Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
programming
biblio
Toward Instantaneous Sanitization through Disturbance-induced Errors and Recycling Programming over 3D Flash Memory
Submitted by grigby1 on Thu, 07/09/2020 - 1:56pm
Human behavior
three-dimensional integrated circuits
Scalability
sanitization functionalities
sanitization
Resiliency
resilience
recycling programming design
pubcrawl
programming disturbance properties
programming
privacy
NAND circuits
instantaneous data sanitization scheme
Human Factors
3D NAND flash memory chips
flash memory
flash memories
error correction codes
error correction code
encryption techniques
disturbance-induced errors
disturbance overheads
Data Security
data sanitization techniques
Data Sanitization
data deletion
Compositionality
3D NAND flash-memory-based devices
biblio
Analyzing the Browser Security Warnings on HTTPS Errors
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
Error analysis
Resistance
browser behaviors
browser defects
browser security warnings
certificate verification
certification
common HTTPS errors
cryptographic algorithm
Compositionality
HPKP
HSTS
name validation
Phase change materials
secure connections
secure Web applications
valid certificate chain
Web Browser Security
internet
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data confidentiality
telecommunication security
data privacy
Cryptography
composability
encoding
programming
online front-ends
error correction codes
Metrics
Reliability
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
Defending against ROP Attacks with Nearly Zero Overhead
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Training
Monitoring
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
composability
Runtime
Libraries
Memory management
programming
static analysis
rop attacks
biblio
CFI: Control Flow Integrity or Control Flow Interruption?
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
return oriented programming
malicious code injection
modern Code Reuse Attacks
Monitoring
object-oriented programming
Payloads
programming
pubcrawl
Resiliency
Libraries
return-oriented programming
Runtime
runtime attacks
runtime memory vulnerabilities
Scalability
security of data
target system
rop attacks
Jump-Oriented Programming
interrupt requests
Human Factors
famous attack paradigms
execution flow
data flow analysis
data execution prevention
corrupt code pointers
control-flow integrity
Control Flow Integrity
computer security
composability
CFI-based defenses
CFI solutions
C++ languages
biblio
Achieving Fast Sanitization with Zero Live Data Copy for MLC Flash Memory
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
multilevel-cell flash memories
zero live-data-copy overhead
zero live data copy
security of data
sanitization
resilience
pubcrawl
programming
privacy
page programming
one-shot sanitization design
Compositionality
MLC flash memory
Micromechanical devices
Media
Human behavior
flash memory
flash memories
fast sanitization scheme
Data Security
Data Sanitization
Cryptography
biblio
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
Submitted by grigby1 on Mon, 11/04/2019 - 12:34pm
ROP Defense
programming
pubcrawl
Randomization
Registers
resilience
return-oriented programming
return-oriented programming attack
rop attacks
OS
Scalability
security mechanisms
security of data
Software
software watermarking
Steganography
Watermarking
defense mechanisms
Compositionality
Resiliency
Benign Use of ROP
code integrity verification
code reuse attack
composability
computer security
Control Flow Integrity
Information Reuse and Security
extended ROP attack
frequency control
Human behavior
Human Factors
Layout
operating system
operating systems (computers)
biblio
Secure Coding Practices in Java: Challenges and Vulnerabilities
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Security by Default
multiple security vulnerabilities
programming
programming challenges
programming obstacles
pubcrawl
resilience
Resiliency
Scalability
Secure Coding
secure coding assistance
secure coding practices
Libraries
Spring security
SSL-TLS security
SSL/TLS
StackOverflow
StackOverflow forum
StackOverflow posts
third-party framework
third-party libraries
XML
XML-based approaches
cryptographic hash functions
security
application program interfaces
authentication
authorisation
authorization
authorization features
Certificate Validation
complex Java-based
complicated cross-language data handling
Computer crime
cross-site request forgery attacks
coding theory
Cryptography
cryptography API
CSRF
developers time
empirical study
encoding
insecure coding practices
Java
Java platform
Java secure coding
biblio
ROPMate: Visually Assisting the Creation of ROP-based Exploits
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
ROP chains
visual analytics system
visual analytics
visual aids
tools
Task Analysis
software reliability
semantically meaningful gadgets
semantically correct chains
security of data
security
Scalability
ROPMate
ROP-based exploits
ROP-based attacks
ROP Exploits
Buildings
rop attacks
return-oriented programming
return oriented programming
Resiliency
Registers
pubcrawl
programming
program testing
Malware Analysis
Human behavior
data visualisation
data analysis
composability
code reuse
biblio
Hardware-Based Adversary-Controlled States Tracking
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Pipelines
target tracking
software security challenges
Software
security of data
Scalability
rop attacks
return oriented programming
Resiliency
Registers
pubcrawl
programming
program diagnostics
classic dynamic taint analysis method
memory vulnerabilities
memory data
Linux applications
Linux
Human behavior
HAST
Hardware-based Adversary-controlled States
Hardware
dynimic taint analysis
control flow
composability
code-reuse attack
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »