Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
firmware
biblio
FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices
Submitted by grigby1 on Thu, 06/09/2022 - 1:51pm
computer architecture
machine learning
Monitoring
pubcrawl
resilience
Conferences
Scalability
Wireless communication
service-oriented architecture
Open Source Software
Human Factors
honey pots
Resiliency
firmware
IoT honeypot
biblio
Vetting Commodity IT Software and Firmware (VET)
Submitted by willirn1 on Tue, 10/26/2021 - 5:30pm
IT
information technology
Software
firmware
supply chains
C3E
cyber
formal
trust
automation
biblio
Industrial Internet of Things (IIoT) Interconnections
Submitted by willirn1 on Tue, 10/26/2021 - 2:40pm
IoT
Industrial Internet of Things (IIoT)
Hardware
Software
firmware
Supply Chain
C3E
Compromise
biblio
A FPGA-based Control-Flow Integrity Solution for Securing Bare-Metal Embedded Systems
Submitted by aekwall on Mon, 05/03/2021 - 12:05pm
JOP
interrupt
forward edges
bare-metal
backward edges
code-reuse attacks
rop attacks
ROP
return-oriented programming
security
Human Factors
microcontrollers
firmware
composability
pubcrawl
Resiliency
embedded systems
Scalability
biblio
Classifier with Deep Deviation Detection in PoE-IoT Devices
Submitted by aekwall on Mon, 01/11/2021 - 12:37pm
Decision trees
vulnerable IoT devices
PoE-IoT devices
PoE-IoT classification
poe
network traffic characteristics
ML
edge intelligence
deep deviation detection
behavior analysis
dpi
deep packet inspection
IoT
Switches
Cameras
computer network security
firmware
Image edge detection
Decision Tree
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
feature extraction
security
Internet of Things
telecommunication traffic
Scalability
Monitoring
biblio
Dominance as a New Trusted Computing Primitive for the Internet of Things
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
resilience
Latches
mainstream IoT devices
neural style transfer
Nucleo-L476RG
operating systems
Predictive Metrics
pubcrawl
Raspberry Pi Compute Module 3
large-scale IoT deployments
Resiliency
Scalability
security of data
sensors
separate service processors
Servers
Trusted Computing
trusted platform modules
geographical area
central entity
CIDER performance overhead
CIDER system
composability
cyber-physical system security
dominant computing paradigms
firmware
firmware image
Authenticated-Watchdog-Timer
Hardware
HummingBoard Edge
Internet of Things
Internet-of-Things
IoT
IoT hardware
IoT platforms
large-scale industrial deployments
biblio
Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries
Submitted by aekwall on Mon, 10/26/2020 - 10:46am
firmware binaries
critical cyber-physical IoT devices hinges
Cyber Physical System
cyber-physical execution semantic information
cyber-physical execution semantics
cyber-physical IoT control application domains
cyber-physical security flaws
domain-specific reverse engineering framework
domain-specific semantic information
dynamic selective memory protection
embedded binary code
embedded controller software binaries
embedded IoT controller software binaries
executables
Execution Semantic
control algorithm parameters
firmware vulnerability assessment
high-level algorithmic expressions
Linux kernel controllers versions
low-level binary symbolic values
memory forensics analysis
MISMO
reverse engineering outcomes
robotics
semantic-matching
state estimation algorithms
Symbolic Comparison
Symbolic Expression
targeted memory data attacks
Linux Operating System Security
Security analysis
security of data
Internet of Things
security
drones
Software
embedded systems
Linux
Resiliency
pubcrawl
composability
Metrics
Data mining
public domain software
firmware
IoT
reverse engineering
Heuristic algorithms
program verification
control engineering computing
Semantics
Software algorithms
Predictive Metrics
Binary codes
operating system kernels
algorithmic level
algorithm-level semantics
binary patching
control algorithm
biblio
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things
Submitted by aekwall on Mon, 09/21/2020 - 2:35pm
IoT privacy
composability
catastrophic accidents
corresponding graph-based analysis
cross-layer formal framework
cross-layer vulnerability detection framework
design flaws
device firmware
ForeSee
high-level decision-making processes
network protocols
long sequence
low-level physical surroundings
Multiple layer
multiple layers
physical environment
potential attack paths
severe threats
system configurations
Cross Layer Security
Intrusion Detection
Internet of Things
IoT devices
Internet of Things (IoT)
Resiliency
pubcrawl
graph theory
Protocols
Vulnerability Analysis
Decision Making
security of data
firmware
IoT security
vulnerability detection
cyber security
security issues
IoT systems
attack graph
Internet-of-Things devices
model checking
biblio
An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
IoT devices
BLE
security vulnerabilities
BLE 4.0
BLE 4.1
BLE 4.2
BLE protocol
elliptic-curve diffie-Hellman
firmware attacks
BLE devices
LTK
MITM attacks
Mobile Applications
pairing
vulnerabilities
Wireless communication
Cyber Physical System
bluetooth security
resilience
Cryptography
Cryptographic Protocols
mobile computing
telecommunication security
public key cryptography
pubcrawl
composability
Resiliency
Internet of Things
Human behavior
cyber physical systems
firmware
Microprogramming
performance evaluation
Bluetooth
Image color analysis
biblio
Mitigating JTAG as an Attack Surface
Submitted by grigby1 on Fri, 08/28/2020 - 10:51am
private instructions
JTAG test access ports
JTAG-based debug
key registers
key systems
materiel availability issues
Metrics
microprocessor chips
on-chip embedded instrumentation
JTAG interface
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
security
standard test access port
system memory
Cryptography
authorisation
BIT
boundary scan
boundary scan architecture
boundary scan testing
Built-In Test
chip lock
computer debugging
attack surface
debug architectures
depot system repair
embedded systems
firmware
IEEE 1149.1
IEEE standards
joint test action group standards
JTAG
1
2
3
4
next ›
last »