Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
verification
biblio
Decomposition Instead of Self-composition for Proving the Absence of Timing Channels
Submitted by K_Hooper on Wed, 05/02/2018 - 10:45am
Computing Theory
resilience
Blazer
composability
decomposition
Metrics
pubcrawl
Subtrails
taint analysis
timing attacks
verification
biblio
Precise Detection of Side-Channel Vulnerabilities Using Quantitative Cartesian Hoare Logic
Submitted by K_Hooper on Wed, 05/02/2018 - 10:45am
composability
Metrics
pubcrawl
side channels
static analysis
taint analysis
verification
vulnerability detection
biblio
Quantitative Analysis of Measurement Overhead for Integrity Verification
Submitted by grigby1 on Tue, 01/23/2018 - 3:28pm
Policy Based Governance
batch extend
collaboration
core measurement
integrity
measurement overhead
Policy
policy-based governance
pubcrawl
verification
biblio
Concerto: A High Concurrency Key-Value Store with Integrity
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
composability
Concurrency
security
indexing
integrity
key-value stores
main memory
merkle trees
Metrics
Outsourced Database Integrity
pubcrawl
recovery
Resiliency
Secure Hardware
verification
biblio
An IDE for the Design, Verification and Implementation of Security Protocols
Submitted by grigby1 on Wed, 01/10/2018 - 12:19pm
intuitive language AnB
verification
tools
software engineering
security protocols
security of data
secure distributed applications
Resiliency
pubcrawl
Protocols
protocol verification
program verification
program compilers
model checker OFMC
Java
AnBx compiler
integrated development environment
implementation
Generators
formal verification
Formal Specification
formal modelling
formal method tools
encryption
Eclipse-based IDE
design
dependable distributed applications
composability
compiler security
code generator
biblio
Detecting and thwarting hardware trojan attacks in cyber-physical systems
Submitted by grigby1 on Mon, 11/13/2017 - 12:00pm
thwarting hardware trojan attacks
Resiliency
security
security measures
smart grid application
Software component
software security
software-only attack
supervisory module
third-party soft IP cores
Reliability
Trojan horses
trust
trust enhancements
trust metric
trust specifications
Trusted Computing
trusted platform modules
verification
Hardware
composability
counter-measure
cyber-physical system integrity
cyber-physical systems
design
Diagnostics
Embedded System
field programmable gate arrays
attack vector models
hardware component
hardware security platform
hardware-only attack
invasive software
IP networks
isolated security primitives
Measurement
pubcrawl
biblio
Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks
Submitted by grigby1 on Fri, 10/27/2017 - 12:10pm
verification
Metrics
pubcrawl
Resiliency
Human behavior
Scalability
active cyber defense
bounded model checking
configuration
OpenFlow
Software Defined Networks
threat mitigation
biblio
Mind the Gap: Monitoring the Control-Data Plane Consistency in Software Defined Networks
Submitted by grigby1 on Thu, 10/19/2017 - 12:15pm
consistency
forward error correction
Forward Error Correction and Security
pubcrawl
Resiliency
Scalability
security
Software Defined Network
verification
biblio
The Virtues of Conflict: Analysing Modern Concurrency
Submitted by K_Hooper on Fri, 10/13/2017 - 10:29am
composability
Compositionality
Computing Theory
Computing Theory and Composabilty
Concurrency
pubcrawl
Software
verification
weak consistency models
biblio
Chapar: Certified Causally Consistent Distributed Key-value Stores
Submitted by K_Hooper on Fri, 10/13/2017 - 10:28am
causal consistency
composability
Compositionality
Computing Theory
Computing Theory and Composabilty
pubcrawl
Theorem Proving
verification
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »