Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attestation
biblio
The Million Dollar Handshake: Secure and Attested Communications in the Cloud
Submitted by grigby1 on Wed, 05/05/2021 - 12:58pm
Remote Attestation
Virtual machining
standards
Software
secure enclaves
secure communication
Scalability
sandboxing
rendering (computer graphics)
attestation
pubcrawl
Protocols
policy-based governance
composability
Communication channels
collaboration agreements
collaboration
Cloud Computing
biblio
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness
Submitted by aekwall on Mon, 12/21/2020 - 1:35pm
IP networks
trustworthiness
Trusted Computing
third-party DNS service
Third-Party DNS
T2DNS
service proxy
Servers
server attackers
pubcrawl
Protocols
privacy preservation
privacy
obfuscation protocol
attestation
Internet infrastructure
internet
Intel SGX
initialization process
hybrid protocol
encryption protocol
encryption
data privacy
Cryptographic Protocols
computer network security
composability
client DNS queries
channel attackers
biblio
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Submitted by aekwall on Mon, 09/28/2020 - 12:11pm
data logs
Mutation testing
actuators
CPS
model checking
cyber-physical system
supervised machine learning
code mutation
code-modification attacks
cross-validation
formal verification
invariants
learnt model
real-world water purification plant
Statistical Model Checking
SVM-based model
system modelling
water treatment systems
CPS Privacy
pubcrawl
Software
attestation
Data models
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Human behavior
Monitoring
program testing
privacy
attacks
Anomaly Detection
cyber physical systems
program diagnostics
sensors
Human Factors
biblio
PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:37am
functional state
VRF
VRASED
verified remote attestation
useful security services
untrusted remote prover
trusted verifier
system-wide resets
secure RA architecture
remote Prv
Prv memory
provably secure software update
obtain proofs
malware-free state
low-end embedded systems
important security services
attestation
formally verified RA architecture
erasure
current memory state
compromised state
low-end embedded devices
microcontrollers
composability
pubcrawl
Human behavior
Resiliency
software state
invasive software
security service
embedded systems
biblio
Towards Systematic Design of Collective Remote Attestation Protocols
Submitted by aekwall on Mon, 08/17/2020 - 11:37am
Systematics
untrusted device
towards systematic design
Systematic Design
single-device RA
single device
remote exploits
prior collective RA schemes
place collective RA
networked embedded devices
embedded system security
concrete collective RA scheme
collective remote attestation protocols
Collective Remote Attestation
remote device
data privacy
malware detection
Topology
composability
pubcrawl
Human behavior
Resiliency
embedded systems
Software
Protocols
performance evaluation
security
Hardware
attestation
biblio
Decentralized Attestation of Conceptual Models Using the Ethereum Blockchain
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
Ethereum blockchain
software connector
globally unique identifiers
existence proofs
Ethereum account
Decentralized Identifiers
decentralized attestation methods
cryptographic verification
Conceptual Modeling
blockchain-based attestation
ADOxx metamodeling platform
distributed ledger
Hash functions
Cryptography
certification
ethereum
smart contracts
Distributed databases
blockchain
composability
pubcrawl
Human behavior
Resiliency
computer architecture
attestation
biblio
SACHa: Self-Attestation of Configurable Hardware
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
hardware-software system
tamper-resistant hardware module
Software
self-attestation
SACHa
Resiliency
remote attacks
Read only memory
pubcrawl
Protocols
physical attacks
Microprocessors
intended application code
Human behavior
attestation
hardware-based attestation
Hardware
FPGAs
Field-Programmable Gate Arrays
field programmable gate arrays
embedded systems
embedded software
embedded device
device attestation
configurable hardware
configurable FPGA hardware
computer architecture
composability
biblio
DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
on-device DNN attestation method
hardware-software codesign
Human behavior
industrial property
intelligent devices
intelligent platforms
IP concern
ip protection
learning (artificial intelligence)
manufactured hardware
neural nets
hardware-level intellectual property
pubcrawl
queried DNN
Resiliency
Software/Hardware Codesign
target platform
TEE-supported platforms
Trusted Execution Environment
unregulated usage
usage control
device provider
application usage
attestation
attestation criterion
authorisation
authorized DNN programs
composability
deep learning frameworks
deep neural networks
DeepAttest overhead
DeepAttest provisions
application program interfaces
device-specific fingerprint
DNN applications
DNN benchmarks
DNN program
embedded fingerprint
end-to-end attestation framework
FP
hardware architectures
hardware-bounded IP protection impair
biblio
RADIS: Remote Attestation of Distributed IoT Services
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
RADIS
distributed IoT service
Distributed IoT Services
inter-operable IoT system
Interoperable IoT
interoperable IoT devices
malicious remote service
modified software detection
physical tampering attacks
control-flow attestation technique
Remote Attestation
remote attestation of distributed IoT services
remote attestation protocols
remote trusted party
security technique
Service Flow
trust-worthiness
Trusted Computing
Monitoring
Internet of Things
IoT devices
attestation
security
performance evaluation
Protocols
Software
computer network security
Resiliency
Human behavior
pubcrawl
composability
Cameras
open systems
Internet of Things systems
biblio
Towards lightweight and interoperable trust models: The entity attestation token
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
security
attestation
Resiliency
Human behavior
pubcrawl
composability
Internet of Things
« first
‹ previous
1
2
3
4
5
6
next ›
last »