Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious inclusions
biblio
Security-Driven Task Scheduling for Multiprocessor System-on-Chips with Performance Constraints
Submitted by grigby1 on Mon, 11/02/2020 - 1:36pm
pubcrawl
two-stage performance-constrained task scheduling algorithm
Trojan horses
task scheduling
Task Analysis
system-on-chip
System performance
system level security constraints
security-driven task scheduling
security of data
security
scheduling
Schedules
schedule length
Resiliency
resilience
composability
Processor scheduling
policy-based governance
performance constraints
Multiprocessor System-on-Chips
multiprocessing systems
MPSoC
malicious inclusions
logic design
IP networks
intellectual property security
industrial property
hardware trojan
Hardware
graph theory
delays
biblio
LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
LAOCOON
verification rules
Trojan horses
trojan horse detection
temporal properties
supply chain security
sensitive information
security
Safety
run-time verification
run-time monitoring
Resiliency
resilience
pubcrawl
Monitoring
malicious inclusions
active fault attacks
invasive software
Integrated circuit modeling
hardware Trojan horses
hardware Trojan detection
Hardware Security
Hardware
generic attackers
formal verification techniques
formal verification
Fault Attacks
electronic systems
dedicated monitoring circuits
cyber physical systems
Circuit faults
automata
biblio
Hardware malicious circuit identification using self referencing approach
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
post-silicon testing
Trojan horses
testing
Test vector generation
Temporal Self Referencing
side channel analysis
sequential Trojans
Sequential trojan
self referencing approach
security vulnerabilities
Robust Trojans
Resiliency
resilience
pubcrawl
Power measurement
composability
Payloads
outsourced products
Microelectronic Security
Metrics
malicious inclusions
logic testing
leakage power
invasive software
hardware Trojan detection sensitivity
hardware malicious circuit identification
Hardware
delays
Cryptography