Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Side-channel attack
biblio
An Efficient Memory Zeroization Technique Under Side-Channel Attacks
Submitted by aekwall on Mon, 02/24/2020 - 10:55am
built-in self test
volatile memories
side-channel attacks
Side-channel attack
security violations
secured data content
secret data
random-access storage
private memory contents
on-chip memory contents
Memory Zeroization
memory security
memory built-in-self-test hardware
MBIST based content zeroization approach
efficient memory zeroization technique
content protection
security of data
Temperature sensors
cryptographic keys
remanence
Compositionality
Engines
Random access memory
data deletion
security attacks
pubcrawl
Resiliency
system-on-chip
security
Memory management
Hardware
Cryptography
biblio
Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
public key cryptography
Stochastic processes
stochastic method
stochastic heuristic approach
Side-channel attack
security effectiveness
Scalability
SCA
RSA cryptosystem
RSA
Resiliency
public-key cryptosystem
public-key cryptography
ACP
pubcrawl
PKC
multiplication-squaring operations
modular exponentiation
microsoft windows
Heuristic algorithms
exponentiation operation
exponentiation
dummy operations
Benchmark testing
addition chain problem
biblio
Adversarial Symbolic Execution for Detecting Concurrency-Related Cache Timing Leaks
Submitted by grigby1 on Tue, 12/17/2019 - 12:22pm
resilience
pubcrawl
Metrics
Resiliency
composability
cyber-physical systems
cyber-physical system
Symbolic Execution
Concurrency
cache
Side-channel attack
timing
Predictive Metrics
biblio
Electromagnetic Equalizer: An Active Countermeasure Against EM Side-Channel Attack
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
composability
countermeasure
electromagnetic
Metrics
Power Grid
power grid vulnerability analysis
pubcrawl
resilience
Resiliency
Side-channel attack
biblio
Single Trace Side Channel Analysis on Quantum Key Distribution
Submitted by grigby1 on Tue, 10/08/2019 - 4:45pm
Resiliency
quantum computer
quantum computing
quantum cryptography
Quantum Key Distribution
quantum physics
quantum properties
random key generation
random number generation
resilience
QKD system
Scalability
Secret key
Side-channel attack
side-channel attacks
single electromagnetic trace
Single Trace Attack
single trace side channel analysis
stable key generation
weak random number generators
Phase modulation
Cryptographic Protocols
Diffie-Hellman key exchange
Electromagnetics
EM analysis
Human behavior
key exchange protocols
Metrics
number theoretic problems
number theory
BB84 protocol
phase modulator
Photonics
plug-and-play
plug-and-play QKD system
private key cryptography
Protocols
pubcrawl
QKD
biblio
A Dynamic-Key Secure Scan Structure Against Scan-Based Side Channel and Memory Cold Boot Attacks
Submitted by grigby1 on Fri, 04/05/2019 - 10:29am
memory attack
Side-channel attack
side channel attack
security level
security
secure scan architecture
scan design key generator
Scalability
Resiliency
resilience
Random access memory
pubcrawl
memory cold boot attack
memory attacks
Chained Attacks
integrated circuit testing
Hardware Security
Generators
flip-flops
dynamic-key secure scan structure
dynamic-key secure DFT structure
dynamic key generation
Discrete Fourier transforms
design for testability
design for test technology
Cryptography
Controllability
Clocks
biblio
A Memory-Deduplication Side-Channel Attack to Detect Applications in Co-Resident Virtual Machines
Submitted by grigby1 on Thu, 01/31/2019 - 12:27pm
Cloud Computing
composability
Cryptography
cyber physical systems
pubcrawl
Resiliency
security
Side-channel attack
virtual machine security
Virtualization
biblio
Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures
Submitted by grigby1 on Wed, 04/11/2018 - 3:01pm
HT defense
Trojan horses
trojan horse detection
side-channel attacks
side-channel attack AES hardware Trojan benchmarks
Side-channel attack
Resiliency
resilience
pubcrawl
HT detection
HT design
AES benchmark
HT benchmark
hardware trojan
hardware security issue
Hardware Security
Hardware
encryption
cyber physical systems
Cryptography
composability
Benchmark testing
biblio
Don'T Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP
Submitted by grigby1 on Tue, 02/27/2018 - 2:39pm
Human behavior
Human Factors
keyboard acoustic eavesdropping
keystroke analysis
machine learning
Metrics
privacy
pubcrawl
security
Side-channel attack
Skype
biblio
Side-channel collision attack based on multiple-bits
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
AES
Algorithm design and analysis
collision attack
composability
encryption
Euclidean distance
field programmable gate arrays
Hardware
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
Side-channel attack
side-channel attacks
« first
‹ previous
1
2
3
next ›
last »