Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
testing
file
Applying User Sessions to Detect SQL Injection Vulnerabilities in Web Applications
Submitted by akarns on Fri, 01/29/2016 - 12:50pm. Contributors:
Sreedevi Sampath
Mengzi Du
Isaiah Yoon
Abstract:
security
SQL injection
web applications
user sessions
testing
High Confidence Software and Systems Conference 2016
Poster
Posters
HCSS'16
HCSS'16 Poster Session
biblio
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
Submitted by BrandonB on Wed, 05/06/2015 - 2:58pm
Ports (Computers)
zero day detection
Zero day attacks
testing
Software
SNIDS
signature based network intrusion detection
Servers
Reliability
Code injection
Payloads
NIDS
false alarm
exploits
digital signatures
computer security
computer network security
computer architecture
biblio
Detection, diagnosis, and repair of faults in memristor-based memories
Submitted by BrandonB on Wed, 05/06/2015 - 2:33pm
Memristor
testing
test time
Sneak-paths
sneak-path free crossbar
Resistance
random-access storage
post-silicon recovery
nanoscale fabrication
multiple memory cells testing
memristors
memristor-based memories
memristor failures
Circuit faults
Memory
March testing
maintenance engineering
integrated circuits
hybrid diagnosis scheme
high defect densities
future memory architectures
faulty cell repairs
fault diagnosis
fault detection
crossbar memories
biblio
Real-time trust evaluation in integrated circuits
Submitted by BrandonB on Wed, 05/06/2015 - 11:37am
power-gating techniques
Trojan-infected variants
Trojan-free variants
Trojan horses
testing
statistical analysis
side-channel measurements
side-channel fingerprinting detection
shift registers
Semiconductor device measurement
reconfigurable linear feedback shift register array
real-time trust evaluation framework
advanced design skills
Power measurement
Power demand
post-fabrication trust evaluation methods
on-board global power consumption
LFSR array
invasive software
integrated circuits
hardware Trojan detection
Hardware
Erbium
chip trustworthiness
biblio
Slack removal for enhanced reliability and trust
Submitted by BrandonB on Wed, 05/06/2015 - 11:34am
Small Delay Defects
mission-critical application
pattern count
reliability enhancement
security of data
security vulnerabilities
security-critical application
slack removal
Slacks
malicious circuitries
test quality
testing
timing slacks
transition fault patterns
Trojan horses
trust enhancement
Wires
fabrication
care bit density intact
Circuit faults
delay defect detection
delay defects
delay unit insertion
delays
design for testability
design technique
At-speed Testing
Hardware
hardware trojan
Hardware Trojans
integrated circuit reliability
logic circuits
Logic gates
logic testing
biblio
IP Spoofing Detection Using Modified Hop Count
Submitted by BrandonB on Wed, 05/06/2015 - 10:39am
IP address spoofing utilization
testing
statistical analysis
Routing protocols
modified hop count parameter
IP spoofing detection
IP spoofing attacks
IP spoofing
IP networks
Computer crime
internet
hop count filtering technique
hop count filtering
Hop Count
HCF learning phase
Filtering
computer network security
biblio
Multiple OS rotational environment an implemented Moving Target Defense
Submitted by BrandonB on Tue, 05/05/2015 - 11:17am
moving target defense
testing
Servers
security of data
security
operating systems (computers)
operating systems
Nmap
multiple OS rotational environment
MTD technique
Availability
manual penetration test
IP networks
insert
Fingerprint recognition
defensive strategies
cyber-attacks mitigation
CORE Impact Pro
CORE
biblio
National Cyber Range Overview
Submitted by BrandonB on Tue, 05/05/2015 - 11:01am
NCR
virtual machines
US Department of Defense
traffic emulation
testing
test
security
resource management
range
computer network security
National Cyber Range
malware
DoD communication networks
Department of Defense
cyberspace security threats
cyberspace resiliency testing
Cyberspace
biblio
Automated Test Generation from Vulnerability Signatures
Submitted by BrandonB on Tue, 05/05/2015 - 10:54am
insecure Web applications
web services
vulnerability signatures
validation and sanitization
transition
testing
string analysis
static string analysis undecidability
state
security
scripting languages
program testing
program diagnostics
path coverage
Algorithm design and analysis
HTML
digital signatures
Databases
automatic vulnerability signature computation
automated test case generation
automata-based test generation
automata-based static string analysis techniques
automata theory
automata
authoring languages
attack string discovery
Approximation methods
biblio
A Practical Experience on the Impact of Plugins in Web Security
Submitted by BrandonB on Tue, 05/05/2015 - 10:53am
security of data
web security
Web pages
web applications
Web application plugin vulnerabilities
vulnerabilities
testing
static code analysis tools
static analysis
SQL injection vulnerabilities
content management
security
program diagnostics
plugins
Manuals
internet
false positive rates
Databases
Cross Site Scripting
content management system
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »