Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computability
biblio
Mesh Based Obfuscation of Analog Circuit Properties
Submitted by aekwall on Mon, 11/09/2020 - 12:41pm
satisfiability modulo theory based algorithm
Design methodology
effective transistor dimensions
enhanced security
key based obfuscation technique
LC tank voltage-controlled oscillator
mesh topology
obfuscated circuitry
obfuscated transistors
obfuscation methodology
physical dimensions
SAT
circuit functionality
SMT
target frequency
transistor circuits
transistor sizes
Transistors
varactor transistor
Varactors
VCO
voltage amplitude
voltage-controlled oscillators
encryption key
Resiliency
pubcrawl
composability
policy-based governance
probability
Topology
reverse engineering
computability
operating frequency
Threshold voltage
Cryptography
circuit design
IP piracy
2×6 mesh structure
analog circuit properties
Analog circuits
analog obfuscation
analog satisfiability algorithm
aSAT algorithm
auto-determine
Brute Force Attack
biblio
Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access
Submitted by aekwall on Tue, 09/08/2020 - 8:59am
locked circuits
Chained Attacks
working chip
unauthorized scan access
secret key recovery
scan chain
SAT attack
robust DFS technique
robust DFS design
robust design-for-security architecture
restricted scan chain access
logic locking security
logic locking attacks
Scalability
IP piracy
Boolean satisfiability based attack
benchmark circuits
ATPG
Boolean functions
logic circuits
computability
Security analysis
logic locking
pubcrawl
Resiliency
Cryptography
biblio
A Formal Model for Resiliency-Aware Deployment of SDN: A SCADA-Based Case Study
Submitted by aekwall on Mon, 07/20/2020 - 9:32am
SDNSynth framework
resiliency-aware deployment
resilient operation
satisfiability modulo theories
SCADA
SCADA network
SCADA systems
SCADA-based case study
SDN architecture
SDNSynth
resiliency requirements
Smart Grid
Smart Grids
smart power grids
software defined networking
supervisory control and data acquisition network
Switches
synthesis model
synthetic SCADA systems
systematic deployment methodology
legacy forwarding devices
budget constraints
computability
Control Theory and Resiliency
deployment plan
encoding
formal model
formal modeling
hybrid network
incremental deployment
pubcrawl
network synthesis
network topology
novel grid control operations
power engineering computing
programmable SDN-enabled switches
real-time data
resilience
Resiliency
biblio
Resolving the Trilemma in Logic Encryption
Submitted by grigby1 on Fri, 04/03/2020 - 11:56am
post SAT approaches
trilemma
traditional logic encryption algorithms
structural security
SAT attack
Resiliency
resilience
query complexity
pubcrawl
provable security
provable logic obfuscation
pre-SAT approaches
Compositionality
Metrics
logic resynthesis
logic design
logic circuits
locking robustness
locked circuit
hardware ip protection
error number
encryption efficiency
Cryptography
computability
biblio
A Critical Evaluation of the Paradigm Shift in the Design of Logic Encryption Algorithms
Submitted by grigby1 on Fri, 04/03/2020 - 11:56am
provable security
structural corruption
SAT attack
paradigm shift
modern logic encryption algorithms
low-cost countermeasures
logic encryption techniques
logic encryption
intellectual property piracy
integrated circuit supply chain
Hardware Trojans
computability
Boolean satisfiability attack
resilience
Logic gates
Compositionality
Metrics
invasive software
Computer crime
integrated circuits
industrial property
Hardware Security
Hardware
Resiliency
pubcrawl
encryption
Cryptography
biblio
Supervisor Obfuscation Against Actuator Enablement Attack
Submitted by aekwall on Mon, 01/13/2020 - 11:18am
actuator attackers
actuator security
supervisor obfuscation
SAT solvers
obfuscated supervisor
normality assumption
finite state machines
finite state automata
computability
closed loop systems
behavior-preserving supervisors
attackability
actuator enablement attack
security of data
Discrete-Event Systems
closed-loop system
actuator attacker
actuator attack
supervisory control
Metrics
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
biblio
An Efficient SAT-Attack Algorithm Against Logic Encryption
Submitted by grigby1 on Tue, 01/07/2020 - 9:54am
information science
Superluminescent diodes
SAT-attack algorithm
SAT
Resiliency
resilience
pubcrawl
logic IP protection
Logic gates
logic encryption
integrated circuits
Benchmark testing
encryption
encrypted circuits
efficient encryption
decryption
cyber physical systems
Cyber Physical System
Cryptography
computability
composability
biblio
Verification of Randomized Security Protocols
Submitted by grigby1 on Thu, 05/24/2018 - 11:22am
Policy
Upper bound
standard cryptographic primitives
sequences
sequence
secret sec
secrecy problem
randomized security protocol Verification
pubcrawl
Protocols
protocol verification
probability
privacy
policy-based collaboration
Complexity theory
nonsatisfiability problem
monadic first order logic
matching lower bound
Indistinguishability
formal logic
encryption
Electronic mail
Cryptographic Protocols
coNEXPTIME
computational complexity
computability
Compositionality
biblio
An SMT-Based Approach to Secure State Estimation under Sensor and Actuator Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:48pm
Metrics
state estimation
sparse strong observability
SMT-based approach
sensors
sensor attacks
security
secure state estimator
satisfiability modulo theory
Resiliency
resilience
pubcrawl
Observability
actuator attacks
Mathematical model
linear time-invariant system
Linear systems
Human behavior
fault tolerance
computability
composability
adversarial attack
adversarial agent
actuators
actuator security