Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Program processors
biblio
NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking
Submitted by grigby1 on Mon, 03/14/2022 - 11:21am
Switches
vtables
vtable hijacking
NoVT
LLVM
codes
Chromium
Metrics
Policy Based Governance
Safe Coding
pubcrawl
control systems
C++ languages
Runtime
Program processors
CFI
Resiliency
resilience
Human Factors
Human behavior
biblio
Packet Header Attack by Hardware Trojan in NoC Based TCMP and Its Impact Analysis
Submitted by grigby1 on Tue, 03/01/2022 - 3:20pm
Program processors
Very large scale integration
System performance
Switches
Scalability
resilience
pubcrawl
Predictive Metrics
Resiliency
Router System Security
• Computer systems organization → Interconnection architectures
privacy
network-on-chip
network on chip security
Multicore processing
Metrics
composability
• Security and privacy → Hardware security implementation
• Networks → Network reliability
biblio
Security Capsules: An Architecture for Post-Silicon Security Assertion Validation for Systems-on-Chip
Submitted by grigby1 on Tue, 03/01/2022 - 3:18pm
post-silicon validation
Very large scale integration
Trace buffer
system-on-chip
Scalability
Run-time security monitors
Resiliency
resilience
pubcrawl
Program processors
dynamic systems
network on chip security
Monitoring
Metrics
IP networks
Heuristic algorithms
Dynamic signal selection
computer architecture
composability
security
biblio
High-Assurance Cryptography in the Spectre Era
Submitted by aekwall on Fri, 02/25/2022 - 9:45am
Software
Robustness
privacy
Libraries
pubcrawl
Resiliency
Semantics
Compositionality
Predictive Metrics
Program processors
Memory management
provable security
biblio
High-speed Hardware Accelerator for Trace Decoding in Real-Time Program Monitoring
Submitted by grigby1 on Tue, 02/22/2022 - 12:42pm
real-time systems
pubcrawl
Metrics
resilience
Resiliency
FPGA
Hardware
Safety
Scalability
multicore computing security
Program processors
Decoding
Multicore processing
Focusing
ARM Cortex-A9
Control Flow Monitoring
CoreSight
Online Trace
biblio
A Certainty-guaranteed inter/intra-core communication method for multi-core embedded systems
Submitted by grigby1 on Tue, 02/22/2022 - 12:41pm
power electronics
software certainty
security
Scalability
resilience
real-time systems
pubcrawl
Program processors
Processor scheduling
embedded systems
operating systems
multicore computing security
DSP
delays
Metrics
composability
Resiliency
biblio
A Study on the Effect of Hardware Trojans in the Performance of Network on Chip Architectures
Submitted by grigby1 on Tue, 02/22/2022 - 12:41pm
Network on Chip (NoC)
Tiled Chip Multicore Processors (TCMP)
taxonomy
System performance
Scalability
Resiliency
resilience
pubcrawl
Program processors
network on chip security
Multicore processing
multicore computing security
multicore
Metrics
Hardware Trojans (HT)
Globalization
electronics industry
computer architecture
biblio
Multi-Granularity Control Flow Anomaly Detection with Hardware Counters
Submitted by grigby1 on Fri, 02/04/2022 - 1:50pm
Hardware Security
Two-Level Predictor
Time factors
Return Oriented Programming (ROP)
return oriented programming
Resource Efficient
resilience
programming
Program processors
PMU
performance counters
microarchitecture
machine learning
rop attacks
Hardware
embedded systems
embedded security
Dynamic Control Flow Integrity
Buffer overflows
buffer overflow
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
Implementation White-Box Cryptography for Elliptic Curve Cryptography
Submitted by aekwall on Mon, 01/31/2022 - 3:10pm
white box cryptography
composability
resilience
Metrics
Elliptic curve cryptography
embedded computing
encryption
information processing
information security
Monitoring
Program processors
pubcrawl
Resiliency
White Box Security
white-box cryptography
biblio
Optimally-secure Coin-tossing against a Byzantine Adversary
Submitted by aekwall on Mon, 12/20/2021 - 11:30am
Computational modeling
Protocols
probability
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
Program processors
Object recognition
information theory
Adversary Models
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »