Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded systems
biblio
PREEMPT: PReempting Malware by Examining Embedded Processor Traces
Submitted by grigby1 on Fri, 10/30/2020 - 12:19pm
learning (artificial intelligence)
zero overhead
tools
software-based AVS
security
Scalability
real-time systems
pubcrawl
program debugging
processor traces
PREEMPT malware
post-silicon validation
malware detection
malware
machine learning-based classifiers
low-latency technique
anti-virus software tools
invasive software
i-o systems security
I-O Systems
HPC
hardware-level observations
Hardware performance counters
Hardware
ETB
embedded trace buffer
embedded systems
embedded processor traces
debug hardware component
Databases
computer viruses
biblio
Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems
Submitted by grigby1 on Fri, 10/30/2020 - 12:18pm
input-output programs
smart I/O modules
security of data
security
Scalability
Safety
runtime enforcement
Runtime
real-world physical systems
pubcrawl
programmable logic controller I/O modules
programmable controllers
production engineering computing
Power Grid
Monitoring
malicious attacks
control engineering computing
Industries
Industrial Control Systems
industrial control
i-o systems security
I-O Systems
hardware architecture
Hardware
embedded systems
embedded control
cyber-physical systems (CPSs)
cyber-physical systems
cyber-physical attacks mitigation
Cyber-physical attacks
CPS
control systems
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System
Submitted by aekwall on Mon, 10/26/2020 - 11:45am
Drone
Weapons
software vulnerabilities
Linux operating system
2.0
AR
AR Drone 2.0
Busybox
CVE
autonomous aerial vehicles
embedded
embedded Linux system
open WiFi network
pairing mode
Parrot
SSH Tunnel
Linux Operating System Security
Metrics
computer network security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
security
tools
vulnerabilities
Vulnerability Analysis
public domain software
wireless LAN
Streaming media
Predictive Metrics
biblio
A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
power systems infrastructures
cyber physical security
cyber-attack
cyber-physical test bed
defense systems
domain based rules
electrical cyber physical systems
energy cyber-physical systems
IEC 61850 GOOSE messages
malicious change
modern power systems
neighboring devices
peer-to-peer communication
Critical Infrastructure Protection
Protection and Control
protection settings
Protective relaying
Protective Relays
relay coordination
relay coordination principles
securing protective relay settings
setting changes
setting rules
simulated cyber-attacks
CPS resilience
power system faults
collaboration
security
cyber-physical systems
pubcrawl
resilience
Resiliency
embedded systems
cyber security
power engineering computing
control layer
IEC standards
security of data
power system reliability
IEC 61850
substation automation
Substations
relay protection
Power system protection
circuit breakers
cyber physical systems
actual relays
Collaborative Defense
computing technologies
biblio
An Accelerator-based Architecture Utilizing an Efficient Memory Link for Modern Computational Requirements
Submitted by grigby1 on Tue, 10/06/2020 - 2:02pm
embedded systems
Task Analysis
security
Resiliency
resilience
Random access memory
pubcrawl
Program processors
On-Chip Communication Architectures
Metrics
Kernel
Heterogeneous systems
Hardware accelerator
Acceleration
embedded system architecture
efficient memory link
cyber physical systems
CPS
configurable accelerators
concurrency (computers)
Concurrency
computer architecture
composability
bussing system
automotive application
accelerator-based architecture
biblio
Vulnerability Modelling for Hybrid IT Systems
Submitted by grigby1 on Tue, 10/06/2020 - 1:50pm
security
IoT systems
Measurement
Metrics
national vulnerability database
network topology
pubcrawl
realistic IT supply chain system
Safety
IoT embedded networks
Security Metrics
Supply Chain
Topology
traditional computer systems
traditional IT security models
Vulnerability
Vulnerability Evaluation
vulnerability modelling
CVSS v3 framework
attack paths
Australia
Common Vulnerability Scoring System
Complexity theory
computer network security
Computing Theory
critical nodes
CVSS
actual vulnerabilities
CVSSIoT
embedded systems
improved vulnerability scoring system
industry standard
Internet of Things
IoT
IoT devices
biblio
Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
Submitted by aekwall on Mon, 10/05/2020 - 11:47am
embedded systems
technology manufacturers
serious embedded security challenges
Security Regulation
security of data
security methods
security foundation
security breach
Response
Recover
pubcrawl
next-generation critical infrastructure
microarchitectural characteristics
international security regulations
embedded technologies
Resilient Security Architectures
embedded security requirements
embedded security microarchitecture
embedded security domains
embedded architectures
Cyber-Physical Embedded System
Cyber Resilient Embedded System
cyber resilience
cyber physical systems
critical infrastructures
critical infrastructure
CPS resilience
business operations
Active Defence
Resiliency
biblio
Toward a framework for assessing the cyber-worthiness of complex mission critical systems
Submitted by aekwall on Mon, 10/05/2020 - 11:46am
initial framework
threat models
threat modelling
threat actor
system safety engineering
SysML
strong level
security of data
security
risk management
Resiliency
resilience
pubcrawl
military systems
military computing
Large-scale systems
Accreditation
highly contested cyber environment
high level threat actors
embedded systems
cyber-worthiness
cyber-physical systems
cyber physical systems
cyber
CPS resilience
computer security
complex systems
complex mission critical systems
complex military systems
certification
assurance
biblio
Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs
Submitted by aekwall on Mon, 09/28/2020 - 11:34am
microcontrollers
software-based virtualization
software-based security framework
secure software updates
pure software-based approaches
modern automotive architectures
legacy automotive ECUs
insecure legacy ECUs
hardware-based security modules
electronic engineering computing
diagnostics security services
automotive electronics
Automotive engineering
Automated Secure Software Engineering
Cyber Attacks
standards
composability
pubcrawl
Resiliency
computer architecture
embedded systems
Software
security of data
cyberattack
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »