Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hardware complexity
biblio
Safe and secure software updates on high-performance embedded systems
Submitted by grigby1 on Mon, 03/29/2021 - 10:56am
Metrics
traditional certification practices
system dependability
standards
security threats
security of data
security
secure software updates
Safety
Resiliency
resilience
regular software updates
pubcrawl
potentially infinite scenarios
post-deployment evidence
OTASU
Artificial Intelligence
interconnected system resilient
high-performance embedded systems
high performance scale
high computing demands
hardware platform
hardware complexity
extended networking technologies
embedded systems
dependable embedded systems
computational complexity
composability
certification
autonomous systems
automobiles
artificial intelligence algorithms
biblio
A compact and efficient architecture for elliptic curve cryptographic processor
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
heterogeneous function units
word length 576 bit
UMC
size 90 nm
scalar multiplication
Resiliency
Registers
public key cryptography
pubcrawl
parallel processing
Montgomery modular division algorithm
microprocessor chips
Metrics
Kaliski's Montgomery modular inversion
arbitrary curves
hardware complexity
Hardware
Galois fields
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
elliptic curve cryptographic processor
dual-field elliptic curve cryptographic processor
computer architecture
composability
CMOS integrated circuits
CMOS 1 P9M technology
clustering technology
Clustering algorithms
biblio
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
ordered hierarchy
Virtual machine monitors
user-level applications
System software
supervisory programs
storage management
security of data
processor architecture
privileged system software
privilege level
permission mechanism
Permission
performance overhead
arbitrary malicious activities
operating systems
noninclusive memory permissions architecture
modern computer system protection
modern commodity systems
Memory management
hypervisor code
high-privileged software layer
hardware-supported page permission scheme
hardware complexity
Hardware
cross-layer attack protection
complex software stack protection