Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Runtime
biblio
Toward Resilient Stream Processing on Clouds Using Moving Target Defense
Submitted by grigby1 on Tue, 02/18/2020 - 12:06pm
pubcrawl
virtual machines
virtual machine
Task Analysis
Storms
shared computing resources
sensitive streaming applications
security of data
Scalability
Runtime
resilient stream processing
Resiliency
resilience
real-time systems
real-time stream processing
Apache Storm
Payloads
operating system
MTD
moving target defense
Metrics
Fast Data platforms
Distributed databases
distributed clusters
clouds
Cloud Computing
canonical distributed stream processing platform
Big Data platforms
Big Data
biblio
Prevention of Data Leakage due to Implicit Information Flows in Android Applications
Submitted by aekwall on Mon, 01/27/2020 - 10:28am
privacy policy enforcement
taint analysis
Smalien enforced privacy policy
implicit information flows
implicit information flow
IIFs
IIF-contained information
IIF-accompanied attacks
IIF tricks
IIF detection technique
explicit information
dynamic taint analysis technique
dynamic taint analysis
DTA technique
Android applications
security of data
Android (operating system)
android
Instruments
data leakage
Metrics
privacy
composability
pubcrawl
mobile computing
performance evaluation
security
Runtime
data privacy
Servers
biblio
SENAD: Securing Network Application Deployment in Software Defined Networks
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
network programmability
app-to-control threats
application plane controller
Computer crashes
data plane controller
DPC
dubbed SENAD
malicious command injection
network application deployment
APC
OpenFlow entries
resource exhaustion attack
resource isolation
SDN architecture
Software Defined Networks
telecommunication control
telecommunication network management
Resiliency
Access Control
authorisation
authorization
Runtime
Software
computer architecture
computer network management
software defined networking
computer network security
pubcrawl
composability
Metrics
SDN controller
process control
network management
command injection attacks
biblio
Detecting Data Races Caused by Inconsistent Lock Protection in Device Drivers
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
Kernel
Scalability
runtime analysis approach
runtime analysis
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
pattern locks
Monitoring
Linux driver patches
Linux
concurrency control
Instruments
inconsistent lock protection
Human Factors
human factor
Human behavior
driver execution
DILP
device drivers
device driver
data race
Concurrent computing
biblio
Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
NoC
Trojan horses
system-on-chip
System recovery
security attacks
security
secure routing algorithm
secret key leaking
runtime detection
Runtime
Routing
Router Systems Security
Resiliency
resilience
pubcrawl
outsourcing
network on chip security
network-on-chip architecture
network-on-chip
network routing
Multiprocessors System-on-Chip
multiprocessing systems
MPSoC
Metrics
Malicious-tolerant Routing Algorithm
malicious Hardware Trojans
logic design
invasive software
integrated circuits
hardware trojan
Hardware
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by grigby1 on Mon, 11/04/2019 - 12:35pm
ROP-style code reuse attacks
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
Model driven development
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
Biomedical monitoring
Instruction sets
Human Factors
Human behavior
high level synthesis
hardware-based protection
Hardware Security
hardware runtime monitors
hardware monitor
Hardware
formal verification
embedded systems
embedded processor
embedded hardware
composability
building memory protection mechanisms
biblio
Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
multilayer protection approach
Web browsers
security of data
Scalability
Runtime
ROP
Return-oriented Programming attacks
return oriented programming
Resiliency
RAS
pubcrawl
Program processors
Nonhomogeneous media
multilayer system
multilayer ROP protection
rop attacks
microarchitecture
microarchitectural units
lightweight security techniques
LBR
layers
Human Factors
Human behavior
Hardware
computer architecture
composability
commodity hardware
CFI
Benchmark testing
architecture
biblio
Compiler-Assisted Code Randomization
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Scalability
Prototypes
pubcrawl
randomized variants
Resiliency
return oriented programming
return-oriented programming
Robustness
Runtime
program compilers
security
security of data
Software
software distribution models
software distribution norms
software diversification
software engineering
transformation-assisting metadata
composability
applied code transformation
CCR
code randomization
code uniformity
compiler level protection
compiler-assisted code randomization
compiler-rewriter cooperation
compiler security
address space layout randomization
Compositionality
fine-grained code randomization
fine-grained code transformation
Hardware
Human behavior
LLVM compiler toolchain
metadata
Metrics
biblio
AirborneCPS: A Simulator for Functional Dependencies in Cyber Physical Systems: A Traffic Collision Avoidance System Implementation
Submitted by grigby1 on Mon, 08/26/2019 - 11:06am
Human Factors
unforeseen runtime behavior
undesired functional interaction
Transponders
traffic collision avoidance system implementation
Simulator
Scalability
runtime behavior
Runtime
road traffic
Resiliency
resilience
pubcrawl
powerful communication networks
Metrics
air traffic control
Human behavior
Functional Dependency
functional dependencies
embedded systems
cyber-physical systems
Cyber Physical System
Cyber Dependencies
CPS
Compositionality
Collision Avoidance System
collision avoidance
Brakes
automobiles
Aircraft
biblio
SEnSE – An Architecture for a Safe and Secure Integration of Safety-Critical Embedded Systems
Submitted by aekwall on Wed, 05/01/2019 - 12:42pm
pubcrawl
trustcenter
SEnSE
security
secure integration
secure and safe embedded
safety-critical software
safety-critical embedded systems
Safety
safe interaction
safe integration
Runtime
Resiliency
recertification
architecture
performance evaluation
Metrics
embedded systems
Embedded System
dynamic system
cyberphysical system
cyber-physical systems
contract-based development
composability
communication protocol
cloud application
automobiles
authorization
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »