Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
error detection
biblio
Attack Modeling and Verification for Connected System Security
Submitted by
aekwall
on Wed, 05/01/2019 - 12:05pm
Adaptation models
Attack Modeling
composability
connected system security
critical systems
dynamic system modeling
Dynamical Systems
embedded systems
error detection
error propagation
extended attack tree
Formal Specification
IoT
Metrics
model checker
model checking
Petri nets
program diagnostics
program verification
pubcrawl
Resiliency
security
security of data
Software Architecture
software tools
static system modeling
SysML
SysML connectivity profile
system security specifications
system specifications
system validation
system verification
systems engineering
Systems modeling
Temporal Logic
Unified modeling language
biblio
A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation
Submitted by
grigby1
on Fri, 03/15/2019 - 10:58am
ad-hoc design rules
approximate logic circuit
approximation
Circuit faults
critical circuits
error detection
fabricated IC
Hardware
hardware trojan
Hardware Trojans
integrated circuit industry
integrated circuits
invasive software
logic circuits
malicious modifications
novel prevention technique
original circuit
prevention methods
pubcrawl
security of data
Sensitivity
Thwart Hardware Trojan insertion
trojan horse detection
Trojan horses
Tunneling magnetoresistance
biblio
Hardening AES Hardware Implementations Against Fault and Error Inject Attacks
Submitted by
grigby1
on Thu, 02/14/2019 - 10:18am
coding theory
security
AES
error correction
error detection
Human Factors
Metrics
non-linearity
pubcrawl
robust codes
Scalability
Tamper resistance
biblio
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement
Submitted by
K_Hooper
on Wed, 10/25/2017 - 10:53am
authentication
cover image
Damage Assessment
error detection
pubcrawl
repairing
resilience
secret image
secret sharing
Steganography
biblio
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement
Submitted by
grigby1
on Fri, 08/18/2017 - 1:11pm
authentication
composability
cover image
error detection
Metrics
privacy
pubcrawl
repairing
secret image
secret sharing
Steganography
steganography detection
biblio
"IntelliCAN: Attack-resilient Controller Area Network (CAN) for secure automobiles"
Submitted by
grigby1
on Thu, 02/23/2017 - 1:27pm
attack-resilient controller area network
automobile
automobiles
CAN protocols
computer network security
controller area network(CAN)
controller area networks
Discrete Fourier transforms
error detection
fault tolerance
Fault tolerant systems
Hardware Security
IntelliCAN
masquerade attack
mechanical engineering computing
nanotechnology
pubcrawl170106
security
Very large scale integration
biblio
"Fault Detection and Correction in Processing AES Encryption Algorithm"
Submitted by
grigby1
on Mon, 02/13/2017 - 12:52pm
advanced encryption standard
AES cipher
AES encryption algorithm
AES Encryption process
AES linear mappings and error correcting codes
AES round structure
Ciphers
Cryptography
cryptosystem
ECC properties
encryption
error control mechanisms
error correction
error detection
error syndrome
Execution errors and countermeasure against fault injection side channel attacks
fault correction technique
fault coverage
fault detection
Fault detection and correction
fault detection technique
fault diagnosis
fault injection attack
fault-tolerance technique design
field programmable gate arrays
FPGA technology
Hardware
linear mappings
MC transformation
MixColumn transformation
noise effects
production faults
pubcrawl170102
radiation effect
ShiftRow transformation
side-channel attacks
Single event upsets
SR transformation
system reliability improvement
system security improvement
temporary redundant check words
biblio
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Submitted by
BrandonB
on Wed, 05/06/2015 - 10:49am
acceptable complexity
Algorithm design and analysis
application specific integrated circuits
Application-specific integrated circuit (ASIC)
ASIC analysis
Circuit faults
computational complexity
concurrency control
Cryptography
error coverage
error detection
Hardware
hardware overhead reduction
hashing
high performance
high-performance concurrent error detection scheme
injection-based fault simulations
integrity checking
Keccak
low-complexity recomputing
parallel processing
performance overheads
pseudorandom number generation
Reliability
robust hardware implementations
rotated operand-based scheme
secure hash algorithm
secure hash algorithm (SHA)-3
security
SHA-3 algorithm
step-forward toward
Transient analysis