Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
attestation
biblio
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
integrity checking program generation
composability
pubcrawl
Human behavior
Resiliency
timing information
Raspberry Pi
POWERALERT
Power measurement
power aware computing
power attestation
network round-trip time
Nash equilibrium strategy
Kernel
attestation
integrity checking
game-theoretic strategy
game theory
Frequency measurement
Current measurement
code segment
checking code
attestation systems
Adaptation models
Protocols
security
data integrity
biblio
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
Runtime
programming
pubcrawl
RA
reduced instruction set computing
remote device integrity
Resiliency
RISC-based embedded devices
RISC-V system-on-chip
Program processors
runtime attestation
security
security of data
security service
SoC
software binaries
system-on-chip
Trusted Computing
embedded Internet of Things devices
composability
control-flow attacks
control-flow attestation schemes
data flow computing
data integrity
data-flow events
data-oriented programming
DOP attacks
attestation
embedded systems
hardware-assisted remote attestation scheme
Human behavior
Internet of Things
lightweight hardware-assisted attestation of program execution
LiteHAX
malicious modification
malware
biblio
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier’s Perspective)
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
swarm
online learning
performance evaluation
Protocols
resource-constrained embedded devices
resource-efficient smart broadcast authentication scheme
smart devices
Software
software integrity checking
malware detection
Task Analysis
Trusted Party
WISE
Resiliency
Human behavior
pubcrawl
composability
fine-grained multiclusters
computer network security
Scalability
Internet of Things
attestation
Hardware
Remote Attestation
attack surface
Cryptographic Protocols
security
heterogenous IoT networks
History
intelligent swarm attestation protocol
interactive protocol
Internet of Things (IoT)
IoT applications
lightweight intelligent swarm attestation scheme
biblio
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
mobile data collectors
composability
pubcrawl
Human behavior
Resiliency
whitebox cryptography
tampered drones
Table lookup
software-based attestation
software integrity
software attestation
secure communications
secret key protection
privacy-sensitive data
security of data
malicious physical/cyber attacks
group attestation scheme
drones
data repositories
data memory
data encryption
code attestation technique
malware
attestation
secret keys
private key cryptography
data privacy
encryption
biblio
Program-flow attestation of IoT systems software
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
malware
TrustZone
static attestation phase
static
software modification
security of data
security
Runtime
Resiliency
remote software-based attestation mechanisms
Remote Attestation
pubcrawl
programming
program-flow attestation
Program-Flow
Memory management
application program flow
IoT systems software
IoT
Internet of Things
impractical constraints
Human behavior
hardware devices
Hardware
dynamic attestation technique
dynamic
Dual Attestation
distributed processing
device integrity measurement
data integrity
composability
attestation
biblio
Mechanisms for Mutual Attested Microservice Communication
Submitted by grigby1 on Mon, 12/10/2018 - 11:30am
pubcrawl
composability
attestation
mutual authentication
Trustworthy Computing
trustworthiness
biblio
Hardware-Secured Configuration and Two-Layer Attestation Architecture for Smart Sensors
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
secured storage
configuration interface
configuration updates
dedicated secured hardware
Hardware Security
hardware-secured configuration
Intelligent sensors
Secure storage
secured configuration protocol
configuration
security updates
Smart Sensor
smart sensors
two-layer attestation architecture
two-layer configuration attestation process
usability
sensor security
composability
Metrics
attestation
pubcrawl
Resiliency
Human behavior
Human Factors
Internet of Things
Software Architecture
security
Protocols
security of data
Hardware
computer architecture
telecommunication security
wireless sensor networks
confidential configuration data
biblio
Exploring the Use of Intel SGX for Secure Many-Party Applications
Submitted by K_Hooper on Wed, 10/18/2017 - 10:14am
Trustworthy Remote Entity
Software Guard Extensions
Smart Grid Privacy
Smart Grid
Resiliency
pubcrawl
privacy
Metrics
Many-Party Applications
attestation
biblio
CQSTR: Securing Cross-Tenant Applications with Cloud Containers
Submitted by grigby1 on Tue, 05/30/2017 - 12:46pm
attestation
cloud containers
composability
linux operating systems security
Metrics
pubcrawl
Resiliency
biblio
Cooperative remote attestation for IoT swarms
Submitted by grigby1 on Thu, 04/20/2017 - 12:29pm
Metrics
Trusted Computing
swarms
security state
Scalability
Resiliency
Remote Attestation
pubcrawl
neighbor devices
attestation
IoT device swarms
Internet-of-Things
Internet of Things
Cryptographic Protocols
cryptographic protocol
cooperative remote attestation
computer network security
« first
‹ previous
1
2
3
4
5
6
next ›
last »