Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
compiler
biblio
A Compiler for Transparent Namespace-Based Access Control for the Zeno Architecture
Submitted by aekwall on Fri, 04/28/2023 - 9:44am
Memory management
compiler security
Memory architecture
Global Shared Memory Space
capability
compiler
source coding
RISC-V
codes
security
Program processors
Compositionality
Semantics
Resiliency
Metrics
pubcrawl
Access Control
Scalability
biblio
Scalable Automatic Differentiation of Multiple Parallel Paradigms through Compiler Augmentation
Submitted by aekwall on Fri, 04/28/2023 - 9:43am
distributed
compiler security
Tasks
Raja
parallel programming
parallel
OpenMP
MPI
LLVM
Julia
hybrid parallelization
Enzymes
Enzyme
Scalability
compiler
C++
automatic differentiation
C++ languages
codes
Runtime
Program processors
Compositionality
Resiliency
Metrics
pubcrawl
biblio
Isolating Compiler Optimization Faults via Differentiating Finer-grained Options
Submitted by grigby1 on Fri, 03/31/2023 - 11:21am
compiler
resilience
Program processors
Optimization Option
Measurement
location awareness
Finer-grained
fault localization
Conferences
Computer bugs
compiler security
codes
Bug Isolation
big data security metrics
Benchmark testing
pubcrawl
Metrics
Scalability
Compositionality
Resiliency
biblio
BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
program compilers
STM32 NUCLEO F446RE microcontroller
memory safety
memory corruptions
low-end ARM Cortex-M microprocessors
compiler-based toolchain
Clang/LLVM compiler
Cats
backward edge control flow integrity
BackFlow
ARM instruction set
Europe
compiler security
compiler
Safety
Instruction sets
CFI
Compositionality
storage management
Benchmark testing
program diagnostics
microcontrollers
computer security
automation
Metrics
pubcrawl
Resiliency
Scalability
biblio
PlaidML-HE: Acceleration of Deep Learning Kernels to Compute on Encrypted Data
Submitted by grigby1 on Fri, 08/07/2020 - 3:48pm
machine learning as a service
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving machine learning
privacy
PPML inference
PlaidML-HE
MLaaS
ML Service
ML kernels
ML front-end frameworks
AI
machine learning
learning (artificial intelligence)
inference mechanisms
Human Factors
Human behavior
Homomorphic encryption
encrypted data
deep learning kernels
data privacy
Cryptography
cryptographic primitives
compiler
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
code fragments
compiler security
user-mode protection
Transactional memory
software engines
sensitive variables
Peapods
OS-independent memory confidentiality
memory disclosure attacks
memory disclosure attack
DRAM chips
cryptographic keys
Cryptographic Implementation
cryptographic engines
confidentiality
compiler
Scalability
automatic protection
program compilers
Registers
Compositionality
operating systems (computers)
Engines
Random access memory
OS kernel
Data protection
Metrics
pubcrawl
Resiliency
Kernel
encryption
Cryptography
biblio
Formally Verified Cryptographic Web Applications in WebAssembly
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
verification
Protocols
pubcrawl
public domain software
Resiliency
Scalability
security-critical software
Servers
Signal
sophisticated custom cryptographic components
standard protocols
standards
toolchain
program verification
verification techniques
verification-oriented programming languages
verified cryptographic Web applications
verified HACL cryptographic library
verified implementation
verified-software
web-security
Webassembly
WebAssembly compilers
WebAssembly version
whatsapp
formal verification
Browsers
CoMP
compilation pipeline
compiler
compiler security
Compositionality
cryptographic code
Cryptographic Protocols
cryptographic-library
cryptographic-protocol-verification
Cryptography
authoring languages
high-assurance cryptographic libraries
high-profile attacks
instruction set
Java
JavaScript runtimes
Libraries
low-level subset
Metrics
modern Web applications
program compilers
program diagnostics
biblio
Information-Flow Preservation in Compiler Optimisations
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
Scalability
optimization
passive side-channel attacks
program optimisations
Program processors
program transformations
program verification
pubcrawl
Resiliency
optimising compilers
Semantics
side-channel
side-channel attacks
source program
standard compiler passes
standards
target program
I-O Systems
Micromechanical devices
Metrics
information-flow preserving program transformation
information-flow preservation
information-flow leaks
Information Flow
IFP
correct compilers
Compositionality
compiler security
compiler optimisations
compiler
CompCert C compiler
security
i-o systems security
biblio
Compiler-Assisted Loop Hardening Against Fault Attacks
Submitted by grigby1 on Wed, 01/10/2018 - 12:18pm
compiler
pubcrawl
Resiliency
composability
physical attacks
software protection
compiler security
1
2
next ›
last »