Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Hardware Security
biblio
An FLL-Based Clock Glitch Detector for Security Circuits in a 5nm FINFET Process
Submitted by grigby1 on Fri, 02/03/2023 - 4:09pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Detectors
Voltage measurement
timing
Hardware Security
Frequency locked loops
Very large scale integration
Phase measurement
pattern locks
Clock glitch
FinFETs
FLL
biblio
Security Metrics for Logic Circuits
Submitted by grigby1 on Fri, 01/13/2023 - 3:19pm
pubcrawl
Metrics
Hardware
Entropy
logic locking
parallel processing
Power demand
Current measurement
Sensitivity
Security Metrics
Hardware Security
obfuscation
logic circuits
biblio
Matlab GUI-based Tool to Determine Performance Metrics of Physical Unclonable Functions
Submitted by grigby1 on Fri, 01/13/2023 - 3:19pm
security
pubcrawl
Metrics
Software
Hardware
performance evaluation
integrated circuits
Hardware Security
physical unclonable functions
software reliability
Security Metrics
Physical Unclonable Function
MATLAB
graphical user interface
biblio
EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security
Submitted by grigby1 on Thu, 12/01/2022 - 1:21pm
Detectors
Zero Day Attack Defense
Side Channel
ML Interpretability
Microarchitectural Attack Detection
Linearized Neural Network
Automatic Attack Sample Generation
Automated Hardware Performance Counter Engineering
Adversarial Machine Learning Attacks
codes
Zero day attacks
generative adversarial networks
Training
defense
Switches
side-channel attacks
microarchitecture
composability
Hardware Security
Hardware
Resiliency
resilience
Metrics
pubcrawl
biblio
Sensing with Random Encoding for Enhanced Security in Embedded Systems
Submitted by grigby1 on Fri, 09/30/2022 - 2:56pm
Hardware Security
random sensing
random encoding
ios
iOS Security
telemetry
Resiliency
Satellites
hardware trojan
timing
security
Compositionality
Trojan horses
encoding
sensors
resilience
Metrics
Human Factors
pubcrawl
biblio
Security Risk Assessment of Server Hardware Architectures Using Graph Analysis
Submitted by grigby1 on Tue, 09/20/2022 - 1:01pm
computer architecture
Servers
pubcrawl
Metrics
Hardware
Hardware Security
Runtime
Measurement
security risk assessment
statistical analysis
Security Metrics
graph theory
Computing Theory
hardware security metrics
biblio
Confidence Modeling and Tracking of Recycled Integrated Circuits, Enabled by Blockchain
Submitted by grigby1 on Fri, 09/09/2022 - 2:56pm
pubcrawl
Metrics
Hardware
Integrated circuit modeling
Hardware Security
Consumer electronics
supply chains
consortium Blockchain
counterfeit electronics detection
electronics supply chain security
recycled ICs
risk modeling and metrics
supply chain risk assessment
biblio
SRTLock: A Sensitivity Resilient Two-Tier Logic Encryption Scheme
Submitted by grigby1 on Fri, 07/29/2022 - 8:45am
standards
pattern locks
Sensitivity Attack
logic design
0-Injection
sensitivity analysis
SAT attack
logic encryption
Benchmark testing
Logic gates
Scalability
Hardware Security
Hardware
Resiliency
resilience
Human behavior
pubcrawl
encryption
biblio
JANUS: Boosting Logic Obfuscation Scope Through Reconfigurable FSM Synthesis
Submitted by grigby1 on Fri, 07/29/2022 - 8:45am
Scalability
pattern locks
Tamper-proof Memory
logic obfuscation
logic locking
boosting
supply chains
Partitioning algorithms
Switches
security
Hardware Security
Hardware
Heuristic algorithms
Resiliency
resilience
Human behavior
pubcrawl
biblio
Secured Test Pattern Generators for BIST
Submitted by grigby1 on Fri, 07/29/2022 - 8:44am
intellectual property
pattern locks
TPG
overproduction
BIST
logic locking
design for testability
built-in self-test
Hardware Security
reverse engineering
pubcrawl
side-channel attacks
integrated circuits
privacy
Scalability
Hardware
Resiliency
resilience
Human behavior
1
2
3
4
5
6
7
8
9
…
next ›
last »