Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrated circuits
biblio
Implementation and Comparison of SPA and DPA Countermeasures for Elliptic Curve Point Multiplication
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
Logic gates
Simple Power Analysis Attack
side channel analysis attacks
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
power analysis attacks
Metrics
Differential Power Analysis Attack
integrated circuits
hardware description languages
elliptic curve point multiplication
elliptic curve cryptosystems
Elliptic Curve Cryptosystem
Elliptic curve cryptography
DPA countermeasures
differential power analysis attacks
biblio
Security Network On-Chip for Mitigating Side-Channel Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:08am
multiple countermeasures
compromised device
contemporary hardware threats
design complexity
electromagnetic analysis attacks
electromagnetic interference
hardware security threats
high-confidence security network on-chip
individual threats
machine learning security IC
malicious physical interference
modern ICs
attack-specific countermeasures
on-chip distribution networks
On-chip power delivery
on-chip voltage variations
operating device-under-attack
robust confidence security network on-chip
security networks
Side-channel attack
side-channel attack mitigation
strict performance requirements
trained ML ICs
network on chip security
timing
Scalability
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
machine learning
physical interaction
system-on-chip
system security
sensors
Attack detection
security of data
Hardware Security
side-channel attacks
integrated circuit design
data analysis
malicious activity
integrated circuits
network-on-chip
active attack
advance invasive attacks
advance noninvasive attacks
advanced technology nodes
biblio
A behavior analysis of Permanent Magnet Synchronous Generator - Vienna rectifier set for marine current energy conversion
Submitted by grigby1 on Fri, 04/24/2020 - 12:01pm
permanent magnet synchronous generator
vienna rectifier
synchronous generators
Resiliency
resilience
Rectifiers
pubcrawl
privacy
phase-shift self-oscillating current controller
Permanent magnets
composability
oscillating behaviors
neutral connected to the mid-point DC bus
Metrics
Mathematical model
marine renewable energies
integrated circuits
Energy conversion
control systems
biblio
A Critical Evaluation of the Paradigm Shift in the Design of Logic Encryption Algorithms
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
provable security
structural corruption
SAT attack
paradigm shift
modern logic encryption algorithms
low-cost countermeasures
logic encryption techniques
logic encryption
intellectual property piracy
integrated circuit supply chain
Hardware Trojans
computability
Boolean satisfiability attack
resilience
Logic gates
Compositionality
Metrics
invasive software
Computer crime
integrated circuits
industrial property
Hardware Security
Hardware
Resiliency
pubcrawl
encryption
Cryptography
biblio
Special Session: Countering IP Security Threats in Supply Chain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
Monitoring
Valves
Trojan insertion
Training
telecommunication security
tagging
supply chain security
supply chain management
Supply Chain
Scalability
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
Data models
machine learning
logic locking schemes
logic design
learning-based trust verification
learning (artificial intelligence)
IP security threats
invasive software
internet
integrated circuits
integrated circuit technology
integrated circuit manufacture
integrated circuit fabrication
integrated circuit design
Human behavior
electronic engineering computing
biblio
Secure Memory for Embedded Tamper-Proof Systems
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
security of data
memory supply voltage manipulation
metastability
Metrics
protection circuitry
pubcrawl
Resiliency
Scalability
secure memory
Memory management
storage management
Tamper resistance
tamper-proof embedded systems
tamper-proof system
Tamper-Resistance
Trusted Component
Voltage measurement
Aerospace electronics
memory instability
memory data leakage protection
memory data change
memory cell circuitry
integrated circuits
Integrated circuit modeling
Human Factors
Human behavior
embedded tamper-proof systems
embedded systems
Data protection
data change scenaria
Cryptography
composability
change memory contents
biblio
Experimental Verification of Security Measures in Industrial Environments
Submitted by aekwall on Mon, 03/02/2020 - 12:29pm
Human Factors
Ubiquitous Computing Security
vICS verification framework
industrial environments
industrial control security
industrial assets
ICS technology
formal verification
security measures
control engineering computing
ICs
industrial control
security of data
verification
Firewalls (computing)
integrated circuits
Anomaly Detection
production engineering computing
Metrics
pubcrawl
Resiliency
Software
Hardware
Scalability
biblio
Increasing the SAT Attack Resiliency of In-Cone Logic Locking
Submitted by grigby1 on Wed, 02/26/2020 - 4:48pm
Logic gates
security
satisfiability attack
SAT attack resiliency
SAT attack
Resiliency
resilience
removal attack
pubcrawl
MFFC based algorithm
maximum fanout free cones
manufacturing
logic locking
provable security
logic design
key gate selection
Iterative methods
integrated logic circuits
integrated circuits
in-cone techniques
in-cone logic locking
Hardware Security
Hardware
Electronics packaging
circuit netlist
biblio
When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans
Submitted by grigby1 on Wed, 02/26/2020 - 4:39pm
information leakage paths
Trojan horses
trojan horse detection
trojan detection approaches
testing
supply chain security
Resiliency
resilience
pubcrawl
invasive software
integrated circuits
Integrated circuit modeling
integrated circuit industry
analog attacks
information flow tracking based solution
IC supply chain
Hardware
formal method driven design
Digital circuits
cyber physical systems
circuit-level properties
charge-domain trojans/vulnerabilities
charge-domain models
charge-domain leakage paths
Capacitors
capacitor-enabled attacks
biblio
Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection Using Testing and Imaging
Submitted by grigby1 on Wed, 02/26/2020 - 4:38pm
Resiliency
Logic Test
low accuracy
malicious modifications
microscopy
modern military systems
new hybrid approach
pubcrawl
rapid hardware trojan detection
resilience
Logic gates
reverse engineering
scanning electron microscopy
security
SEM images
superlative accuracy
supply chain security
trojan horse detection
Trojan horses
grave threat
commercial systems
cyber physical systems
detection method
exhaustive test infrastructure
existing gate footprints
Foundries
GGC
golden chip
golden gate circuits
backside ultra thinning
Hardware
Hardware Trojans
high classification accuracy
high time cost
Image analysis
Imaging
integrated circuits
invasive software
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »