Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
side-channel attacks
biblio
Address Collision Attacks on ECSM Protected by ADPA
Submitted by grigby1 on Thu, 05/13/2021 - 11:20am
Human behavior
Support vector machines
side-channel attacks
Side-channel attack
Scalability
Resiliency
resilience
pubcrawl
Power demand
Address collision attack
encryption
Elliptic curves
Elliptic curve cryptography
collision attack
Attack vectors
Analytical models
Address-bit DPA
biblio
A Hole in the Ladder : Interleaved Variables in Iterative Conditional Branching
Submitted by aekwall on Mon, 03/22/2021 - 12:14pm
exponentiation
semiinterleaved ladders
RSA cryptographic protocol
iterative conditional branching
interleaved variables
fully-interleaved ladders
fully-interleaved ladder properties
fully-interleaved cases
Countermeasures (computer)
Iterative algorithms
Montgomery ladder
interleaved codes
fault detection
Scalability
public-key cryptography
modular exponentiation
side-channel attacks
Registers
Space exploration
public key cryptography
Mathematical model
pubcrawl
Resiliency
Cryptographic Protocols
security
Cryptography
biblio
Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:55pm
Metrics
Zero-day attacks
Zero day attacks
side-channel attacks
Resiliency
resilience
pubcrawl
Monitoring
microarchitecture
composability
machine learning
Identification
Hardware
feature extraction
Detectors
detection
defense
biblio
Implementation White Box Cryptography in Substitution-Permutation network
Submitted by grigby1 on Thu, 03/04/2021 - 1:33pm
resilience
white-box cryptography
White Box Security
white box
substitution-permutation network
side-channel attacks
Side-channel attack
security
Resiliency
white box cryptography
pubcrawl
privacy
Metrics
leak channels
Information Leakage
Cryptography
composability
biblio
RPC Based Framework for Partitioning IoT Security Software for Trusted Execution Environments
Submitted by aekwall on Mon, 11/09/2020 - 12:19pm
side-channel attacks
Information Reuse and Security
trusted execution environments
TEE integration time
software partitioning
RPC-based solutions
RPC-based framework
RPC based framework
RPC
remote procedure calls
partitioning security components
partitioning
IoT security software
interface definition language files
graphical user interface
graphical user interfaces
security of data
framework
TEE
Compositionality
information security
Java
software engineering
Python
Libraries
pubcrawl
Resiliency
Protocols
security
IoT devices
Internet of Things
Servers
biblio
Fidelius: Protecting User Secrets from Compromised Browsers
Submitted by grigby1 on Fri, 09/11/2020 - 10:58am
fully malicious environment
Browser Security
Keyboards
browser window
Browser-Security
client-side privacy measures
compromised browsers
credit card numbers
Fidelius
user interfaces
Hardware-enclave
Malware-protection
page load
Trusted-I/O
user interaction
user secret protection
web browsing sessions
security of data
operating systems (computers)
Compositionality
Browsers
side-channel attacks
malware
online front-ends
composability
sensitive data
data privacy
Hardware
resilience
Metrics
Human behavior
pubcrawl
Servers
biblio
Securing AES against Localized EM Attacks through Spatial Randomization of Dataflow
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Power Attacks
fully controlled access
generic attack
high resolution EM probes
high-performance implementation
localized electromagnetic attack
localized EM attacks
minimum traces to disclosure
permutation network
potent threat
fixed S-box
profiled attack
randomization results
Semiconductor device measurement
side-channel attacks
spatial randomization
state register byte
transient random value
black box encryption
AES
encryption
Information Leakage
pubcrawl
composability
Metrics
Resiliency
resilience
sensitive data
Registers
Cryptography
Probes
black-box model attack
countermeasures
dataflow
datapath components
dynamic random mapping
embedded cryptographic implementations
exploitable leakage
biblio
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
load dynamics
Dynamic scheduling
ADAPT2
Autonomic computing
autonomic resource management techniques
crippling applications
distributed edge computing systems
dynamic placement
edge security
side-channel attacks
moving-target defense
obfuscate resource management
resource management substrate
single compromised node
state estimation techniques
valuable system
Autonomic Security
composability
Internet of Things
Internet-of-Things
security
attack surface
Software
Adaptation models
Resiliency
pubcrawl
computer network security
resource management
Robustness
resource allocation
fault tolerant computing
quality of service
distributed systems
state estimation
biblio
Whitenoise encryption implementation with increased robustness to side-channel attacks
Submitted by aekwall on Mon, 07/20/2020 - 9:46am
design techniques
white box cryptography
whitenoise encryption algorithm implementation
White noise
static power consumption
shift registers
quadratic cost
power analysis attacks
linear cost
Hamming distance
dynamic power consumption
Cryptography
side-channel attacks
Power demand
pubcrawl
Heuristic algorithms
Robustness
Metrics
composability
Resiliency
encryption
biblio
Efficient Timing Channel Protection for Hybrid (Packet/Circuit-Switched) Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 11:29am
Switching circuits
network transmission
network-on-chip
packet switching
packet switching NoC
packet-circuit-switched
security in NoC
Separate interface Hybrid
side-channel attacks
network routing
system security policy
TDM
Throughput
timing
timing channel
timing channel protection
timing characteristics
timing side channel
combined hybrid routers
network on chip security
Scalability
Resiliency
resilience
Metrics
channel attacks
circuit switching
circuit switching NoC
pubcrawl
conventional hybrid router
covert timing channel
hybrid network-on-chip
hybrid NoC
Integrated circuit modeling
MP-SoC
multiprocessing systems
multiprocessor system-on-chip
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »