Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hardware trojan
biblio
Hardware Trojan Detection Based on SRC
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
resilience
Trojan horses
trojan horse detection
Training
supply chain security
sparse representation-based classifier (SRC)
Size measurement
security
Resiliency
composability
pubcrawl
Noise measurement
machine learning
integrated circuits
hardware trojan
Hardware
cyber physical systems
cyber physical security
biblio
Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
power analysis
Mahalanobis distance
Integrated circuit modeling
hardware trojan
Time Frequency Analysis and Security
frequency-domain analysis
Fourier transform
encryption
cyber physical systems
cyber physical security
composability
AES encryption circuit
Scalability
Predictive Metrics
Resiliency
biblio
Hardware Trojans Detection Based on BP Neural Network
Submitted by grigby1 on Mon, 11/08/2021 - 1:35pm
Power demand
Trojan horses
trojan horse detection
supply chain security
standards
side channel analysis
Resiliency
resilience
pubcrawl
Backpropagation
Neural networks
hardware trojan
Hardware
encryption
cyber physical systems
cyber physical security
composability
BP Neural Network
biblio
ADobf: Obfuscated Detection Method against Analog Trojans on I2C Master-Slave Interface
Submitted by grigby1 on Mon, 11/08/2021 - 1:34pm
obfuscation
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Sensitivity
Resistors
Resiliency
resilience
pubcrawl
Communication channels
Master-slave
I2C
hardware trojan
Hardware
cyber physical systems
cyber physical security
composability
analog Trojan
Clocks
biblio
Defense Against on-Chip Trojans Enabling Traffic Analysis Attacks
Submitted by aekwall on Thu, 09/30/2021 - 11:43am
Trojan horses
Hardware
Routing
pubcrawl
Scalability
Metrics
Resiliency
traffic control
Payloads
simulated annealing
NoC
hardware trojan
obfuscation
Program processors
routineg
network on chip security
biblio
Novel Design of Hardware Trojan: A Generic Approach for Defeating Testability Based Detection
Submitted by aekwall on Mon, 06/28/2021 - 12:41pm
Hardware
Support vector machines
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
timing
Hardware Security
hardware trojan
Controllability
intellectual property
Observability
Stealthy Design.
intellectual property security
biblio
SS3: Security-Aware Vendor-Constrained Task Scheduling for Heterogeneous Multiprocessor System-on-Chips
Submitted by aekwall on Mon, 06/28/2021 - 12:39pm
security
Task Analysis
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
MPSoC
sensors
Minimization
hardware trojan
task scheduling
intellectual property
IP vendor
multiprocessing systems
intellectual property security
biblio
System Level Hardware Trojan Detection Using Side-Channel Power Analysis and Machine Learning
Submitted by grigby1 on Wed, 05/26/2021 - 11:39am
AES-256
chipwhisperer
CPS Privacy
cyber physical systems
Hardware Security
hardware trojan
Human behavior
Human Factors
machine learning
privacy
pubcrawl
side-channel power analysis
system-level
biblio
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC
Submitted by grigby1 on Tue, 11/17/2020 - 2:39pm
frequency regulator
Clocks
system-on-chip
Frequency modulation
ARM TrustZone
AXI bus
DVFS
Dynamic Voltage and Frequency Scaling
embedded system security
power aware computing
nonsecure ARM core
Regulators
secure ARM core
security failure
TrustZone-enabled heterogeneous SoC
TrustZone-enabled System-on-Chip
voltage regulator
Operating systems security
Instruction sets
IP networks
Trusted Computing
pubcrawl
Metrics
Resiliency
embedded systems
composability
computer architecture
security
hardware trojan
Receivers
resilience
energy consumption
operating systems (computers)
operating systems
operating system
electronic engineering computing
biblio
A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion
Submitted by aekwall on Mon, 11/09/2020 - 1:33pm
intellectual property/IC
IP piracy
SAT attack
hardware obfuscation
Anti-Trojan insertion algorithm
Controllability
copy protection
design-for-trust
hardware Trojan insertion
HT insertion
hardware trojan
logic encryption methods
logic encryption techniques
logic locking
PUF based logic encryption technique
PUF-based encryption
Rare Signal
reverse engineering attack
unique encryption
Hardware Security
encryption
Hardware
invasive software
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
integrated circuits
Cryptography
Topology
Logic gates
industrial property
reverse engineering
integrated circuit design
logic circuits
Physical Unclonable Function
encryption key
« first
‹ previous
1
2
3
4
5
next ›
last »