Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program compilers
biblio
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
robust preservation
hyperproperties
linked adversarial code
linked adversarial target code
linked source code
linked target code
liveness
low-level target language
multiple programs
noninterference
property classes
relational hyperproperties
relational properties
good programming languages
robust property preservation
secure compilation
secure compilation chain
Secure interoperability
secure linking
Security Foundations
source language
source-level abstraction
strictly stronger security guarantees
supported security goals
trace properties
compiler security
Compositionality
security of data
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
Libraries
program diagnostics
program verification
Writing
Space exploration
Security Properties
Safety
program compilers
secure code
source program
adversarial contexts
arbitrary adversarial contexts
compiled program
Computer languages
equivalent property-free
formal secure compilation criteria
full abstraction
fully abstract compilation chain
biblio
SoK: Shining Light on Shadow Stacks
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
return oriented programming
metadata
Metrics
optimization
Payloads
performance comparisons
program compilers
program diagnostics
pubcrawl
Registers
Resiliency
Memory Protection
return-oriented-programming
Scalability
security
security of data
shadow stack design
shadow stacks
shadow-stacks
Software
software security mitigations
virtual calls
control-flow-integrity
C++ languages
CFI mitigations
compatibility
compiler designers
compiler security
composability
Compositionality
control-flow hijacking attacks
control-flow integrity solutions
control-flow-hijacking
backward edge
defense mechanisms
deployed mitigations
dominant attack vector
forward edge
fully precise mechanism
Human Factors
indirect calls
language-based-security
low performance overhead
biblio
Integrating Compiler Driven Transformation and Simulated Annealing Based Floorplan for Optimized Transient Fault Tolerant DSP Cores
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
simulated annealing
fault security
Finite impulse response filters
high performance devices
integrated circuit layout
integrated circuit reliability
low-power electronics
optimized low cost transient fault tolerant DSP core
optimized transient fault tolerant DSP
electronic device realibility
simulated annealing based floorplan
simulated annealing based optimization process
sub-nanometer technology scale
technology scaling
Transient fault
transient fault tolerant approach
compiler security
program compilers
Resiliency
pubcrawl
Metrics
Transient analysis
delays
fault tolerance
Fault tolerant systems
Compositionality
Scalability
battery operated low power
battery operated low power high performance devices
circuit optimisation
compiler driven transformation
contradictory design goal optimization
digital signal processing chips
DSP core
biblio
Automatically Validating the Effectiveness of Software Diversity Schemes
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
program compilers
compiler security
software protection
software diversity schemes
software diversity
scant attention
exploit mitigation
diversity techniques
diversity strategies
diversifying compiler
DARPA Cyber Grand Challenge environment
comparative evaluation
compilers
security of data
Compositionality
Semantics
evaluation
Measurement
computer security
Cybersecurity
vulnerabilities
Metrics
pubcrawl
Resiliency
Program processors
Scalability
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
biblio
Compiler-Assisted Code Randomization
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Scalability
Prototypes
pubcrawl
randomized variants
Resiliency
return oriented programming
return-oriented programming
Robustness
Runtime
program compilers
security
security of data
Software
software distribution models
software distribution norms
software diversification
software engineering
transformation-assisting metadata
composability
applied code transformation
CCR
code randomization
code uniformity
compiler level protection
compiler-assisted code randomization
compiler-rewriter cooperation
compiler security
address space layout randomization
Compositionality
fine-grained code randomization
fine-grained code transformation
Hardware
Human behavior
LLVM compiler toolchain
metadata
Metrics
biblio
Efficient and Safe Control Flow Recovery Using a Restricted Intermediate Language
Submitted by grigby1 on Thu, 09/26/2019 - 10:24am
security
program diagnostics
program verification
pubcrawl
resilience
Resiliency
restricted control transition intermediate language
Safe Coding
safe control flow recovery
program compilers
security mechanisms
security of data
security policies
Security Validation
Semantics
software fault tolerance
source code level
Explosions
Bianry Analysis
collaboration
Computational modeling
Conferences
Control Flow Recovery
control-flow recovery
data flow analysis
data-flow analyses
automatic analysis
Formal Specification
Human behavior
Human Factors
low-level object code
Memory management
Metrics
policy-based governance
biblio
Scalable Verification Framework for C Program
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalability issues
property-guided program slicing
pubcrawl
quality assurance
resilience
Resiliency
Safety
safety critical areas
Scalability
program verification problem
scalable verification
scalable verification framework
Software
Software systems
structural abstraction
Through-silicon vias
TSV
abstraction refinement
program verification
Program slicing
program compilers
optimization
model checking
Metrics
memory consumption
lines-of-code
extended structural abstraction
context aware software verification
Compositionality
Complexity theory
C program verifiers
C language
automatic software verification framework
biblio
Parallelization of Machine Learning Applied to Call Graphs of Binaries for Malware Detection
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
program compilers
machine learning algorithms
malware
Malware Analysis
malware detection
Metrics
OpenMP version
parallelization
privacy
machine learning
pubcrawl
resilience
Resiliency
shortest path graph kernel
SPGK
support vector machine
Support vector machines
SVM
graph theory
Binary Analysis
byte-level n-grams
call graphs
compiler intermediate representations
compiler techniques
dynamic trace analysis
Engines
feature extraction
adaptive learning-based techniques
graph-based program representations
graphics processing units
Heterogeneous computing
Human behavior
invasive software
Kernel
learning (artificial intelligence)
biblio
Secure Compilation and Hyperproperty Preservation
Submitted by grigby1 on Wed, 01/10/2018 - 12:19pm
Safety
untyped target language
typed source language
Type theory
trace-preserving compilation
TPC
Syntactics
standards
Semantics
Security Properties
security of data
security
secure compilers
secure compilation
safety hyperproperties
coding theory
Resiliency
pubcrawl
program verification
Program processors
program compilers
low-level attack capabilities
hyperproperty preservation
fully abstract compiler
correctness criterion
Concrete
composability
compiler security
compiled program
« first
‹ previous
1
2
3
4
next ›
last »