Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
embedded systems
biblio
Work-in-Progress: Towards a Smaller than Grain Stream Cipher: Optimized FPGA Implementations of Fruit-80
Submitted by aekwall on Fri, 03/03/2023 - 10:57am
lightweight cryptography
Lightweight Ciphers
stream cipher
parallelism
Grain
Fruit-80
FPGA implementation
flip-flops
Computer aided software engineering
field programmable gate arrays
cyber-physical systems
Ciphers
Resiliency
Scalability
pubcrawl
optimization
Internet of Things
embedded systems
biblio
“If security is required”: Engineering and Security Practices for Machine Learning-based IoT Devices
Submitted by grigby1 on Tue, 02/28/2023 - 5:51pm
Prototypes
embedded systems
Costs
software engineering
security and privacy
reverse engineering
cyber-physical systems
computer security
composability
Internet of Things
IoT security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
machine learning
Interviews
biblio
Effectiveness on C Flaws Checking and Removal
Submitted by grigby1 on Fri, 02/17/2023 - 5:42pm
Telecommunications
Code Correction
Buffer Overflow Vulnerabilities
Buffer overflows
software assurance
static analysis
Rail transportation
software security
embedded systems
pubcrawl
Computer languages
fuzzing
Memory management
Scalability
Software
Resiliency
resilience
biblio
Work-in-Progress: Reliability Evaluation of Power SCADA System with Three-Layer IDS
Submitted by grigby1 on Fri, 02/17/2023 - 5:13pm
Intrusion Detection
pubcrawl
resilience
Resiliency
authentication
industrial control
SCADA systems
Compositionality
SCADA
Reliability
embedded systems
SCADA Systems Security
passwords
Computer aided software engineering
three-layer IDS
biblio
System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats
Submitted by grigby1 on Fri, 02/17/2023 - 5:10pm
secure system
SoC
isolated domains
arm
policy governance
sandboxing
Embedded System
threats
embedded systems
Robustness
computer architecture
side-channel attacks
composability
system-on-chip
Safety
security
Hardware
pubcrawl
collaboration
biblio
HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers
Submitted by aekwall on Fri, 02/17/2023 - 10:41am
Prototypes
TrustZone
Randomization
microcontroller security
code reuse attack
rop attacks
microcontrollers
Runtime environment
codes
security
Proposals
composability
Resiliency
Scalability
pubcrawl
Human Factors
embedded systems
biblio
Combination of ROP Defense Mechanisms for Better Safety and Security in Embedded Systems
Submitted by aekwall on Fri, 02/17/2023 - 10:40am
Safety
Xtensa
Control flow integ-rity
arm
digital systems
rop attacks
return-oriented programming
codes
Program processors
embedded systems
composability
Resiliency
Scalability
pubcrawl
Human Factors
Software
Hardware
biblio
Code Mutation as a mean against ROP Attacks for Embedded Systems
Submitted by aekwall on Fri, 02/17/2023 - 10:39am
biological systems
code permutation
codes
composability
Computer crashes
embedded computing
embedded systems
Human Factors
pubcrawl
Resiliency
ROP attack
rop attacks
Scalability
security
Sociology
Statistics
biblio
Automated IoT security testing with SecLab
Submitted by aekwall on Fri, 01/13/2023 - 4:03pm
Compositionality
security scalability
Security Lab
SecLab
DoRIoT
Automated Testing
devsecops
Costs
IoT security
security
Complexity theory
cyber-physical systems
pubcrawl
Scalability
Internet of Things
Libraries
embedded systems
biblio
An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
Submitted by aekwall on Thu, 01/05/2023 - 5:12pm
reverse engineering
embedded systems
Internet of Things
authentication
Protocols
pubcrawl
Metrics
Resiliency
composability
Fingerprint recognition
Very large scale integration
sybil attacks
1
2
3
4
5
6
7
8
9
…
next ›
last »