Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program diagnostics
biblio
A Clone Code Detection Method Based on Software Complex Network
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
network coding
software-security
software-network
software network model
software maintenance
software complex network feature matching
software clone detection
security of data
Security analysis
resilience
pubcrawl
program diagnostics
open source code
Information Reuse and Security
Metrics
feature-matching
cyber physical systems
composability
complex networks
code comparison
clone-code-detection
clone codes information
clone code detection method
added features
Resiliency
Compositionality
biblio
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
IoT firmware kernel greybox fuzzer
vulnerabilities discovery
static binary analysis.
security of data
Router Systems Security
resilience
real-world Linux-based IoT programs
program diagnostics
Metrics
Linux-based IoT program
Linux
IoT program greybox fuzzing
static analysis
Internet of Things
fuzzing
firmware
embedded security
effective vulnerability discovery technique
binary static analysis
Resiliency
composability
Human behavior
pubcrawl
biblio
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
static analysis
Locky
program diagnostics
pubcrawl
Ransomware
ransomware pandemic prevention
SDHASH
Semantics
Similarity Preserving
SSDEEP
invasive software
Syntactics
System performance
Triaging
triaging performance
triaging ransomware
WannaCry
WannaCryptor
YARA rules
CryptoWall
Resiliency
Metrics
Fuzzy Cryptography
Cer-ber
Cerber
composability
Context-Triggered Piecewise Hashing
Cryptography
Scalability
cyberthreat hunting
data privacy
dynamic analysis
Engines
file organisation
Fuzzy Hashing
IM-PHASH
Import Hashing
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
Ares: Inferring Error Specifications through Static Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
program debugging
predictability
Security Heuristics
reliability flaws
error specification
error handling blocks
error handling
Ares
API-related defects
security
application program interfaces
program diagnostics
program testing
static analysis
pubcrawl
Resiliency
Scalability
security of data
biblio
Algebraic Patterns of Vulnerabilities in Binary Code
Submitted by aekwall on Mon, 02/17/2020 - 2:42pm
sockets
symbolic modelling
rewriting rules
pattern creation
cyber reasoning systems
behaviour algebra
algebraic patterns
algebraic matching methods
algebraic matching
algebraic approach
algebra equations
Binary codes
binary code
Buffer overflows
Registers
Compositionality
Semantics
algebra
program diagnostics
pattern matching
vulnerability detection
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics
Submitted by aekwall on Mon, 02/10/2020 - 12:11pm
software quality
software assurance
technical debt principal
technical consequences
static analysis techniques
source code maintenance
SecDevOps
malicious external attacks
malicious attack tactics
external cybersecurity attacks
external attack tactics
exploitable source code vulnerabilities
cybersecurity attack tactics
Common Weakness Enumerations
system weaknesses
technical debt
security of data
quality assurance
Scalability
program diagnostics
source code (software)
software maintenance
static analysis
computer security
Cybersecurity
tools
composability
pubcrawl
Software measurement
Software
Organizations
biblio
Towards Better Utilizing Static Application Security Testing
Submitted by aekwall on Mon, 02/10/2020 - 12:10pm
SAST techniques
vulnerability warnings
utilization of software engineering tools
static program analysis
static bug detection
static application security testing
software reliability
software quality
software assurance
security of data
security experts
Scalability
static analysis
SAST product
quality-assurance effort
program testing
program diagnostics
Priv
data visualisation
actionable vulnerability warnings
Resiliency
composability
Human behavior
pubcrawl
biblio
Towards Automated Security Vulnerability and Software Defect Localization
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
undiscovered vulnerabilities
tools
static code analysis
Software systems
software maintenance
software defects
software defect localization
software defect
security vulnerability
security vulnerabilities
security of data
security
resilience
static analysis
modern software
Defect Localization
Cybersecurity
Correlation
Computer bugs
bug
automated security vulnerability
Automated Secure Software Engineering
Resiliency
composability
Human behavior
pubcrawl
biblio
DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development
Submitted by grigby1 on Mon, 02/10/2020 - 11:36am
program diagnostics
Tainted data flow
static code analysis
static analysis-based security analysis approach
static analysis plugin
static analysis
SQL injection
software engineering
Software
security of data
Secure Software Development
Resiliency
resilience
pubcrawl
android
password
mobile software development
mobile computing
Mobile Applications
leak detection
Human Factors
Human behavior
Handheld computers
DroidPatrol
Conferences
computer science education
composability
Android Development Studio
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »