Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Pins
biblio
Attacking Split Manufacturing from a Deep Learning Perspective
Submitted by aekwall on Mon, 11/09/2020 - 1:42pm
integrated circuit split manufacturing
integrated circuit manufacture
Foundries
back-end-of-line parts
BEOL connections
different foundries
FEOL facility
front-end-of-line
image-based features
IP piracy
ISCAS-85benchmarks
layout-level placement
Metals
network-flow attack
security promise
sophisticated deep neural network
vector-based features
neural nets
invasive software
computer architecture
learning (artificial intelligence)
Resiliency
pubcrawl
composability
policy-based governance
deep learning
security of data
manufacturing systems
Capacitance
industrial property
Image Processing
Wires
Layout
Pins
biblio
A Comprehensive Security System for Digital Microfluidic Biochips
Submitted by grigby1 on Mon, 11/02/2020 - 1:36pm
private key cryptography
intellectual property security
invasive software
IP piracy
Lab-on-a-Chip
malicious attackers
Microfluidics
Pins
policy-based governance
intellectual property piracy
pubcrawl
resilience
Resiliency
secret keys
security
trojan
Trojan attacks
Trojan horses
comprehensive security system
authentication mechanism
bioassay completion time
biochips market
biology computing
bioMEMS
Cameras
CCD cameras
composability
authentication
Computer crime
defense mechanisms
Digital Microfluidic Biochips
Digital Microfluidics
DMFBs
Electrodes
Foundries
industrial property
biblio
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Pulse width modulation
malware
Metrics
OpenPLC software
particular state
Pins
PLCs
predefined states
programmable controllers
Protocols
Prototypes
pubcrawl
malicious disruption
pulse width modulation pins
PWM
Raspberry Pi
Registers
resilience
Resiliency
Scalability
security
signature shares
uncorrupted PLC
group-signature
\$-threshold signature scheme
Anomaly Detection
BIOS Security
compromised state
control engineering computing
corrupted PLC
cyber security awareness week-2017 competition
digital signatures
electro-mechanical processes
finite state machine
finite state machines
(k
Human Factors
I-O Systems
i-o systems security
I/O pin configuration attack
input-output mechanism
IO pin configuration attack
l)-threshold signature scheme
Legacy PLC system
legacy PLCs
malicious code
biblio
Smart Lightning and Security System
Submitted by grigby1 on Thu, 07/30/2020 - 2:14pm
Lightning
Wires
security system
security
Resiliency
resilience
pubcrawl
PIR motion sensor
Pins
motion measurement
Motion detection
microcontrollers
microcontroller
Metrics
Acoustics
IR sensors
IR radiations
IR motion sensor
IoT security
Intelligent sensors
infrared radiation emission
infrared detectors
Human Factors
Human behavior
electrical energy
electric power consumption
composability
automatic smart lightning
biblio
WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
financial data processing
wearables security
WristSpy
Wearable sensors
single wrist-worn wearable device
personal mobile devices
passcode input scenarios
passcode inference system
parallel PIN inference
parallel pattern inference
multidimensional feature extraction
mobile payment
machine-learning based classification
fine-grained hand movement trajectories
Euclidean distance
wearable computers
Scalability
Pins
Trajectory
Online banking
electronic money
parallel processing
privacy
Mobile handsets
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
mobile computing
authorisation
biblio
Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
integrated circuits
WebUSB
public personal identification service
multifactor web authentication system
Multi-factor authentication
Individual Number Card
cryptographic authenticator
multifactor authentication
Pins
Digital identity
Human Factors
Servers
Public key
password
authentication
Cybersecurity
Internet users
internet
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Secure Smart Card Signing with Time-based Digital Signature
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
DER Decoder
trusted digital signing process
trusted digital signature
time-based digital signature
time stamping protocol packet
Terminal Attack
smart card terminal
sign documents
Secure Time Stamp
secure smart card signing
Pins
PIN sniffing
message alteration attack
Java Card
electronic signature
security of data
cybersecurity challenges
current smart card digital signature
smart cards
microsoft windows
digital signatures
message authentication
smart phones
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Conferences
Scalability
biblio
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
multiple pattern scheme
user authentication
Usable Security
usability
statistical analysis
Sensitivity
sensitive applications
Scalability
Resiliency
resilience
pubcrawl
progressive authentication
Pins
pattern locks
pattern lock
password
access levels
multiple level pattern
mobile computing
message authentication
median unlock times
low-security applications
Human Factors
human factor
Human behavior
higher-complexity pattern
graphical passwords
geriatrics
generic applications
consecutive user survey
authentication
Android pattern lock
biblio
Architecture Analysis and Verification of I3C Protocol
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
SoC
MIPI
Monitoring
Pins
policy-based governance
privacy
protocol verification
Protocols
pubcrawl
IP networks
system Verilog
test environments
Universal Verification Methodology
UVM
verification components
verification environment
VLSI
formal verification
back end design
base class library
Clocks
collaboration
composability
Compositionality
Conferences
digital integrated circuits
Aerospace electronics
front end design
hardware description languages
I3C
I3C bus protocol
improved inter integrated circuit
integrated circuit design
integrated circuit testing
biblio
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study
Submitted by grigby1 on Thu, 08/23/2018 - 11:36am
security risks
automotive
automotive electronics
automotive applications
Bluetooth
Bluetooth connectivity
bluetooth security
Bluetooth-enabled systems
composability
Cybersecurity
Resiliency
Safety
Roads
security
wireless interfaces
telecommunication security
Human behavior
human factor
infotainment
Inspection
malicious attacks
on-board communications
Pins
pubcrawl
resilience
threat intelligence
war-nibbling
« first
‹ previous
1
2
3
next ›
last »