Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
software protection
biblio
Automatically Validating the Effectiveness of Software Diversity Schemes
Submitted by aekwall on Mon, 12/02/2019 - 11:07am
security of data
Scalability
Program processors
Resiliency
pubcrawl
Metrics
vulnerabilities
Cybersecurity
computer security
Measurement
evaluation
Semantics
Compositionality
program compilers
compilers
comparative evaluation
DARPA Cyber Grand Challenge environment
diversifying compiler
diversity strategies
diversity techniques
exploit mitigation
scant attention
software diversity
software diversity schemes
software protection
compiler security
biblio
Compiler-Assisted Loop Hardening Against Fault Attacks
Submitted by grigby1 on Wed, 01/10/2018 - 11:18am
compiler
pubcrawl
Resiliency
composability
physical attacks
software protection
compiler security
biblio
Binary Protection Using Dynamic Fine-grained Code Hiding and Obfuscation
Submitted by grigby1 on Mon, 04/24/2017 - 10:52am
Binary Protection
obfuscation
pubcrawl
security
Self-modifying Code
software protection
virtual machine
virtual machine security
file
Maass_Theory_and_Tools_Thesis_DG.pdf
Submitted by Jamie Presken on Tue, 12/06/2016 - 11:13am
Apr'16
CMU
Java sandbox
sandboxing
software engineering
software protection
supply chain security
biblio
A Theory and Tools for Applying Sandboxes Effectively
Submitted by Jamie Presken on Mon, 04/25/2016 - 10:49am
Apr'16
CMU
Java sandbox
sandboxing
software engineering
software protection
supply chain security
CMU
Apr'16
biblio
A New Code Obfuscation Scheme for Software Protection
Submitted by BrandonB on Fri, 05/01/2015 - 6:57am
Cloning
code fragment cloning
code obfuscation scheme
code patterns
code transformation
Complexity theory
Computer crime
Data processing
IT industry
Licenses
malicious reverse engineering
nontrivial code clones
Resistance
Resists
reverse engineering
security attacks
Software
software engineering
software protection
systems re-engineering
tampering