Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hardware vulnerabilities
biblio
Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems
Submitted by grigby1 on Thu, 03/04/2021 - 1:45pm
resilience
Metrics
microcomputers
microprocessor systems
Microsoft Windows (operating systems)
network access
Production
Program processors
pubcrawl
remote attack
local computer calculation network
Resiliency
Server Message Block service
Silicon
Software Vulnerability
Transistors
WannaCry trojan encoder
Windows Operating System Security
Windows OS
encryption program
security
authorisation
composability
Computer crime
computer viruses
Computers
Cryptography
Data protection
Windows operating system
File systems
Hardware
hardware algorithm protection
hardware vulnerabilities
hardware vulnerability
information protection
information security
invasive software
biblio
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment
Submitted by grigby1 on Fri, 09/18/2020 - 1:15pm
pre-silicon security assessment
design stage
formal verification methods
hardware designer
hardware overhead
hardware system
hardware vulnerabilities
language based framework
language-based approach
language-based hardware security verification
malicious logic detection
potential security vulnerabilities
design mistakes
promising solution
QIF model
QIF-Verilog
quantified information flow model
quantitative information-flow
security rules
verification process
Verilog type systems
vulnerable logic detection
compiler security
integrated circuit testing
Hardware design languages
Cryptography
security solutions
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Hardware
Integrated circuit modeling
hardware description languages
Scalability
Registers
integrated circuit design
formal verification
Measurement
Compositionality
uncertainty
Vulnerability Analysis
electronic engineering computing
data flow
biblio
Defense Systems and IoT: Security Issues in an Era of Distributed Command and Control
Submitted by grigby1 on Wed, 05/17/2017 - 12:33pm
chips
counterfeit
counterfeit threats
defense systems
electronics
Hardware
hardware vulnerabilities
integrating supply chain and technical data
IoT
pubcrawl
quantifying risk of counterfeits
Resiliency
supply chain for electronic parts
supply chain risk assessment
supply chain security
testing of electronic chips