Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Universal Serial Bus
biblio
A Review of Various Attack Methods on Air-Gapped Systems
Submitted by grigby1 on Mon, 01/25/2021 - 11:28am
Fans
Universal Serial Bus
security breach
Resiliency
resilience
pubcrawl
Metrics
malware
Magnetoacoustic effects
Human Factors
Human behavior
Acoustics
exfiltrate
Electromagnetic radiation
data leak
covert channels
composability
Cameras
attack methods
air-gapped
Air gaps
biblio
Security Flaws of Operating System Against Live Device Attacks: A case study on live Linux distribution device
Submitted by aekwall on Mon, 10/26/2020 - 11:45am
data tampering
Linux Operating System Security
Universal Serial Bus
software portability
security and privacy
portability
permanent record deletion
operating systems
operating system security flaws
live Linux distribution device
Live Devices
live device attacks
Linux operating system
security of data
Insider Threats
Predictive Metrics
File systems
microsoft windows
data theft
Metrics
composability
pubcrawl
Resiliency
Linux
mobile computing
security
biblio
LBM: A Security Framework for Peripherals within the Linux Kernel
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
powerful filtering functionality
Linux (e)BPF modules
Linux kernel
Linux-Kernel
malicious peripherals
malicious USB
NFC devices
operating systems (computers)
OS software stacks
Peripheral
peripheral attack surface
Linux
Protocols
pubcrawl
resilience
Resiliency
security
Smartphones
standardized communication protocols
Universal Serial Bus
USB
cyber physical systems
Metrics
Predictive Metrics
Bluetooth
bluetooth security
composability
computer network security
computer peripheral equipment
Computer peripherals
Cyber Physical System
Linux Operating System Security
eBPF
eBPF packet filtering mechanism
external GPU
filtering theory
general security framework
host operating system
Human behavior
Kernel
LBM framework
biblio
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
optical equipment
light emitting diodes
light sensor
malicious insider
malware
Metrics
modern cyber-attack
modern USB keyboards
Network
Num-Lock
optical
optical communication
Keyboards
Optical sensors
pubcrawl
Receivers
remote cameras
resilience
Resiliency
Scroll-Lock
sensitive optical sensors
smart phones
Trusted Computing
Universal Serial Bus
CTRL-ALT-LED
Air gaps
air-gap
air-gapped computers
airgapped computers
bit rate 120.0 bit/s
bit rate 3000.0 bit/s
Cameras
Caps-Lock
composability
computer network security
covert channel
advanced persistent threat
data leakage prevention systems
evil maid attacks
exfiltrate data
exfiltration
firmware
Human behavior
Human Factors
invasive software
keyboard
keyboard LEDs
biblio
Reducing USB Attack Surface: A Lightweight Authentication and Delegation Protocol
Submitted by grigby1 on Thu, 01/31/2019 - 12:13pm
safest places
mobile device
mobile malware
network communications
Petri nets
privately owned smart device
Protocols
pubcrawl
radiofrequency identification
resilience
Resiliency
Metrics
secure places
Servers
smart phones
unintentional piggybacking
Universal Serial Bus
USB attack surface
USB connection streams
USB security
USB storage
Filtering
air-gapped networks
authentication
coloured Petri nets
Coloured Petri Nets (CPN) modelling
composability
Computational modeling
corporate network
Cryptographic Protocols
delegation protocol
epidemic model.
Air gaps
free malware equilibrium
Human behavior
intentional piggybacking
Internet of Things (IoT)
invasive software
lightweight authentication
malware
malware infection
malware spread
biblio
Identifying Vulnerabilities in APT Attacks: A Simulated Approach
Submitted by grigby1 on Mon, 01/21/2019 - 12:37pm
multiple simulated attacks
vulnerabilities
virtualized environment
Universal Serial Bus
tools
spearphishing
security of data
Scalability
Resiliency
pubcrawl
Payloads
operating system
advanced persistent threat attacks
mitigation
Metrics
malware
Human behavior
Firewalls (computing)
cyber-attacks
Browsers
APT threat vectors
APT attacks
antivirus software
advanced persistent threats
biblio
A Visible Light Channel Based Access Control Scheme for Wireless Insulin Pump Systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:21pm
Insulin pumps
Visible Light Communications Security
wireless insulin pump systems
wireless infusion insulin pumps
visible light channel based access control scheme
Universal Serial Bus
Sugar
smart personal insulin pumps
RF channels
photodiodes
patient treatment
patient monitoring
malicious attacks
security
infrared detectors
free-space optical communication
light emitting diodes
Communication system security
telecommunication security
Wireless communication
Scalability
Resiliency
Metrics
pubcrawl
wireless sensor networks
biblio
An object-oriented open software architecture for security applications
Submitted by grigby1 on Thu, 06/07/2018 - 3:01pm
public key cryptography
Universal Serial Bus
Software Architecture
Software
smart cards
security of data
security device
security applications
security APIs
security
secure messaging
secure communication
SEcube™ platform
Resiliency
resilience
application program interfaces
pubcrawl
Pins
Open Hardware security platform
object-oriented open software architecture
object oriented security
multiplatform Open Source security framework
Metrics
Libraries
Hardware
field programmable gate arrays
dedicated Open Hardware devices
Data protection
CPU
composability
biblio
Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
learning (artificial intelligence)
wireless sensor networks
wireless insulin pump system
Wireless insulin pump
Wireless communication
Universal Serial Bus
supervised learning approaches
single acute overdose
security mechanisms
regression models
regression analysis
PIPAC
patient safety
patient infusion pattern based access control schemes
Access Control
Insulin
infusion pattern
implantable medical devices
hospitals
home healthcare systems
health care
Diabetes
Communication system security
chronic overdose
bolus abnormal dosage detection
basal abnormal rate detection
authorisation
1536086
biblio
Discovering and Mitigating New Attack Paths Using Graphical Security Models
Submitted by grigby1 on Mon, 04/02/2018 - 12:52pm
resilience
zero-day vulnerabilities
Virtual private networks
UV-RAM
Universal Serial Bus
unified vulnerability risk analysis module
system components
Servers
security of data
Security analysis
security
risk analysis
Resiliency
Analytical models
pubcrawl
new attack path mitigation
new attack path discovery
network hardening
modern networked systems
mitigation strategies
Metrics
graphical security models
Databases
composability
attack graphs
« first
‹ previous
1
2