Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware Trojans
biblio
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory
Submitted by aekwall on Mon, 03/29/2021 - 11:51am
Repeated game
zero-sum
third-party companies
prospect theory
optimal deception rationality
offshore manufacturing
multilevel game-theoretic framework
manufactured ICs
malicious IC manufacturer
learning stage
IC designers
Hardware Trojans
hardware Trojan detection
first-step deception mitigation process
deception analysis
actual game stage
Scalability
hypergame theory
integrated circuits
game theoretic security
Predictive Metrics
Human Factors
Cybersecurity
supply chains
Supply Chain
pubcrawl
Resiliency
learning (artificial intelligence)
deception
invasive software
game theory
biblio
SoCINT: Resilient System-on-Chip via Dynamic Intrusion Detection
Submitted by grigby1 on Mon, 11/02/2020 - 12:29pm
Monitoring
Trojan horses
system-on-chip
software tools
SoCs
SoCINT
security
Runtime system
Resiliency
resilience
Registers
pubcrawl
policy-based governance
open source processor
composability
IP networks
Intrusion Detection
intellectual property security
intellectual properties
industrial property
Hardware Trojans
hardware tracing
Hardware Security
Hardware
FPGA platform
field programmable gate arrays
dynamic intrusion detection approach
biblio
Study of hardware trojans based security vulnerabilities in cyber physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
SCADA systems
IC industry
integrated circuits
invasive software
malicious modifications
Metrics
pubcrawl
reliable functionality
resilience
Resiliency
hardware-in-the-loop based simulation platform
secure functionality
security
Security Awareness
security vulnerabilities
simulations
software peripherals
threat models
Trojan horses
CPS modeling
closed-loop systems
completely virtual simulation platform
complex computing environment
composability
Computational modeling
computing chip
computing hardware design
computing platform
closed loop systems
critical CPS application
cyber physical systems
cyber-physical systems
gas pipeline based SCADA system
Hardware
hardware internals
Hardware Trojans
hardware-in-the loop simulation
biblio
A Benchmark Suite of Hardware Trojans for On-Chip Networks
Submitted by grigby1 on Fri, 05/15/2020 - 12:45pm
Information Leakage
Trojan horses
system-on-chip
standards
side channel analysis
security
Routing
performance degradation
on-chip networks
NoC
network-on-chip
multiprocessing systems
multicore systems
manycore systems
invasive software
network on chip security
HT defense methods
Hardware Trojans
hardware trojan
Hardware
Functional testing
Cryptography
benchmarks
Benchmark testing
benchmark suite
Metrics
Resiliency
resilience
Scalability
biblio
A Critical Evaluation of the Paradigm Shift in the Design of Logic Encryption Algorithms
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
provable security
structural corruption
SAT attack
paradigm shift
modern logic encryption algorithms
low-cost countermeasures
logic encryption techniques
logic encryption
intellectual property piracy
integrated circuit supply chain
Hardware Trojans
computability
Boolean satisfiability attack
resilience
Logic gates
Compositionality
Metrics
invasive software
Computer crime
integrated circuits
industrial property
Hardware Security
Hardware
Resiliency
pubcrawl
encryption
Cryptography
biblio
Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection Using Testing and Imaging
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
Resiliency
Logic Test
low accuracy
malicious modifications
microscopy
modern military systems
new hybrid approach
pubcrawl
rapid hardware trojan detection
resilience
Logic gates
reverse engineering
scanning electron microscopy
security
SEM images
superlative accuracy
supply chain security
trojan horse detection
Trojan horses
grave threat
commercial systems
cyber physical systems
detection method
exhaustive test infrastructure
existing gate footprints
Foundries
GGC
golden chip
golden gate circuits
backside ultra thinning
Hardware
Hardware Trojans
high classification accuracy
high time cost
Image analysis
Imaging
integrated circuits
invasive software
biblio
Lightweight Authenticated Encryption for Network-on-Chip Communications
Submitted by grigby1 on Tue, 01/21/2020 - 12:04pm
Availability
cyber physical systems
Hardware Trojans
integrity
Lightweight Ciphers
network-on-chip
pubcrawl
resilience
Resiliency
Scalability
biblio
Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers
Submitted by grigby1 on Wed, 10/02/2019 - 2:56pm
Hardware Trojans
multi-party computation
pubcrawl
resilience
Resiliency
trojan-resilience
biblio
Property Specific Information Flow Analysis for Hardware Security Verification
Submitted by grigby1 on Mon, 05/20/2019 - 4:30pm
Scalability
Metrics
policy-based governance
potential security violations
property specific information flow analysis
property specific search
property specific trimming technique
pubcrawl
resilience
Resiliency
Mathematical model
security
security critical paths
security model
security of data
security property
security verification
timing
Trojan horses
unintended design flaws
hardware security verification
collaboration
Complexity theory
composability
Control Theory
Design methodology
formal verification
Hardware
hardware information flow analysis
Hardware Security
Acceleration
hardware security vulnerabilities
Hardware Trojans
Human behavior
Human Factors
information flow analysis
information flow models
information flow security
information theoretic security
biblio
Hardware Trojan Detection Using Path Delay Order Encoding with Process Variation Tolerance
Submitted by grigby1 on Fri, 03/15/2019 - 11:59am
Logic gates
variation-tolerant path delay order encoding technique
Trojan horses
trojan horse detection
security threats
security
pubcrawl
process variation tolerance
path delay information
outsourcing
delays
HT detection techniques
Hardware Trojans
hardware Trojan detection
Hardware
Foundries
fabrication
encoding
DfT
design-for-trust techniques
« first
‹ previous
1
2
3
4
next ›
last »