Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Metals
biblio
TCB Minimization towards Secured and Lightweight IoT End Device Architecture using Virtualization at Fog Node
Submitted by aekwall on Wed, 07/07/2021 - 5:09pm
secured architecture
composability
virtualization privacy
Human behavior
Resiliency
Metrics
pubcrawl
Virtual machine monitors
trusted computing base
TCB Minimization
security
Metals
Lightweight Architecture
IoT End Device
Internet of Things
computer architecture
privacy
Software
Minimization
biblio
Killing EM Side-Channel Leakage at its Source
Submitted by grigby1 on Thu, 05/20/2021 - 11:53am
Probes
white box cryptography
White-box modeling
Signature Suppression
Low-overhead countermeasure
Local lower metal routing
attenuation
Metals
EM Side-channel attack
pubcrawl
Switches
Routing
composability
Cryptography
Resiliency
resilience
Metrics
biblio
Attacking Split Manufacturing from a Deep Learning Perspective
Submitted by aekwall on Mon, 11/09/2020 - 1:42pm
integrated circuit split manufacturing
integrated circuit manufacture
Foundries
back-end-of-line parts
BEOL connections
different foundries
FEOL facility
front-end-of-line
image-based features
IP piracy
ISCAS-85benchmarks
layout-level placement
Metals
network-flow attack
security promise
sophisticated deep neural network
vector-based features
neural nets
invasive software
computer architecture
learning (artificial intelligence)
Resiliency
pubcrawl
composability
policy-based governance
deep learning
security of data
manufacturing systems
Capacitance
industrial property
Image Processing
Wires
Layout
Pins
biblio
S℡LAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-Cause Analysis
Submitted by grigby1 on Tue, 02/18/2020 - 11:52am
signature attenuation hardware
low-overhead solution
Metals
Metrics
noninvasive attacker
noninvasive electromagnetic side-channel attacks
power side-channel countermeasures
Probes
pubcrawl
resilience
Resiliency
resource-constrained Internet-connected devices
Routing
side-channel analysis attacks
signature attenuation embedded CRYPTO
low-level metal routing
size 32.0 nm
size 65.0 nm
S℡LAR
S℡LAR hardware
system-level EM simulations
system-level implementation
telecommunication network routing
top-level metal layers
TSMC 65 nm CMOS technology
two-stage solution
white-box analysis
white box cryptography
white-box understanding
external attacker
composability
critical encryption signature
critical signal radiation
Cryptographic Hardware
Cryptography
EM leakage
EM probes
EM SCA attack
EM Side-channel attack
encryption
entire cryptographic core
entire crypto IP
example cryptographic block
CMOS integrated circuits
frequency 40.0 MHz
Generic countermeasure
generic EM side-channel attack protection
Ground-up EM Leakage Modeling
ground-up root-cause analysis
higher-level metal layers
high-resolution electromagnetic probes
integrated circuit
Integrated circuit modeling
Intel 32 nm CMOS technology interconnect stack
internet
lower-level metal layers
lower-level metal routing
biblio
Timing Analysis for Diffie Hellman Key Exchange In U-BOOT Using Raspberry Pi
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
telecommunication security
public key cryptography
Raspberry Pi
Raspberry-pi
Resiliency
Scalability
Secret key
security schemes
side channel attack
system-on-chip
pubcrawl
timing
Timing attack
timing attacks
timing patterns
tools
U-Boot bare metal
unsecure communication channel
word length 2048.0 bit
word length 64.0 bit
embedded systems
cryptographic
cryptographic era
Cryptographic Protocols
Cryptography
DHKE protocol
diffie hellman key exchange
Diffie Hellman Key Exchange protocol
Discrete Log Hard Problem
embedded device
brute force attacks
exponentiation
firmware
Force
GMP bignum library
Metals
modular exponentiation
networked embedded systems security
Protocols
biblio
A Framework for Threat-Driven Cyber Security Verification of IoT Systems
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalable verification
model checking-based formal analysis
modeling
Object oriented modeling
production engineering computing
pubcrawl
resilience
Resiliency
Scalability
mitigation strategies
security
security of data
Security Properties
Silicon
system deployment
system security
threat-driven cyber security verification
Alloy
Metrics
Metals
IoT systems
IoT
Internet of Things
industrial IoT infrastructures
industrial control
formal verification
distributed industrial control systems
distributed control
control systems
Compositionality
Communication channels
attack patterns
Analytical models
biblio
Hybrid silicon CMOS-carbon nanotube physically unclonable functions
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
nanotube array
Transistors
Silicon
security tokens
security
Resiliency
resilience
PUF circuit
PUF
pubcrawl
physically unclonable functions
Physically unclonable
nanotube transistors
analog silicon circuit
Microelectronics Security
Metrics
Metals
hybrid silicon CMOS-carbon nanotube
electronic devices
Contact resistance
Computational modeling
composability
CMOS analogue integrated circuits
CMOS
carbon nanotubes
carbon nanotube
biblio
Data supply chain in Industrial Internet
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
Metals
Web Protocol
visionary data supply chain
supply chains
standards
Punching
pubcrawl170112
Protocols
Production facilities
Open Messaging Interface
business data processing
IoT
internet
industry business activities
industrial Internet application architecture
industrial internet
Data processing
Data collection
data analysis
computer architecture
biblio
Cryptographically secure shields
Submitted by BrandonB on Thu, 04/30/2015 - 2:20pm
metal layer
TSV technology
Through Silicon Vias (TSV)
through silicon vias
three-dimensional integrated circuits
SIMON lightweight block cipher
SIMON block cipher
shield structure
security product
Routing
Registers
protective layer
probing attacks
Metals
chip design
mesh lines
invasive attacks
integrated circuits
integrated circuit design
integrated circuit
Focused Ion Beam (FIB)
digital shield
digital fence
Cryptography
Cryptographically secure shield
cryptographical secure shield
Ciphers
« first
‹ previous
1
2