Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded systems
biblio
Mitigating JTAG as an Attack Surface
Submitted by grigby1 on Fri, 08/28/2020 - 11:51am
private instructions
JTAG test access ports
JTAG-based debug
key registers
key systems
materiel availability issues
Metrics
microprocessor chips
on-chip embedded instrumentation
JTAG interface
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
security
standard test access port
system memory
Cryptography
authorisation
BIT
boundary scan
boundary scan architecture
boundary scan testing
Built-In Test
chip lock
computer debugging
attack surface
debug architectures
depot system repair
embedded systems
firmware
IEEE 1149.1
IEEE standards
joint test action group standards
JTAG
biblio
Autonomic Resource Management for Power, Performance, and Security in Cloud Environment
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
machine learning
Autonomic Security
secure resources
Power and Performance Management
on-demand computing capabilities
cloud computing systems
Big Data Analytics
autonomic resource management
Power demand
power consumption
High performance computing
security of data
tools
resource management
composability
pubcrawl
Resiliency
embedded systems
security
Hardware
Cloud Computing
Monitoring
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:37am
functional state
VRF
VRASED
verified remote attestation
useful security services
untrusted remote prover
trusted verifier
system-wide resets
secure RA architecture
remote Prv
Prv memory
provably secure software update
obtain proofs
malware-free state
low-end embedded systems
important security services
attestation
formally verified RA architecture
erasure
current memory state
compromised state
low-end embedded devices
microcontrollers
composability
pubcrawl
Human behavior
Resiliency
software state
invasive software
security service
embedded systems
biblio
Towards Systematic Design of Collective Remote Attestation Protocols
Submitted by aekwall on Mon, 08/17/2020 - 11:37am
Systematics
untrusted device
towards systematic design
Systematic Design
single-device RA
single device
remote exploits
prior collective RA schemes
place collective RA
networked embedded devices
embedded system security
concrete collective RA scheme
collective remote attestation protocols
Collective Remote Attestation
remote device
data privacy
malware detection
Topology
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Software
Protocols
performance evaluation
security
Hardware
attestation
biblio
SACHa: Self-Attestation of Configurable Hardware
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
hardware-software system
tamper-resistant hardware module
Software
self-attestation
SACHa
Resiliency
remote attacks
Read only memory
pubcrawl
Protocols
physical attacks
Microprocessors
intended application code
Human behavior
attestation
hardware-based attestation
Hardware
FPGAs
Field-Programmable Gate Arrays
field programmable gate arrays
embedded systems
embedded software
embedded device
device attestation
configurable hardware
configurable FPGA hardware
computer architecture
composability
biblio
A Practical Attestation Protocol for Autonomous Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:35am
remote device
secure operation
safe operation
PASTA
network disruptions
Mesh networks
low-end verifier devices
low-end prover devices
low-end embedded devices
existing attestation protocols
connected embedded devices
collective attestation
autonomous system
autonomous networks
autonomous embedded systems
arbitrary device outages
Internet of Things
security guarantees
Scalability
Embedded System
computer networks
Robustness
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Protocols
performance evaluation
security
Remote Attestation
attestation
biblio
A Probability Prediction Based Mutable Control-Flow Attestation Scheme on Embedded Platforms
Submitted by aekwall on Mon, 08/17/2020 - 11:35am
execution-profiling CFG
operating systems (computers)
coarse-grained check
coarse-grained control-flow attestation schemes
Control Flow Attestation
control-flow security
costly fine-grained level
Embedded Platform Security
embedded software
Predictive models
execution-profiling control-flow graph
fine-grained remote control-flow attestation
MGC-FA
mutable control-flow attestation scheme
mutable granularity control-flow attestation
Mutable Granularity Scheme
remote control-flow attestation scheme
Resiliency
attestation
Remote Attestation
Runtime
security
software integrity
control-flow attacks
embedded systems
Raspberry Pi
security of data
Human behavior
pubcrawl
composability
machine learning
Probabilistic logic
probability
ARM TrustZone
biblio
Reusable intellectual property core protection for both buyer and seller
Submitted by grigby1 on Thu, 07/30/2020 - 2:05pm
intellectual property
seller watermark
scheduling phase
reusable intellectual property core protection
register allocation phase
latency overhead
IP seller
IP core protection
IP core design
design cost overhead
Consumer electronics
CE devices
buyer fingerprint
architectural synthesis process
ip protection
Watermarking
logic circuits
resource management
Metrics
Fingerprint recognition
Registers
composability
embedded systems
microprocessor chips
Resiliency
resilience
policy-based governance
Human Factors
Human behavior
pubcrawl
IP networks
logic design
biblio
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
connected car systems
automotive electronics
controller area networks
automotive cybersecurity tests
automotive engineers
automotive field
automotive security tooling
black-box fuzz testing
CAN fuzz testing example
fuzzing
controller area network fuzz testing
cybersecurity testing
dynamic security test
dynamic software testing
Fuzz Testing
laboratory vehicle
SAE J3061
secure-by-design
pubcrawl
security of data
Internet of Things
security
Protocols
Software
embedded systems
cyber-physical systems
Resiliency
Automotive engineering
program testing
system security
program debugging
Prototypes
controller area network
black-box testing
controller area network security
automobiles
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »