Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trojan horses
biblio
SIN2: Stealth infection on neural network \#x2014; A low-cost agile neural Trojan attack methodology
Submitted by grigby1 on Fri, 07/06/2018 - 2:06pm
neural computing framework
Trojan horses
third-party cloud based machine learning as a service
static neural network model
software algorithm level
SIN2
security
Scalability
Runtime
Resiliency
resilience
pubcrawl
portable DNN computing engine
Payloads
Neural networks
neural nets
AI Poisoning
low-cost modular methodology-stealth infection on neural network
low-cost agile neural Trojan attack methodology
learning (artificial intelligence)
invasive software
Intelligent systems
intelligent supply chain
intelligent service supply chain
Human behavior
dynamic runtime system
DNN security
Deep Neural Network
Computational modeling
Cloud Computing
artificial intelligence industry
biblio
Binary malware image classification using machine learning with local binary pattern
Submitted by grigby1 on Wed, 06/20/2018 - 12:56pm
machine learning
visualization
Trojan horses
Support vector machines
Resiliency
resilience
pubcrawl
privacy
pattern classification
Metrics
malware images
malware classification methodology
malware classification
malware
binary image
local binary pattern
learning (artificial intelligence)
LBP feature
invasive software
image texture
image descriptors
Image color analysis
image classification
Human behavior
feature extraction
Cyber-security
classification
binary malware image classification
biblio
Profile hidden Markov model for malware classification \#x2014; usage of system call sequence for malware classification
Submitted by grigby1 on Wed, 06/20/2018 - 12:55pm
obfuscation
Trojan horses
tools
system call sequence
system call
Resiliency
resilience
pubcrawl
proteins
protein sequences
profile hidden markov model
privacy
pattern classification
obfuscation technique
bioinformatics
microsoft windows
Metrics
malware technology
malware files
malware classification
malware
invasive software
Human behavior
Hidden Markov models
Grippers
DNA sequences
DNA
biological informatics
biblio
Study of secure boot with a FPGA-based IoT device
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
bitstream decoding
network on chip security
Xilinx Zynq-7000 Series System-on-Chip ZC706 prototype board
Trojan Horse attacks
software-based security implementation
Secure Boot
IoT system
infrastructure components
host processor computation power
FPGA-based IoT device
FPGA design
FPGA bitstream
encrypt system boot image
effective security provisioning
critical components
pubcrawl
system-on-chip
Decoding
Metrics
resilience
system security
field programmable gate arrays
Trojan horses
authentication
encryption
Cryptography
Internet of Things
Scalability
Resiliency
biblio
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
security
nontrusted IP
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
property specification language SERE
pubcrawl
run-time verification techniques
sandboxed layouts
sandboxing
IP security
sequential extended regular expressions
SoC
system-on-chip
Trojan horses
Trojan mitigation
trusted system-on-chips
virtualized controllers
virtualized resources
composability
automata theory
automatic generation
behavioral checkers
behavioral properties
CAPSL
collaboration
component authentication process
components off the shelf
automata
computer science
Computers
COTS
design flow
Hardware
hardware sandboxes
interface automata
invasive software
biblio
Introducing TFUE: The Trusted Foundry and Untrusted Employee Model in IC Supply Chain Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
pubcrawl
VLSI
trusted foundry and untrusted employee model
Trojan horses
supply chain security
security
Scalability
Resiliency
resilience
double patterning lithography
mask development lines
lithography
Layout
Integrated circuit modeling
IC supply chain security
Human behavior
Foundries
fabrication
biblio
Visible but Transparent Hardware Trojans in Clock Generation Circuits
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
clock generation circuits
Clocks
composability
cyber physical systems
Frequency conversion
Hardware
Injection-locked oscillators
pubcrawl
resilience
Resiliency
Ring oscillators
transparent Trojans
trojan horse detection
Trojan horses
biblio
Programmable Assertion Checkers for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
outsourcing
VLSI chips
Trojan horses
trojan horse detection
system-on-chip
system on chip
SoC
security of data
Resiliency
resilience
pubcrawl
programmable logic fabric
programmable logic arrays
programmable assertion checkers
product development
circuit complexity
Monitoring
manufactured product security
manufactured product authenticity
integrated circuit design
hardware Trojan detection
hardware assertion optimization
Hardware
field programmable gate arrays
design complexity
cyber physical systems
cost reduction
composability
Circuit synthesis
circuit designers
biblio
Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
HT defense
Trojan horses
trojan horse detection
side-channel attacks
side-channel attack AES hardware Trojan benchmarks
Side-channel attack
Resiliency
resilience
pubcrawl
HT detection
HT design
AES benchmark
HT benchmark
hardware trojan
hardware security issue
Hardware Security
Hardware
encryption
cyber physical systems
Cryptography
composability
Benchmark testing
biblio
Hardware Trojan Detection Based on Correlated Path Delays in Defiance of Variations with Spatial Correlations
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
intradie variation
Trojan horses
trojan horse detection
spatial correlations
Solid modeling
side channel analysis
Resiliency
resilience
pubcrawl
Process Variations
path delay ratio
path delay
minimally invasive Trojans
malicious circuit
Logic gates
invasive software
composability
interdie variation
Integrated circuit modeling
Integrated circuit interconnections
Image edge detection
HT inserted circuits
HT detection methods
HT detection method
hardware Trojan detection
Hardware Security
delays
cyber physical systems
Cryptography
Correlation
correlated path delays
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »