Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
rewriting systems
biblio
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries
Submitted by aekwall on Thu, 04/08/2021 - 3:34pm
rewriting systems
system-level security facilities
rewriting-based randomization
quantitative assessment
legacy software systems
legacy software
legacy binaries
fine-grained randomization tools
code-reuse attacks
Binary Rewriting
advanced security attacks
Information Reuse and Security
security of data
source code
Binary codes
code-reuse attack
fine-grained code randomization
code randomization
Compositionality
software maintenance
risk assessment
pubcrawl
Resiliency
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 9:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
Resource-Bounded Intruders in Denial of Service Attacks
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
refined intruder model
powerful intruders
privacy
protocol execution
protocol theories
protocol verification
Protocols
PSPACE-complete
pubcrawl
reachability analysis
real-time systems
policy-based governance
resource-bounded intruders
rewriting modulo SMT
rewriting systems
serious security concern
Servers
service resource usage
service unavailable
tools
unlimited resources
Denial of Service attacks
Analytical models
Bandwidth
collaboration
complexity
composability
Compositionality
computational complexity
Computer crime
computer network security
DDoS
amplification DoS attacks
Dolev-Yao intruder
DoS problem
existing resource-conscious protocol verification models
formal methods
formal protocol verification
Formal Specification
formal verification
formal verification model
Policy Based Governance