Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded system security
biblio
ARCHIE: A QEMU-Based Framework for Architecture-Independent Evaluation of Faults
Submitted by aekwall on Sun, 10/16/2022 - 6:30pm
Fault injection
white box cryptography
Tiny Code Generator
QEMU
fault analysis
embedded system security
automatic fault simulation
codes
Random access memory
embedded systems
Inspection
Manuals
Registers
composability
Resiliency
Metrics
pubcrawl
tools
biblio
A Study on UAV Operating System Security and Future Research Challenges
Submitted by grigby1 on Fri, 07/29/2022 - 5:13pm
pubcrawl
resilience
Resiliency
Conferences
computer security
Task Analysis
operating systems
Transportation
surveillance
drones
Operating systems security
operating system security
Drone security
embedded system security
unmanned aerial vehicle
biblio
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC
Submitted by grigby1 on Tue, 11/17/2020 - 2:39pm
frequency regulator
Clocks
system-on-chip
Frequency modulation
ARM TrustZone
AXI bus
DVFS
Dynamic Voltage and Frequency Scaling
embedded system security
power aware computing
nonsecure ARM core
Regulators
secure ARM core
security failure
TrustZone-enabled heterogeneous SoC
TrustZone-enabled System-on-Chip
voltage regulator
Operating systems security
Instruction sets
IP networks
Trusted Computing
pubcrawl
Metrics
Resiliency
embedded systems
composability
computer architecture
security
hardware trojan
Receivers
resilience
energy consumption
operating systems (computers)
operating systems
operating system
electronic engineering computing
biblio
Detection of Near Field Communication (NFC) Relay Attack Anomalies in Electronic Payment Cases using Markov Chain
Submitted by aekwall on Tue, 09/08/2020 - 9:59am
Markov processes
Chained Attacks
target NFC network
near-field communication
markov chain
intrusive detection system
electronic payment cases
attack anomalies
Near Field Communication
Training data
security of data
embedded system security
Relays
relay attack
Google
pubcrawl
Resiliency
Data models
security
Scalability
biblio
Towards Systematic Design of Collective Remote Attestation Protocols
Submitted by aekwall on Mon, 08/17/2020 - 11:37am
Systematics
untrusted device
towards systematic design
Systematic Design
single-device RA
single device
remote exploits
prior collective RA schemes
place collective RA
networked embedded devices
embedded system security
concrete collective RA scheme
collective remote attestation protocols
Collective Remote Attestation
remote device
data privacy
malware detection
Topology
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Software
Protocols
performance evaluation
security
Hardware
attestation
biblio
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security
Submitted by aekwall on Wed, 05/01/2019 - 12:42pm
temporal consistency
embedded system security
embedded systems
Metrics
composability
pubcrawl
Resiliency
Remote Attestation
biblio
A red team blue team approach towards a secure processor design with hardware shadow stack
Submitted by grigby1 on Thu, 06/07/2018 - 3:02pm
private data access
Trusted Computing
software attacks
security of data
security
RISC-V
return oriented programming attack
Resiliency
resilience
reduced instruction set computing
red team blue team approach
pubcrawl
processor vulnerabilities
processor design security
processor architecture
composability
Payloads
openrisc
open processor architectures
object-oriented programming
object oriented security
Metrics
memory corruption
hardware-software codesign
hardware shadow stack
Hardware
embedded systems
embedded system security
Computer bugs
computer architecture
biblio
Time and Sequence Integrated Runtime Anomaly Detection for Embedded Systems
Submitted by grigby1 on Mon, 03/26/2018 - 1:13pm
Anomaly Detection
composability
defense
embedded system security
medical device security
Metrics
pubcrawl
Resiliency
software security
timing based detection
Zero day attacks
biblio
C-FLAT: Control-Flow Attestation for Embedded Systems Software
Submitted by grigby1 on Tue, 10/10/2017 - 10:52am
composability
control-flow attacks
embedded system security
Metrics
pubcrawl
Remote Attestation
Resiliency
rop attacks
Scalability
biblio
Lightweight Authentication Protocol Deployment over FlexRay
Submitted by grigby1 on Mon, 04/03/2017 - 11:54am
authentication
composability
embedded system security
FlexRay security
In-Vehicles security
Metrics
network control systems
network control systems security
networked control systems
pubcrawl
Resiliency
security
Time-Triggered security
1
2
next ›
last »