Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
SigAttack: New High-level SAT-based Attack on Logic Encryptions
Submitted by aekwall on Mon, 04/06/2020 - 10:06am
DIP-generation attack
pattern locks
SigAttack
SAT-resilient encryptions
piracy
logic encryption design
key-revealing signature
high-level SAT-based attack
hardware protection technique
Electronics packaging
distinguishing input pattern generation
Scalability
Error analysis
logic design
Logic gates
Complexity theory
attacks
pubcrawl
Human behavior
Resiliency
Hardware
Cryptography
biblio
Two Methods for Authentication Using Variable Transmission Power Patterns
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
pattern locks
Human behavior
Scalability
Resiliency
Access Control
authentication
Communication system security
Hardware
Mathematical model
power control
pubcrawl
Relays
source authentication
variable power
wireless authentication
Wireless communication
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
A Critical Evaluation of the Paradigm Shift in the Design of Logic Encryption Algorithms
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
provable security
structural corruption
SAT attack
paradigm shift
modern logic encryption algorithms
low-cost countermeasures
logic encryption techniques
logic encryption
intellectual property piracy
integrated circuit supply chain
Hardware Trojans
computability
Boolean satisfiability attack
resilience
Logic gates
Compositionality
Metrics
invasive software
Computer crime
integrated circuits
industrial property
Hardware Security
Hardware
Resiliency
pubcrawl
encryption
Cryptography
biblio
Prototype Container-Based Platform for Extreme Quantum Computing Algorithm Development
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
Docker container environment
quantum computing security
rapid prototype development
quantum simulators
quantum computing hardware platforms
quantum computing devices
quantum computing algorithm development
quantum computer
Qiskit source codes
prototype environment
prototype container-based platform
prototype container system
prototype container based system
IBM Q Experience Web site
IBM Q Experience
Docker Containers
Cloud Computing
computer security challenges
cloud computing system
cloud computing software environment
Prototypes
Predictive Metrics
quantum computing
Containers
source code (software)
Libraries
composability
pubcrawl
Resiliency
Software
Hardware
Scalability
biblio
Analysis of Black Hole Router Attack in Network-on-Chip
Submitted by grigby1 on Mon, 03/23/2020 - 4:15pm
Resiliency
Multiprocessors System-on-Chip
network-on-chip
network on chip security
NoC
outsourcing
outsourcing design
Packet loss
processing cores
pubcrawl
resilience
multiprocessing systems
Router Systems Security
Scalability
security
security attacks
sensitive information
System performance
telecommunication network routing
Trojan horses
very strong violent attack
Hardware
BHR attack
Black Hole Router attack
black holes
Blak Hole
communication platform
computer network security
data packets
denial of service attack
Denial-of-Service
DoS.
BHR
hardware trojan
HT
HT model
infected node
Integrated circuit modeling
invasive software
malicious Hardware Trojan
malicious nodes
Metrics
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 12:26pm
protected volumes
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
file servers
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
Cloud Computing
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Outsourced Database Integrity
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
biblio
Preservation System for Scientific Experiments in High Performance Computing: Challenges and Proposed Concept
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Scientific Computing Security
scientific experiment
research experiments preservation
research experiments
research data management
preservation system
preservation process
HPC system
HPC computations
HPC
future reproduction
created experiment
containerization
computing system
case preservation
operating systems
security of data
High performance computing
Compositionality
reproducible research
Predictive Metrics
resilience
parallel processing
Containers
knowledge based systems
Libraries
internet
pubcrawl
operating system
Hardware
Servers
biblio
Scalable Simulation-Based Verification of SystemC-Based Virtual Prototypes
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
SystemC VP
Computer simulation
design verification
Electronic System Level
semiconductor industry
simulation behavior
Simulation-based Verification
SystemC
SystemC language
scalable verification
SystemC-based virtual prototypes
systems analysis
TLM
TLM-2.0 rules
Transaction Level Modeling framework
Virtual Prototype
virtual prototyping
Scalability
Protocols
Resiliency
pubcrawl
Computational modeling
standards
Formal Specification
verification
timing
Hardware
Predictive Metrics
Prototypes
Compositionality
formal verification
Clang
hardware description languages
Object oriented modeling
biblio
Assessment of SCADA System Vulnerabilities
Submitted by aekwall on Mon, 03/16/2020 - 10:28am
operating systems (computers)
vulnerability assessment
SCADA vulnerabilities
SCADA system vulnerabilities
SCADA critical vulnerabilities
SCADA attacks
publicly available vulnerabilities
NVD
national vulnerability database
legacy operating systems
domain-specific vulnerability scoring system
actuators
Compositionality
security of data
SCADA Systems Security
cyber-attacks
Databases
pubcrawl
Human behavior
Resiliency
SCADA systems
SCADA
Software
security
Hardware
Monitoring
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »