Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program diagnostics
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
continuous compliance process
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
encryption audits
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
Production
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Cloud Computing
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
biblio
Extracting Taint Specifications for JavaScript Libraries
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
static analysis tools
pubcrawl
resilience
Resiliency
security
security of data
security vulnerabilities
software engineering
static analysis
program testing
taint sinks
taint specifications
test suites
testing
third-party libraries
tools
Writing
JavaScript applications
access path mechanism
authoring languages
command injection attacks
composability
cross-site scripting
dynamic analysis
Entry points
exit points
taint analysis
JavaScript libraries
Libraries
Metrics
Node.js platform
npm repository
package dependency structure
program diagnostics
biblio
Securing Asynchronous Exceptions
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
Libraries
Theorem Proving
telecommunication security
Synchronization
security of data
security
Runtime system
Runtime
pubcrawl
programming language semantics
programming
program verification
program invariants
program diagnostics
program compilers
Metrics
pattern locks
language-based information-flow control techniques
language constructs
Instruction sets
IFC language
features asynchronous exceptions
different covert channels
data structures
Concurrent computing
concurrency control
Compositionality
compiler security
Resiliency
Scalability
Human behavior
biblio
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning Types
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
Grounded Theory study
secure software
security tools
14 professional software developers
50 professional software developers
code security
developer preferences
developer security warnings
development tools
compiler security
Qualitative research
security checkers
security warning types
security warnings
static analysis engines
warning interactions
warning type
security of data
Compositionality
security issues
program diagnostics
software development
static analysis
software engineering
machine learning
tools
Metrics
pubcrawl
Resiliency
Software
security
Organizations
Scalability
biblio
BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
program compilers
STM32 NUCLEO F446RE microcontroller
memory safety
memory corruptions
low-end ARM Cortex-M microprocessors
compiler-based toolchain
Clang/LLVM compiler
Cats
backward edge control flow integrity
BackFlow
ARM instruction set
Europe
compiler security
compiler
Safety
Instruction sets
CFI
Compositionality
storage management
Benchmark testing
program diagnostics
microcontrollers
computer security
automation
Metrics
pubcrawl
Resiliency
Scalability
biblio
Gap between Theory and Practice: An Empirical Study of Security Patches in Solidity
Submitted by aekwall on Mon, 03/15/2021 - 12:07pm
contracts
vulnerability patches
Solidity team
Solidity
security patches
real-world Solidity contracts
real-world Ethereum smart contracts
potentially vulnerable contracts
missing security patches
Ethereum smart contract developers
empirical study
smart contract security
Manuals
electronic commerce
compiler security
C++ language
security of data
program compilers
Compositionality
encoding
program diagnostics
smart contracts
security vulnerabilities
static analysis
software engineering
tools
Metrics
pubcrawl
Resiliency
security
telecommunication security
Scalability
biblio
ComPy-Learn: A toolbox for exploring machine learning representations for compilers
Submitted by aekwall on Mon, 03/15/2021 - 12:07pm
compilers
program compilers
Clang
LLVM
compiler security
empirical evaluation
Clang compiler
Code Representations
compiler heuristics
Compositionality
ComPy-Learn
developer productivity
graph representations
LLVM compiler backend
program code
software engineering tools
software performance
syntax-level language information
tools
Task Analysis
Program processors
learning (artificial intelligence)
Resiliency
pubcrawl
machine learning
Metrics
optimization
Scalability
Training
software engineering
public domain software
Vulnerability prediction
program diagnostics
Predictive models
Pipelines
biblio
Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks
Submitted by grigby1 on Tue, 03/09/2021 - 2:22pm
mobile devices
ISCX botnet dataset
learning (artificial intelligence)
machine learning
machine learning classifiers
malicious apps
Metrics
mobile botnet detection
mobile computing
invasive software
mobile operating systems
pattern classification
program diagnostics
pubcrawl
resilience
Resiliency
smart phones
static app features
CNN-based approach
Android botnet detection
Android Botnets
Android platform
Androids
botnet
botnet apps
Botnet detection
botnets
Android (operating system)
CNN-based model
composability
convolutional neural nets
convolutional neural networks
deep learning
feature extraction
Forestry
Humanoid robots
biblio
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Submitted by grigby1 on Fri, 12/11/2020 - 2:31pm
Robustness
Metrics
mobile computing
mobile malware scanning
privacy
program analysis
program diagnostics
pubcrawl
resilience
Resiliency
market-wide malware scanning
semantic features
Semantics
social networking (online)
social-network-based centrality analysis
static analysis
syntax-based features
transformation attacks
zero-day malware including malware samples
graph theory
Android (operating system)
Android malware
Android Malware Detection
API Centrality
fault-tolerant representation
feature extraction
Google-Play app market
graph semantics
Analysis of variance
Human behavior
invasive software
Lightweight feature
lightweight graph-based approach
MalScan
malware
Malware Analysis
Market-wide
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 12:03pm
LSTM
Internet-scale Computing Security
sequential processing layers
ScriptNet system
Privacy-invasive software
preinformant learning
PIL model
neural static analysis
Neural models
neural malicious JavaScript detection
JavaScript files
Internet-scale processing
discriminative training
computer infection threat vector
policy governance
deep learning model
malware
deep learning
program diagnostics
Java
Vectors
machine learning
Neural networks
neural nets
Metrics
malware detection
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
invasive software
1
2
3
4
5
6
7
8
9
next ›
last »