Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
side-channel analysis
biblio
"Make Sure DSA Signing Exponentiations Really Are Constant-Time"
Submitted by grigby1 on Wed, 05/17/2017 - 12:52pm
Applied cryptography
cache-timing attacks
CVE-2016-2178
digital signatures
DSA
exponentiation
Human behavior
Kerberos
Metrics
OpenSSL
pubcrawl
Resiliency
side-channel analysis
timing attacks
biblio
Buffer Overflow Attack's Power Consumption Signatures
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
channel coding
composability
Cyber Dependencies
cyber physical security
ICS Anomaly Detection
Metrics
Physical layer
physical layer security
physical-layer security
power consumption anomaly detection
pubcrawl
Resiliency
rop attacks
Scalability
side-channel analysis
simple power analysis
biblio
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Submitted by BrandonB on Wed, 05/06/2015 - 10:40am
information processing
Trojan tolerance
Trojan taxonomy
Trojan horses
Trojan detection
threat analysis
side-channel analysis
self-referencing
reactive protection approach
proactive protection approach
invasive software
integrated circuits
Integrated circuit modeling
Circuit faults
hardware Trojan attacks
hardware Trojan attack
hardware obfuscation
Hardware intellectual property (IP) trust
Hardware
global economic trend
fabrication
electronics industry
electronic hardware malicious modifications
computer system security
computer security
biblio
EM-based detection of hardware trojans on FPGAs
Submitted by BrandonB on Wed, 05/06/2015 - 10:37am
Layout
Xilinx Virtex-II Pro target
Trojan placement
Trojan horses
Software
side-channel analysis
sequential denial-of-service
RapidSmith
Probes
malicious circuitry
logic design
AES design
invasive software
Hardware Trojan injection
hardware Trojan detection
Hardware
FPGA
field programmable gate arrays
EM-based detection
EM measurement
electromagnetic emanation
Clocks
« first
‹ previous
1
2
3