Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

vetting process

biblio

Visible to the public Securing the supply chain for commodity IT devices by automated scenario generation

Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
  • security of data
  • Hardware
  • Homeland Security
  • Microprogramming
  • nonUS suppliers
  • operating systems
  • program analysis
  • program diagnostics
  • pubcrawl170112
  • security
  • grave vulnerabilities
  • software components
  • static program analysis
  • Supply Chain
  • supply chain management
  • supply chain security
  • supply chains
  • Theseus
  • vetting process
  • component interaction mapping
  • attack graph generation
  • attack graph generation algorithms
  • automated scenario generation
  • Boolean functions
  • Boolean satisfiability solver
  • checklist generation workflow
  • commodity devices
  • commodity IT devices
  • adversary goals
  • computer architecture
  • cyber-attacks
  • DARPA VET program
  • DP industry
  • firmware
  • firmware-software architecture
  • FW-SW
  • graph theory

Terms of Use  |  ©2023. CPS-VO