Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Registers
biblio
SEVerity: Code Injection Attacks against Encrypted Virtual Machines
Submitted by grigby1 on Thu, 05/12/2022 - 10:50am
Virtual machine monitors
Encrypted Virtual Machines
Code Execution Attacks
AMD SEV ES
AMD SEV
virtual machine security
outsourcing
cyber physical systems
resilience
Virtualization
Cryptography
Virtual machining
Registers
Memory management
composability
privacy
Resiliency
pubcrawl
Cloud Computing
biblio
Design and Execution of Highly Adaptable Elliptic Curve Cryptographic Processor and Algorithm on FPGA using Verilog HDL
Submitted by grigby1 on Thu, 05/05/2022 - 2:18pm
Metrics
Verilog
Time-frequency Analysis
Scalability
Resiliency
resilience
Registers
pubcrawl
process control
composability
Memory management
Layout
Karatsuba
FPGA
Elliptic curves
Elliptic curve cryptography
elliptic curve
ECDSA
biblio
MAJORCA: Multi-Architecture JOP and ROP Chain Assembler
Submitted by aekwall on Mon, 03/14/2022 - 1:34pm
gadget
rop attacks
ROP compiler
ROP chain
ROP benchmark
ROP
return-oriented programming
restricted symbols
Payload
Jump-Oriented Programming
JOP
gadget frame
gadget catalog
Benchmark testing
code-reuse attack
codes
Registers
composability
Resiliency
Scalability
pubcrawl
Heuristic algorithms
operating systems
computer architecture
Human Factors
Measurement
biblio
SAIF: Automated Asset Identification for Security Verification at the Register Transfer Level
Submitted by aekwall on Tue, 02/22/2022 - 2:16pm
Measurement and Metrics Testing
vulnerability assessment
security verification.
Security Metrics
security assets
Solid modeling
Very large scale integration
Registers
Metrics
pubcrawl
Analytical models
Hardware
Measurement
Benchmark testing
biblio
The Remote on the Local: Exacerbating Web Attacks Via Service Workers Caches
Submitted by grigby1 on Mon, 01/31/2022 - 5:41pm
Vulnerability
web protection
web attack
user experience
Service Workers
cache
web security
Measurement
Web Browser Security
Web pages
Compositionality
security
Registers
programming
privacy
Conferences
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
The Remote on the Local: Exacerbating Web Attacks Via Service Workers Caches
Submitted by grigby1 on Mon, 01/31/2022 - 5:40pm
Vulnerability
web protection
web attack
user experience
Service Workers
cache
Web Caching
web security
Measurement
Web pages
security
Registers
programming
privacy
Scalability
Conferences
Resiliency
resilience
Metrics
pubcrawl
biblio
An Anonymous Editable Blockchain Scheme Based on Certificateless Aggregate Signature
Submitted by grigby1 on Tue, 12/21/2021 - 10:18am
accountability
Aggregates
Analytical models
anonymity
anonymous messaging
blockchains
certificateless aggregate signature
editable blockchain
Law
natural language processing
pubcrawl
Registers
resilience
Resiliency
Scalability
smart contracts
biblio
The Research and Application of Trusted Startup of Embedded TPM
Submitted by grigby1 on Mon, 11/08/2021 - 1:44pm
industrial control
trusted startup
trusted platform modules
Trusted Platform Module
trusted computing environment
Resiliency
resilience
Registers
industrial control system
pubcrawl
Hardware
encryption
embedded systems
Embedded System
cyber physical systems
cyber physical security
computer architecture
composability
biblio
Macros for Coding Information Encryption Amp; Decryption in Trusted Platform Module
Submitted by grigby1 on Mon, 11/08/2021 - 1:43pm
Industrial engineering
trusted platform modules
Trusted Platform Module
standards
security
Resiliency
resilience
Registers
Program processors
OS Windows Security
macros
pubcrawl
GOST
encryption
DES
decryption
Decoding Assembly Language
cyber physical systems
cyber physical security
composability
Ciphers
AES
biblio
Is Register Transfer Level Locking Secure?
Submitted by aekwall on Mon, 10/04/2021 - 1:53pm
integrated circuits
Logic gates
security
Hardware
pubcrawl
Scalability
Resiliency
Human behavior
Registers
Foundries
Layout
pattern locks
1
2
3
4
5
6
7
8
9
next ›
last »