Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
taint analysis
biblio
Mining Input Grammars from Dynamic Taints
Submitted by grigby1 on Tue, 05/30/2017 - 1:06pm
composability
context-free grammars
dynamic tainting
fuzzing
Input formats
Metrics
pubcrawl
taint analysis
biblio
Automatic Model Generation from Documentation for Java API Functions
Submitted by grigby1 on Tue, 05/30/2017 - 1:06pm
composability
Metrics
pubcrawl
taint analysis
biblio
Call Me Back!: Attacks on System Server and System Apps in Android Through Synchronous Callback
Submitted by grigby1 on Tue, 05/30/2017 - 1:06pm
composability
denial of service
Metrics
Mobile Security
pubcrawl
synchronous callback
taint analysis
vulnerability detection
biblio
In-Depth Enforcement of Dynamic Integrity Taint Analysis
Submitted by grigby1 on Tue, 05/30/2017 - 1:06pm
Algorithms
auditing
composability
Control Theory
languages
Metrics
pubcrawl
security
Security Audits
Security Policies Analysis
taint analysis
theory
verification
biblio
Carraybound: Static Array Bounds Checking in C Programs Based on Taint Analysis
Submitted by grigby1 on Tue, 05/30/2017 - 1:06pm
array index out-of-bounds
composability
data flow analysis
Metrics
pubcrawl
static analysis
taint analysis
biblio
StraightTaint: Decoupled Offline Symbolic Taint Analysis
Submitted by grigby1 on Tue, 05/30/2017 - 1:06pm
composability
Decoupling
Metrics
Offline
pubcrawl
Symbolic taint analysis
taint analysis
biblio
LDX: Causality Inference by Lightweight Dual Execution
Submitted by grigby1 on Wed, 05/17/2017 - 1:54pm
causality inference
composability
concurrency and security
concurrency security
dual execution
dynamic analysis
Dynamical Systems
Metrics
pubcrawl
Resiliency
taint analysis
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 10:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context
biblio
Analysis on Password Protection in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:26pm
leakage
vulnerability analyzing method
Vulnerability
user privacy
taint analysis
smart phones
PW Exam
privacy
password protection
password leakage
password
mobile computing
Android applications
Humanoid robots
encryption
decompile step
data privacy
cryptography misuse detection
cryptography misuse analysis
Cryptography
API call record
Androids
Android apps
biblio
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Computerized monitoring
dynamic analysis
Filters
Heuristic algorithms
Information analysis
information security
Performance analysis
privacy
Reactive power
Runtime
Symbolic Execution
taint analysis
testing
« first
‹ previous
1
2
3
4
5
6
7