Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security Properties
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
biblio
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
Submitted by grigby1 on Tue, 11/12/2019 - 4:30pm
Symbolic-Model
privacy
protocol verification
Protocols
pubcrawl
radiofrequency identification
RFID protocols
Security Properties
stateful cryptographic protocols
symbolic model
policy-based governance
Tamarin
Tamarin prover
Theorem Proving
tools
user-defined equational theories
verification tool
XOR operations
XOR theory
Cryptography
attack identification
automated unbounded verification
collaboration
composability
Compositionality
Computational modeling
Cryptographic Protocols
Cryptographic-Protocols
Analytical models
electronic payment protocols
equational theory
Exclusive-OR
exclusive-or operations
formal verification
Formal-Verification
Mathematical model
observational equivalence
biblio
A Cryptographic Look at Multi-party Channels
Submitted by aekwall on Mon, 09/23/2019 - 10:26am
multiparty channels
broadcast channels
broadcast communication
channel security
confidential communication
cryptographic channels
FSE17-ToSC17
full-fledged broadcast channel
game-based authenticity
Group communication
bidirectional communication
point-to-point link
point-to-point links
protocol
secure-channels
Security Properties
standard cryptographic primitives
unidirectional links
Compositionality
Reliability
Servers
encryption
Cryptographic Protocols
Protocols
provable security
Resiliency
pubcrawl
internet
computer network security
Predictive Metrics
-broadcast-communication
-causality-preservation
-confidentiality
-integrity
authenticated communication
authenticated encryption
bidirectional channel
biblio
A Framework for Threat-Driven Cyber Security Verification of IoT Systems
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalable verification
model checking-based formal analysis
modeling
Object oriented modeling
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
mitigation strategies
security
security of data
Security Properties
Silicon
system deployment
system security
threat-driven cyber security verification
Alloy
Metrics
Metals
IoT systems
IoT
Internet of Things
industrial IoT infrastructures
industrial control
formal verification
distributed industrial control systems
distributed control
control systems
Compositionality
Communication channels
attack patterns
Analytical models
biblio
Model Checking of Security Properties in Industrial Control Systems (ICS)
Submitted by grigby1 on Thu, 05/09/2019 - 10:46am
Industrial Control Systems
industrial control systems (ICS)
model checking
pubcrawl
resilience
Resiliency
Scalability
scalable
Security Properties
biblio
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
road safety
private information
Protocols
pseudonym-varying scheduling
pubcrawl
real-time systems
Receivers
resilience
Resiliency
privacy properties
Scalability
secure authentication algorithm
Security Properties
spatial-temporal messages
Spatial-Temporal Trust mechanism
Symmetric-Key Cryptography
Trusted Computing
anonymous messaging
privacy
message authentication
malicious cars
Intelligent Transportation Systems
Intelligent Transportation System
FastTrust
Fast and Anonymous Spatial-Temporal Trust
Expressways
entropy-based commitment
data privacy
Cryptography
connected cars
automobiles
authorisation
authentication
biblio
Data management and searching system and method to provide increased security for IoT platform
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
Peer-to-peer computing
telecommunication security
simulation
signature
Servers
Security Properties
searching system
Scalability
Resiliency
resilience
Public key
pubcrawl
Proof-of-work
Ports (Computers)
blockchain
Named Data Network Security
IP networks
Internet of Things
Human behavior
Hash Function
file organisation
digital signatures
Databases
data management system
data management
data integrity
Cryptography
biblio
Confidentiality and Authenticity in a Platform Based on Network-on-Chip
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
network performance
SoCIN-based systems
silicon overhead
Security Properties
security mechanisms
security aspects
security
Scalability
Resiliency
resilience
reference multicore platform
pubcrawl
Program processors
processing elements
networks-on-chip
network-on-chip
advanced encryption standard
network level
Network interfaces
multiprocessing systems
multicore computing security
Multicore Computing
Metrics
Many-core systems
low-cost interconnect architecture
encryption
Cryptography
confidentiality
computer architecture
authenticity
AES model
biblio
Using computational game theory to guide verification and security in hardware designs
Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
Metrics
complex designs
composability
computational game theory
Computational modeling
Data protection
defender strategy
design network structure
embedded systems
formal methods
game theory
Games
Hardware
hardware validation
Hardware verification
Laboratories
verification costs
open-source synthesized hardware designs
optimal security deployment strategy
pubcrawl
Reliability
reliability threats
Resiliency
resource allocation
Safety
safety properties
security
security of data
Security Properties
Stackelberg security games model
system state space
valuable verification resource allocation
biblio
Secure Compilation and Hyperproperty Preservation
Submitted by grigby1 on Wed, 01/10/2018 - 12:19pm
Safety
untyped target language
typed source language
Type theory
trace-preserving compilation
TPC
Syntactics
standards
Semantics
Security Properties
security of data
security
secure compilers
secure compilation
safety hyperproperties
coding theory
Resiliency
pubcrawl
program verification
Program processors
program compilers
low-level attack capabilities
hyperproperty preservation
fully abstract compiler
correctness criterion
Concrete
composability
compiler security
compiled program
« first
‹ previous
1
2
3
next ›
last »