Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
reverse engineering
biblio
Evolved Similarity Techniques in Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 11:14am
malware function similarity techniques
Zeus malware
Zeus
Semantics
reverse engineering
Resiliency
Registers
pubcrawl
privacy
Predictive Metrics
Metrics
Manuals
malware similarity
malware samples
Malware Analysis
malware function pairs
malware family
malware evolution
malware authors
malware
invasive software
Human behavior
function call graph
evolved similarity techniques
evolved code
Databases
binary similarity
graph theory
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
Mitigating JTAG as an Attack Surface
Submitted by grigby1 on Fri, 08/28/2020 - 10:51am
private instructions
JTAG test access ports
JTAG-based debug
key registers
key systems
materiel availability issues
Metrics
microprocessor chips
on-chip embedded instrumentation
JTAG interface
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
security
standard test access port
system memory
Cryptography
authorisation
BIT
boundary scan
boundary scan architecture
boundary scan testing
Built-In Test
chip lock
computer debugging
attack surface
debug architectures
depot system repair
embedded systems
firmware
IEEE 1149.1
IEEE standards
joint test action group standards
JTAG
biblio
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
Metrics
android encryption
repackaged apps
online markets
method information
malicious codes
intent
implicit intents
code obfuscation techniques
Cloning
clone detection
class method
Android app clones detection
Andorid app
Code Obfuscation
Scalability
Android ecosystem
reverse engineering
Android (operating system)
Data mining
tools
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
malware
encryption
biblio
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
Submitted by grigby1 on Thu, 07/30/2020 - 1:06pm
pubcrawl
Layout
layout camouflaging
LC
malicious entities
manufacturing
manufacturing flow
manufacturing paradigm
Metrics
production engineering computing
ip protection
resilience
reverse engineering
security
security-driven CAD flow
SM
split manufacturing
supply chains
Three-dimensional displays
extensive security analysis
policy-based governance
composability
IP piracy
3D ICs
business models
CAD
Cryptography
DRC-clean layouts
Resiliency
Foundries
Human behavior
Human Factors
industrial property
integrated circuit design
integrated circuit manufacture
integrated circuits
IP networks
biblio
Can Multi-Layer Microfluidic Design Methods Aid Bio-Intellectual Property Protection?
Submitted by grigby1 on Thu, 07/30/2020 - 12:48pm
biointellectual property protection
ip protection
skilled person-hour investment
significant fiscal person-hour investment
Product design
Multiplexing
multilayer microfluidic design methods
Mixers
Microfluidics
Lab-on-a-Chip
intellectual property rights
Foundries
biotechnology
bioMEMS
pubcrawl
bioassay implementation
bioassay developer
Three-dimensional displays
reverse engineering
Valves
Layout
Nonhomogeneous media
composability
industrial property
Resiliency
resilience
policy-based governance
biblio
Healthcare IoT: Benefits, vulnerabilities and solutions
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
medical data
white box cryptography
security defense
security
reverse engineering
return oriented programming techniques
Resiliency
pubcrawl
obfuscation technique
obfuscation
Monitoring
Mobile Applications
Metrics
Medical services
Medical diagnostic imaging
Access Control
medical computing
Internet of Things
implantable medical devices
implantable health gadgets
healthcare IoT system
healthcare IoT
health care
data privacy
Cryptography
Computer crime
composability
Biomedical monitoring
authorisation
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
Experience Report: How to Extract Security Protocols' Specifications from C Libraries
Submitted by grigby1 on Fri, 04/24/2020 - 3:20pm
object-oriented languages
tools
Task Analysis
Software
security protocols
security protocol specifications
security of data
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
object-oriented programming
automatic tools
object oriented security
Metrics
Libraries
human-dependent approach
formal verification
Formal Specification
formal model
extract security protocols
documentation
composability
codelevel reverse engineering
C programming language
C libraries
biblio
Random Seed Generation For IoT Key Generation and Key Management System Using Blockchain
Submitted by aekwall on Mon, 03/23/2020 - 12:19pm
Public key
random key generation
Seed
reverse engineering
Random Seed
Public Key Distribution
Out-of-Band
key
Hyperledger Fabric
Fabrics
IoT
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
Internet of Things
encryption
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »