Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrated circuits
biblio
PCH framework for IP runtime security verification
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
post-silicon stage
untrusted third-party vendors
untrusted IPs
Trusted Computing
Symbolic Execution
security of data
security
SAT solving methods
runtime formal verification framework
Runtime
Resiliency
resilience
pubcrawl
proof-carrying hardware framework
pre-silicon stage
composability
PCH framework
Microelectronics Security
Metrics
Mathematical model
malicious behavior detection
IP runtime security verification
integrated circuits
high-level security assurance
hardware runtime verification
Hardware design languages
Hardware
Foundries
formal verification
biblio
Scan chain based IP fingerprint and identification
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
intellectual property
Silicon
security
scan chain
Scalability
Resiliency
resilience
pubcrawl
network on chip security
Metrics
ip protection
IP networks
IP identification
IP fingerprint
copy protection
integrated circuits
integrated circuit design
industrial property
identification technology
IC identification
fingerprinting techniques
Fingerprint recognition
fault coverage
fabrication
digital fingerprinting
digital fingerprint
delays
biblio
Cyber Security of Industrial Communication Protocols
Submitted by grigby1 on Wed, 05/30/2018 - 4:01pm
Metrics
testbed
security weaknesses
security
Resiliency
resilience
pubcrawl
Protocols
programming
PROFINET
Portals
policy-based governance
Monitoring
collaboration
Machinery
Local area networks
integrated circuits
industrial Ethernet
Industrial Control Systems
industrial control
industrial communication protocols
Human Factors
Human behavior
cyber security
computer network security
commercial-off-the-shelf equipment
biblio
Testing Techniques and Analysis of SQL Injection Attacks
Submitted by grigby1 on Thu, 05/24/2018 - 12:08pm
SQL Injection vulnerability
resilience
Resiliency
security of data
security systems
security testing
sensitive data
sensitive information
SQL
SQL injection
SQL Injection attacks
SQL injection problems
relational databases
SQL query
testing techniques
three-tier-architecture
traditional security policies
user interfaces
users
Web application vulnerabilities
web applications
Web sites
website
handy interface
attackers
Cogeneration
commonly used Web application attacks
composability
Data protection
database-driven Web applications
DH-HEMTs
different security systems
effective data protection systems
good target
governmental organizations
attack
Human behavior
integrated circuits
internet
Knowledge engineering
Metrics
penetration testing technique
program testing
proper data protection
pubcrawl
relational database security
biblio
Hardware-Based Anti-Counterfeiting Techniques for Safeguarding Supply Chain Integrity
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
pubcrawl
system designer
supply chain security
supply chains
supply chain management
supply chain integrity
security matrices
Scalability
reverse engineering
Resiliency
resilience
Consumer electronics
product supply chain
IP theft
intellectual property laws
integrated circuits
Human behavior
hardware security-based techniques
hardware-based anti-counterfeiting
Hardware
counterfeiting
counterfeit detection
biblio
Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Logic gates
TrustHUB benchmarks
Trojan-feature extraction
Trojan nets
Trojan horses
trojan horse detection
Resiliency
resilience
random forest classifier
Random Forest
pubcrawl
normal nets
Multiplexing
malicious third-party vendors
machine-learning based hardware Trojan classifier
machine learning
Benchmark testing
learning (artificial intelligence)
invasive software
integrated circuits
integrated circuit design
IC design process
hardware-Trojan infected nets
hardware-Trojan detection
hardware trojan
Hardware
gate-level netlists
gate-level netlist
feature extraction
F-measure
cyber physical systems
composability
biblio
Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
mission critical applications
Trojan horses
trojan horse detection
traditional techniques
Temperature sensors
system-on-chip
simple processing mechanism
runtime hardware Trojan detection techniques
Runtime
Resiliency
resilience
pubcrawl
power distribution networks
Monitoring
behavior profiling
manufacturing test phase
IP based SoC
invasive software
Intrusion Detection
integrated circuits
Hardware
golden data model
digital power profile
cyber physical systems
Cryptography
composability
classical Advanced Encryption Standard circuit
circuit under test
biblio
Intra-Die-Variation-Aware Side Channel Analysis for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:59pm
Sensitivity
logic testing
Power based Side-channel
Power measurement
probability
process variation levels
Process Variations
pubcrawl
relative power difference
resilience
Resiliency
logic circuits
sequential type Trojans
side channel analysis
spatial correlation
Systematics
test pattern generation
Trojan activation probability
trojan horse detection
Trojan horses
Trojan inserted circuits
hardware trojan
automatic test pattern generation
combinational type Trojans
composability
cyber physical systems
delays
Detection sensitivity
efficient Trojan detection approach
elevated process variations
Hardware
AES-128 circuit
hardware Trojan detection
high detection sensitivity
integrated circuit design
integrated circuit testing
integrated circuits
intra-die-variation
invasive software
ISCAS 89 benchmark
ITC 99 benchmark
biblio
A Practical Evaluation of Free-Text Keystroke Dynamics
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
keystroke time series
time series
time 5 min
time 30 min
time 2.5 min
time 10 min
time 1 min
temporal data order
sliding window
sessions
pubcrawl
Metrics
Measurement
Human behavior
keystroke analysis
Keyboards
integrated circuits
Human Factors
authentication
behavioral biometric
biometrics (access control)
continuous user authentication
Data collection
free-text keystroke dynamics
Heuristic algorithms
biblio
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
Internet world
security services
secure communication channels
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
process monitoring
process control
Monitoring
Metrics
KMS
key management
Access Control
internet
integrated circuits
industrial process
Industrial Control Systems
ICs
IBE
IBC
Human behavior
efficient key management system
cyber security challenges
cyber security
Cryptography
authorisation
authentication
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »