Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
timing channel
biblio
Efficient Timing Channel Protection for Hybrid (Packet/Circuit-Switched) Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 11:29am
Switching circuits
network transmission
network-on-chip
packet switching
packet switching NoC
packet-circuit-switched
security in NoC
Separate interface Hybrid
side-channel attacks
network routing
system security policy
TDM
Throughput
timing
timing channel
timing channel protection
timing characteristics
timing side channel
combined hybrid routers
network on chip security
Scalability
Resiliency
resilience
Metrics
channel attacks
circuit switching
circuit switching NoC
pubcrawl
conventional hybrid router
covert timing channel
hybrid network-on-chip
hybrid NoC
Integrated circuit modeling
MP-SoC
multiprocessing systems
multiprocessor system-on-chip
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 11:07am
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
biblio
Web Covert Timing Channels Detection Based on Entropy
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
Noise measurement
Web weaknesses
web vulnerabilities
Web covert timing channels detection
Web
victim
timing channel
telecommunication traffic
telecommunication channels
system security policies
security attacks
security
Scalability
resilience
Receivers
public access permission
channel entropy
modulation
memory storage
internet
information security
entropy-based detection method
entropy threshold
Entropy
disclosure information
delays
covert storage channels
covert channels
Convert Channel
computer network security
Compositionality
communication contrary
biblio
Dummy Traffic Generation to Limit Timing Covert Channels
Submitted by grigby1 on Thu, 09/05/2019 - 10:24am
hidden communication
timing channel
timing
telecommunication traffic
security policy
Scalability
resilience
Receivers
IP timing covert channels
IP networks
Information Leakage
hidden transmit information
Bandwidth
Entropy
dummy traffic generation
dummy traffic
Cybersecurity
covert channels
covert channel capacity formula
covert channel
computer network security
Compositionality
channel capacity
biblio
Review of jamming attack using game theory
Submitted by grigby1 on Fri, 10/26/2018 - 4:04pm
malicious attack nodes
WSN
wireless sensor networks
Wireless Sensor Network
wireless networks
timing channel
telecommunication security
security threats
security
Scalability
pubcrawl
power expenditure
network load
Metrics
external attack
jamming technique
jamming detection
jamming attack
Jamming
internal attack
interaction model
information preservation
Human Factors
Games
game theory
game theoretic strategies
game theoretic security
game theoretic representation