Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware Security
biblio
A Stealthy Hardware Trojan Design and Corresponding Detection Method
Submitted by grigby1 on Thu, 05/19/2022 - 12:03pm
Hardware Security
trojan horse detection
imbalanced controllability
Observability
unsupervised clustering
Controllability
transition probability
Systematics
Hardware Trojans
pubcrawl
Trojan horses
Benchmark testing
composability
Integrated circuit modeling
Hardware
Resiliency
resilience
biblio
Hardware-Trojan Classification based on the Structure of Trigger Circuits Utilizing Random Forests
Submitted by grigby1 on Thu, 05/19/2022 - 11:59am
composability
trojan horse detection
netlist
hardware trojan
manufacturing
Hardware Security
Random Forest
Trojan horses
Benchmark testing
Internet of Things
integrated circuits
Hardware
Resiliency
resilience
pubcrawl
machine learning
feature extraction
biblio
Performance Analysis of Scientific Computing Workloads on General Purpose TEEs
Submitted by aekwall on Fri, 04/01/2022 - 1:05pm
Memory management
Scientific Computing Security
TEE
SEV
Prefetching
Degradation
HPC
scientific computing
SGX
Hardware
Predictive Metrics
Compositionality
Technological innovation
machine learning
Resiliency
pubcrawl
Hardware Security
biblio
Bypassing memory safety mechanisms through speculative control flow hijacks
Submitted by aekwall on Mon, 03/14/2022 - 12:35pm
programming
rop attacks
Transient Execution
Speculative ROP
side channels
operating system security
Memory Safety Mechanisms
Buffer overflows
Computer bugs
Runtime
Force
process control
composability
Resiliency
Scalability
pubcrawl
Human Factors
Hardware Security
Software
biblio
Exploiting Process Variations to Protect Machine Learning Inference Engine from Chip Cloning
Submitted by grigby1 on Tue, 03/01/2022 - 3:19pm
network on chip security
Transistors
Throughput
testing
security
Scalability
Resiliency
resilience
pubcrawl
non-volatile memory
Cloning
Metrics
machine learning
inmemory computing
Hardware Security
Hardware accelerator
Engines
Deep Neural Network
composability
biblio
Trustworthy Computing on Untrustworthy and Trojan-Infected on-Chip Interconnects
Submitted by grigby1 on Tue, 03/01/2022 - 3:19pm
Metrics
tagging
system-on-chip
Software
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Trustworthy Systems
IP networks
Hardware Trust
Hardware Security
Hardware
Focusing
Europe
design for security
composability
biblio
On Preventing SAT Attack with Decoy Key-Inputs
Submitted by aekwall on Fri, 02/25/2022 - 9:44am
logic locking
Very large scale integration
Switches
supply chains
SAT attack
Resistance
Resiliency
pubcrawl
provable security
Predictive Metrics
overproduction
Tamper resistance
ip protection
intellectual property
Hardware Security
design-for-trust
control systems
computer architecture
Compositionality
Human Factors
Metrics
Scalability
biblio
Multi-Granularity Control Flow Anomaly Detection with Hardware Counters
Submitted by grigby1 on Fri, 02/04/2022 - 1:50pm
Hardware Security
Two-Level Predictor
Time factors
Return Oriented Programming (ROP)
return oriented programming
Resource Efficient
resilience
programming
Program processors
PMU
performance counters
microarchitecture
machine learning
rop attacks
Hardware
embedded systems
embedded security
Dynamic Control Flow Integrity
Buffer overflows
buffer overflow
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
Deep Learning Based Attack for AI Oriented Authentication Module
Submitted by grigby1 on Mon, 11/29/2021 - 1:50pm
Artificial Neural Networks
authentication
Data models
deep learning
Hardware Security
Human behavior
Human Factors
machine learning
machine learning attack
Metrics
Physical Unclonable Function
pubcrawl
Scalability
Tamper resistance
biblio
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 12:36pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Statistics
Sociology
reverse engineering
Resiliency
resilience
backscatter
integrated circuits
hardware trojan
Hardware Security
Hardware
cyber physical systems
cyber physical security
composability
clustering
Backscattering side-channel
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »