Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Runtime
biblio
Detection of SQL injection attacks by removing the parameter values of SQL query
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
privacy
web services
web applications
tools
Structured Query Language
SQL query
SQL Injection attacks
SQL injection attackers
SQL injection attack detection method
SQL injection
SQL
Runtime
Resiliency
query processing
pubcrawl
backend database
policy-based-governance
parameter values
mobile web applications
mobile computing
Metrics
Internet users
internet
Human behavior
desktop web application
Databases
database
confidential information
Conferences
Computer crime
biblio
LUCON: Data Flow Control for Message-Based IoT Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:20am
message-based IoT systems
usage control mechanisms
usage control
Temperature measurement
taint analysis
sensors
Semantics
Runtime
real-world IoT middleware
pubcrawl
process control
private data
policy enforcement
personal information
middleware
Metrics
Access Control
message routes
LUCON policies
IoT applications
Internet of Things
information leaks
Information Flow Control
Industrial Internet of Things
distributed systems
data-centric security policy framework
data privacy
data flows
data flow control
computer network security
composability
authorisation
biblio
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
Runtime
programming
pubcrawl
RA
reduced instruction set computing
remote device integrity
Resiliency
RISC-based embedded devices
RISC-V system-on-chip
Program processors
runtime attestation
security
security of data
security service
SoC
software binaries
system-on-chip
Trusted Computing
embedded Internet of Things devices
composability
control-flow attacks
control-flow attestation schemes
data flow computing
data integrity
data-flow events
data-oriented programming
DOP attacks
attestation
embedded systems
hardware-assisted remote attestation scheme
Human behavior
Internet of Things
lightweight hardware-assisted attestation of program execution
LiteHAX
malicious modification
malware
biblio
Program-flow attestation of IoT systems software
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
malware
TrustZone
static attestation phase
static
software modification
security of data
security
Runtime
Resiliency
remote software-based attestation mechanisms
Remote Attestation
pubcrawl
programming
program-flow attestation
Program-Flow
Memory management
application program flow
IoT systems software
IoT
Internet of Things
impractical constraints
Human behavior
hardware devices
Hardware
dynamic attestation technique
dynamic
Dual Attestation
distributed processing
device integrity measurement
data integrity
composability
attestation
biblio
Detecting Cryptomining Using Dynamic Analysis
Submitted by grigby1 on Mon, 11/19/2018 - 11:15am
Browsers
computer security
cryptocurrency
cryptojacking
Human behavior
invasive software
malware
Metrics
pubcrawl
resilience
Resiliency
Runtime
standards
biblio
SIN2: Stealth infection on neural network \#x2014; A low-cost agile neural Trojan attack methodology
Submitted by grigby1 on Fri, 07/06/2018 - 1:06pm
neural computing framework
Trojan horses
third-party cloud based machine learning as a service
static neural network model
software algorithm level
SIN2
security
Scalability
Runtime
Resiliency
resilience
pubcrawl
portable DNN computing engine
Payloads
Neural networks
neural nets
AI Poisoning
low-cost modular methodology-stealth infection on neural network
low-cost agile neural Trojan attack methodology
learning (artificial intelligence)
invasive software
Intelligent systems
intelligent supply chain
intelligent service supply chain
Human behavior
dynamic runtime system
DNN security
Deep Neural Network
Computational modeling
Cloud Computing
artificial intelligence industry
biblio
PCH framework for IP runtime security verification
Submitted by grigby1 on Mon, 06/11/2018 - 2:47pm
post-silicon stage
untrusted third-party vendors
untrusted IPs
Trusted Computing
Symbolic Execution
security of data
security
SAT solving methods
runtime formal verification framework
Runtime
Resiliency
resilience
pubcrawl
proof-carrying hardware framework
pre-silicon stage
composability
PCH framework
Microelectronics Security
Metrics
Mathematical model
malicious behavior detection
IP runtime security verification
integrated circuits
high-level security assurance
hardware runtime verification
Hardware design languages
Hardware
Foundries
formal verification
biblio
A security-aware routing implementation for dynamic data protection in zone-based MPSoC
Submitted by grigby1 on Mon, 06/11/2018 - 2:24pm
multiprocessing systems
network on chip security
Zones
security-aware routing
network-on-chip routing
network routing
multiprocessor system-on-chip
MPSoC
Encapsulation
asymmetrical security zones
Firewalls (computing)
Runtime
NoC
Routing protocols
Metrics
resilience
Routing
IP networks
Data protection
network-on-chip
Scalability
Resiliency
pubcrawl
security
biblio
A hybrid method for detection and prevention of SQL injection attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
serious security threat
Policy-Governed Secure Collaboration
Prevention
privacy
pubcrawl
Resiliency
Runtime
security of data
sensitive information
policy-based governance
Servers
SQL
SQL injection
SQL injection attack
SQL statements
SQLIA
static
web applications
detection
collaboration
common gateway interface
Computer hacking
Data mining
database design
database driven web applications
database management systems
Databases
access content
dynamic
Hacker
Human behavior
hybrid method
hybrid SQLIA
internet
Policy
biblio
Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:00pm
mission critical applications
Trojan horses
trojan horse detection
traditional techniques
Temperature sensors
system-on-chip
simple processing mechanism
runtime hardware Trojan detection techniques
Runtime
Resiliency
resilience
pubcrawl
power distribution networks
Monitoring
behavior profiling
manufacturing test phase
IP based SoC
invasive software
Intrusion Detection
integrated circuits
Hardware
golden data model
digital power profile
cyber physical systems
Cryptography
composability
classical Advanced Encryption Standard circuit
circuit under test
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »