Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Secure IoT for a Pervasive Platform
Submitted by grigby1 on Tue, 11/26/2019 - 3:42pm
pubcrawl
ubiquitous computing
software elements
Software
smart communication-enable devices
Servers
security
secure IoT
secure element
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
computer architecture
pervasive systems
pervasive platform
Pervasive Computing Security
pervasive computing
pervasive applications
Metrics
Internet of Things
Human Factors
human factor
Human behavior
Hardware
end-to-end security level
computer network security
biblio
Hardware Implementation of A Chaotic Pseudo Random Number Generator Based on 3D Chaotic System without Equilibrium
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
lightweight systems
chaotic pseudorandom number generator
cryptography systems
deterministic chaotic systems
digital communication
digital communication systems
dynamical behavior
Dynamical Systems
Hardware Implementation
chaotic dynamics
low computational overhead
low-cost chaotic hardware
low-cost hardware platforms
simple nonlinear systems
three-dimensional chaotic flows
Three-dimensional displays
chaotic cryptography
field programmable gate arrays
chaotic behaviors
chaotic based digital systems
3D chaotic system
3D chaotic flows
chaotic communication
Predictive Metrics
random number generation
Generators
Mathematical model
composability
pubcrawl
Resiliency
embedded systems
Hardware
Cryptography
biblio
Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
NoC
Trojan horses
system-on-chip
System recovery
security attacks
security
secure routing algorithm
secret key leaking
runtime detection
Runtime
Routing
Router Systems Security
Resiliency
resilience
pubcrawl
outsourcing
network on chip security
network-on-chip architecture
network-on-chip
network routing
Multiprocessors System-on-Chip
multiprocessing systems
MPSoC
Metrics
Malicious-tolerant Routing Algorithm
malicious Hardware Trojans
logic design
invasive software
integrated circuits
hardware trojan
Hardware
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by grigby1 on Mon, 11/04/2019 - 12:35pm
ROP-style code reuse attacks
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
Model driven development
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
Biomedical monitoring
Instruction sets
Human Factors
Human behavior
high level synthesis
hardware-based protection
Hardware Security
hardware runtime monitors
hardware monitor
Hardware
formal verification
embedded systems
embedded processor
embedded hardware
composability
building memory protection mechanisms
biblio
A Study of the Advances in IoT Security
Submitted by grigby1 on Wed, 10/30/2019 - 10:31am
collaboration
comparability
Efficiantcy
Hardware
Human behavior
IoT
Metrics
pubcrawl
Resiliency
Scalability
Science of Security
security
biblio
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
DREAD risk assessment model
Security Policies Analysis
threat modelling
STRIDE threat modelling
STRIDE
Security Modelling
Secure by design
policy-based security modelling
policy-based security enforcement
policy update
OEMs
Guidelines
embedded security
embedded architectures
security of data
device life-cycle
connected vehicles
configurable policy engine
Biological system modeling
application threat analysis
Policy
risk management
policy-based governance
pubcrawl
embedded systems
Software
Hardware
Access Control
biblio
Spectre Attacks: Exploiting Speculative Execution
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Program processors
Transient analysis
speculative-execution
Spectre
side-channel attacks
Scalability
return oriented programming
Resiliency
Registers
pubcrawl
rop attacks
microarchitecture-security
microarchitecture
microarchitectural-attack
Human Factors
Human behavior
Hardware
composability
arrays
biblio
Hardware-Based Adversary-Controlled States Tracking
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Pipelines
target tracking
software security challenges
Software
security of data
Scalability
rop attacks
return oriented programming
Resiliency
Registers
pubcrawl
programming
program diagnostics
classic dynamic taint analysis method
memory vulnerabilities
memory data
Linux applications
Linux
Human behavior
HAST
Hardware-based Adversary-controlled States
Hardware
dynimic taint analysis
control flow
composability
code-reuse attack
biblio
Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
multilayer protection approach
Web browsers
security of data
Scalability
Runtime
ROP
Return-oriented Programming attacks
return oriented programming
Resiliency
RAS
pubcrawl
Program processors
Nonhomogeneous media
multilayer system
multilayer ROP protection
rop attacks
microarchitecture
microarchitectural units
lightweight security techniques
LBR
layers
Human Factors
Human behavior
Hardware
computer architecture
composability
commodity hardware
CFI
Benchmark testing
architecture
biblio
Compiler-Assisted Code Randomization
Submitted by aekwall on Mon, 10/14/2019 - 10:20am
Scalability
Prototypes
pubcrawl
randomized variants
Resiliency
return oriented programming
return-oriented programming
Robustness
Runtime
program compilers
security
security of data
Software
software distribution models
software distribution norms
software diversification
software engineering
transformation-assisting metadata
composability
applied code transformation
CCR
code randomization
code uniformity
compiler level protection
compiler-assisted code randomization
compiler-rewriter cooperation
compiler security
address space layout randomization
Compositionality
fine-grained code randomization
fine-grained code transformation
Hardware
Human behavior
LLVM compiler toolchain
metadata
Metrics
« first
‹ previous
…
40
41
42
43
44
45
46
47
48
…
next ›
last »