Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
leakage
biblio
SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables
Submitted by grigby1 on Fri, 01/06/2023 - 3:59pm
Network
SATA
leakage
electromagnetic
Workstations
radio transmitters
air-gap
exfiltration
Air gaps
covert channels
pubcrawl
Virtual machining
composability
Computers
Wireless communication
wireless sensor networks
Resiliency
resilience
Metrics
Human behavior
biblio
Quantifying Information Leakage of Deterministic Encryption
Submitted by grigby1 on Tue, 01/21/2020 - 11:54am
Compositionality
Deterministic Encryption
encryption audits
leakage
Metrics
pubcrawl
Quantitative information flow
resilience
Resiliency
biblio
Security of Okamoto Identification Scheme: A Defense Against Ephemeral Key Leakage and Setup
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
composability
Compositionality
ephemeral random values
GDH
Identification
impersonation
leakage
Metrics
Okamoto scheme
provable security
pubcrawl
resilience
Resiliency
security reduction
simulatability
biblio
Breaking Web Applications Built On Top of Encrypted Data
Submitted by grigby1 on Wed, 03/29/2017 - 12:25pm
application security
composability
Control Theory
decomposition
encryption audits
leakage
Metrics
provable security
pubcrawl
searchable encryption
security
Security Audits
biblio
Analysis on Password Protection in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:26pm
leakage
vulnerability analyzing method
Vulnerability
user privacy
taint analysis
smart phones
PW Exam
privacy
password protection
password leakage
password
mobile computing
Android applications
Humanoid robots
encryption
decompile step
data privacy
cryptography misuse detection
cryptography misuse analysis
Cryptography
API call record
Androids
Android apps