Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware Security
biblio
EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security
Submitted by grigby1 on Thu, 12/01/2022 - 1:21pm
Detectors
Zero Day Attack Defense
Side Channel
ML Interpretability
Microarchitectural Attack Detection
Linearized Neural Network
Automatic Attack Sample Generation
Automated Hardware Performance Counter Engineering
Adversarial Machine Learning Attacks
codes
Zero day attacks
generative adversarial networks
Training
defense
Switches
side-channel attacks
microarchitecture
composability
Hardware Security
Hardware
Resiliency
resilience
Metrics
pubcrawl
biblio
Sensing with Random Encoding for Enhanced Security in Embedded Systems
Submitted by grigby1 on Fri, 09/30/2022 - 2:56pm
Hardware Security
random sensing
random encoding
ios
iOS Security
telemetry
Resiliency
Satellites
hardware trojan
timing
security
Compositionality
Trojan horses
encoding
sensors
resilience
Metrics
Human Factors
pubcrawl
biblio
Security Risk Assessment of Server Hardware Architectures Using Graph Analysis
Submitted by grigby1 on Tue, 09/20/2022 - 1:01pm
computer architecture
Servers
pubcrawl
Metrics
Hardware
Hardware Security
Runtime
Measurement
security risk assessment
statistical analysis
Security Metrics
graph theory
Computing Theory
hardware security metrics
biblio
Confidence Modeling and Tracking of Recycled Integrated Circuits, Enabled by Blockchain
Submitted by grigby1 on Fri, 09/09/2022 - 2:56pm
pubcrawl
Metrics
Hardware
Integrated circuit modeling
Hardware Security
Consumer electronics
supply chains
consortium Blockchain
counterfeit electronics detection
electronics supply chain security
recycled ICs
risk modeling and metrics
supply chain risk assessment
biblio
SRTLock: A Sensitivity Resilient Two-Tier Logic Encryption Scheme
Submitted by grigby1 on Fri, 07/29/2022 - 8:45am
standards
pattern locks
Sensitivity Attack
logic design
0-Injection
sensitivity analysis
SAT attack
logic encryption
Benchmark testing
Logic gates
Scalability
Hardware Security
Hardware
Resiliency
resilience
Human behavior
pubcrawl
encryption
biblio
JANUS: Boosting Logic Obfuscation Scope Through Reconfigurable FSM Synthesis
Submitted by grigby1 on Fri, 07/29/2022 - 8:45am
Scalability
pattern locks
Tamper-proof Memory
logic obfuscation
logic locking
boosting
supply chains
Partitioning algorithms
Switches
security
Hardware Security
Hardware
Heuristic algorithms
Resiliency
resilience
Human behavior
pubcrawl
biblio
Secured Test Pattern Generators for BIST
Submitted by grigby1 on Fri, 07/29/2022 - 8:44am
intellectual property
pattern locks
TPG
overproduction
BIST
logic locking
design for testability
built-in self-test
Hardware Security
reverse engineering
pubcrawl
side-channel attacks
integrated circuits
privacy
Scalability
Hardware
Resiliency
resilience
Human behavior
file
Provably Secure, Usable, and Performant Enclaves in Multicore Processors
Submitted by JasonGigax on Wed, 06/22/2022 - 1:48pm. Contributors:
Srini Devadas
Arvind
Adam Chlipala
Project Highlight Slides
Design Systems
Formal Methods and Language-based Security Hardware
Hardware Security
security architecture
2115587
SaTC PI Meeting 2022
biblio
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
Submitted by grigby1 on Fri, 05/20/2022 - 3:31pm
pubcrawl
Hardware Security
quantum computing
Quantum mechanics
composability
side-channel attacks
Compositionality
Resistance
Power measurement
digital signature
Transforms
standardization
correlation power analysis
number theoretic transform
Post-quantum cryptography
theoretical cryptography
biblio
Hardware Trojan for Lightweight Cryptoraphy Elephant
Submitted by aekwall on Thu, 05/19/2022 - 12:42pm
Cryptography
Trojan horses
Hardware
Human Factors
Conferences
pubcrawl
Scalability
Metrics
Resistance
hardware trojan
Hardware Security
Consumer electronics
Elephant
lightweight cryptography
Tamper resistance
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »