Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
side channel attack
biblio
RSGX: Defeating SGX Side Channel Attack with Return Oriented Programming
Submitted by grigby1 on Fri, 02/04/2022 - 2:49pm
programming
side-channel attacks
side channel attack
SGX
Semantics
Runtime
ROP
Return Oriented Programming (ROP)
return oriented programming
resilience
rop attacks
Loading
data privacy
Conferences
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
F-SGX: Next Generation SGX for Trusted Computing
Submitted by aekwall on Tue, 01/25/2022 - 3:51pm
Image Processing
Hardware
operating systems
Conferences
Trusted Computing
pubcrawl
Resiliency
Human behavior
composability
side-channel attacks
Computers
attestation
SGX
side channel attack
Trusting computing
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 10:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Submitted by grigby1 on Mon, 03/02/2020 - 1:33pm
Indexes
Tamper resistance
side-channel analysis
side channel attack
Security Evaluation
searchable encryption system
Scalability
pubcrawl
Power demand
power analysis
Metrics
Medical services
medical computing
searchable encryption
Immune system
illegal attacks
Human Factors
Human behavior
Hamming distance
encryption
embedded searchable encryption
Cryptography
Ciphers
Big Data
Artificial Intelligence
biblio
A New Information Extractor for Profiled DPA and Implementation of High Order Masking Circuit
Submitted by aekwall on Mon, 02/10/2020 - 11:44am
extracting information
Microelectronics Security
time reduction
space reduction
side channel attack
security circuit implementation
profiled stage
profiled DPA
new information extractor
machine learning method
information retrieval
high order masking scheme
high order masking circuit
high order masking
Cryptography
explained local variance
ELV
CHES 2015
Predictive Metrics
computer science
principal component analysis
microsoft windows
Data mining
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Hardware
biblio
Timing Analysis for Diffie Hellman Key Exchange In U-BOOT Using Raspberry Pi
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
telecommunication security
public key cryptography
Raspberry Pi
Raspberry-pi
Resiliency
Scalability
Secret key
security schemes
side channel attack
system-on-chip
pubcrawl
timing
Timing attack
timing attacks
timing patterns
tools
U-Boot bare metal
unsecure communication channel
word length 2048.0 bit
word length 64.0 bit
embedded systems
cryptographic
cryptographic era
Cryptographic Protocols
Cryptography
DHKE protocol
diffie hellman key exchange
Diffie Hellman Key Exchange protocol
Discrete Log Hard Problem
embedded device
brute force attacks
exponentiation
firmware
Force
GMP bignum library
Metals
modular exponentiation
networked embedded systems security
Protocols
biblio
A Dynamic-Key Secure Scan Structure Against Scan-Based Side Channel and Memory Cold Boot Attacks
Submitted by grigby1 on Fri, 04/05/2019 - 10:29am
memory attack
Side-channel attack
side channel attack
security level
security
secure scan architecture
scan design key generator
Scalability
Resiliency
resilience
Random access memory
pubcrawl
memory cold boot attack
memory attacks
Chained Attacks
integrated circuit testing
Hardware Security
Generators
flip-flops
dynamic-key secure scan structure
dynamic-key secure DFT structure
dynamic key generation
Discrete Fourier transforms
design for testability
design for test technology
Cryptography
Controllability
Clocks
biblio
Lightweight Cipher Aware Countermeasure Using Random Number Masks and Its Evaluation
Submitted by grigby1 on Thu, 02/14/2019 - 11:16am
Human Factors
Lightweight Cipher
Metrics
pubcrawl
Scalability
Scurity of IoT Device
side channel attack
Tamper resistance
biblio
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices
Submitted by grigby1 on Thu, 01/31/2019 - 12:17pm
Mobile Security
Switches
strong coercive multisnapshot adversaries
storage medium
smart phones
side-channel attacks
side channel attack
Scalability
Resiliency
resilience
pubcrawl
practical plausibly deniable encryption system
plausibly deniable encryption
PDE schemes
password
Multi snapshot Adversary
Android (operating system)
mobile device
MobiCeal
Metrics
LG Nexus 4 Android phone
Human Factors
Human behavior
fast switching
encryption
dummy write
decrypt data
Cryptography
block-based file systems
android encryption
Android 4.2.2
biblio
Secured Dual-Rail-Precharge Mux-based (DPMUX) symmetric-logic for low voltage applications
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
processed data
Metrics
Microelectronics Security
PAA
power analysis attacks
power consumption
Power dissipation
private key cryptography
probability
Probability distribution
low-power electronics
pubcrawl
resilience
Resiliency
secret cryptographic keys
secured dual-rail-precharge mux
side channel attack
Signal to noise ratio
Switches
DPMUX symmetric-logic
average power dissipation
clock cycle
combinatorial logic
composability
cryptographic algorithms
Cryptography
delays
deterministic power
Digital circuits
activity factor
dynamic switching energy
Hardware implementations
Information Leakage
linear relationship
logic circuits
logic design
Logic gates
low voltage applications
1
2
next ›
last »