Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Symbolic Execution
biblio
Accelerating SoC Security Verification and Vulnerability Detection Through Symbolic Execution
Submitted by aekwall on Fri, 04/28/2023 - 8:44am
codes
compiler security
secure SoC design
KLEE
Symbiosis
formal verification
Symbolic Execution
C++ languages
Costs
Hardware Security
model checking
Compositionality
Resiliency
Metrics
pubcrawl
Scalability
system-on-chip
Hardware
biblio
OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept
Submitted by aekwall on Thu, 05/19/2022 - 12:39pm
Software
pubcrawl
Metrics
composability
Ecosystems
taint analysis
C++ languages
Computer crashes
Proofs-of-Concept
Symbolic Execution
Vulnerability Propagation
biblio
AngErza: Automated Exploit Generation
Submitted by grigby1 on Tue, 01/25/2022 - 3:54pm
computer architecture
tools
pubcrawl
resilience
Resiliency
Software
composability
Computer bugs
Publishing
Symbolic Execution
buffer overflow
Buffer overflows
Automated Secure Software Engineering
angr
Automated Exploit GeneraTION(AEG)
codes
biblio
Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications
Submitted by grigby1 on Mon, 11/29/2021 - 1:27pm
Binary Analysis
composability
dynamic programming
Explosions
Function Summaries
Metrics
Mobile Security
operating systems
Performance analysis
privacy
pubcrawl
static analysis
Symbolic Execution
taint analysis
tools
biblio
A Method of ROP Decentralized Layout
Submitted by grigby1 on Thu, 09/16/2021 - 1:02pm
pubcrawl
Symbolic Execution
security
Scalability
ROP chain
return oriented programming
Resiliency
resilience
Registers
Aerospace electronics
programming
operating systems
Layout
Human Factors
Human behavior
Fragmented layout
Data execution protection
composability
biblio
Scalable yet Rigorous Floating-Point Error Analysis
Submitted by aekwall on Mon, 05/03/2021 - 12:19pm
High performance computing
Symbolic Execution
Scalable Analysis
Round-off error
floating-point arithmetic
Algorithmic Differentiation
abstraction
Error analysis
scalable verification
Resiliency
numerical analysis
Compositionality
Predictive Metrics
Scalability
tools
optimization
resource management
pubcrawl
biblio
Symbolic Execution for Attribution and Attack Synthesis in Neural Networks
Submitted by grigby1 on Fri, 08/28/2020 - 11:22am
DNN validation
Symbolic Execution
pubcrawl
program analysis
neural nets
Metrics
Importance Analysis
Image resolution
image classification
Human behavior
adversarial attacks
DNN
DeepCheck lightweight symbolic analysis
deep neural networks
core ideas
composability
attribution
attack synthesis
adversarial generation
biblio
Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 1:41pm
Human behavior
vulnerability pattern matching
vulnerability detection
Vulnerability
vulnerabilities detection
two-level algebraic method
Symbolic Execution
Semantics
Resiliency
pubcrawl
pattern matching
model checking
Metrics
Mathematical model
algebra
fuzzing
Formal Specification
formal methods
exploit
Cybersecurity
Compositionality
Buffer overflows
Binary codes
binary code
behavior matching
behavior algebra
algebra expressions
biblio
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks
Submitted by grigby1 on Tue, 12/17/2019 - 11:22am
resilience
pubcrawl
Metrics
Resiliency
composability
cyber-physical systems
cyber-physical system
Symbolic Execution
Concurrency
cache
Side-channel attack
timing
Predictive Metrics
biblio
DoSE: Deobfuscation Based on Semantic Equivalence
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
code cloning
collaboration
control-flow graph
deobfuscation
false trust
Malware Analysis
obfuscation
opaque predicate
policy-based governance
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
Symbolic Execution
1
2
3
next ›
last »