Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
program diagnostics
biblio
Detecting the Use of Unsafe Data in Software of Embedded Systems by Means of Static Analysis Methodology
Submitted by grigby1 on Fri, 02/22/2019 - 4:10pm
pubcrawl
unsafe data
Syntactics
syntactic information
static program code analysis
static code analysis
static analysis methodology
static analysis
software quality
Semantics
semantic information
Resiliency
composability
program diagnostics
program code
potentially unsafe data
Indexes
increase of efficiency
Human behavior
embedded systems
embedded computing
diagnostic rules
Containers
biblio
T-Fuzz: Fuzzing by Program Transformation
Submitted by grigby1 on Thu, 02/14/2019 - 11:20am
program analysis
tools
taint analysis
t-fuzz approach
symbolic execution-based approach
software bugs
Software
security of data
security
randomly generated inputs
pubcrawl
program verification
program transformation
program testing
program diagnostics
program debugging
bug finding
Metrics
Libraries
input mutation techniques
input checks
fuzzing transformed programs
fuzzing
fuzzer-generated inputs
Fuzz
dynamic tracing based technique
deep execution paths
coverage-guided fuzzer
Computer bugs
composability
code paths
biblio
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
NIST post-quantum cryptography project submissions
validation tools
tools
taint analysis
static analysis
source code
quantum cryptography
pubcrawl
Proposals
program diagnostics
post-quantum cryptography algorithms
NIST post-quantum standardization project
cache storage
NIST
Metrics
leakage pattern detection
execution behavior
encryption
development cycle
dedicated vulnerability research tool
cryptographic algorithms
composability
cache-timing vulnerabilities
cache-timing attacks
biblio
Symbolic execution and probabilistic reasoning
Submitted by grigby1 on Wed, 09/05/2018 - 10:42am
Systematics
systematic program analysis technique
symbolic path conditions
software system security
software system safety
program paths
program behaviors
probabilistic reasoning
event occurrence probability
Computing Theory
cognition
Probabilistic logic
Security Metrics
reliability theory
Metrics
Atmospheric modeling
inference mechanisms
probability
Software systems
program diagnostics
Computational modeling
safety-critical software
Symbolic Execution
pubcrawl
biblio
Securing Concurrent Lazy Programs Against Information Leakage
Submitted by grigby1 on Thu, 08/23/2018 - 11:57am
information-flow control tools
concurrency control
Agda proof assistant
concurrent lazy programs security
covert channel
functional languages
functional programming
Haskell libraries
IFC libraries
IFC tools
Information Leakage
lazy calculus
lazy evaluation
lazy languages
lazyDup
Message systems
noninterference
security library MAC
software libraries
Writing
data structures
Theorem Proving
Haskell
Concurrency
cyber-physical systems
pubcrawl
composability
security of data
data privacy
Sensitivity
security
program diagnostics
resilience
Metrics
Libraries
Lattices
timing
Resiliency
software tools
biblio
A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software
Submitted by grigby1 on Wed, 06/20/2018 - 12:57pm
Malware Analysis
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
Phased arrays
pattern classification
Metrics
Malware Clustering
malware classification
antivirus software detection
malware
lightweight malware classification
internet
Human behavior
Electronic mail
dynamic analysis
Databases
Data mining
cyber threats
computer viruses
arrays
biblio
Malware classification using static analysis based features
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
malware classification
Vegetation
Training
static analysis
Resiliency
resilience
pubcrawl
program diagnostics
privacy
pattern classification
ordinary opcode n-gram based features
Metrics
anti-virus vendors
malware binaries
malware
machine learning features
machine learning algorithms
learning (artificial intelligence)
Human behavior
feature extraction
Decision trees
control statement shingling
computer viruses
biblio
Scalable Framework for Accurate Binary Code Comparison
Submitted by grigby1 on Wed, 06/20/2018 - 12:50pm
maximum common subgraph
CG
comparison algorithm
empiric results heuristic method
exact matches
extensive binaries
forward slicing
functions matching process parallelization
heavily modified functions
high matching quality
IdaPro disassembler
main stages
matched vertices
matching process
call graph
old versions
PDG
practical applications
program dependence graph
programmatic changes
real world libraries
scalable framework
slightly modified functions
statically linked libraries
target program
unchanged modified functions
well-known bugs prevention
Libraries
graph theory
privacy
pubcrawl
Human behavior
invasive software
Algorithm design and analysis
tools
Semantics
Cloning
program diagnostics
Malware Analysis
resilience
Metrics
static analysis
Computer bugs
Resiliency
program debugging
Program slicing
Binary codes
accurate binary code comparison
backward slicing
binary code clone detection
Binary code comparison
binary files
Binnavi platform
calculated heuristics
biblio
Identifying and Documenting False Positive Patterns Generated by Static Code Analysis Tools
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
public domain software
warning message
tools
system documentation
static code analysis tools
static code analysis
software tools
software engineering
security
Resiliency
resilience
commercial tool
pubcrawl
program diagnostics
open-source tools
Open Source Software
Human behavior
false positive pattern identification
false positive pattern documentation
Context
Conferences
composability
biblio
The approach to finding errors in program code based on static analysis methodology
Submitted by grigby1 on Thu, 06/07/2018 - 3:12pm
semantic information
tools
testing
syntax tree
Syntactics
syntactic information
static program code analysis
static code analysis methodology
static code analysis
source code (software)
source code
software quality
Semantics
Bars
Resiliency
resilience
pubcrawl
program diagnostics
program code Error detection
increase of efficiency
Human behavior
embedded computing
efficiency improvement
diagnostic rules
composability
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »