Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Information Flow
biblio
Verifying and Synthesizing Constant-Resource Implementations with Types
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
programs verification
type inference algorithm
timing channels
Syntactics
static analysis
standards
side channel attacks
Semantics
resource-aware noninterference
resource consumption
resource aware ML
resource analysis
resource allocation
pubcrawl
AARA
programming
program verification
language-based security
information flow tracking
Information Flow
inference mechanisms
encryption
Cryptography
constant-resource behavior implementations
Compositionality
cognition
automatic amortized resource analysis
biblio
Sparse Representation of Implicit Flows with Applications to Side-channel Detection
Submitted by grigby1 on Fri, 09/15/2017 - 10:50am
composability
edge detection
implicit flows
Information Flow
Metrics
pubcrawl
Resiliency
Scalability
security
sparse analyses
SSA
biblio
Studying Naive Users and the Insider Threat with SimpleFlow
Submitted by grigby1 on Tue, 05/30/2017 - 12:45pm
composability
Information Flow
insider threat
Linux
linux operating systems security
linux security module
Metrics
operating system security
pubcrawl
Resiliency
biblio
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency
Submitted by grigby1 on Mon, 05/22/2017 - 1:58pm
channel coding
collaboration
consistency
distributed systems
Human Factors
Information Flow
language-based security
Metrics
pubcrawl
Resiliency
safe coding standards
security
serializability
transactions
biblio
Practical Detection of Entropy Loss in Pseudo-Random Number Generators
Submitted by grigby1 on Mon, 05/22/2017 - 1:52pm
bounded model checking
collaboration
composability
entropy loss
Human behavior
Information Assurance
Information Flow
information theoretic security
Metrics
OpenSSL
PRNG
pseudo-random number generator
pubcrawl
Resiliency
Scalability
static analysis
biblio
JCrypt: Towards Computation over Encrypted Data
Submitted by grigby1 on Mon, 04/24/2017 - 11:52am
data confidentiality
Encryption Scheme Inference
Information Flow
Polymorphism
pubcrawl
security
virtual machine
virtual machine security
biblio
Potential cyber-attacks against global oil supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Information Flow
threats to energy sector
Temperature sensors
supply chains
supply chain management
security of data
risk management
ripple effect
pubcrawl170112
petroleum industry
organization
organisational aspects
oil supply chain
information management
Companies
globalisation
global supply chain
global oil supply chain
global market
financial losses
Energy Sector
damaging effect
cyber-attacks countermeasures
cyber-attacks
cyber-attack
cyber risk assessment
Cyber incident
Computer hacking
biblio
Using Dynamic Taint Approach for Malware Threat
Submitted by grigby1 on Tue, 03/07/2017 - 1:40pm
pubcrawl170109
Information Flow
intersuspicious modules
invasive software
malware
Malware behavioural analysis
malware infection
malware threat analysis
network threats
FSM
Servers
suspicious apps
taint checking tools
taint marking
threat analysis
trees (mathematics)
weighted spanning tree analysis scheme
Computer hacking
Android programs
attack sequence
behavioural analysis
cloud applications
Cloud Computing
cloud computing server
Computational modeling
Computer crime
Analytical models
cyber security attack
data tracking
defence capability
Dynamic taint propagation
dynamic taint propagation analysis model
finite state machine
finite state machines
file
Gradual Information Flow Control
Submitted by akarns on Tue, 01/26/2016 - 3:52pm. Contributors:
Peter Thiemann
Luminous Fennell
Presented as part of the
2016 HCSS conference
.
gradual typing
Information Flow
Java
High Confidence Software and Systems Conference 2016
Academia
Presentation
HCSS 2016
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
« first
‹ previous
1
2
3
next ›
last »