Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
timing
biblio
Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes
Submitted by grigby1 on Thu, 07/16/2020 - 12:17pm
machine learning methods
window sizes
Vectors
timing
telecommunication channels
TCPIP
Scalability
Resiliency
resilience
pubcrawl
Protocols
network steganography
composability
machine learning
Linux
learning (artificial intelligence)
information security
hidden data
feature extraction
data packets
covert timing channel
covert channels
computer network security
Compositionality
biblio
Earthquake — A NoC-based optimized differential cache-collision attack for MPSoCs
Submitted by grigby1 on Fri, 05/15/2020 - 12:30pm
programming flexibility
MPSoC configurations
MPSoC Glass
multiprocessing systems
network-on-chip
Network-on-Chip communication structure
NoC
on-chip connectivity
optimized differential cache-collision attacks
optimized variant
microprocessor chips
security concerns
Security NoC
system-on-chip
Systems-on-Chips
timing
Timing attack
timing measurements
Timing Side-channel Attack
cache location
network on chip security
Scalability
Resiliency
resilience
Metrics
attack efficiency
cache activity
cache line
pubcrawl
cache memories
cache storage
computer architecture
Cryptography
earthquake attack
Earthquakes
encryption
Glass
biblio
Efficient Timing Channel Protection for Hybrid (Packet/Circuit-Switched) Network-on-Chip
Submitted by grigby1 on Fri, 05/15/2020 - 12:29pm
Switching circuits
network transmission
network-on-chip
packet switching
packet switching NoC
packet-circuit-switched
security in NoC
Separate interface Hybrid
side-channel attacks
network routing
system security policy
TDM
Throughput
timing
timing channel
timing channel protection
timing characteristics
timing side channel
combined hybrid routers
network on chip security
Scalability
Resiliency
resilience
Metrics
channel attacks
circuit switching
circuit switching NoC
pubcrawl
conventional hybrid router
covert timing channel
hybrid network-on-chip
hybrid NoC
Integrated circuit modeling
MP-SoC
multiprocessing systems
multiprocessor system-on-chip
biblio
Towards the formal verification of security properties of a Network-on-Chip router
Submitted by grigby1 on Fri, 05/15/2020 - 12:29pm
IP networks
timing
security
Routing
NoC routing architectures
Network-on-Chip router
network-on-chip
network routing
MultiProcessors Systems-on-Chip
multiprocessing systems
model checking
pubcrawl
integrated circuit design
Hardware
formal verification
Cryptography
Metrics
resilience
Resiliency
Scalability
network on chip security
biblio
Security Network On-Chip for Mitigating Side-Channel Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:08am
multiple countermeasures
compromised device
contemporary hardware threats
design complexity
electromagnetic analysis attacks
electromagnetic interference
hardware security threats
high-confidence security network on-chip
individual threats
machine learning security IC
malicious physical interference
modern ICs
attack-specific countermeasures
on-chip distribution networks
On-chip power delivery
on-chip voltage variations
operating device-under-attack
robust confidence security network on-chip
security networks
Side-channel attack
side-channel attack mitigation
strict performance requirements
trained ML ICs
network on chip security
timing
Scalability
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
machine learning
physical interaction
system-on-chip
system security
sensors
Attack detection
security of data
Hardware Security
side-channel attacks
integrated circuit design
data analysis
malicious activity
integrated circuits
network-on-chip
active attack
advance invasive attacks
advance noninvasive attacks
advanced technology nodes
biblio
APT Attack Situation Assessment Model Based on optimized BP Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:42pm
APT
Neural Network Security
Training samples
timing
Situation Prediction
security situation
neural network
genetic algorithms
attack situation assessment model
Attack Path
adaptive genetic algorithm
BP Neural Network
Backpropagation
security of data
advanced persistent threat
Metrics
neural nets
Trojan horses
network security
collaboration
policy-based governance
pubcrawl
Neural networks
security
Predictive models
Training
biblio
A Hierarchical Approach to Self-Timed Circuit Verification
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
asynchronous circuit modeling
timing circuits
self-timed circuit verification
non deterministic behavior
mechanical theorem proving
link-joint style
link joint model
Latches
iterative self-timed circuits
hierarchical verification
hardware description language
greatest common divisor circuit model
greatest common divisor
flip-flops
combinational circuits
asynchronous circuit verification
Resiliency
arbitrated merge
ACL2 theorem prover
Theorem Proving
scalable verification
hardware description languages
Integrated circuit modeling
Wires
Compositionality
Predictive Metrics
Scalability
timing
Logic gates
Iterative methods
Computational modeling
pubcrawl
biblio
Scalable Simulation-Based Verification of SystemC-Based Virtual Prototypes
Submitted by aekwall on Mon, 03/16/2020 - 10:39am
SystemC VP
Computer simulation
design verification
Electronic System Level
semiconductor industry
simulation behavior
Simulation-based Verification
SystemC
SystemC language
scalable verification
SystemC-based virtual prototypes
systems analysis
TLM
TLM-2.0 rules
Transaction Level Modeling framework
Virtual Prototype
virtual prototyping
Scalability
Protocols
Resiliency
pubcrawl
Computational modeling
standards
Formal Specification
verification
timing
Hardware
Predictive Metrics
Prototypes
Compositionality
formal verification
Clang
hardware description languages
Object oriented modeling
biblio
Adaptive Network Management for Safety-Critical Systems
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
Bandwidth
predictability
Security Heuristics
Safety-Critical Systems
optimization algorithm
fault diagnosis
Dijkstra algorithm
complex network configurations
adaptive network management
Device-to-device communication
computer network reliability
timing
Safety
resilience
security
software-defined networking
telecommunication network routing
optimisation
optimization
Routing
pubcrawl
Resiliency
software defined networking
computer network management
telecommunication traffic
Scalability
computer network security
biblio
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
telecommunication traffic
packet inter-arrival times
Presses
pubcrawl
search engine
search engines
search predictions
Servers
Side Channel
network traffic
timing
Traffic analysis
transport protocols
user query input field
Vulnerability
website
Web sites
keyboard input events
browser
Browsers
computer network security
HTTP requests
Human behavior
Human Factors
hypermedia
information leakage measurement
autocomplete
Keyboards
keylogging
keylogging side channel attack
keystroke analysis
keystroke timing attack
Metrics
Mutual information
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »