Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware Security
biblio
EM Based Machine Learning Attack for XOR Arbiter PUF
Submitted by grigby1 on Thu, 02/14/2019 - 10:18am
electromagnetic analysis
Hardware Security
Human Factors
machine learning attack
Metrics
Physical Unclonable Function
pubcrawl
Scalability
Tamper resistance
XOR arbiter PUF
biblio
RSA Signatures Under Hardware Restrictions
Submitted by grigby1 on Thu, 02/14/2019 - 10:17am
digital signatures
Hardware Security
hardware security modules
Human Factors
Metrics
pubcrawl
RSA
Scalability
secure enclaves
Tamper resistance
biblio
Secure, Consistent, and High-Performance Memory Snapshotting
Submitted by grigby1 on Thu, 02/14/2019 - 10:17am
Cloud Security
Forensics
Hardware Security
Human Factors
malware and unwanted software
Metrics
pubcrawl
Scalability
Tamper resistance
biblio
Cross-Lock: Dense Layout-Level Interconnect Locking Using Cross-Bar Architectures
Submitted by grigby1 on Thu, 02/14/2019 - 10:17am
Hardware Security
Human Factors
logic locking
logic obfuscation
Metrics
pubcrawl
sat attacks
Scalability
Tamper resistance
biblio
Preventing Neural Network Model Exfiltration in Machine Learning Hardware Accelerators
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
Metrics
Training
Side-Channels
Scalability
Resiliency
pubcrawl
Neural networks
neural network
model theft
model exfiltration
Adversary Models
memory probing
machine learning
inference
Human behavior
Hardware Security
Hardware
Data models
Context modeling
Computational modeling
biblio
Hardware Security Threats Against Bluetooth Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 1:05pm
hardware security threats
wireless mesh networks
smartphone platforms
security protocol
resilience
pubcrawl
physical attacks
network topology
Metrics
mesh topology
Mesh networks
Internet of Things
authentication
Hardware Security
encryption
Cryptographic Protocols
composability
Bluetooth special interest group
Bluetooth mesh networks
Bluetooth mesh
bluetooth low energy
Bluetooth
BLE technology
BLE networks
biblio
A highly reliable dual-arbiter PUF for lightweight authentication protocols
Submitted by grigby1 on Wed, 05/16/2018 - 12:41pm
lightweight security alternative
Switches
security primitive
RFIDs
RFID
Resiliency
resilience
Reliability
radio frequency identification
PUF
pubcrawl
Protocols
authentication
lightweight authentication protocols
integrated circuit reliability
increased security
human factor
Human behavior
Hardware Security
dual arbiter PUF design
delays
Cryptographic Protocols
Constrained Devices
BER
biblio
Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures
Submitted by grigby1 on Wed, 04/11/2018 - 2:01pm
HT defense
Trojan horses
trojan horse detection
side-channel attacks
side-channel attack AES hardware Trojan benchmarks
Side-channel attack
Resiliency
resilience
pubcrawl
HT detection
HT design
AES benchmark
HT benchmark
hardware trojan
hardware security issue
Hardware Security
Hardware
encryption
cyber physical systems
Cryptography
composability
Benchmark testing
biblio
Hardware Trojan Detection Based on Correlated Path Delays in Defiance of Variations with Spatial Correlations
Submitted by grigby1 on Wed, 04/11/2018 - 2:01pm
intradie variation
Trojan horses
trojan horse detection
spatial correlations
Solid modeling
side channel analysis
Resiliency
resilience
pubcrawl
Process Variations
path delay ratio
path delay
minimally invasive Trojans
malicious circuit
Logic gates
invasive software
composability
interdie variation
Integrated circuit modeling
Integrated circuit interconnections
Image edge detection
HT inserted circuits
HT detection methods
HT detection method
hardware Trojan detection
Hardware Security
delays
cyber physical systems
Cryptography
Correlation
correlated path delays
biblio
Mitigating Control Flow Attacks in Embedded Systems with Novel Built-in Secure Register Bank
Submitted by grigby1 on Wed, 04/11/2018 - 1:47pm
control flow attacks
csaw
embedded systems
Hardware Security
Human behavior
Metrics
openrisc
pubcrawl
resilience
Resiliency
threat mitigation
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
next ›
last »