Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Random access memory
biblio
Time-Related Hardware Trojan Attacks on Processor Cores
Submitted by grigby1 on Wed, 02/26/2020 - 4:39pm
real-time clock
Trojan horses
trojan horse detection
trigger conditions
time-related Hardware Trojan attacks
time information
system power-on
supply chain security
specific time period passes
specific realworld time
RISC-V processor
Resiliency
resilience
relative-time based Trojan
real-time systems
real-time clock circuits
Clocks
Random access memory
pubcrawl
Payloads
modern electronic systems
microprocessor chips
Kernel
invasive software
internal information
Hardware Trojan designs
hardware trojan
Hardware
extra power consumption
design security
cyber physical systems
biblio
An Efficient Memory Zeroization Technique Under Side-Channel Attacks
Submitted by aekwall on Mon, 02/24/2020 - 10:55am
built-in self test
volatile memories
side-channel attacks
Side-channel attack
security violations
secured data content
secret data
random-access storage
private memory contents
on-chip memory contents
Memory Zeroization
memory security
memory built-in-self-test hardware
MBIST based content zeroization approach
efficient memory zeroization technique
content protection
security of data
Temperature sensors
cryptographic keys
remanence
Compositionality
Engines
Random access memory
data deletion
security attacks
pubcrawl
Resiliency
system-on-chip
security
Memory management
Hardware
Cryptography
biblio
Reconfigurable Architecture to Speed-up Modular Exponentiation
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
modular exponentiation
Xilinx Virtex 7 FPGA
Scalability
RSA protocols
Resiliency
reconfigurable architectures
Reconfigurable Architecture
random number generation
Random access memory
public key cryptography
pubcrawl
pseudorandom number generator
Pre-computation techniques
Modular Multiplication
batch multiplication
hardware architecture
Hardware
frequency 200.0 MHz
FPGA
field programmable gate arrays
exponentiation
digital arithmetic
Diffie-Hellman like protocols
Diffie-Hellman key pair
Cryptography
computer architecture
computationally intensive cryptographic operations
Clocks
biblio
IoT Server Availability Considering DDoS-Attacks: Analysis of Prevention Methods and Markov Model
Submitted by grigby1 on Wed, 12/18/2019 - 2:47pm
Metrics
technical diagnostics
storage management
Software
smart business center diagnostics
Servers
server
SBC server protection
SBC network
Resiliency
resilience
Random access memory
pubcrawl
prevention methods
network servers
authentication
Markov processes
Markov model
IoT server availability
Internet of Things
Industrial Internet of Things
Human behavior
encryption
dependability
DDoS-attacks
DDoS-attack
DDoS Attack Prevention
Databases
computer network security
composability
biblio
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
code fragments
compiler security
user-mode protection
Transactional memory
software engines
sensitive variables
Peapods
OS-independent memory confidentiality
memory disclosure attacks
memory disclosure attack
DRAM chips
cryptographic keys
Cryptographic Implementation
cryptographic engines
confidentiality
compiler
Scalability
automatic protection
program compilers
Registers
Compositionality
operating systems (computers)
Engines
Random access memory
OS kernel
Data protection
Metrics
pubcrawl
Resiliency
Kernel
encryption
Cryptography
biblio
Establishing Independent Audit Mechanisms for Database Management Systems
Submitted by grigby1 on Mon, 07/01/2019 - 10:02am
Scalability
logging
malicious hacking
meta data
metadata
Organizations
pubcrawl
Random access memory
resilience
Resiliency
independent audit mechanisms
security
security audit
security audit tools
Security Audits
security breaches
security threat
storage image
tamper-detection software
tools
Digital Forensics
auditing
comprehensive audit framework
Computer crime
computer crimes
database forensic analysis
database forensics
database forensics methods
database management systems
Databases
apriori database preparation
evidence gathering
file system metadata
forensic audit tools
Forensics
Human behavior
Human Factors
Image reconstruction
independent audit framework
biblio
A Consideration of an Efficient Arithmetic Over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography
Submitted by aekwall on Wed, 05/01/2019 - 12:37pm
Gaussian processes
Vectors
Scalability
Resiliency
Random access memory
public key cryptography
pubcrawl
Proposals
Metrics
Conferences
finite element analysis
Elliptic curves
elliptic curve pairing cryptography
Elliptic curve cryptography
Cyclic Vector Multiplication Algorithm
cubic extension
Cryptography
biblio
A Dynamic-Key Secure Scan Structure Against Scan-Based Side Channel and Memory Cold Boot Attacks
Submitted by grigby1 on Fri, 04/05/2019 - 10:29am
memory attack
Side-channel attack
side channel attack
security level
security
secure scan architecture
scan design key generator
Scalability
Resiliency
resilience
Random access memory
pubcrawl
memory cold boot attack
memory attacks
Chained Attacks
integrated circuit testing
Hardware Security
Generators
flip-flops
dynamic-key secure scan structure
dynamic-key secure DFT structure
dynamic key generation
Discrete Fourier transforms
design for testability
design for test technology
Cryptography
Controllability
Clocks
biblio
Blockchain IoT (BIoT): A New Direction for Solving Internet of Things Security and Trust Issues
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
data authentication
trusted computing resources
Trusted Computing
transaction forgery
Software
sensors data
sensor data
security
secure microcontrollers
Random access memory
pubcrawl
Internet of Things security
Internet of Things
authentication
Cryptography
cryptographic signatures
controller entities
computer network security
blockchain transactions
blockchain security
blockchain platforms
blockchain operation
Blockchain IoT
blockchain infrastructure
blockchain
biblio
A software-defined networking framework for IoT based on 6LoWPAN
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
pubcrawl
wireless sensor networks
Wireless Sensor Network
Wireless communication
telecommunication power management
Task Analysis
software-defined wireless management
software-defined networking
software defined networking
SD-WSN6Lo
Resiliency
Random access memory
6LoWPAN
Protocols
Power demand
power consumption
personal area networks
networking framework
management complexity
low power wireless network
IoT
Internet of Things
composability
6LoWPAN networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »