Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PCS
biblio
MiteS: Software-based Microarchitectural Attacks and Countermeasures in networked AP SoC Platforms
Submitted by grigby1 on Mon, 03/15/2021 - 1:08pm
programming
microarchitectural attack
microarchitecture
microcomputers
microprocessor chips
MiteS
Multiple Encryption
networked AP SoC platforms
PCS
personal computers
preventive countermeasure
Metrics
Protocols
pubcrawl
resilience
Resiliency
return-oriented programming
return-oriented programming attack
software-based microarchitectural attacks
stack protection
system-on-chip
Computer crime
adapted words addition
all-programmable system-on-chip
AP SoC attacker
AP SoC victim
buffer overflow
Buffer overflow attack
command injection attacks
command-injection
command-injection-based attack
composability
return oriented programming
Cryptography
dynamic reconfiguration
field programmable gate arrays
FPGA dynamic configuration
Intellectual Property cores
internet
Internet Protocol
internetworked all programmable system-on-chip platforms
IP
biblio
Design, Verification and Implementation of a Lightweight Remote Attestation Protocol for Process Control Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Remote Attestation
policy-based collaboration
privacy
process control
process control systems
program verification
protocol implementation
protocol verification
Protocols
pubcrawl
Policy
remote network infrastructures
Romania
Scyther model checking tool
secure software integrity verification scheme
security
Software
software integrity
specialized components
industrial applications
commodity-off-the-shelf hardware
commodity-off-the-shelf software
Compositionality
COTS
Cryptographic Protocols
data integrity
formal verification
gas transportation network automation
Hardware
closed process control applications
industrial communications
industrial control
isolated components
lightweight remote attestation protocol
Nickel
PCS
Phoenix-Contact industrial controller
physically secured locations
biblio
Multi End-Hopping Modeling and Optimization Using Cooperative Game
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
MEH
computer network security
Control engineering
cooperative game
cyber-attack
DoS attack
game theory
hosts
information science
malicious scanning
Resiliency
moving target defense
MTD
multi end-hopping
Network reconnaissance
optimisation
optimization method
PCS
possible configurable space
pubcrawl
biblio
Cross-layer security framework for smart grid: Physical security layer
Submitted by BrandonB on Tue, 05/05/2015 - 10:13am
physical layer security
Trojan horses
smart power grids
smart power grid cyber technology
Smart Grids
smart grid security
Smart Grid
process control system
Process Control Security
process control
predictive control
power system security
physical security layer
conceptual layering model
PCS
Monitoring
isolated security tool
Hidden Markov models
hardware Trojan threat
Hardware
CyNetPhy PSL resolution
cross-layer security framework
Cross-Layer Security
cooperative real-time security system
control systems