Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fabrication
biblio
Introducing TFUE: The Trusted Foundry and Untrusted Employee Model in IC Supply Chain Security
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
pubcrawl
VLSI
trusted foundry and untrusted employee model
Trojan horses
supply chain security
security
Scalability
Resiliency
resilience
double patterning lithography
mask development lines
lithography
Layout
Integrated circuit modeling
IC supply chain security
Human behavior
Foundries
fabrication
biblio
A hybrid model for anomaly-based intrusion detection in SCADA networks
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
learning (artificial intelligence)
Zero-day attacks
vulnerability detection
vulnerabilities
supervisory control and data acquisition systems
security of data
SCADA systems
SCADA networks
robust hybrid model
Resiliency
pubcrawl
Protocols
Metrics
machine learning approach
machine learning
anomaly-based Intrusion Detection Systems
Intrusion Detection
industrial control system dataset
industrial control system
industrial control
Human behavior
feature selection model
Feature Selection
feature extraction
fabrication
Distributed Analytics and Security Institute Mississippi State University Starkville
Cybersecurity
Computational modeling
Compositionality
biblio
Efficient and secure split manufacturing via obfuscated built-in self-authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
Layout
untrusted foundries
trustworthiness
supply chains
split manufacturing
semiconductor supply chain
reverse engineering
pubcrawl170112
OBISA circuit
obfuscated built-in self-authentication
Logic gates
chip layout
IP piracy
invasive software
integrated circuits
integrated circuit reliability
integrated circuit manufacture
hardware Trojan insertion
Foundries
fabrication
delays
biblio
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation
Submitted by BrandonB on Wed, 05/06/2015 - 2:06pm
invasive software
computer architecture
cyber-attacks
embedded microprocessors
embedded systems
fabrication
fabrication attacks
Hardware
Hardware Trojans
high-performance microprocessors
zero-overhead malicious modifications
Logic gates
malicious modification
Microprocessors
modern microprocessor privilege escalation
multiprocessing systems
privilege escalation
Trojan horses
zero overhead
biblio
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Submitted by BrandonB on Wed, 05/06/2015 - 11:40am
information processing
Trojan tolerance
Trojan taxonomy
Trojan horses
Trojan detection
threat analysis
side-channel analysis
self-referencing
reactive protection approach
proactive protection approach
invasive software
integrated circuits
Integrated circuit modeling
Circuit faults
hardware Trojan attacks
hardware Trojan attack
hardware obfuscation
Hardware intellectual property (IP) trust
Hardware
global economic trend
fabrication
electronics industry
electronic hardware malicious modifications
computer system security
computer security
biblio
Slack removal for enhanced reliability and trust
Submitted by BrandonB on Wed, 05/06/2015 - 11:34am
Small Delay Defects
mission-critical application
pattern count
reliability enhancement
security of data
security vulnerabilities
security-critical application
slack removal
Slacks
malicious circuitries
test quality
testing
timing slacks
transition fault patterns
Trojan horses
trust enhancement
Wires
fabrication
care bit density intact
Circuit faults
delay defect detection
delay defects
delay unit insertion
delays
design for testability
design technique
At-speed Testing
Hardware
hardware trojan
Hardware Trojans
integrated circuit reliability
logic circuits
Logic gates
logic testing
« first
‹ previous
1
2