Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software reusability
biblio
Investigating Novel Approaches to Defend Software Supply Chain Attacks
Submitted by grigby1 on Fri, 04/14/2023 - 4:04pm
Computer hacking
Organizations
pubcrawl
resilience
Conferences
Software
Scalability
Cybersecurity
Resistance
supply chains
software security
Chained Attacks
Resiliency
codes
software reusability
Software Supply Chain Attacks
biblio
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
Submitted by aekwall on Mon, 11/09/2020 - 1:11pm
Layout
Vulnerability
source code (software)
software reusability
Software
security of data
security
Resiliency
relative memory
pubcrawl
Position-Independent Code-Reuse Attacks
Payloads
multiple position-independent ROP
Memory management
address-space layout randomization
just-in-time code-reuse attacks
Information Reuse and Security
information disclosure mitigation
information disclosure detection
exploitation
Electronic mail
computer science
Compositionality
code pointers
code gadgets
code addresses
ASLR
advanced attacker
biblio
Towards a TRansparent I/O Solution
Submitted by aekwall on Mon, 06/01/2020 - 10:49am
source code
preceding graph
pubcrawl
Regulated I/O
resilience
Resiliency
reusable components
security
security of data
Semantics
software reusability
policy-based governance
source code (software)
storage back-end
storage platforms
Strips
Transparent I/O
transparent I/O solution
Web service scenario security
web services
workload diversity
in-transit processing
complex storage solutions
composability
cost reduction
custom code
data distribution
data lands
encryption
graph chain
In transit engine
application behaviors
infrastructure level
infrastructure setup
infrastructure-related changes
Libraries
Logic gates
management code
metadata
middleware
middleware security
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
FIXER: Flow Integrity Extensions for Embedded RISC-V
Submitted by aekwall on Mon, 02/24/2020 - 11:01am
integrated Rocket Custom Coprocessor
program compilers
security framework
RISC-V
buffer overflow
Code injection
coprocessors
fine-grained control-flow integrity
FIXER
flow integrity extensions for embedded RISC-V
return oriented programming
low-power embedded devices
open source architecture
RISC-V architecture
RISC-V processor core
RISC-V SoC platform
RISC-V toolchains
Rockets
security extension
shadow stack
Buffer overflows
Scalability
Internet of Things
data integrity
Hardware
security
embedded systems
reduced instruction set computing
system-on-chip
computer architecture
security of data
Resiliency
pubcrawl
composability
software reusability
Software Architecture
Bars
Human Factors
code reuse attacks
ROP
biblio
Software Ecosystem Call Graph for Dependency Management
Submitted by aekwall on Mon, 03/04/2019 - 10:49am
popular form
ecosystem-level
Ecosystems
Equifax data breach
external libraries
fine-grained dependency network
impact
indicative information
leftpad package removal
open source software libraries
packages
developers
program analysis
public domain software
software development management
software ecosystem
software libraries
software reusability
Software reuse
workspace
Automated Secure Software Engineering
call graphs
security
Software
Resiliency
pubcrawl
composability
tools
Libraries
software engineering
automated tools
security of data
centralized code repositories
client-server systems
Computer bugs
core package
counter measure
dependencies
dependency checkers
Dependency management
dependency networks
biblio
Reducing Attack Surface via Executable Transformation
Submitted by grigby1 on Fri, 02/08/2019 - 4:32pm
security
office of naval research
ONR
overwhelming emphasis
Productivity
programmers productivity
pubcrawl
resilience
Resiliency
Scalability
obscure use cases
security of data
Software
software engineering
software engineering history
software maintenance
software reusability
telecommunication security
total platform cyber protection
TPCP
individual approaches
Binary
binary transformation
Complexity theory
Conferences
constant demands
de-bloat software binaries
Debloat
deployment practices
executable transformation
attack surface
individual decisions
Late Stage Customization
Libraries
maximal code reuse
Metrics
minimal developer effort
modern software development
Navy
biblio
Source File Set Search for Clone-and-Own Reuse Analysis
Submitted by K_Hooper on Wed, 12/20/2017 - 11:31am
Software reuse
Resiliency
security
security vulnerabilities
SHA-1 file hash
Software
software ecosystem
software packages
software reusability
pubcrawl
source code repositories
source code reuse
source code search
source code (software)
source files
source file set search
version control system
Android (operating system)
origin analysis
Information Reuse
Firefox source code
file clone detection
efficient file similarity computation
directory names
Debian Linux package
Debian GNU package
Data mining
Cryptography
component extraction
Cloning
clone-and-own reuse analysis
b-bit minwise hashing technique
Android source code
biblio
Software Structure Analysis Using Network Theory
Submitted by grigby1 on Wed, 03/08/2017 - 2:04pm
program testing
two-layer network model
structure analysis
Software Testing
software structure network
software structure analysis
software reusability
software analysis
Software
reused modules
pubcrawl170111
complex network
program diagnostics
network metrics calculation
Measurement
Image edge detection
features extraction
feature extraction
critical functions
complex networks
complex network theory
biblio
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
Submitted by Katie Dey on Fri, 10/24/2014 - 12:52pm
Science of Security
Patterns
taxonomy
software reusability
Software
security patterns
security of data
security knowledge
security
Science of Security
requirements engineering pattern
requirements engineering
psychology
abstraction
patternmining
Pattern recognition
pattern experimentation
object-oriented methods
Natural languages
knowledge reuse
information security guidelines
formal verification
documentation
cognitive psychology
CMU
CMU