Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
reverse engineering
biblio
Split Compilation for Security of Quantum Circuits
Submitted by grigby1 on Fri, 08/12/2022 - 2:10pm
compiler security
Transpilation
Split
Overhead
obfuscation
Coupling Map
compilation
quantum computing
IP theft
reverse engineering
computer architecture
Software as a service
Metrics
Program processors
Routing
composability
Computers
Resiliency
pubcrawl
Logic gates
biblio
Secured Test Pattern Generators for BIST
Submitted by grigby1 on Fri, 07/29/2022 - 9:44am
intellectual property
pattern locks
TPG
overproduction
BIST
logic locking
design for testability
built-in self-test
Hardware Security
reverse engineering
pubcrawl
side-channel attacks
integrated circuits
privacy
Scalability
Hardware
Resiliency
resilience
Human behavior
biblio
LL-ATPG: Logic-Locking Aware Test Using Valet Keys in an Untrusted Environment
Submitted by grigby1 on Fri, 07/29/2022 - 9:44am
supply chains
pattern locks
untrusted foundry
Manufacturing test
logic locking
design for testability
Costs
Semiconductor device modeling
reverse engineering
Logic gates
manufacturing
Scalability
system-on-chip
Resiliency
resilience
Human behavior
pubcrawl
biblio
High-level Intellectual Property Obfuscation via Decoy Constants
Submitted by grigby1 on Wed, 06/08/2022 - 10:21am
intellectual property security
SAT attack
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
Logic gates
IP obfuscation
pattern locks
intellectual property
hardware obfuscation
Hardware
Foundries
digital FIR filter design
composability
Complexity theory
automatic test pattern generation
biblio
Research on Key Technology of Software Intellectual Property Protection
Submitted by grigby1 on Wed, 06/08/2022 - 10:19am
pubcrawl
policy-based governance
resilience
Resiliency
Heuristic algorithms
composability
Java
Software algorithms
reverse engineering
intellectual property
software protection
intellectual property security
obfuscation
codes
software intellectual property protection
SOPM
biblio
Automated Malware Design for Cyber Physical Systems
Submitted by grigby1 on Tue, 05/03/2022 - 3:55pm
pubcrawl
Systematics
Security Heuristics
security
Scalability
SCADA
safety property
Safety
reverse engineering
Resiliency
resilience
attack
predictability
malware
Learning systems
Heuristic algorithms
Hazards
Formal Specification
fault tolerance
Cyber Physical System
CPS
Control System
biblio
WAFFLE: Watermarking in Federated Learning
Submitted by grigby1 on Tue, 04/26/2022 - 10:36am
Collaborative Work
Data models
deep learning
Deterrence
federated learning
Human behavior
ownership demonstration
process control
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
Training
Training data
Watermarking
biblio
AE-DCNN: Autoencoder Enhanced Deep Convolutional Neural Network For Malware Classification
Submitted by aekwall on Mon, 02/07/2022 - 5:04pm
Resiliency
Pattern recognition
Image coding
deep convolutional neural network
autoencoder
malware classification
Predictive Metrics
malware
Human behavior
reverse engineering
pubcrawl
Training
deep learning
privacy
information security
Transforms
security
biblio
Enhancing SAT-Attack Resiliency and Cost-Effectiveness of Reconfigurable-Logic-Based Circuit Obfuscation
Submitted by aekwall on Fri, 02/04/2022 - 10:35am
reverse engineering
security
Observability
Routing
resilience
pubcrawl
Integrated circuit modeling
logic locking
Switching circuits
Resiliency
Table lookup
LUT-based obfuscation
Reconfigurable Logic
SAT-based attack
biblio
A Novel Golden-Chip-Free Clustering Technique Using Backscattering Side Channel for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/08/2021 - 1:36pm
pubcrawl
Trojan horses
trojan horse detection
Trojan detection
supply chain security
Statistics
Sociology
reverse engineering
Resiliency
resilience
backscatter
integrated circuits
hardware trojan
Hardware Security
Hardware
cyber physical systems
cyber physical security
composability
clustering
Backscattering side-channel
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »