shadow stack technology
tools
code reuse attack
Compositionality
Resiliency
address space layout randomization
ASLR
C Applications
C languages
C program
CFI
coarse-grained CFI
coarse-grained control-flow integrity
code injection attacks
Information Reuse and Security
code reuse attacks
composability
Conferences
Control-hijacking attacks
COOP
Counterfeit Object-oriented Programming
data-execution prevention
DEP
existing function
fine-grained CFI technologies
FOP
biblio
A Threat Modeling Approach for Cloud Storage Brokerage and File Sharing Systems
Submitted by grigby1 on Thu, 09/26/2019 - 9:42am
security challenges
Measurement
Metrics
Peer-to-peer computing
pubcrawl
resilience
Resiliency
risk management
Secure Configuration
Secure File Sharing
security
Mathematical model
Security Metrics
security of data
security risk assessment
storage management
Threat Modeling
threat modeling schema
threat models
tools
trees (mathematics)
Common Configuration Scoring System
Cloud Computing
Cloud Security
cloud stakeholders
Cloud storage brokerage systems
Cloud Storage Brokers
cloud storage complexities
Cloud storage Enumeration Attack
Cloud Storage Exploitation Attack
cloud storage systems
Cloud-Security
attack tree
composability
comprehensive risk assessments
Computational modeling
conflicting security policies
Data models
file sharing systems
Human behavior
Human Factors
identified security risks
biblio
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques
Submitted by grigby1 on Thu, 09/26/2019 - 9:25am
resilience
tools
Text Mining
standards
SQL injection vulnerabilities
SQL injection
SQL
source code (software)
software vulnerabilities
Software
singular decision trees
security of data
security
Secure Coding
Safe Coding
Resiliency
code analysis
Python
pubcrawl
program diagnostics
policy-based governance
natural language techniques
natural language processing
Metrics
Java program
Java byte code
Java
Human Factors
Human behavior
Decision trees
collaboration
code analysis tools
biblio
Checked C: Making C Safe by Extension
Submitted by grigby1 on Thu, 09/26/2019 - 9:24am
incremental conversion
tools
storage management
static analysis
spatial safety
security
Safety
Safe Coding
Resiliency
resilience
pubcrawl
programming languages
program debugging
policy-based governance
performance evaluation
Metrics
backward-compatibility
Human Factors
Human behavior
highly performant code
developer control
Cyclones
Computer bugs
collaboration
checked region
checked pointer
checked C's design
C++ language
C safe
bounds-safe interfaces
Benchmark testing
biblio
Blockchain Based Provenance Sharing of Scientific Workflows
Submitted by aekwall on Mon, 09/23/2019 - 9:41am
Human behavior
transaction verification
tools
Task Analysis
scientific workflow provenance
scientific workflow
scientific information systems
Resiliency
Reliability
pubcrawl
Provenance
Metrics
metadata
blockchain
experiments backtracking
experiment reproducibility verification
experiment reproducibility
distributed scientists
distributed research cooperation
Distributed databases
data providers
cryptocurrencies
computer architecture
composability
centralized provenance sharing architectures
blockchain based provenance sharing
biblio
A Data Provenance Visualization Approach
Submitted by aekwall on Mon, 09/23/2019 - 9:41am
Data visualization
W3C-PROV-O specification compatible provenance data
social networking (online)
provenance visualization
PROV-O
Prototypes
open source visualization tool
data provenance visualization approach
data lineage
data provenance
Provenance
data visualisation
Big Data
public domain software
data analysis
metadata
tools
Metrics
component
composability
pubcrawl
Human behavior
Resiliency
Classification algorithms
biblio
Fine-Grained Provenance for Matching ETL
Submitted by aekwall on Mon, 09/23/2019 - 9:40am
provenance APIs
data provenance tools
data science tasks
data types
data warehouses
database provenance tools
database-style provenance techniques
matching computations
matching tasks
Provenance
data objects
provenance-driven troubleshooting tool
PROVision
Record linking
support optimization
track provenance
tuple-level provenance
workflow
workflow management software
workflow provenance systems
Data mining
Resiliency
Human behavior
pubcrawl
composability
Metrics
optimization
ETL
tools
data analysis
Task Analysis
database management systems
application program interfaces
Instruments
Semantics
algebra
arbitrary code
code versions
common ETL
biblio
A Social Engineer in Terms of Control Theory
Submitted by grigby1 on Thu, 09/05/2019 - 10:27am
password
tools
terminal model
telecommunication control
social engineering
social engineer
security of data
security
Resiliency
resilience
pubcrawl
psychology
Planning
communication algorithms
nonstochastic communication object
information security specialists
information security
human model
human factor
Handheld computers
effective communication
Control Theory
contracts
composability
communication process
communication control system
« first
‹ previous
…
43
44
45
46
47
48
49
50
51
…
next ›
last »