Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
malicious modifications
biblio
Study of hardware trojans based security vulnerabilities in cyber physical systems
Submitted by grigby1 on Thu, 07/16/2020 - 10:57am
SCADA systems
IC industry
integrated circuits
invasive software
malicious modifications
Metrics
pubcrawl
reliable functionality
resilience
Resiliency
hardware-in-the-loop based simulation platform
secure functionality
security
Security Awareness
security vulnerabilities
simulations
software peripherals
threat models
Trojan horses
CPS modeling
closed-loop systems
completely virtual simulation platform
complex computing environment
composability
Computational modeling
computing chip
computing hardware design
computing platform
closed loop systems
critical CPS application
cyber physical systems
cyber-physical systems
gas pipeline based SCADA system
Hardware
hardware internals
Hardware Trojans
hardware-in-the loop simulation
biblio
Design of Software Rejuvenation for CPS Security Using Invariant Sets
Submitted by grigby1 on Fri, 03/27/2020 - 10:28am
malicious modifications
software rejuvenation design
software engineering
security of data
Safe Coding
run-time system
run-time code
Resiliency
resilience
quadrotor system
pubcrawl
policy-based governance
online software
Metrics
collaboration
Lyapunov methods
Lyapunov function
invariant sets
invariance
Human Factors
Human behavior
Data protection
cyber-physical systems
Cyber Attacks
CPS Security
control-theoretic perspective
control engineering computing
biblio
Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection Using Testing and Imaging
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
Resiliency
Logic Test
low accuracy
malicious modifications
microscopy
modern military systems
new hybrid approach
pubcrawl
rapid hardware trojan detection
resilience
Logic gates
reverse engineering
scanning electron microscopy
security
SEM images
superlative accuracy
supply chain security
trojan horse detection
Trojan horses
grave threat
commercial systems
cyber physical systems
detection method
exhaustive test infrastructure
existing gate footprints
Foundries
GGC
golden chip
golden gate circuits
backside ultra thinning
Hardware
Hardware Trojans
high classification accuracy
high time cost
Image analysis
Imaging
integrated circuits
invasive software
biblio
A Neural Network Trojan Detection Method Based on Particle Swarm Optimization
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
particle swarm optimization
Trojan horses
trojan horse detection
Side Channel Analysis technology
RTL circuits
pubcrawl
PSO NN method
Principal Component Analysis algorithm
principal component analysis
Power demand
power consumption data
power consumption
power aware computing
Artificial Neural Networks
particle swarm optimisation
neural network Trojan detection
neural nets
malicious modifications
invasive software
intelligent neural networks algorithm
Integrated circuit modeling
HSPICE power consumption simulation
hardware Trojan detection
Hardware
Cryptography
biblio
A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
Submitted by grigby1 on Fri, 03/15/2019 - 10:58am
invasive software
Tunneling magnetoresistance
Trojan horses
trojan horse detection
Thwart Hardware Trojan insertion
Sensitivity
security of data
pubcrawl
prevention methods
original circuit
novel prevention technique
malicious modifications
logic circuits
ad-hoc design rules
integrated circuits
integrated circuit industry
Hardware Trojans
hardware trojan
Hardware
fabricated IC
error detection
critical circuits
Circuit faults
approximation
approximate logic circuit