Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
Mystic: Mystifying IP Cores Using an Always-ON FSM Obfuscation Method
Submitted by aekwall on Mon, 11/09/2020 - 12:32pm
integrated circuit industry
IP piracy
application specific integrated circuits
ASIC technology
circuit complexity
combinational circuits
finite state machine
FSM obfuscation method
hardware obfuscation method
Hardware Security
IP overproduction
ITC99 circuit benchmarks
logic encryption
Logic masking
Mystic obfuscation approach
Mystic protection method
mystifying IP cores
Logic gates
Hardware
Resiliency
pubcrawl
composability
policy-based governance
Production
Complexity theory
microprocessor chips
IP networks
obfuscation
reverse engineering
encoding
finite state machines
logic circuits
logic design
size 45.0 nm
biblio
Customized Locking of IP Blocks on a Multi-Million-Gate SoC
Submitted by aekwall on Mon, 11/09/2020 - 12:31pm
integrated circuit design
VLSI testing
Solid modeling
off-site untrusted fabrication facilities
multiple IP blocks
multimillion-gate SoC
IP block
integrated circuit manufacture
industrial designs
IP piracy
logic design
Erbium
IP networks
industrial property
Logic gates
integrated circuits
logic locking
policy-based governance
composability
pubcrawl
Resiliency
system-on-chip
security
Hardware
biblio
IC/IP Piracy Assessment of Reversible Logic
Submitted by aekwall on Mon, 11/09/2020 - 12:31pm
proper-size reversible functions
BDD
binary decision diagrams
embedded function
garbage outputs
IC-IP piracy assessment
IC/IP piracy
intellectual property piracy
Number of embeddings
ancillary inputs
QMDD
quantum multivalued decision diagrams
regular functions
Reversible logic
reversible logic circuits
reversible logic synthesis tools
IP piracy
IP networks
adiabatic computing
logic design
logic circuits
adders
Integrated circuit modeling
industrial property
Logic gates
quantum computing
Trojan horses
policy-based governance
composability
pubcrawl
Resiliency
embedded systems
security
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 12:14pm
machine learners
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
open systems
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
pubcrawl
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
distributed denial of service
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
biblio
ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks
Submitted by grigby1 on Wed, 11/04/2020 - 1:13pm
repetitive ARP reply
tools
Software-Defined Networks
software-defined networking
software defined networking
SFC vulnerability
SFC
service function chaining
Servers
security issues
SDN
Scalability
Safety
Resiliency
resilience
AI Poisoning
pubcrawl
Protocols
Next generation networking
networking technology
networking environment
IP networks
Human behavior
Firewalls (computing)
control systems
computer network security
ARP update state
ARP Poisoning attack detection
ARP Poisoning
biblio
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress
Submitted by grigby1 on Wed, 11/04/2020 - 1:13pm
pubcrawl
GeoIP related features
Human behavior
internet
IP networks
Kaminsky attack
learning (artificial intelligence)
machine learning
machine learning techniques
feature extraction
resilience
Resiliency
Scalability
security of data
Servers
standard DNS protocols
time related features
Training
detection method
authoritative DNS server
cache poisoning attack
cache storage
cached DNS data
compromised authoritative DNS servers
Computer crime
computer network security
Databases
AI Poisoning
DNS
DNS based domain name resolution
DNS cache poisoning attacks
DNS cache servers
DNS packet
DNS response packets
DNS security extensions
biblio
Security-Driven Task Scheduling for Multiprocessor System-on-Chips with Performance Constraints
Submitted by grigby1 on Mon, 11/02/2020 - 12:36pm
pubcrawl
two-stage performance-constrained task scheduling algorithm
Trojan horses
task scheduling
Task Analysis
system-on-chip
System performance
system level security constraints
security-driven task scheduling
security of data
security
scheduling
Schedules
schedule length
Resiliency
resilience
composability
Processor scheduling
policy-based governance
performance constraints
Multiprocessor System-on-Chips
multiprocessing systems
MPSoC
malicious inclusions
logic design
IP networks
intellectual property security
industrial property
hardware trojan
Hardware
graph theory
delays
biblio
Deceive the Attacker: Thwarting IP Theft in Sieve-Valve-based Biochips
Submitted by grigby1 on Mon, 11/02/2020 - 11:29am
real-life biochips
IP theft
Lab-on-a-Chip
Microfluidics
Mixers
Multiplexing
obfuscated biochips
policy-based governance
practical sieve-valve based obfuscation
pubcrawl
IP networks
resilience
Resiliency
reverse engineering
security of data
Sequential analysis
sieve-valve-based biochips
sieve-valves
Valves
computer network security
bioassay developer
bioassay implementation
biochip building blocks
biochips
biological techniques
Biomembranes
bioMEMS
composability
attacker
control signals
cost-security trade-offs
desieve
highly-skilled-person-hour investment
industrial property
intellectual property rights
intellectual property security
internet
biblio
SoCINT: Resilient System-on-Chip via Dynamic Intrusion Detection
Submitted by grigby1 on Mon, 11/02/2020 - 11:29am
Monitoring
Trojan horses
system-on-chip
software tools
SoCs
SoCINT
security
Runtime system
Resiliency
resilience
Registers
pubcrawl
policy-based governance
open source processor
composability
IP networks
Intrusion Detection
intellectual property security
intellectual properties
industrial property
Hardware Trojans
hardware tracing
Hardware Security
Hardware
FPGA platform
field programmable gate arrays
dynamic intrusion detection approach
biblio
An Orthogonal Algorithm for Key Management in Hardware Obfuscation
Submitted by grigby1 on Mon, 11/02/2020 - 11:28am
member leakage attack
supply chain management
Supply Chain
semiconductor chips
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
partnership organization
orthogonal obfuscation algorithm
Orthogonal obfuscation
orthogonal matrix
microprocessor chips
authenticate obfuscation keys
Licenses
IP piracy attacks
IP piracy
IP networks
IP cores
intellectual property security
intellectual property piracy attacks
integrated circuits
integrated circuit design
industrial property
Hardware Security
Hardware
copy protection
composability
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »