Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Random access memory
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
Scalability
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
microarchitectural security threat
security
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
I-O Systems
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
advanced Memway algorithm
i-o systems security
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
biblio
An Accelerator-based Architecture Utilizing an Efficient Memory Link for Modern Computational Requirements
Submitted by grigby1 on Tue, 10/06/2020 - 2:02pm
embedded systems
Task Analysis
security
Resiliency
resilience
Random access memory
pubcrawl
Program processors
On-Chip Communication Architectures
Metrics
Kernel
Heterogeneous systems
Hardware accelerator
Acceleration
embedded system architecture
efficient memory link
cyber physical systems
CPS
configurable accelerators
concurrency (computers)
Concurrency
computer architecture
composability
bussing system
automotive application
accelerator-based architecture
biblio
Straggler Resilient Serverless Computing Based on Polar Codes
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
Resiliency
hybrid computing framework
linear algebra
matrix multiplication
optimisation
polar codes
pubcrawl
Random access memory
resilience
gradient methods
sequential decoding
serverless computing mechanism
serverless platforms
Servers
straggler resilient serverless computing
straggler-resilience
Task Analysis
channel coding
encoding
emerging cloud based computation model
distributed computation
Decoding
Computing Theory
computationally expensive tasks
computationally effective manner
Computational modeling
computational burden
Complexity theory
coding theory
coding methods
coded computation technique
coded computation scheme
Cloud Computing
biblio
Asynchronous Rendering of Texts in iOS Applications
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
operating systems
iOS Security
user interfaces
text information rendering
rendering (computer graphics)
rendering
iOS operating system
iOS applications
asynchronous text rendering
asynchronous methods
iOS (operating system)
mobile computing
Message systems
Instruction sets
Compositionality
Human Factors
Random access memory
Mobile Applications
text analysis
Metrics
pubcrawl
Resiliency
biblio
HSSM: High Speed Split Multiplier for Elliptic Curve Cryptography in IoT
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Complexity theory
Cryptography
Elliptic curve cryptography
Elliptic curves
encryption
Metrics
Montgomery Curve
pubcrawl
Random access memory
resilience
Resiliency
Scalability
Scalar Point Multiplication
Twisted Edward Curve
biblio
Memory Efficient High-Performance Rotational Image Encryption
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
real-time systems
optimisation
optimization
optimizations
parallel architectures
parallel rotational encryption technique
pubcrawl
Random access memory
real-time applications
memory efficient high-performance rotational image encryption
resilience
Resiliency
rotated encrypted images
rotational image encryption technique
shadow image
storage management
visual cryptography
gpu
composability
compute unified device architecture
Conferences
Cryptography
CUDA
cyber-physical systems
efficient encryption
encryption
coalesce
graphics processing units
high-performance
high-performance device
high-performance reformulations
Image Processing
improved global memory utilization
Instruction sets
biblio
Towards a Generic Approach for Memory Forensics
Submitted by grigby1 on Wed, 06/03/2020 - 12:02pm
Kernel
Scalability
Resiliency
resilience
Random access memory
pubcrawl
PDB file
microsoft windows
Metrics
Memory Forensics
Application's data
information forensics
Human Factors
Human behavior
Forensics
digital evidence
Debugging information
debugging
data structures
Data mining
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices
Submitted by aekwall on Mon, 03/23/2020 - 1:21pm
PUF
random key generation
SRAM PUF
SRAM device
SRAM chips
SRAM chip
SRAM
PUF key generation mechanism
Private keys
fuzzy extractors
fuzzy extractor techniques
error correction coding methods
Error analysis
Arduino mega shield
adjustable memory-based PUF
key generation
IoT
error correction codes
physically unclonable functions
Random access memory
authentication
Metrics
pubcrawl
Human behavior
Resiliency
secret keys
private key cryptography
IoT devices
Internet of Things
encryption
Servers
Scalability
biblio
Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems : (Invited Paper)
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
Hardware Security
Ubiquitous Computing Security
ubiquitous hardware security
Thermal stability
security-sensitive applications
random number generators
pufs
power penalty
low-end devices
Low power
HW security
energy-efficient primitives
ubiquitous computing
error correction codes
security
Human Factors
Random access memory
Entropy
attacks
design requirements
Metrics
pubcrawl
Resiliency
power aware computing
attack surface
Hardware
Cryptography
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »