Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Runtime
biblio
POWERT Channels: A Novel Class of Covert CommunicationExploiting Power Management Vulnerabilities
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
Resiliency
Power management
power management algorithms
power management vulnerabilities
power system management
POWERT channel capacity
pubcrawl
representative commercial systems
resilience
power headroom modulation
resource allocation
Runtime
runtime power management
Scalability
Software
system-wide shared resource
tight power budget
application performance requirements
Power demand
power aware computing
multiprocessing systems
Monitoring
microprocessor chips
instantaneous power demand timely
Hardware
critical shared resource
covert communication
covert channels
control systems
Compositionality
composability
channel capacity
bit rate 121.6 bit/s
biblio
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds
Submitted by aekwall on Mon, 05/11/2020 - 11:29am
openstack
user interfaces
security policies
security of data
security
Runtime
Resiliency
pubcrawl
proactive security verification
privacy
policy-based governance
pluggable interface
PERMON
openstack middleware
Access Control
network accountability
Monitoring
middleware security
middleware
Metrics
Event Interception
Conferences
composability
Cloud Security
cloud runtime security policy enforcement
cloud providers
cloud environment accountability
Cloud Computing
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 10:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks
Submitted by aekwall on Mon, 04/13/2020 - 10:13am
software-defined networking
Service efficiency problems
routing security policy verification
interconnected devices
security policy
security policies
IoT network
quality of service
delays
network traffic
Monitoring
telecommunication network routing
Routing
policy-based governance
pubcrawl
security
Runtime
telecommunication security
Internet of Things
telecommunication traffic
biblio
Data Provenance for Experiment Management of Scientific Applications on GPU
Submitted by aekwall on Mon, 03/30/2020 - 11:32am
multipurpose applications
execution patterns
experiment management
gpu
GPU environments
GPU memory usage
GPU nodes
GPU runtime environments
graphics processing units
memory virtualization methods
diverse memory usage patterns
natural sciences computing
parallel architectures
pattern change
Physical Memory
resource configuration
runtime configuration
runtime execution
runtime monitoring
scientific applications
Provenance
Memory management
Runtime
Task Analysis
Resiliency
Human behavior
pubcrawl
composability
Metrics
Throughput
Monitoring
data provenance
scientific workflow
Instruction sets
application characteristics
application management
co-located applications
CUDA scientific applications
data provenance management
biblio
CapExec: Towards Transparently-Sandboxed Services
Submitted by grigby1 on Fri, 03/27/2020 - 11:37am
tools
collaboration
security
pubcrawl
policy-based governance
composability
Runtime
Libraries
Memory management
application security
Capsicum
Cats
compartmentalization
Containers
sandboxing
service manager
biblio
SafeCheck: Safety Enhancement of Java Unsafe API
Submitted by grigby1 on Fri, 03/27/2020 - 11:29am
Resiliency
memory safety
Metrics
openJDK bug system
policy-based governance
program debugging
Programming Language
pubcrawl
resilience
Memory Protection
Runtime
Safe Coding
Safety
safety enhancement
security of data
storage management
tools
unsafe crash patterns
Java core library
bytecode
bytecode verification
collaboration
Computer bugs
dynamic analysis
Human behavior
Human Factors
Java
application program interfaces
Java runtime
Java unsafe API
JVM crash
Libraries
low- level system code
Memoey Safety
memory checker
biblio
Defending against ROP Attacks with Nearly Zero Overhead
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Training
Monitoring
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
composability
Runtime
Libraries
Memory management
programming
static analysis
rop attacks
biblio
Adaptive Security and Privacy in Smart Grids: A Software Engineering Vision
Submitted by grigby1 on Mon, 03/09/2020 - 2:58pm
security requirements failures
pubcrawl
reconfiguring system controls
resilience
Resiliency
Runtime
Scalability
security
security and privacy
security requirements
Privacy Threats
security threats
Smart Grid
Smart Grid Privacy
Smart Grids
smart grids adaptive security
smart grids privacy
smart power grids
software engineering
software engineering vision
Human Factors
automating prevention
collaboration
composability
computer architecture
data privacy
energy producers
engineering adaptive security
failure analysis
Human behavior
Adaptive software
Metrics
Monitoring
NIST
policy-based governance
power engineering computing
power system security
privacy
privacy requirements failures
biblio
CFI: Control Flow Integrity or Control Flow Interruption?
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
return oriented programming
malicious code injection
modern Code Reuse Attacks
Monitoring
object-oriented programming
Payloads
programming
pubcrawl
Resiliency
Libraries
return-oriented programming
Runtime
runtime attacks
runtime memory vulnerabilities
Scalability
security of data
target system
rop attacks
Jump-Oriented Programming
interrupt requests
Human Factors
famous attack paradigms
execution flow
data flow analysis
data execution prevention
corrupt code pointers
control-flow integrity
Control Flow Integrity
computer security
composability
CFI-based defenses
CFI solutions
C++ languages
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »