Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
physical attacks
biblio
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:29pm
man-in-the-middle
Sensors and Actuators
sensor spoofing
sensor security
security
Resiliency
pubcrawl
physical attacks
Metrics
actuator security
IoT security
Internet of Things (IoT)
Human behavior
Device Fingerprinting
cyber physical systems
CPS/ICS Security
composability
biblio
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate Sensors in CPS
Submitted by grigby1 on Mon, 01/21/2019 - 12:29pm
actuator security
Attacks on Sensors
authentication
composability
CPS/ICS Security
cyber physical systems
Device Fingerprinting
Human behavior
Metrics
physical attacks
pubcrawl
Resiliency
security
sensor fingerprinting
Sensors and Actuators
biblio
Hardware Security Threats Against Bluetooth Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 2:05pm
hardware security threats
wireless mesh networks
smartphone platforms
security protocol
resilience
pubcrawl
physical attacks
network topology
Metrics
mesh topology
Mesh networks
Internet of Things
authentication
Hardware Security
encryption
Cryptographic Protocols
composability
Bluetooth special interest group
Bluetooth mesh networks
Bluetooth mesh
bluetooth low energy
Bluetooth
BLE technology
BLE networks
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
biblio
Compiler-Assisted Loop Hardening Against Fault Attacks
Submitted by grigby1 on Wed, 01/10/2018 - 12:18pm
compiler
pubcrawl
Resiliency
composability
physical attacks
software protection
compiler security
biblio
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
Resiliency
Noise measurement
noise pattern
Object recognition
physical attacks
process control
pubcrawl
realistic water treatment testbed
reference noise pattern
Industrial Control Systems
security
sensor fingerprinting
sensor measurements
Temperature measurement
threat models
ultrasonic level sensors
Ultrasonic variables measurement
Water Distribution Testbed
cyber physical systems
simulation
Acoustic Fingerprints
Acoustics
Attack detection
communication channel
composability
control engineering computing
CPS
CPS modeling
cyber security
cyber-physical systems
cyberphysical system
deterministic model
fingerprint identification
hardware identification
Human behavior
industrial control
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
Submitted by grigby1 on Tue, 05/30/2017 - 12:46pm
composability
data lifetime
Data protection
linux operating systems security
memory disclosure attacks
Metrics
physical attacks
pubcrawl
RAM encryption
Resiliency
biblio
DARPA: Device Attestation Resilient to Physical Attacks
Submitted by grigby1 on Wed, 03/29/2017 - 12:34pm
attestation
capture
collective attestation
embedded devices
Metrics
networks
neural network
Neural networks
neural networks security
physical attacks
policy-based governance
pubcrawl
Resiliency
biblio
A Formalization of the Security Features of Physical Functions
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
key generation algorithms
Unpredictability
Unclonability
side channels attacks
security features
rudimentary security models
Robustness
quantification tools
PUF
Physics
Physically Unclonable Function (PUF)
physical unclonable functions
physical functions
physical attacks
Noise measurement
manufacturing
Adaptive optics
Integrated optics
integrated circuits
information systems security
Information Leakage
Formal Security Model
fault injection attacks
erroneous computations
Cryptography
cryptographic research
cryptographic devices
cryptographic constructions
context intrinsic physical properties
block ciphers
anticounterfeiting schemes
algorithmic solutions
« first
‹ previous
1
2
3
next ›
last »