Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Program processors
biblio
TEADS: A Defense-Aware Framework for Synthesizing Transient Execution Attacks
Submitted by grigby1 on Wed, 03/17/2021 - 11:42am
pubcrawl
transient execution attacks
Transient analysis
testing
synthesize
security
Scalability
Resiliency
resilience
attack chains
Program processors
privacy
microarchitecture
Heuristic algorithms
framework
dynamically
Chained Attacks
biblio
CheckMyCode: Assignment Submission System with Cloud-Based Java Compiler
Submitted by aekwall on Mon, 03/15/2021 - 11:08am
Java cloud based programming compiler
portability
assignment management system
CheckMyCode system
cloud based Java compiler
cloud compiler
Cloud System
computer science and engineering curriculum
educational courses
computer aided instruction
Java programming
learning system
mobile learning
PC browser
programming assignment submission system
programming language learning
smart device browser
Java
Scalability
programming
Task Analysis
Program processors
Resiliency
pubcrawl
Metrics
computer science education
Cloud Computing
Multimedia systems
Writing
Compositionality
program compilers
programming languages
compiler security
smart devices
biblio
ComPy-Learn: A toolbox for exploring machine learning representations for compilers
Submitted by aekwall on Mon, 03/15/2021 - 11:07am
compilers
program compilers
Clang
LLVM
compiler security
empirical evaluation
Clang compiler
Code Representations
compiler heuristics
Compositionality
ComPy-Learn
developer productivity
graph representations
LLVM compiler backend
program code
software engineering tools
software performance
syntax-level language information
tools
Task Analysis
Program processors
learning (artificial intelligence)
Resiliency
pubcrawl
machine learning
Metrics
optimization
Scalability
Training
software engineering
public domain software
Vulnerability prediction
program diagnostics
Predictive models
Pipelines
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
Improving MPI Collective I/O for High Volume Non-Contiguous Requests With Intra-Node Aggregation
Submitted by grigby1 on Fri, 10/30/2020 - 11:19am
MPI collective I/O
Writing
two-phase I/O
security
Scalability
request redistribution
pubcrawl
Program processors
Production
performance evaluation
parallel processing
parallel jobs
Parallel I/O
non-contiguous I/O
MPI processes
Aggregates
message passing
Libraries
intranode aggregation
internode communication contention
Intel KNL
input-output programs
i-o systems security
I-O Systems
high volume noncontiguous requests
Haswell processors
Cray XC40 parallel computers
collective MPI-IO functions
Benchmark testing
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
formal verification
Linux Operating System Security
term rewriting
ROSA model checker
privileged open source programs
privilege escalation attacks
PrivAnalyzer
LLVM-based C/C++ compiler
Linux privileges
Linux privilege use
ChronoPriv
AutoPriv
operating systems
dynamic analysis
verification
static analysis
security
program compilers
Predictive Metrics
program diagnostics
Containers
Analytical models
tools
Metrics
composability
pubcrawl
Resiliency
Linux
Program processors
Access Control
security of data
biblio
An Accelerator-based Architecture Utilizing an Efficient Memory Link for Modern Computational Requirements
Submitted by grigby1 on Tue, 10/06/2020 - 1:02pm
embedded systems
Task Analysis
security
Resiliency
resilience
Random access memory
pubcrawl
Program processors
On-Chip Communication Architectures
Metrics
Kernel
Heterogeneous systems
Hardware accelerator
Acceleration
embedded system architecture
efficient memory link
cyber physical systems
CPS
configurable accelerators
concurrency (computers)
Concurrency
computer architecture
composability
bussing system
automotive application
accelerator-based architecture
biblio
Trust is the Cure to Distributed Consensus with Adversaries
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
resilience
Iterative methods
Nonvolatile memory
optimisation
policy-based governance
Policy-Governed Secure Collaboration
Power supplies
Program processors
pubcrawl
Hardware
Resiliency
Scalability
social engineering networked systems
Task Analysis
trust evaluation mechanism
trust graph model
trust propagation scheme
trust-aware consensus algorithm
decision theory
composability
Computer Theory and Trust
access protocols
Byzantine adversary detection
computer science
consensus iteration process
Decision Making
decision making problem
Compositionality
distributed consensus algorithm
distributed consensus problems
distributed optimization
economic engineering networked systems
energy harvesting
false trust
graph theory
biblio
A Formal Approach to Secure Speculation
Submitted by grigby1 on Fri, 04/03/2020 - 11:55am
SMT
meltdown
microarchitectural side-channels
mitigation
observational-determinism
out-of-order-execution
safety-property
secure speculation property
secure speculative execution
side-channel
information-flow
software mitigations
Spectre
speculation
trace property-dependent observational determinism
trace-property
transient execution attacks
transient-execution
uclid5
resilience
formal verification
security
pubcrawl
Resiliency
verification
microarchitecture
Program processors
Transient analysis
Linux
Kernel
security of data
Metrics
Compositionality
provable security
formal
formal approach
Formal-Verification
hyperproperty
information flow security properties
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 2:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »