Scalability and Composability
tearline
Submitted by awhitesell on Tue, 10/09/2018 - 2:10pm
tearline
Submitted by Jamie Presken on Thu, 09/13/2018 - 2:32pm
tearline
Submitted by Serge Egelman on Mon, 07/30/2018 - 12:34pm
tearline
Submitted by Serge Egelman on Mon, 07/30/2018 - 10:28am
biblio
Submitted by RCJBob on Mon, 07/09/2018 - 4:39pm
tearline
Submitted by RCJBob on Mon, 07/09/2018 - 3:25pm
tearline
Submitted by RCJBob on Fri, 07/06/2018 - 5:44pm
tearline
Submitted by David Nicol on Mon, 03/19/2018 - 10:24pm
group_project
Submitted by Warren Alexander on Mon, 03/19/2018 - 10:08pm
Cyber-Physical Systems (CPS)--cars, airplanes, power plants, and etc.--are increasingly dependent on powerful and complex hardware for higher intelligence and functionalities. However, this complex hardware may also introduce new attack vectors--hardware side-channels--which can be exploited by attackers to steal sensitive information, to disrupt timing of time critical functions that interact with the physical plants, or to break memory protection mechanisms in modern computers.
group_project
Submitted by Warren Alexander on Mon, 03/19/2018 - 10:07pm
Remote attestation provides a run-time capability for appraising system behavior and establishing trust. Using remote attestation, an appraiser requests evidence describing a target. The target responds by performing measurement to gather evidence then adds cryptographic signatures to assure integrity and authenticity. The appraiser takes the evidence and assesses the target's behavior to determine if the target is who and what it claims to be.