Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Runtime
biblio
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return Addresses**Thanks to all the reviewers for their valuable comments. This research is supported by an Australian Research Council grant (DP180104069).
Submitted by aekwall on Mon, 05/03/2021 - 12:05pm
return oriented programming
Benchmark testing
Binary codes
composability
Control Flow Integrity
Human Factors
programming
pubcrawl
Resiliency
return-oriented programming
rop attacks
Runtime
Runtime Rerandomization
Scalability
shadow stack
biblio
Saffire: Context-sensitive Function Specialization against Code Reuse Attacks
Submitted by aekwall on Mon, 05/03/2021 - 12:05pm
Scalability
Runtime
Software
Resiliency
pubcrawl
composability
Libraries
Complexity theory
Human Factors
software reliability
Layout
return oriented programming
rop attacks
Transforms
return into libc
software debloating
biblio
Through the Lens of Code Granularity: A Unified Approach to Security Policy Enforcement
Submitted by grigby1 on Thu, 04/29/2021 - 1:16pm
automata
Communication networks
Conferences
enforcement
Java
Monitoring
Policies
policy-based governance
pubcrawl
Runtime
security
security mechanisms
security policies
biblio
Cost-efficient Integration Process Placement in Multiclouds
Submitted by aekwall on Tue, 04/27/2021 - 12:34pm
Random access memory
Process Placement
Multicloud
Integration Patterns
Cost efficient
Application Integration
predictability
Security Heuristics
contracts
Scalability
Containers
pattern matching
Routing
pubcrawl
Resiliency
security
Runtime
biblio
Transparent IDS Offloading for Split-Memory Virtual Machines
Submitted by grigby1 on Fri, 04/09/2021 - 10:35am
IDS
VMemTrans
VM migration
VM introspection
transparent IDS offloading
split-memory VM
split-memory virtual machines
split migration
remote hosts
offloaded IDS
multiple hosts
large-memory VM
IDS offloading
exchanges memory data
access VM remote memory
security of data
Instruction sets
resilience
virtual machines
Virtual machining
maintenance engineering
Memory management
Runtime
composability
Big Data
Resiliency
pubcrawl
Intrusion Detection Systems
Monitoring
biblio
An Effective Semantic Security Metric for Industrial Cyber-Physical Systems
Submitted by grigby1 on Mon, 03/29/2021 - 10:56am
pubcrawl
systems analysis
System-of-Systems
system design
SoS context
Semantics
Semantic Networks
security of data
Security Metrics
security metric definitions
Security Engineering
security by design
security
Runtime
Resiliency
resilience
Measurement
Model-Based Engineering
Metrics
industrial cyber-physical systems
ICPS
embedded systems
embedded system engineering
effective semantic security metric
cyber-physical systems
Current measurement
composability
business processes
business data processing
Business
metrics testing
biblio
Securing Asynchronous Exceptions
Submitted by aekwall on Mon, 03/15/2021 - 11:09am
Libraries
Theorem Proving
telecommunication security
Synchronization
security of data
security
Runtime system
Runtime
pubcrawl
programming language semantics
programming
program verification
program invariants
program diagnostics
program compilers
Metrics
pattern locks
language-based information-flow control techniques
language constructs
Instruction sets
IFC language
features asynchronous exceptions
different covert channels
data structures
Concurrent computing
concurrency control
Compositionality
compiler security
Resiliency
Scalability
Human behavior
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 1:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
A Decentralized Approach to Explanatory Artificial Intelligence for Autonomic Systems
Submitted by aekwall on Mon, 03/01/2021 - 4:01pm
Autonomic systems
XAI solution
XAI functions
SISSY systems
generic decentralized architecture
explanatory artificial intelligence
explanatory AI
explanation
Decentralised Architecture
D-CAN
black box methods
autonomic management system
Autonomic Management
user trust
Scalability
xai
smart home domain
Power demand
Artificial Intelligence
Smart Home
home automation
Smart homes
cognition
fault tolerant computing
pubcrawl
Resiliency
cyber-physical systems
Runtime
biblio
Hardening Firefox against Injection Attacks
Submitted by grigby1 on Wed, 02/10/2021 - 12:22pm
real-world security vulnerabilities
user interfaces
Web pages
Browser Security
information retrieval
CSS
Firefox
Hardening
injection attacks
HTML
Universal Cross-site Scripting
untrusted Web content
user interface
Web browsers display content
web security
Web security model
Cross Site Scripting
online front-ends
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Runtime
security of data
JavaScript
World Wide Web
authoring languages
Browsers
operating systems
Web sites
hypermedia markup languages
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »