Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Benchmark testing
biblio
FPGA-oriented moving target defense against security threats from malicious FPGA tools
Submitted by aekwall on Mon, 09/09/2019 - 10:48am
FOMTD
Predictive Metrics
Xilinx
target defense
reverse engineering
moving target defense principle
malicious FPGA tools
hardware trojan
FPGA-oriented MTD method
FPGA users
FPGA security
FPGA hardware-software providers
FPGA emulation results
FPGA design suite
FPGA configuration
security of data
defense lines
moving target defense
Benchmark testing
Scalability
Hardware Security
security threats
Trojan horses
pubcrawl
Resiliency
Table lookup
security
Hardware
FPGA
field programmable gate arrays
biblio
An Approach for Trustworthiness Benchmarking Using Software Metrics
Submitted by aekwall on Mon, 07/01/2019 - 10:12am
Security Metrics
trustworthiness benchmarking
trustworthiness assessment model
Trusted Computing
Software systems
software security experts
software quality
software metrics
security vulnerabilities
security of data
Measurement
security attributes
security
pubcrawl
Mozilla Firefox project
Metrics
Buildings
Benchmark testing
metrics testing
biblio
Security Metrics: Principles and Security Assessment Methods
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
security assessment
Taxonomy of Security Metric
taxonomy
Standards organizations
security standards
security sections
security of data
Security Metrics
security metric
security measures
security conditions
security assessments
security assessment methods
Measurement
pubcrawl
Organizations
organizational security
Metrics
metric standards
Meta-Metric
information technology
information security
business data processing
benchmarking method
Benchmark testing
metrics testing
biblio
Designing Subspecies of Hardware Trojans and Their Detection Using Neural Network Approach
Submitted by grigby1 on Fri, 03/15/2019 - 11:58am
learning (artificial intelligence)
true positive rate
Trojan horses
trojan horse detection
trigger circuits
TPR
third-party vendors
pubcrawl
outsourcing
neural-network based hardware-Trojan detection method
neural network approach
neural network
neural nets
machine-learning-based hardware-Trojan detection method
machine learning
Logic gates
Artificial Neural Networks
invasive software
integrated circuit design
high-performance hardware device
hardware trojan subspecies designing
hardware trojan
hardware devices mass-production
Hardware
gradient methods
gate-level netlist
feature extraction
electronic engineering computing
electric devices
Design Time
Benchmark testing
biblio
Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
invasive software
user apps
tools
taint checking
taint analysis
simultaneous scalability
security vulnerabilities
security
representative precise taint analysis
real-world evolving Android apps
reachability analysis
pubcrawl
Open Source Software
mobile computing
Metrics
analysis effectiveness
incremental taint analysis
incremental
historical versions
Google
EVOTAINT
Evolution
differencing
composability
Benchmark testing
attacks
Android ecosystem
Android devices
Android (operating system)
android
biblio
Improving Power amp; Latency Metrics for Hardware Trojan Detection During High Level Synthesis
Submitted by grigby1 on Mon, 12/10/2018 - 11:42am
Mathematical model
work factor metrics
Unroll Factor
Trojan horses
third party IP cores
Space exploration
semiconductor industry
secure IC design process
Scalability
resource allocation
Resiliency
resilience
pubcrawl
power metrics
power consumption
microprocessor chips
adders
latency metrics
invasive software
integrated circuits
integrated circuit design
integrated chip design
high level synthesis
hardware Trojan detection
hardware trojan
Hardware
design-for-trust techniques
design space exploration process
Design Space Exploration
datapath resource allocation
cuckoo search algorithm
Benchmark testing
biblio
Detecting Security Vulnerabilities in Object-Oriented PHP Programs
Submitted by grigby1 on Thu, 06/07/2018 - 3:02pm
PHP
tools
static analysis
security vulnerability detection
security analysis tool
security
safety-critical software
Resiliency
resilience
pubcrawl
program diagnostics
program debugging
PIXY PHP security analyzer
analysis
OOPIXY
object-oriented programming
object-oriented PHP programs
object oriented security
object orientation feature
microbenchmarks
Metrics
feature extraction
dynamic languages
computer architecture
composability
Benchmark testing
biblio
A Scalable and Reconfigurable Verification and Benchmark Environment for Network on Chip Architecture
Submitted by grigby1 on Wed, 05/09/2018 - 2:47pm
on-chip component
verification
UVM
Universal Verification Methodology
traffic control
Throughput
system-on-chip
standardized methodology
scalable verification
Scalability
reusable methodology
Resiliency
resilience
reconfigurable verification
pubcrawl
benchmark
Object oriented modeling
NoC
network-on-chip architecture
network-on-chip
Monitoring
Metrics
interconnection architectures
integrated circuit design
Generators
Compositionality
complex on-chip communication problems
Benchmark testing
benchmark environment
biblio
Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
HT defense
Trojan horses
trojan horse detection
side-channel attacks
side-channel attack AES hardware Trojan benchmarks
Side-channel attack
Resiliency
resilience
pubcrawl
HT detection
HT design
AES benchmark
HT benchmark
hardware trojan
hardware security issue
Hardware Security
Hardware
encryption
cyber physical systems
Cryptography
composability
Benchmark testing
biblio
Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Logic gates
TrustHUB benchmarks
Trojan-feature extraction
Trojan nets
Trojan horses
trojan horse detection
Resiliency
resilience
random forest classifier
Random Forest
pubcrawl
normal nets
Multiplexing
malicious third-party vendors
machine-learning based hardware Trojan classifier
machine learning
Benchmark testing
learning (artificial intelligence)
invasive software
integrated circuits
integrated circuit design
IC design process
hardware-Trojan infected nets
hardware-Trojan detection
hardware trojan
Hardware
gate-level netlists
gate-level netlist
feature extraction
F-measure
cyber physical systems
composability
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »