Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Clocks
biblio
Practical Implementation of APTs on PTP Time Synchronisation Networks
Submitted by grigby1 on Fri, 01/22/2021 - 2:39pm
synchronisation
PTP time synchronisation networks
PTP infrastructure components
PTP
programmable Man-in-the-Middle
programmable injector device
precision time protocol
IEEE 1588
computer clocks
advanced persistent threats
Clocks
Degradation
Synchronization
cyber-attacks
security of data
APT
advanced persistent threat
malware
delays
Protocols
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
Cyber-security
biblio
Random Number Generator Based on Skew-tent Map and Chaotic Sampling
Submitted by aekwall on Mon, 01/18/2021 - 11:22am
Oscillators
skew-tent map
field programmable analog arrays
field programmable analog array
discrete-time chaos
chaotic sampling of regular waveform
random number generator
Clocks
Trajectory
Scalability
chaotic cryptography
chaotic communication
Throughput
Generators
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Bluetooth devices fingerprinting using low cost SDR
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
Clocks
wireless security
wireless communication scheme
transmitters identification
Software Defined Radios
physical-layer fingerprinting approach
low cost SDR
communication protocol
Bluetooth scan
Bluetooth devices fingerprinting
authentication layer
software radio
bluetooth security
Bluetooth
Physical layer
Synchronization
fingerprint identification
composability
Wireless communication
Communication system security
Protocols
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
resilience
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
high data rates
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
BT spectrum analysis
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
address randomization
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
biblio
Physical Unclonable Functions (PUFs) Entangled Trusted Computing Base
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
Predictive Metrics
trusted platform modules
trusted computing base
Trusted Computing
SW-PUF measurements
software measurement physical unclonable function
Software measurement
software instruction
Software
Semiconductor device measurement
Scalability
Resiliency
Reliability
pubcrawl
program execution
processor chip ALU silicon biometrics
Clocks
Pollution measurement
physical unclonable functions
particular program instruction
neural style transfer
microprocessor chips
logic design
logic circuits
field programmable gate arrays
digital signatures
delays
data-dependent delay
cyber-physical system security
copy protection
composability
biblio
DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC
Submitted by grigby1 on Tue, 11/17/2020 - 2:39pm
frequency regulator
Clocks
system-on-chip
Frequency modulation
ARM TrustZone
AXI bus
DVFS
Dynamic Voltage and Frequency Scaling
embedded system security
power aware computing
nonsecure ARM core
Regulators
secure ARM core
security failure
TrustZone-enabled heterogeneous SoC
TrustZone-enabled System-on-Chip
voltage regulator
Operating systems security
Instruction sets
IP networks
Trusted Computing
pubcrawl
Metrics
Resiliency
embedded systems
composability
computer architecture
security
hardware trojan
Receivers
resilience
energy consumption
operating systems (computers)
operating systems
operating system
electronic engineering computing
biblio
Towards provably-secure performance locking
Submitted by aekwall on Mon, 11/09/2020 - 1:32pm
Electronics packaging
provably-secure performance locking
performance locking
integrated circuit thwarts attacks
functional locking
FabScalar microprocessor
FabScalar
boolean satisfiability (sat)
intellectual property piracy
IP piracy
Degradation
security of data
Clocks
multiprocessing systems
Integrated circuit modeling
Business
policy-based governance
composability
pubcrawl
Resiliency
power aware computing
security
biblio
A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Submitted by grigby1 on Mon, 11/02/2020 - 12:28pm
Registers
IJTAG network
IJTAG security
Instruments
intellectual property security
isolation signals
microprocessor chips
on-chip access
on-chip instruments
policy-based governance
power consumption
pubcrawl
IJTAG
resilience
Resiliency
scan chain
security
security of data
system-on-chip
system-on-chip designs
third party intellectual property providers
unauthorized user access
untrusted sources
Diagnosis
Clocks
Complexity theory
composability
controlled scan chain isolation
data integrity
Data Integrity Attacks
data manipulation
data protection scheme
data sniffing
debug
design for test
authorisation
electronic design automation
embedded instruments
embedded systems
graph coloring problem
graph colouring
graph theory approach
hidden test-data registers
IEEE standards
IEEE Std 1687
IEEE Std. 1687
biblio
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
multi-threading
vulnerabilities
tools
Synchronization
security of data
security
Runtime
Resiliency
resilience
pubcrawl
program diagnostics
multithreaded execution nondeterminism
Clocks
Metrics
Instruments
Instruction sets
cyber physical systems
CPS
CONVUL
Concurrent computing
concurrency vulnerability detection
concurrency control
Concurrency
composability
biblio
Towards Protection Mechanisms for Secure and Efficient CAN Operation
Submitted by aekwall on Mon, 09/21/2020 - 3:46pm
efficient CAN operation
security solutions
controller area networks
CAN bus
access controller
automotive security
broadband services
CAN data-link layer
CAN Security
Clocks
fault confinement mechanism
iterative research
message priority
numerous proposed solutions
protection mechanisms
real-time message deliverability
secure CAN operation
confinement
Protocols
Automotive engineering
computer network security
telecommunication traffic
authorisation
real-time systems
Resiliency
pubcrawl
composability
automobiles
Industry 4.0
privacy
authentication
Cyber Attacks
cyber-physical systems
error detection
timing
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »