Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
reachability analysis
biblio
An Empirical Study on Implicit Constraints in Smart Contract Static Analysis
Submitted by aekwall on Thu, 02/02/2023 - 3:22pm
static code analysis
Human behavior
Resiliency
composability
Code audit
Implicit constraints
pubcrawl
reachability analysis
smart contract
smart contracts
software engineering
static analysis
Systematics
Time factors
biblio
Automated Vulnerability Testing via Executable Attack Graphs
Submitted by aekwall on Mon, 01/25/2021 - 12:04pm
automated vulnerability testing
vulnerability scans
vulnerability assessments
virtual environment
suboptimal decision making
individual attack paths
executable attack graphs
end-to-end process
cyber risk reduction
cyber risk assessments
cyber risk assessment uncertainty
cyber risk assessment process
cyber attack graphs
AVRA
computer network security
automated vulnerability and risk analysis
automatic test software
attack graphs
Predictive Metrics
security issues
risk analysis
Decision Making
reachability analysis
graph theory
composability
pubcrawl
Resiliency
biblio
Automation Framework for Software Vulnerability Exploitability Assessment
Submitted by aekwall on Mon, 09/28/2020 - 10:34am
common vector scoring system
third-factor access complexity
Structural Severity
software vulnerability exploitability assessment
software structural properties
software development sector
security flaws
secure software
reachability
Entry points
de facto metrics system
CVSS exploitability measures
security of data
automated exploit attack
access vector
software vulnerabilities
security risks
Automated Secure Software Engineering
software engineering
reachability analysis
vulnerabilities
composability
pubcrawl
Resiliency
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 10:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance
biblio
Automatic Analysis of Critical Sections for Efficient Secure Multi-Execution
Submitted by grigby1 on Mon, 02/10/2020 - 10:35am
Noninterference Enforcement
Switches
static code analysis
static analysis
Semantics
security of data
security
resource requirements
Resiliency
resilience
reachability analysis
pubcrawl
program testing
Security Policies Analysis
Multi Execution
Monitoring
manual binary analysis
Lattices
hypersafety security policies
Human behavior
fully automatic critical section analysis
demand-driven secure multiexecution
DDSME
composability
Binary Analysis
biblio
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Submitted by aekwall on Mon, 01/20/2020 - 11:05am
network reachability
attack tree
client-side attack
enterprise networks risk measurement
host based vulnerability scan
intrusion prevention system
modeling modern network attack
NetSPA attack graph system
network defense
attack graph
personal firewall
point-to-point reachability algorithm
protection
proxy firewall
reverse reachability computation
SCAP
zero-day exploit
Zero Day Attacks and Defense
risk management
authorisation
Resiliency
pubcrawl
composability
graph theory
Computational modeling
reachability analysis
Analytical models
computer network security
computer security
military computing
Laboratories
computer networks
Predictive Metrics
Computer worms
Application software
biblio
Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis
Submitted by grigby1 on Thu, 02/14/2019 - 10:19am
invasive software
user apps
tools
taint checking
taint analysis
simultaneous scalability
security vulnerabilities
security
representative precise taint analysis
real-world evolving Android apps
reachability analysis
pubcrawl
Open Source Software
mobile computing
Metrics
analysis effectiveness
incremental taint analysis
incremental
historical versions
Google
EVOTAINT
Evolution
differencing
composability
Benchmark testing
attacks
Android ecosystem
Android devices
Android (operating system)
android
file
CyberCardia- Compositional, Approximate, and Quantitative Reasoning for Medical CPSs
Submitted by Scott Smolka on Tue, 01/22/2019 - 4:36pm. Contributor:
Scott Smolka
Cardiac Device
MRI
cyber-attacks
reachability analysis
Posters (Sessions 8 & 11)
1446832
CPS-PI Meeting 2018
2018
Poster
biblio
Constraining Attacker Capabilities Through Actuator Saturation
Submitted by grigby1 on Mon, 01/21/2019 - 11:30am
LTI control systems
vehicles platoon
tools
System performance
security
road vehicles
Resiliency
reachable sets
reachability analysis
pubcrawl
physical limits
outer ellipsoidal bounds
optimization
Metrics
mathematical tools
actuator saturation
Linear systems
linear matrix inequalities
Human behavior
Engines
Ellipsoids
dangerous states
control system synthesis
computer simulations
composability
attacker capabilities
artificial limits
actuators
actuator security
1
2
next ›
last »