Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program diagnostics
biblio
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs
Submitted by grigby1 on Fri, 08/14/2020 - 11:45am
Domain-Specific Language
application programming interface
lightweight domain-specific language
large-scale C programs
IMSpec rules
API-misuse detection capability
API usage validation
API usage constraints
API misuses
bug detection
API-misuse bugs
application programming interfaces
Syntactics
Semantics
Compositionality
tools
specification languages
public domain software
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Software
Resiliency
resilience
pubcrawl
Engines
biblio
An Empirical Study on API-Misuse Bugs in Open-Source C Programs
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
C language
API misuse
API-misuse bugs
API-misuse detection
API-misuse detectors
APIMU4C
benchmark
bug detection
C code
application programming interfaces
empirical study
fix patterns
Open Source Software
open-source C programs
static analysis detectors
usage statistics
application programming interface
security of data
Detectors
Compositionality
public domain software
security vulnerabilities
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Libraries
Benchmark testing
Resiliency
resilience
pubcrawl
biblio
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
ARMv8-A processor
application programming interface
tablets
suspected Flush+Reload
static code analysis schemes
secure collaborative API
obfuscation techniques
mobile phones
Flush+Reload attack
Flush+Flush cache attacks
Flush+Flush attack
flush operation API
Collabo rative API
security of data
ARMv8 A
Compositionality
application program interfaces
APIs
program diagnostics
performance evaluation
cache storage
mobile computing
microprocessor chips
Resiliency
resilience
pubcrawl
biblio
Real Time Android Ransomware Detection by Analyzed Android Applications
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
program diagnostics
android encryption
static method
realtime variant ransomware detection
realtime unknown ransomware detection
realtime new ransomware detection
real-time detection
real-time Android ransomware detection
PC environment
New/Variant/Unknown Ransomware
dynamic method
analyzed Android applications
Metrics
Android (operating system)
android
Monitoring
static analysis
Entropy
smart phones
Ransomware
pubcrawl
Human behavior
Resiliency
real-time systems
mobile computing
invasive software
encryption
Cryptography
Scalability
biblio
File Similarity Determination Based on Function Call Graph
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
Plagiarism
static analysis methods
space-time efficiency
similarity detection method
similarity detection
large-scale software systems
graph isomorphism
function features
function call graph
file similarity determination
decision strategies
control flow features
ip protection
file organisation
information retrieval
feature extraction
intellectual property
graph theory
Syntactics
Measurement
Metrics
program diagnostics
static analysis
composability
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
biblio
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
supervised classifiers
Metrics
neural nets
private clouds
program diagnostics
pubcrawl
ransomware samples
resilience
Resiliency
static analysis
malware
transfer learning
Trusted Computing
trusted malware signature generation method
TrustSign signature generation process
unsupervised classifier
Unsupervised Learning
VGG-19 neural network model
virtualisation
volatile memory
distribution time
Cloud Computing
cloud virtualization technology
convolutional neural networks
Cryptography
cryptojacking
cryptojacking attacks
deep feature transfer learning
deep learning
digital signatures
Automatic Signature Generation
dynamic analysis
fileless malware
high-level deep features
Human behavior
Human Factors
ImageNet dataset
in-browser cryptojacking attacks
inspection procedure
invasive software
biblio
Detecting Input Sanitization Errors in Scala
Submitted by grigby1 on Thu, 07/09/2020 - 1:57pm
program diagnostics
taint analysis
static types
sensitive sink methods
security of data
ScalaTaint
Scalability
Scala programming language
Scala Compiler
Scala applications
Resiliency
resilience
pubcrawl
programming languages
Compositionality
privacy
object-oriented programming
input sanitization errors
Input Sanitization
Human Factors
Human behavior
high-level language
functional programming
Error
dynamic taint analyzer
Data Sanitization
data deletion
biblio
The European H2020 project VESSEDIA (Verification Engineering of Safety and SEcurity critical Dynamic Industrial Applications)
Submitted by grigby1 on Fri, 06/26/2020 - 1:18pm
IoT security
verification engineering of safety and security critical dynamic industrial applications
tools
static analysis
Source code analysis
software fault tolerance
Software
security of data
Security and Safety Analysis
security
Safety
Resiliency
pubcrawl
program diagnostics
Metrics
certification
IoT
Internet of Things
high-criticality applications
formal verification
Formal Specification
formal methods
European H2020 project VESSEDIA
Europe
embedded systems
Cyber-security
cyber-physical systems
cyber-attacks
connected systems security
composability
biblio
Identifying Security Spots for Data Integrity
Submitted by grigby1 on Fri, 04/24/2020 - 4:21pm
malware
tools
security spots identification
Security spot
security of data
Resiliency
resilience
pubcrawl
program diagnostics
object-oriented programs
object-oriented programming
object oriented security
Metrics
benign code
malicious code
integrity breach conditions
Integrity breach condition
insiders
insider attack
IBCs
Databases
data integrity
Couplings
coupling
composability
biblio
Using Safety Properties to Generate Vulnerability Patches
Submitted by aekwall on Mon, 04/20/2020 - 10:45am
relational databases
vulnerability-specific safety properties
source code patches
Software-Vulnerability
Software-Patch
safety-property
safety property
property-based APR
Program-Analysis
Buffer storage
automatic program repair methods
Automated-Program-Repair
relational database security
program debugging
Engines
Safety
program verification
program diagnostics
software maintenance
security vulnerabilities
Libraries
tools
Metrics
composability
pubcrawl
Human behavior
Resiliency
Software
security
security of data
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »