Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fault Attacks
biblio
Extensive Fault Emulation on RFID Tags
Submitted by grigby1 on Thu, 09/30/2021 - 11:55am
cyber physical systems
emulation
Fault Attacks
Fault injection
Human behavior
Human Factors
MBU
Metrics
multiple fault diagnosis
pubcrawl
resilience
Resiliency
RFID
Robustness
SBU
SEU
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
Fault detection method
smaller keys
Scalability
Resiliency
resilience
public key cryptosystems
public key cryptography
pubcrawl
power consumption
Montgomery Scalar Multiplication algorithm
Montgomery ladder
Metrics
key sizes
Hardware
fault injection attack
fault diagnosis
Circuit faults
fault detection
Fault Attacks
embedded devices
Elliptical Curve Cryptography
Elliptic curves
elliptic curve Scalar Multiplication Montgomery algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
efficient fault detection method
efficient countermeasure
ECC
cryptographic computation
Conferences
classical asymmetric cryptosystems
biblio
Evaluating Fault Resiliency of Compressed Deep Neural Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:48pm
Hardware
VGG16
storage faults
software mitigation techniques
Resiliency
resilience
Quantization (signal)
pubcrawl
Predictive models
neural nets
LeNet-5
learning (artificial intelligence)
inference mechanisms
hardware mitigation techniques
Analytical models
fault tolerant computing
fault tolerance
Fault resiliency
Fault Resilience
Fault Attacks
Efficient and secure inference engines
Deep neural network model compression
deep learning
Data models
data compression
Computational modeling
compressed DNN models
compressed deep neural networks
biblio
LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
LAOCOON
verification rules
Trojan horses
trojan horse detection
temporal properties
supply chain security
sensitive information
security
Safety
run-time verification
run-time monitoring
Resiliency
resilience
pubcrawl
Monitoring
malicious inclusions
active fault attacks
invasive software
Integrated circuit modeling
hardware Trojan horses
hardware Trojan detection
Hardware Security
Hardware
generic attackers
formal verification techniques
formal verification
Fault Attacks
electronic systems
dedicated monitoring circuits
cyber physical systems
Circuit faults
automata
biblio
Pointing in the Right Direction - Securing Memory Accesses in a Faulty World
Submitted by grigby1 on Thu, 02/14/2019 - 10:17am
countermeasure
Fault Attacks
Human Factors
memory access
Metrics
pointer protection
pubcrawl
Scalability
Tamper resistance
biblio
On Secure Implementations of Quantum-Resistant Supersingular Isogeny Diffie-Hellman
Submitted by grigby1 on Wed, 05/30/2018 - 3:06pm
Scalability
pubcrawl
public key cryptography
quantum computing
quantum-resistant SIDH protocol
quantum-resistant supersingular isogeny Diffie-Hellman protocol
random number generation
resilience
Resiliency
Protocols
secret kernel point
secret scalars
side-channel analysis
signature based defense
simple power analysis
timing
timing attacks
true random number generator
Elliptic curves
Cryptographic Protocols
Cryptography
Differential Power Analysis
double-point multiplication
ECDH key exchange
Electronic mail
elliptic curve Diffie-Hellman key exchange
elliptic curve isomorphism
ALU
elliptic curve theory
Fault Attacks
Fermat little theorem inversion
Hardware
hardware architectures
isogeny-based cryptography
oracle attacks
Post-quantum cryptography
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks
Submitted by K_Hooper on Fri, 10/13/2017 - 9:33am
AES
compiler
countermeasures
Fault Attacks
LLVM
Metrics
pubcrawl
Resiliency
scalabilty
Securing Compilers