Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
side channel attacks
biblio
Software Implementation of AES-128: Side Channel Attacks Based on Power Traces Decomposition
Submitted by grigby1 on Thu, 06/22/2023 - 12:43pm
deep learning
Training
pubcrawl
Human behavior
Metrics
Software
AES
performance evaluation
Data models
composability
side-channel attacks
microcontrollers
power analysis
decomposition
Power trace decomposition
side channel attacks
biblio
A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks
Submitted by grigby1 on Tue, 05/24/2022 - 12:50pm
Switches
voltage regulator
trng
side channel attacks
power analysis
Regulators
Voltage control
Metals
Resistance
Compositionality
Metrics
Internet of Things
side-channel attacks
composability
Information Assurance
AES
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks
Submitted by aekwall on Mon, 10/04/2021 - 12:53pm
security
Software
pubcrawl
Scalability
Resiliency
Human behavior
Probes
side-channel attacks
Data mining
Multicore processing
computer architecture
ping-pong regulator
Regulators
side channel attacks
pattern locks
biblio
JSKernel: Fortifying JavaScript against Web Concurrency Attacks via a Kernel-Like Structure
Submitted by grigby1 on Tue, 06/01/2021 - 1:44pm
security
pubcrawl
Metrics
resilience
Resiliency
composability
Kernel
JavaScript
Browsers
Reactive power
Instruction sets
Concurrent computing
Clocks
Concurrency
side channel attacks
Web Concurrency Attacks
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 9:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
SVMDF: A Secure Virtual Machine Deployment Framework to Mitigate Co-Resident Threat in Cloud
Submitted by grigby1 on Mon, 03/09/2020 - 12:26pm
Cloud Security
load balance
CRRVA
covert channel attacks
co-resident-resistant VM allocation
co-resident threat mitigation
co-resident threat defense solution
co-resident attacks
CloudSim
migration cost
Cloud Computing
attack-aware VM reallocation
analytic hierarchy process-based threat score mechanism
analytic hierarchy process
allocation co-resident threat
AHPTSM
AAVR
security threat
VM pairs
VM migration
VM allocation policy
virtual machines
virtual machine security
threat score distribution
SVMDF
side channel attacks
VM threat score mechanism
security of data
secure virtual machine deployment framework
runtime co-resident security
resource interference attacks
resource allocation
pubcrawl
power consumption
biblio
A New Three Party Authenticated Key Agreement Protocol Which Is Defiant towards Password Guessing Attack
Submitted by grigby1 on Mon, 03/02/2020 - 12:32pm
Servers
Password authentication
Password Guessing Attacks
password related attacks
private key cryptography
protocol vulnerable
Protocols
pubcrawl
Scalability
password
side channel attacks
Smart card
smart cards
Tamper resistance
tampered resistance property
telecommunication security
transaction secret values
accurate guess
off-line password guessing attack
new three party authenticated key agreement protocol
Metrics
message authentication
lost smart card
key agreement protocol
insecure channel
Human Factors
Human behavior
encryption
Cryptographic Protocols
cryptographic key agreement protocol
common session secret key
Bio-Hash
authentication
biblio
Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET
Submitted by aekwall on Mon, 02/24/2020 - 9:57am
key escrow problem
certificateless aggregate signature scheme
certificateless public key cryptography
digital signature schemes
hierarchical organization
hierarchical trusted authority based VANET
hierarchical trusted authority privacy
high vehicle density scenarios
identity based cryptography
certificateless aggregate message authentication
message forgeability attack
multiple trusted authorities
neighboring vehicles
OBU device
side channel attacks
traditional PKC concept
Repudiation
digital signatures
telecommunication security
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
Metrics
message authentication
data privacy
public key cryptography
VANET
RSU
Aggregate Signature
aggregate verification
beacon messages
certificate management overhead
biblio
A Cross-Virtual Machine Network Channel Attack via Mirroring and TAP Impersonation
Submitted by grigby1 on Mon, 01/21/2019 - 11:17am
side channel attacks
network channel attacks
network traffic
openstack
physical machine
privacy
pubcrawl
Resiliency
security
security requirements
Network Channel Attack
Switches
TAP impersonation
Virtual machine monitors
virtual machines
virtualisation
virtualization privacy
virtualization services
VM-to-VM interference
internal cloud virtual network
Cloud Computing
cloud platform
co-located VMs
co-resident VMs
composability
computer network security
cross-Virtual machine network channel attack
data privacy
Human behavior
Bridges
internal virtual network
IP networks
logical resource isolation
malicious VM
Metrics
mirroring
Monitoring
multitenant virtualized cloud environments
biblio
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Submitted by grigby1 on Wed, 04/11/2018 - 1:50pm
Intel SGX
Metrics
privacy
pubcrawl
side channel attacks
threat vectors
1
2
next ›
last »