Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IEEE standards
biblio
On Attacking IJTAG Architecture based on Locking SIB with Security LFSR
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
reverse engineering
SLFSR
power analysis
LSIB
Linear feedback shift registers
known-plaintext attack
IEEE standard 1687
Hybrid power systems
brute force attacks
collaboration
IEEE standards
side-channel attacks
integrated circuits
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
How Not to Protect Your IP – An Industry-Wide Break of IEEE 1735 Implementations
Submitted by aekwall on Tue, 12/20/2022 - 5:20pm
reverse engineering
White-Box RSA
software protection
key extraction
IEEE standards
IEEE Standard 1735-2014
hardware ip protection
White Box Security
Lattices
Hardware
composability
Resiliency
Metrics
pubcrawl
Public key
privacy
Software
biblio
A Survey on Security and Privacy Threats to Federated Learning
Submitted by grigby1 on Mon, 04/18/2022 - 2:36pm
policy-based governance
security weaknesses
security threat
Resists
Resiliency
resilience
pubcrawl
Protocols
Privacy-preserving
privacy
Collaborative Work
poisoning attacks
inference attacks
IEEE standards
Human behavior
generative adversarial networks
GAN attacks.
federated learning
Computational modeling
biblio
A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System
Submitted by aekwall on Mon, 11/16/2020 - 2:57pm
system life cycle
ISO/IEC/IEEE 152SS
NIST SP SOO-160
notional autonomous space system
notional space system
secure cyber-physical systems
software engineering processes
space missions
Space vehicles
STPA-Sec
functional-level security requirements
system operation
system-theoretic process analysis approach for security
systems security analysis
systems security engineering
systems security requirements
top down approach
top down systems security requirements analysis approach
traceable security
Resilient Security Architectures
Software Architecture
security of data
security
cyber-physical systems
Resiliency
pubcrawl
Cybersecurity
Stakeholders
IEC standards
ISO standards
Safety
resilience
Formal Specification
aerospace computing
IEEE standards
requirements analysis
system architecture
resiliency requirements
architectural-level security specifications
biblio
A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
Registers
IJTAG network
IJTAG security
Instruments
intellectual property security
isolation signals
microprocessor chips
on-chip access
on-chip instruments
policy-based governance
power consumption
pubcrawl
IJTAG
resilience
Resiliency
scan chain
security
security of data
system-on-chip
system-on-chip designs
third party intellectual property providers
unauthorized user access
untrusted sources
Diagnosis
Clocks
Complexity theory
composability
controlled scan chain isolation
data integrity
Data Integrity Attacks
data manipulation
data protection scheme
data sniffing
debug
design for test
authorisation
electronic design automation
embedded instruments
embedded systems
graph coloring problem
graph colouring
graph theory approach
hidden test-data registers
IEEE standards
IEEE Std 1687
IEEE Std. 1687
biblio
Efficient Modeling of HIL Multi-Grid System for Scalability Concurrency in CPS Security Testbed
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
large-scale grid models
cyber-event-triggered power system blackout
cyber-physical system testbeds
grid data streams
hardware-in-the-loop
hardware-in-the-loop CPS security testbeds
HIL CPS security testbed
HIL multigrid system
HIL realtime digital simulator environment
IEEE-118 bus grid model
IEEE-39 bus grid models
industry-grade hardware
interdependent events
cyber-event-triggered power grid blackout
modular integration designs
Multi-Grid
multigrid isolated models
multitude designs
phasor measurement
physics-constrained recovery
Power and Cyber System Testbed
real-time execution environment
restoration process
synthetic grid model
Ukrainian grid
IEC standards
security
CPS
cyber-physical systems
Metrics
resilience
Resiliency
IEEE standards
Computational modeling
power engineering computing
composability
real-time systems
power grids
security of data
SCADA
Scalability
Relays
WAMS
Software systems
Concurrent computing
Phasor measurement units
cyber physical systems
100% realtime performance
Concurrency
coordinated cyber attacks
biblio
Mitigating JTAG as an Attack Surface
Submitted by grigby1 on Fri, 08/28/2020 - 11:51am
private instructions
JTAG test access ports
JTAG-based debug
key registers
key systems
materiel availability issues
Metrics
microprocessor chips
on-chip embedded instrumentation
JTAG interface
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
security
standard test access port
system memory
Cryptography
authorisation
BIT
boundary scan
boundary scan architecture
boundary scan testing
Built-In Test
chip lock
computer debugging
attack surface
debug architectures
depot system repair
embedded systems
firmware
IEEE 1149.1
IEEE standards
joint test action group standards
JTAG
biblio
Performance Evaluation of Some Industrial Loss of Field Protection Schemes Using a Realistic Model in The RTDS
Submitted by grigby1 on Thu, 07/16/2020 - 11:43am
Relays
phase domain model
power generation
power generation faults
power generation protection
power plants
pubcrawl
real-time-digital-simulator
realistic power generation unit
realistic system
relay protection
performance evaluation
Reliability
resilience
Resiliency
Rotors
security viewpoints
simulations
synchronous generator
Synchronous generator protection
synchronous generators
industrial loss
ANSI code
composability
CPS modeling
earthing
field protection schemes
field relay
IEEE standards
Impedance
important protection functions
industrial LOF protection schemes
admittance based schemes
Loading
LOF events
LOF relay
LOF studies
loss of field
loss of field relay
machine protection
Metrics
overvoltage protection
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
RSN
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
integrating lightweight encryption
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
flexible access
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
-play instrument wrapper
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
biblio
Quickest Detection of Time-Varying False Data Injection Attacks in Dynamic Smart Grids
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
Human behavior
worstcase expected detection delay
time-varying state variables
time-varying false data injection attacks
smart power grids
security of data
Resiliency
resilience
pubcrawl
power system security
power engineering computing
IEEE standards
IEEE standard power system
False Data Detection
FDIAs
false data injection attacks
expected false alarm period
dynamic smart grids
dynamic smart grid systems
Cybersecurity
cyber physical systems
cumulative-sum-type algorithms
cumulative sum
computational complexity
computational complex scaling
composability
1
2
next ›
last »