Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program debugging
biblio
Can We Predict the Quality of Spectrum-based Fault Localization?
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
fault diagnosis
work factor metrics
static test suite
static test metrics
spectrum-based fault localization
prediction model
potential effectiveness
fault-related metrics
fault localization techniques
fault localization effectiveness
effective fault localization
dynamic test suite
dynamic test metrics
debugging
automated fault localization
Scalability
Couplings
software fault tolerance
software metrics
program debugging
Predictive models
Complexity theory
Measurement
machine learning
program testing
tools
Metrics
pubcrawl
Resiliency
Electronic mail
biblio
Cloud-based Labs and Programming Assignments in Networking and Cybersecurity Courses
Submitted by grigby1 on Wed, 11/04/2020 - 2:02pm
learning activities
teaching
Servers
Security Programming
security of data
public cloud
pubcrawl
Programming profession
programming languages
programming assignments
program testing
program debugging
private cloud
privacy
networking course
Network Programming
Cloud Computing
Laboratories
innovative design
innovate practice
Hands-On Laboratory
educational courses
education
cybersecurity education
cybersecurity course
cyber physical systems
course learning objectives
computer security
computer science education
computer aided instruction
cloud-based labs
biblio
PREEMPT: PReempting Malware by Examining Embedded Processor Traces
Submitted by grigby1 on Fri, 10/30/2020 - 12:19pm
learning (artificial intelligence)
zero overhead
tools
software-based AVS
security
Scalability
real-time systems
pubcrawl
program debugging
processor traces
PREEMPT malware
post-silicon validation
malware detection
malware
machine learning-based classifiers
low-latency technique
anti-virus software tools
invasive software
i-o systems security
I-O Systems
HPC
hardware-level observations
Hardware performance counters
Hardware
ETB
embedded trace buffer
embedded systems
embedded processor traces
debug hardware component
Databases
computer viruses
biblio
Evolutionary Computation for Improving Malware Analysis
Submitted by aekwall on Mon, 10/26/2020 - 12:13pm
program debugging
variable-strength covering arrays
software improvement
malicious code
individual software artifacts
GI-based bug repair
GI-based approach
genetic improvement
automated repair
automated malware analysis
benign software
Genetics
evolutionary computation
malicious software
Predictive Metrics
Servers
malware samples
Malware Analysis
genetic algorithms
software maintenance
privacy
tools
Metrics
pubcrawl
Human behavior
Resiliency
invasive software
security
malware
biblio
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
Resiliency
multiple processes
practical online bug diagnosis tool
principal component analysis
Production
production system
program debugging
program diagnostics
program testing
pubcrawl
resilience
multiple failing executions
scheduling
SCMiner
security
security of data
statistical analysis
statistical anomaly detection techniques
system call traces
System Level
system-level concurrency fault
tools
event handlers
Computer bugs
Concurrency
concurrency (computers)
Concurrency Failures
Concurrent computing
CPS
cyber physical systems
Data mining
debugging
default system audit tools
composability
failure-inducing system call sequences
fault diagnosis
fault localization
file content
Instruments
interleaving schedule
localizing system-level concurrency faults
Metrics
Multi Process Applications
biblio
SWAN\_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Submitted by aekwall on Mon, 09/28/2020 - 11:33am
novel automated machine-learning approach SWAN
software metrics
graphical user interfaces
machine-learning
active machine learning
authentication methods
bug detection
code-specific methods
IntelliJ plugin
program debugging
program analysis
security-relevant methods
semiautomated detection
SRM
static analysis tools
SWAN\_ASSIST aids developers
SWAN\_ASSIST tool
time exactly those methods whose classification best impact
machine learning
learning (artificial intelligence)
Resiliency
pubcrawl
composability
pattern classification
vulnerability detection
Training
Libraries
security
authentication
public domain software
software maintenance
Automated Secure Software Engineering
Java
program diagnostics
software quality
biblio
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs
Submitted by grigby1 on Fri, 08/14/2020 - 11:45am
Domain-Specific Language
application programming interface
lightweight domain-specific language
large-scale C programs
IMSpec rules
API-misuse detection capability
API usage validation
API usage constraints
API misuses
bug detection
API-misuse bugs
application programming interfaces
Syntactics
Semantics
Compositionality
tools
specification languages
public domain software
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Software
Resiliency
resilience
pubcrawl
Engines
biblio
Inferring API Correct Usage Rules: A Tree-based Approach
Submitted by grigby1 on Fri, 08/14/2020 - 11:45am
inference mechanisms
application programming interface
statistically extracted API correct usage rules
Software Vulnerability
parent API
majority API usages
lower-level API
API tree structure
API misuse
API documentation
API Correct Usage Rule
security of data
Compositionality
tree data structures
application program interfaces
APIs
Linux
program debugging
Resiliency
resilience
pubcrawl
biblio
An Empirical Study on API-Misuse Bugs in Open-Source C Programs
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
C language
API misuse
API-misuse bugs
API-misuse detection
API-misuse detectors
APIMU4C
benchmark
bug detection
C code
application programming interfaces
empirical study
fix patterns
Open Source Software
open-source C programs
static analysis detectors
usage statistics
application programming interface
security of data
Detectors
Compositionality
public domain software
security vulnerabilities
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Libraries
Benchmark testing
Resiliency
resilience
pubcrawl
biblio
FireBugs: Finding and Repairing Bugs with Security Patterns
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
program debugging
Software systems
software quality
software maintenance
software design experience
software defects
security patterns
security of data
security bugs
security
Secure Software Development
Resiliency
resilience
repairing bugs
pubcrawl
Automated Secure Software Engineering
mobile computing
javax.crypto APIs
firebugs
Cryptography
Compositionality
Bug Repair
automated approach
application programming interface
application program interfaces
APIs
Android app repositories
Android (operating system)
composability
1
2
3
4
next ›
last »