Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Silicon systems security and building a root of trust
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
Monitoring
system-on-chip
system security
supply chain assurance
SoC
silicon system security
Silicon
Si
pubcrawl170112
Program processors
computer security concept
manufacturing
hardware-based roots of trust
Hardware Root of Trust
Hardware
elemental semiconductors
data privacy
Cryptography
cryptographic key
biblio
Hardware-assisted code obfuscation for FPGA soft microprocessors
Submitted by grigby1 on Mon, 02/27/2017 - 12:53pm
many embedded FPGA system
Table lookup
Switches
software security
software confidentiality
Software
Soft microprocessor
security of data
pubcrawl170107
minimal hardware overhead
microprocessor chips
Code Obfuscation
hardware-software codesign
hardware assisted code obfuscation
Hardware
FPGA soft microprocessors
field programmable gate arrays
encryption
encoding
data dependent control flow modification
Complexity theory
biblio
Securing MDSplus for the NSTX-U Digital Coil Protection System
Submitted by grigby1 on Thu, 02/23/2017 - 2:27pm
NSTX-U digital coil protection system
Tokamak devices
superconducting coils
Software algorithms
Software
Servers
Relays
real-time systems
real-time
pubcrawl170106
protection
plasma toroidal confinement
CAMAC
NSTX
MDSplus
machine protection
Hardware
electrical limit
DCPS
data acquisition
data
control data acquisition hardware
control
biblio
"SPeCK: a kernel for scalable predictability"
Submitted by grigby1 on Tue, 02/21/2017 - 12:26pm
nonpreemptive kernel
Synchronization
SPeCK kernel
scalable predictability
Scalability
resource management
pubcrawl170103
preemptive system
operating system kernels
average-case overheads
multiprocessing systems
multicore systems
manycore systems
Kernel
Interference
Instruction sets
Hardware
COMPOSITE OS
biblio
"A novel simulation approach for fault injection resistance evaluation on smart cards"
Submitted by grigby1 on Tue, 02/14/2017 - 1:15pm
fault simulation
Software
smart cards
smart card source code
Smart card
Side-channel attack
side-channel analyses
security
Registers
pubcrawl170102
Physical attack
Object oriented modeling
multiple fault attacks
instruction skip
Hardware
generic fault injection simulation tool
advanced encryption standard
fault injection simulations
fault injection resistance evaluation
Fault injection
embedded systems
embedded fault simulator
EFS
data modification
Data models
Cryptography
control flow fault models
complex smart card systems
combined attack
backward analyses
AES
biblio
"Application specific processor design for DCT based applications"
Submitted by grigby1 on Tue, 02/14/2017 - 1:10pm
FPGA
Watermarking
Transform coding
pubcrawl170102
parallel architectures
parallel architecture
one dimensional DCT
MicroBlaze softcore processer
JPEG compression
image watermarking
image encryption
IDCT hardware
Hardware
Application Specific Processor
field programmable gate arrays
field programmable gate array
Europe
discrete cosine transforms
discrete cosine transform
DCT based image watermarking
DCT based applications
Channel estimation
ASP
Application specific processors
application specific processor design
biblio
"Fault Detection and Correction in Processing AES Encryption Algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 1:52pm
production faults
fault diagnosis
fault injection attack
fault-tolerance technique design
field programmable gate arrays
FPGA technology
Hardware
linear mappings
MC transformation
MixColumn transformation
noise effects
fault detection technique
pubcrawl170102
radiation effect
ShiftRow transformation
side-channel attacks
Single event upsets
SR transformation
system reliability improvement
system security improvement
temporary redundant check words
encryption
AES cipher
AES encryption algorithm
AES Encryption process
AES linear mappings and error correcting codes
AES round structure
Ciphers
Cryptography
cryptosystem
ECC properties
advanced encryption standard
error control mechanisms
error correction
error detection
error syndrome
Execution errors and countermeasure against fault injection side channel attacks
fault correction technique
fault coverage
fault detection
Fault detection and correction
biblio
"Improved serial 2D-DWT processor for advanced encryption standard"
Submitted by grigby1 on Mon, 02/13/2017 - 1:08pm
Hardware
size 65 nm
serialized DT processor
serial 2D-DWT processor
secured image processing
RTL-GDSII
Quantization (signal)
pubcrawl170102
low power ASIC
lifting scheme algorithm
image data security
Image coding
high speed encryption
advanced encryption standard
frequency 333 MHz
encryption
DWT
discrete wavelet transforms
discrete wavelet transform
data compression
Cryptography
compression ratio
CMOS technology
ASIC circuit design
application specific integrated circuits
AES
biblio
Practical DCB for improved data center networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
NIC
Vegetation
transport protocols
Topology
Throughput
telecommunication traffic
telecommunication network topology
TCP-bolt
System recovery
switching networks
storage area networking
Routing protocols
Routing
Ports (Computers)
arbitrary network topology traffic
lossless Ethernet
Local area networks
line blocking head
improved data center network
Hardware
ECMP routing
deadlock-free routing scheme
DCB
data center bridging
computer centres
commodity data center switch
buffering delay
biblio
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation
Submitted by BrandonB on Wed, 05/06/2015 - 2:06pm
invasive software
computer architecture
cyber-attacks
embedded microprocessors
embedded systems
fabrication
fabrication attacks
Hardware
Hardware Trojans
high-performance microprocessors
zero-overhead malicious modifications
Logic gates
malicious modification
Microprocessors
modern microprocessor privilege escalation
multiprocessing systems
privilege escalation
Trojan horses
zero overhead
« first
‹ previous
…
57
58
59
60
61
62
63
64
65
next ›
last »