Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
program verification
biblio
Continuous Compliance
Submitted by aekwall on Mon, 03/22/2021 - 1:08pm
Cloud Computing
Cryptography
Data Security
data privacy
Resiliency
pubcrawl
Compliance
standards
tools
Production
Industries
software engineering
public domain software
encryption
program diagnostics
program verification
Predictive Metrics
Compositionality
encryption audits
Open Source Software
Manuals
key length
SoC
PCI DSS
auditing source code
cloud data stores
compliance certificate
continuous compliance process
cryptographically unsafe algorithms
FedRAMP
Hard-coded credentials
large cloud-services company
lightweight verification tools
open-source software
pluggable type systems
source-code compliance requirement
biblio
Securing Asynchronous Exceptions
Submitted by aekwall on Mon, 03/15/2021 - 12:09pm
compiler security
Compositionality
concurrency control
Concurrent computing
data structures
different covert channels
features asynchronous exceptions
IFC language
Instruction sets
language constructs
language-based information-flow control techniques
Libraries
Metrics
program compilers
program diagnostics
program invariants
program verification
programming
programming language semantics
pubcrawl
Resiliency
Runtime
Runtime system
Scalability
security
security of data
Synchronization
telecommunication security
Theorem Proving
biblio
Runtime Enforcement for Control System Security
Submitted by aekwall on Mon, 01/25/2021 - 12:52pm
security of data
Monitoring
Runtime
security
critical infrastructures
Industrial Control Systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
process control
security breaches
program verification
sensors
automata
industrial control
Cyber-physical attacks
actuators
control system security
actuator security
explosion
Smart Systems
controller
formal languages
ad-hoc sub-class
alphabet P
classical properties
corrupted controllers
cyber components
enforceable regular expression e
external events
heterogeneous physical components
incorrect actions
industrial facilities
Ligatti et al.
monitored controllers
nonobvious properties
observable actions
physical processes
PLC malware
potentially compromised controllers
Process calculus
programmable logic controllers
Regan's Timed Process Language
runtime enforcement
runtime enforcement techniques
specification compliance
synthesis algorithm
timed property
biblio
Mixed-Trust Computing for Real-Time Systems
Submitted by grigby1 on Wed, 12/02/2020 - 2:14pm
complex cyber-physical systems
Complexity theory
Computational modeling
Computing Theory
CPS critical functions
drone application
framework design
Human behavior
Human Factors
program verification
pubcrawl
Raspberry Pi 3 implementation
real-time mixed-trust computing framework
real-time systems
Runtime
Safety
safety-critical autonomous features
safety-critical software
scheduling
Task Analysis
timing
timing guarantees
traditional verification methods
trust
Trusted Computing
trusted hypervisor
untrusted components
virtual machines
VM hosting
biblio
Modeling and Analysis Cyber Threats in Power Systems Using Architecture Analysis Design Language (AADL)
Submitted by aekwall on Mon, 11/16/2020 - 2:58pm
security of data
cyber-physical systems
Resiliency
pubcrawl
cyber-physical security
Software Architecture
power engineering computing
power system security
power grids
program verification
power systems
cyber threats
verification techniques
Power Grid
specification languages
AADL
Architecture Analysis & Design Language
cyber-grid components
cyber-physical model
cyber-physical modeling capabilities
false data injection attacks
FDI attack
Model-based analysis
power system information models
Power systems security
switching attack
Resilient Security Architectures
biblio
Assessing Level of Resilience Using Attack Graphs
Submitted by aekwall on Mon, 11/16/2020 - 2:51pm
security of data
security
pubcrawl
graph theory
tools
Analytical models
cyber-attacks
Communication networks
resilience
program verification
Stability analysis
Local area networks
stability
attack graphs
faults
attack graph
AADL
architecture analysis-&-design language
cyber-physical-systems
generated attack scenarios
generated attack sequences
generated network models
JKind model checker integrated tool
possible attack instances
program visualisation
resilience level assessment
Resiliency
security property
system resiliency
Unity software
Resilient Security Architectures
biblio
Runtime Verification of Hyperproperties for Deterministic Programs
Submitted by grigby1 on Mon, 11/02/2020 - 11:39am
data minimality
deterministic algorithms
deterministic input-output programs
Doping
finite element analysis
i-o systems security
i/o systems security
information-flow
information-flow policies
Monitoring
noninterference
parametric monitor
program verification
pubcrawl
Runtime
runtime verification
runtime verification monitors
runtime verification problem
Safety
safety hyperproperty
Scalability
security
security of data
security policies
Software
software doping
system monitoring
biblio
Security Checking Experiments with Mobile Services
Submitted by grigby1 on Mon, 11/02/2020 - 11:39am
Androids
automata
Electron devices
Humanoid robots
i-o systems security
i/o systems security
input/output parameters
Java
Java Path Finder verifier
JPF-mobile
mobile computing
mobile services
program verification
pubcrawl
Scalability
security
security checking
security checking experiments
security of data
Software
software behavior
software security
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
IoT
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
Security analysis
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
control algorithm parameters
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
firmware binaries
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
biblio
Incorporating Robustness and Resilience into Mixed-Criticality Scheduling Theory
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
Computing Theory
LO-criticality workload
MCSh
Measurement
mixed-criticality scheduling algorithms
mixed-criticality scheduling theory
pre-runtime verification
program verification
pubcrawl
resilience
Resiliency
Robustness
scheduling
Scheduling algorithms
Task Analysis
WCET
worst-case execution time
1
2
3
4
next ›
last »