Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Layout
biblio
Attacking Split Manufacturing from a Deep Learning Perspective
Submitted by aekwall on Mon, 11/09/2020 - 1:42pm
integrated circuit split manufacturing
integrated circuit manufacture
Foundries
back-end-of-line parts
BEOL connections
different foundries
FEOL facility
front-end-of-line
image-based features
IP piracy
ISCAS-85benchmarks
layout-level placement
Metals
network-flow attack
security promise
sophisticated deep neural network
vector-based features
neural nets
invasive software
computer architecture
learning (artificial intelligence)
Resiliency
pubcrawl
composability
policy-based governance
deep learning
security of data
manufacturing systems
Capacitance
industrial property
Image Processing
Wires
Layout
Pins
biblio
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure
Submitted by aekwall on Mon, 11/09/2020 - 1:11pm
Layout
Vulnerability
source code (software)
software reusability
Software
security of data
security
Resiliency
relative memory
pubcrawl
Position-Independent Code-Reuse Attacks
Payloads
multiple position-independent ROP
Memory management
address-space layout randomization
just-in-time code-reuse attacks
Information Reuse and Security
information disclosure mitigation
information disclosure detection
exploitation
Electronic mail
computer science
Compositionality
code pointers
code gadgets
code addresses
ASLR
advanced attacker
biblio
Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers
Submitted by aekwall on Mon, 10/05/2020 - 11:59am
telecommunication network topology
Dynamic Networks and Security
TCP/IP protocol
space layout randomization system
periodic dynamic hopping
network intruder
internal network address
grid topological structure
address layout randomization
address hoppin
Dynamic scheduling
security protection
Layout
network architecture
IP address
computer network security
Aerospace electronics
Heuristic algorithms
process control
SDN
Metrics
composability
pubcrawl
Resiliency
moving target defense
transport protocols
software defined networking
security
IP networks
biblio
An Open Privacy-Preserving and Scalable Protocol for a Network-Neutrality Compliant Caching
Submitted by aekwall on Mon, 09/28/2020 - 12:17pm
Impedance
CPS Privacy
video content distribution
traffic prioritization
SSS scheme
Shamir Secret Sharing scheme
regulator authority
open privacy-preserving scalable protocol
network-neutrality compliant caching
ISP network
CP
content providers
cyber physical systems
Internet service providers
cache storage
Detectors
Silicon
Layout
Geometry
Human Factors
QoS
quality of service
Feeds
privacy
internet
Protocols
pubcrawl
Human behavior
RA
telecommunication traffic
biblio
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
pubcrawl
Layout
layout camouflaging
LC
malicious entities
manufacturing
manufacturing flow
manufacturing paradigm
Metrics
production engineering computing
ip protection
resilience
reverse engineering
security
security-driven CAD flow
SM
split manufacturing
supply chains
Three-dimensional displays
extensive security analysis
policy-based governance
composability
IP piracy
3D ICs
business models
CAD
Cryptography
DRC-clean layouts
Resiliency
Foundries
Human behavior
Human Factors
industrial property
integrated circuit design
integrated circuit manufacture
integrated circuits
IP networks
biblio
Can Multi-Layer Microfluidic Design Methods Aid Bio-Intellectual Property Protection?
Submitted by grigby1 on Thu, 07/30/2020 - 1:48pm
biointellectual property protection
ip protection
skilled person-hour investment
significant fiscal person-hour investment
Product design
Multiplexing
multilayer microfluidic design methods
Mixers
Microfluidics
Lab-on-a-Chip
intellectual property rights
Foundries
biotechnology
bioMEMS
pubcrawl
bioassay implementation
bioassay developer
Three-dimensional displays
reverse engineering
Valves
Layout
Nonhomogeneous media
composability
industrial property
Resiliency
resilience
policy-based governance
biblio
Enabling File-Oriented Fast Secure Deletion on Shingled Magnetic Recording Drives
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
magnetic recording
Writing
storage device
SMR drives
shingled magnetic recording drives
shingled magnetic recording
serious write amplification
security of data
secure deletion operations
Scalability
pubcrawl
privacy
performance degradation
data deletion
Layout
file-oriented fast secure deletion strategy
file-oriented
File systems
file organisation
file information
FFSD
fast secure deletion
encryption
Drives
Degradation
data layout
biblio
Efficient Partial Firmware Update for IoT Devices with Lua Scripting Interface
Submitted by grigby1 on Fri, 06/19/2020 - 11:34am
IoT devices
Wireless communication
updatable fragments
security
Resiliency
resilience
relocatable code
radio spectrum management
pubcrawl
Microprogramming
Metrics
Lua scripting interface
Lua
LoRaWAN
lora
Layout
air update
IoT
invokable native code
Internet of Things
GCC
FOTA
forward error correction
firmware
energetic efficiency
efficient partial firmware update
dedicated memory layout
computer network security
composability
batteries
API extension
biblio
Unit Regression Test Selection According To Different Hashing Algorithms
Submitted by aekwall on Mon, 06/08/2020 - 11:34am
Layout
hash algorithms
unit regression test selection
Testing process
regression test selection
in-depth review
hashing algorithms
hashing
resource usage
Manuals
security
Compositionality
regression analysis
testing
program testing
Force
Synchronization
pubcrawl
Resiliency
Software
biblio
An Approach of Code Pointer Hiding Based on a Resilient Area
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
Information systems
source code (software)
Software
security of data
security
Scalability
rop attacks
resilient area
resilience
pubcrawl
pointer hiding
Payloads
memory disclosure vulnerability
Layout
Information Reuse and Security
information system security
Human Factors
Human behavior
flow graphs
Diversity methods
composability
code reuse attack
code reuse
code randomization
code pointer hiding
attack scenario
Resiliency
Compositionality
« first
‹ previous
1
2
3
4
5
next ›
last »