Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware Security
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
An effective technique preventing differential cryptanalysis attack
Submitted by grigby1 on Wed, 03/17/2021 - 11:42am
Adaptive scan chain
Chained Attacks
traditional scan chain
plaintexts differs
plaintext analysis technique
plaintext analysis module
plaintext analysis circuit
differential cryptanalysis attack
different scan chain
design for testability
controller circuit
complicated scan chain
adaptive scan chain structure
adaptive scan chain circuit
Logic gates
Hardware Security
Watermarking
Switches
Registers
Scalability
integrated circuit testing
Mathematical model
AES
Hardware
Resiliency
resilience
pubcrawl
Cryptography
biblio
A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion
Submitted by aekwall on Mon, 11/09/2020 - 12:33pm
intellectual property/IC
IP piracy
SAT attack
hardware obfuscation
Anti-Trojan insertion algorithm
Controllability
copy protection
design-for-trust
hardware Trojan insertion
HT insertion
hardware trojan
logic encryption methods
logic encryption techniques
logic locking
PUF based logic encryption technique
PUF-based encryption
Rare Signal
reverse engineering attack
unique encryption
Hardware Security
encryption
Hardware
invasive software
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
integrated circuits
Cryptography
Topology
Logic gates
industrial property
reverse engineering
integrated circuit design
logic circuits
Physical Unclonable Function
encryption key
biblio
Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method
Submitted by aekwall on Mon, 11/09/2020 - 12:32pm
integrated circuit industry
IP piracy
application specific integrated circuits
ASIC technology
circuit complexity
combinational circuits
finite state machine
FSM obfuscation method
hardware obfuscation method
Hardware Security
IP overproduction
ITC99 circuit benchmarks
logic encryption
Logic masking
Mystic obfuscation approach
Mystic protection method
mystifying IP cores
Logic gates
Hardware
Resiliency
pubcrawl
composability
policy-based governance
Production
Complexity theory
microprocessor chips
IP networks
obfuscation
reverse engineering
encoding
finite state machines
logic circuits
logic design
size 45.0 nm
biblio
Property Based Formal Security Verification for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/02/2020 - 12:35pm
Resiliency
invasive software
Logic gates
malicious Hardware Trojans
modern computer hardware
policy-based governance
pubcrawl
register transfer level information flow security models
resilience
intellectual property security
secret information
security
security behavior
Security Properties
Semantics
Theorem Proving
third-party intellectual property cores
Trojan horses
golden reference design
composability
Coq
fine grained gate level information flow model
formal representations
formal security verification
Formal Specification
formal verification
formal verification method
Complexity theory
Hardware
hardware designs
Hardware Security
hardware trojan
industrial property
information flow analysis
Integrated circuit modeling
biblio
SoCINT: Resilient System-on-Chip via Dynamic Intrusion Detection
Submitted by grigby1 on Mon, 11/02/2020 - 11:29am
Monitoring
Trojan horses
system-on-chip
software tools
SoCs
SoCINT
security
Runtime system
Resiliency
resilience
Registers
pubcrawl
policy-based governance
open source processor
composability
IP networks
Intrusion Detection
intellectual property security
intellectual properties
industrial property
Hardware Trojans
hardware tracing
Hardware Security
Hardware
FPGA platform
field programmable gate arrays
dynamic intrusion detection approach
biblio
An Orthogonal Algorithm for Key Management in Hardware Obfuscation
Submitted by grigby1 on Mon, 11/02/2020 - 11:28am
member leakage attack
supply chain management
Supply Chain
semiconductor chips
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
partnership organization
orthogonal obfuscation algorithm
Orthogonal obfuscation
orthogonal matrix
microprocessor chips
authenticate obfuscation keys
Licenses
IP piracy attacks
IP piracy
IP networks
IP cores
intellectual property security
intellectual property piracy attacks
integrated circuits
integrated circuit design
industrial property
Hardware Security
Hardware
copy protection
composability
biblio
Machine Learning Bluetooth Profile Operation Verification via Monitoring the Transmission Pattern
Submitted by grigby1 on Fri, 09/04/2020 - 3:27pm
radio frequency output power
electronic engineering computing
Hardware Security
hardware-software security
integrated circuit manufacture
k-nearest neighbor
license communication IC
low computational complexity
low-cost legacy technology
mobile radio
profile classification algorithm
custom low-frequency integrated circuit
RF envelope detector
RF output power
RF Power
signal classification
smart descriptive time-domain feature extraction
Supervisory Circuit
support vector machine
transmission pattern
Cyber Physical System
bluetooth security
cyber physical systems
telecommunication security
pubcrawl
composability
Resiliency
resilience
Human behavior
machine learning
feature extraction
classifier
learning (artificial intelligence)
security
formal verification
Decision Tree
system-on-chip
telecommunication computing
Bluetooth
Blue-tooth
Bluetooth profile operation verification
Bluetooth SoC
Bluetooth System-on-Chip
communication complexity
biblio
Automated Synthesis of Differential Power Attack Resistant Integrated Circuits
Submitted by aekwall on Mon, 08/24/2020 - 11:41am
Dynamic Differential Logic
cryptographic processors
cryptographic systems
differential circuit design
differential logic
Differential Power Analysis
differential power analysis attacks
differential power attack resistant integrated circuits
DPA attack resistance
DPA resistant cell designs
combinational cells
fully automated synthesis system DPA resistant integrated circuits
MDPL
multiplying circuits
RT level Verilog specifications
secret key information
Secure Differential Multiplexer Logic
sequential cells
sequential circuits
power consumption
Resiliency
pubcrawl
composability
Cryptography
standards
tools
Libraries
Automated Response Actions
Logic gates
private key cryptography
Power demand
logic design
Hardware Security
Resistance
combinational circuits
Automated Synthesis
CMOS logic circuits
CMOS synthesis
biblio
Impact Evaluation of Embedded Security Mechanisms on System Performance
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
data flows
system protection
subject-object model
reference monitor functional model
reference monitor
impact evaluation analytical model of reference monitor
impact evaluation
general-purpose systems
embedded security mechanisms
System performance
system security
Hardware Security
security of data
Mathematical model
Analytical models
Data protection
Metrics
composability
pubcrawl
Resiliency
embedded systems
performance evaluation
Access Control
Monitoring
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »