Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

design for test

biblio

Visible to the public Protecting the Supply Chain for Automotives and IoTs

Submitted by Katie Dey on Thu, 10/21/2021 - 11:44am
  • design for test
  • Hardware Trojans
  • key provisioning
  • secure keys
  • design for debug
biblio

Visible to the public A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation

Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
  • Registers
  • IJTAG network
  • IJTAG security
  • Instruments
  • intellectual property security
  • isolation signals
  • microprocessor chips
  • on-chip access
  • on-chip instruments
  • policy-based governance
  • power consumption
  • pubcrawl
  • IJTAG
  • resilience
  • Resiliency
  • scan chain
  • security
  • security of data
  • system-on-chip
  • system-on-chip designs
  • third party intellectual property providers
  • unauthorized user access
  • untrusted sources
  • Diagnosis
  • Clocks
  • Complexity theory
  • composability
  • controlled scan chain isolation
  • data integrity
  • Data Integrity Attacks
  • data manipulation
  • data protection scheme
  • data sniffing
  • debug
  • design for test
  • authorisation
  • electronic design automation
  • embedded instruments
  • embedded systems
  • graph coloring problem
  • graph colouring
  • graph theory approach
  • hidden test-data registers
  • IEEE standards
  • IEEE Std 1687
  • IEEE Std. 1687
biblio

Visible to the public Protecting the Supply Chain for Automotives and IoTs

Submitted by aekwall on Mon, 02/18/2019 - 12:53pm
  • Scalability
  • Resiliency
  • Human behavior
  • pubcrawl
  • design for debug
  • design for test
  • Hardware Trojans
  • key provisioning
  • secure keys
  • supply chain security

Terms of Use  |  ©2023. CPS-VO