Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
program diagnostics
biblio
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization
Submitted by grigby1 on Tue, 02/16/2021 - 12:24pm
tools
privacy
security of data
security
pubcrawl
Human behavior
resilience
Resiliency
Instruments
Runtime
Libraries
program compilers
program debugging
fuzzing
program diagnostics
Computer bugs
security checks
Compositionality
binary security analysis
software libraries
Data Sanitization
Address Sanitizer
automatic vulnerability discovery
binary-only memory checker
binary-rewriting instrumentation
closed source binaries
code coverage
compile time
compiler-instrumented binaries
compiler-level performance
COTS binaries
default QEMU-based instrumentation
Dynamic binary translation
fuzzing sanitization
position independent code
prohibitive performance overhead
RetroWrite
static binary rewriting
static rewriter
third-party libraries
biblio
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Submitted by grigby1 on Fri, 12/11/2020 - 1:31pm
Analysis of variance
Android (operating system)
Android malware
Android Malware Detection
API Centrality
fault-tolerant representation
feature extraction
Google-Play app market
graph semantics
graph theory
Human behavior
invasive software
Lightweight feature
lightweight graph-based approach
MalScan
malware
Malware Analysis
Market-wide
market-wide malware scanning
Metrics
mobile computing
mobile malware scanning
privacy
program analysis
program diagnostics
pubcrawl
resilience
Resiliency
Robustness
semantic features
Semantics
social networking (online)
social-network-based centrality analysis
static analysis
syntax-based features
transformation attacks
zero-day malware including malware samples
biblio
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
Submitted by aekwall on Mon, 11/30/2020 - 11:03am
malware
invasive software
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
malware detection
Metrics
neural nets
Neural networks
machine learning
Vectors
Java
program diagnostics
deep learning
LSTM
deep learning model
policy governance
computer infection threat vector
discriminative training
Internet-scale processing
JavaScript files
neural malicious JavaScript detection
Neural models
neural static analysis
PIL model
preinformant learning
Privacy-invasive software
ScriptNet system
sequential processing layers
Internet-scale Computing Security
biblio
Android gaming malware detection using system call analysis
Submitted by grigby1 on Tue, 11/17/2020 - 1:40pm
Monitoring
pubcrawl
Metrics
Resiliency
composability
mobile computing
smart phones
Cloning
malware
invasive software
program diagnostics
dynamic analysis
Games
resilience
Androids
Humanoid robots
Android (operating system)
computer games
Android Gaming Malware
Android gaming malware detection system
Android operating systems
benign game system calls
cloning applications
detection system
malicious games
malicious gaming applications
malware game system calls
system call analysis
Operating systems security
biblio
Research on Intelligent Evaluation Method of Transient Analysis Software Function Test
Submitted by aekwall on Mon, 11/02/2020 - 1:47pm
active deep learning
active deep learning mathematical model
active depth learning algorithm
association rule mining method
Cloud Computing
cloud computing environment
correlation dimension characteristics
Data mining
Functional testing
intelligent evaluation method
learning (artificial intelligence)
Measurement
metrics testing
Metrics
program diagnostics
program testing
pubcrawl
reliability intelligent evaluation
security of data
Software
software function failure
software functional completeness
software functional integrity positioning
software metrics
software reliability
software reliability measurement
Software Vulnerability
spectral density distribution method
statistical distributions
testing
Transient analysis
transient analysis software function testing
transient distributed
transient distributed cloud computing environment
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
i-o systems security
I-O Systems
security
advanced Memway algorithm
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
microarchitectural security threat
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
Scalability
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
security
security of data
Access Control
Program processors
Linux
Resiliency
pubcrawl
composability
Metrics
tools
Analytical models
Containers
program diagnostics
Predictive Metrics
program compilers
formal verification
static analysis
verification
dynamic analysis
operating systems
AutoPriv
ChronoPriv
Linux privilege use
Linux privileges
LLVM-based C/C++ compiler
PrivAnalyzer
privilege escalation attacks
privileged open source programs
ROSA model checker
term rewriting
Linux Operating System Security
biblio
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
Clocks
composability
Concurrency
concurrency control
concurrency vulnerability detection
Concurrent computing
CONVUL
CPS
cyber physical systems
Instruction sets
Instruments
Metrics
multi-threading
multithreaded execution nondeterminism
program diagnostics
pubcrawl
resilience
Resiliency
Runtime
security
security of data
Synchronization
tools
vulnerabilities
biblio
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Submitted by grigby1 on Tue, 10/06/2020 - 1:01pm
composability
Computer bugs
Concurrency
concurrency (computers)
Concurrency Failures
Concurrent computing
CPS
cyber physical systems
Data mining
debugging
default system audit tools
event handlers
failure-inducing system call sequences
fault diagnosis
fault localization
file content
Instruments
interleaving schedule
localizing system-level concurrency faults
Metrics
Multi Process Applications
multiple failing executions
multiple processes
practical online bug diagnosis tool
principal component analysis
Production
production system
program debugging
program diagnostics
program testing
pubcrawl
resilience
Resiliency
scheduling
SCMiner
security
security of data
statistical analysis
statistical anomaly detection techniques
system call traces
System Level
system-level concurrency fault
tools
biblio
On Aggregation of Information in Timing Attacks
Submitted by grigby1 on Mon, 10/05/2020 - 12:48pm
Compositionality
Human behavior
Human Factors
Computing Theory and Compositionality
Aggregates
Analytical models
Computational modeling
Cryptography
cryptosystems
divide and conquer methods
divide-and-conquer method
high-profile timing attacks
information aggregation reasoning
Information Flow
information-flow analysis
Mathematical model
multiple timing measurements
program compositionality
program diagnostics
pubcrawl
real-world adversaries
real-world attacks
Side-Channels
system vulnerability
timing
timing attacks
1
2
3
4
5
6
7
8
9
next ›
last »