Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Threshold voltage
biblio
Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters
Submitted by aekwall on Mon, 01/31/2022 - 4:13pm
analysis
White Box Security
Threshold voltage
structural engineering
Spiking Neural Networks
SNN
Problem-solving
parameters
Neuromorphic
Firing
security
adversarial attacks
composability
Resiliency
Metrics
pubcrawl
optimization
machine learning
deep learning
Robustness
biblio
Stealthy-Shutdown: Practical Remote Power Attacks in Multi - Tenant FPGAs
Submitted by aekwall on Thu, 05/13/2021 - 11:36am
Scalability
side-channel
power attack
multi-tenant
Denial-of-Service
attack surface
Threshold voltage
Power demand
Acceleration
field programmable gate arrays
sensors
tools
Metrics
pubcrawl
Resiliency
Task Analysis
FPGA
biblio
Stable cryptographic key generation using SRAM based Physical Unclonable Function
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
SRAM fingerprint
random pattern
resilience
Resiliency
Scalability
secure IoT devices
SRAM
SRAM cells
SRAM chips
random number generation
SRAM physical unclonable function
SRAM PUF
Stability analysis
Static Random-Access Memory based PUFs
Threshold voltage
Transistors
Trusted Computing
zero trust
integrated circuits
Cadence Virtuoso tool
cryptographic key generation stability
cryptographic key sequence
Cryptography
digital fingerprint
fingerprint identification
hardware root-of-trust
Human Factors
authorisation
Internet of Things
IoT
MOS devices
Physical Unclonable Function
policy-based governance
power aware computing
pubcrawl
pufs
biblio
Two-Stage Architectures for Resilient Lightweight PUFs
Submitted by aekwall on Mon, 11/16/2020 - 2:59pm
reverse engineering
Resilient Security Architectures
Product codes
physical unclonable function (PUF)
Maximum likelihood decoding
integrated circuit reliability
Differential Comparator PUF
Current Mirror PUF
arbiter PUF
Transistors
Threshold voltage
Binary codes
security of data
resilience
Decoding
program testing
machine learning
pubcrawl
Resiliency
invasive software
security
Internet of Things
field programmable gate arrays
biblio
Mesh Based Obfuscation of Analog Circuit Properties
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
satisfiability modulo theory based algorithm
Design methodology
effective transistor dimensions
enhanced security
key based obfuscation technique
LC tank voltage-controlled oscillator
mesh topology
obfuscated circuitry
obfuscated transistors
obfuscation methodology
physical dimensions
SAT
circuit functionality
SMT
target frequency
transistor circuits
transistor sizes
Transistors
varactor transistor
Varactors
VCO
voltage amplitude
voltage-controlled oscillators
encryption key
Resiliency
pubcrawl
composability
policy-based governance
probability
Topology
reverse engineering
computability
operating frequency
Threshold voltage
Cryptography
circuit design
IP piracy
2×6 mesh structure
analog circuit properties
Analog circuits
analog obfuscation
analog satisfiability algorithm
aSAT algorithm
auto-determine
Brute Force Attack
biblio
Run-time Detection and Mitigation of Power-Noise Viruses
Submitted by aekwall on Mon, 02/10/2020 - 11:58am
data corruptions
multicore computing security
voltage noise data
voltage emergencies
Viruses (medical)
Threshold voltage
system crashes
run-time system
run-time estimation
resonance detection
power-noise virus mitigation
power-noise virus detection
power-noise attacks
power viruses
operating frequency
multicore microprocessors
security
Arm multicore processor
Resonant frequency
multiprocessing systems
Microprocessors
Benchmark testing
computer viruses
system-on-chip
microcontrollers
regression analysis
Metrics
pubcrawl
Resiliency
power aware computing
Scalability