Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
CrypTFlow: Secure TensorFlow Inference
Submitted by aekwall on Mon, 03/15/2021 - 12:11pm
compiler security
TensorFlow inference code
semihonest security
semihonest MPC protocol
Secure TensorFlow inference
secure multiparty computation protocols
Porthos
plaintext TensorFlow
malicious security
malicious secure MPC protocols
inference accuracy
improved semihonest 3-party protocol
ImageNet dataset
end-to-end compiler
CrypTFlow
Aramis
Scalability
program compilers
Compositionality
inference mechanisms
Benchmark testing
public key cryptography
Logistics
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Protocols
Cryptographic Protocols
Hardware
data privacy
biblio
Hardware Design of Polynomial Multiplication for Byte-Level Ring-LWE Based Cryptosystem
Submitted by aekwall on Mon, 03/15/2021 - 12:10pm
NIST PQC Standardization Process
BRAMs
byte-level modulus
byte-level ring-LWE based cryptosystem
computational time-consuming block
DSPs
high-level synthesis based hardware design methodology
ideal lattice
LAC
multiplication core
high level synthesis
polynomial multiplication
ring learning with error problem
ring LWE
time 4.3985 ns
time 5.052 ns
time 5.133 ns
Vivado HLS compiler
Xilinx Artix-7 family FPGA
NIST
Scalability
lattice-based cryptography
Cryptography
Hardware
Table lookup
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
field programmable gate arrays
post quantum cryptography
timing
polynomials
Software algorithms
Compositionality
program compilers
compiler security
logic design
biblio
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions
Submitted by aekwall on Mon, 03/15/2021 - 12:10pm
Side Channel
BranchSpec attacks
called BranchSpec
Coffee Lake-based processors
existing speculative attacks
harness branch predictors
information leakage attacks
information leakage threat
microarchitectural attack
microarchitectural side channels
processor hardware vulnerabilities
processor microarchitectural components
processor microarchitecture
branch predictor
simpler code patterns
speculative branch executions
speculative branch instruction executions
speculative execution
speculative executions
speculative path
speculative state update
speculatively executed branches
Transient Execution Attack
transient execution attacks
transient executions
victim
microprocessor chips
Scalability
Conferences
telecommunication security
Hardware
attack surface
History
information security
Resiliency
pubcrawl
Metrics
security vulnerability
Transient analysis
security of data
Compositionality
Instruction sets
program compilers
microarchitecture
Spectre
compiler security
Surface treatment
sensitive information
computer architecture
parallel architectures
branch pattern history structure
branch prediction mechanisms
biblio
Security across abstraction layers: old and new examples
Submitted by aekwall on Mon, 03/15/2021 - 12:08pm
Context modeling
successive layers
source programming language
source code level
single level
ISA
Instruction Set Architecture
ICT system
ICT application
higher level abstractions
cross-layer security issues
cross-layer nature
cross-layer issues
abstraction layers
operating systems
security
compiler security
secure compilation
Computer languages
program compilers
Instruction sets
Compositionality
security issues
Java
Metrics
pubcrawl
Resiliency
Hardware
Scalability
security of data
biblio
Implementation and Analysis of USB based Password Stealer using PowerShell in Google Chrome and Mozilla Firefox
Submitted by grigby1 on Tue, 03/09/2021 - 2:39pm
Software
password management feature
passwordfox
PasswordFox program
policy-based governance
powershell
powershell script
pubcrawl
rubber ducky
password
stored data
time 14.0 s
tools
Universal Serial Bus
USB password stealer
user interfaces
usernames
Windows operating system
Google Chrome
Arduino Pro Micro Leonardo device
authorisation
badusb
browser applications
Browsers
brute force attacks
chromepass
Computer crime
arduino pro micro leonardo
Hardware
Human behavior
Human Factors
internet
Mozilla Firefox login data
operating systems
operating systems (computers)
biblio
Hardware Implementation of Cancellable Biometric Systems
Submitted by aekwall on Tue, 03/09/2021 - 11:56am
FPGA model
Watermarking
Three-dimensional displays
security systems
security applications
Scalability
Resiliency
pubcrawl
one-way cancellable biometric template system
Metrics
Information encryption
Hardware Implementation
Hardware
biometric encryption
FPGA
fingerprint encryption
field programmable gate arrays
face encryption
encryption
Cryptography
Cancellable biometrics
biometrics (access control)
Biological system modeling
3D chaotic mapping
3D chaotic map
biblio
Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 2:55pm
Metrics
Zero-day attacks
Zero day attacks
side-channel attacks
Resiliency
resilience
pubcrawl
Monitoring
microarchitecture
composability
machine learning
Identification
Hardware
feature extraction
Detectors
detection
defense
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
Analysis of USB Based Spying Method Using Arduino and Metasploit Framework in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
Software
peripheral interfaces
plug and play functionality
powershell
pubcrawl
resilience
Resiliency
reverse shell
reverse shell backdoor
operating systems (computers)
spying attacks
Universal Serial Bus
USB attack
USB device
Webcam
Webcams
Windows Operating System Security
Keyboards
security
Arduino
backdoor reverse shell
composability
computer network security
exploitation
Hardware
invasive software
Windows operating system
malware
Metasploit Framework
Metrics
microcontrollers
microphone device
operating system
operating systems
biblio
Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
Universal Serial Bus
powershell script
pubcrawl
resilience
Resiliency
security
security of data
Software
Turning
powershell
universal serial bus devices
USB
USB devices
user interfaces
Windows
Windows 10 operating system attacks
Windows operating system
Windows Operating System Security
keylogger
Arduino Pro Microdevice
composability
Firewalls (computing)
Hardware
internet
keyboard injection attack analysis
keyboard injection attack implementation
Keyboards
Arduino
keylogger program
keystroke analysis
Metrics
microcomputers
Microsoft Windows (operating systems)
operating systems
peripheral interfaces
« first
‹ previous
…
24
25
26
27
28
29
30
31
32
…
next ›
last »