Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure code
biblio
Neural Network Wiretap Code Design for Multi-Mode Fiber Optical Channels
Submitted by aekwall on Mon, 03/15/2021 - 10:55am
optical receivers
wiretap code
polar wiretap codes
Pareto improvement
neural network wiretap code design
mutual information leakage
multimode fiber wiretap channel
multimode fiber optical channel
multi-mode fiber
industrial machine type communication
finite blocklength
finite block length
fading channel
AWGN channel
Pareto optimisation
autoencoder
telecommunication security
telecommunication network reliability
secure code
polar codes
AWGN channels
physical layer security
eavesdropper
telecommunication computing
optical fibre networks
channel coding
neural nets
Metrics
composability
pubcrawl
Resiliency
biblio
Trustworthiness Assessment of Web Applications: Approach and Experimental Study using Input Validation Coding Practices
Submitted by aekwall on Mon, 12/07/2020 - 11:30am
secure code
web applications
Web application
vulnerabilities
trustworthiness assessment
trustworthiness
software security
software quality
security vulnerabilities
security perspective
security of data
Assessment
quality model
pubcrawl
internet
input validation practices
input validation coding practices
feasible security practices results
composability
coding practices
assessment techniques
biblio
A Proposed Approach to Build an Automated Software Security Assessment Framework using Mined Patterns and Metrics
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
security-specific properties
mined patterns
Patterns
pubcrawl
reliable software
Resiliency
Scalability
secure code
security
security of data
security-centric
Metrics
Software
software metrics
software security
software security level
Software Vulnerability
text analysis
tools
Ubiquitous Computing Security
Vulnerability prediction
Data mining
Security Metrics
automated framework
Automated Secure Software Engineering
automated software security assessment framework
building security-specific metrics
coding theory
Complexity theory
composability
current software metrics
Computing Theory
encoding
estimated security level
existing nanopatterns
generic patterns
graph theory
Human Factors
Java
Java method-level traceable patterns
machine learning
biblio
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
Submitted by aekwall on Mon, 12/02/2019 - 11:08am
robust preservation
hyperproperties
linked adversarial code
linked adversarial target code
linked source code
linked target code
liveness
low-level target language
multiple programs
noninterference
property classes
relational hyperproperties
relational properties
good programming languages
robust property preservation
secure compilation
secure compilation chain
Secure interoperability
secure linking
Security Foundations
source language
source-level abstraction
strictly stronger security guarantees
supported security goals
trace properties
compiler security
Compositionality
security of data
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
Libraries
program diagnostics
program verification
Writing
Space exploration
Security Properties
Safety
program compilers
secure code
source program
adversarial contexts
arbitrary adversarial contexts
compiled program
Computer languages
equivalent property-free
formal secure compilation criteria
full abstraction
fully abstract compilation chain
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 11:07am
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
biblio
Safe Cryptography for All: Towards Visual Metaphor Driven Cryptography Building Blocks
Submitted by grigby1 on Fri, 02/08/2019 - 3:12pm
APIs
Compositionality
Cryptography
developer support
pubcrawl
resilience
Resiliency
Safe Coding
secure code
visual metaphor