Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

memory data

biblio

Visible to the public Copker: A Cryptographic Engine Against Cold-Boot Attacks

Submitted by aekwall on Mon, 11/30/2020 - 12:08pm
  • key-encryption key
  • cold-boot attack
  • cold-boot attacks
  • Copker stores kilobytes
  • CPU registers
  • cryptographic engine
  • cryptographic services
  • deterministic random bit generators
  • disk encryption
  • ECDSA signing
  • Cache-as-RAM
  • multiple private keys
  • on-chip CPU caches
  • PGP Email clients
  • plain-text sensitive data
  • popular asymmetric cryptosystems
  • public-key cryptography implementation
  • RAM chips
  • suspend mode
  • Magnetic Remanence
  • Computers
  • private key cryptography
  • Kernel
  • Resiliency
  • pubcrawl
  • Cryptography
  • cyber physical systems
  • random number generation
  • Random access memory
  • RSA
  • Internet of Things
  • Compositionality
  • Registers
  • memory data
  • cryptographic keys
  • sensitive information
  • deterministic random bit generator
  • private key
  • Cathode ray tubes
biblio

Visible to the public Hardware-Based Adversary-Controlled States Tracking

Submitted by aekwall on Mon, 10/14/2019 - 10:20am
  • Pipelines
  • target tracking
  • software security challenges
  • Software
  • security of data
  • Scalability
  • rop attacks
  • return oriented programming
  • Resiliency
  • Registers
  • pubcrawl
  • programming
  • program diagnostics
  • classic dynamic taint analysis method
  • memory vulnerabilities
  • memory data
  • Linux applications
  • Linux
  • Human behavior
  • HAST
  • Hardware-based Adversary-controlled States
  • Hardware
  • dynimic taint analysis
  • control flow
  • composability
  • code-reuse attack

Terms of Use  |  ©2023. CPS-VO