Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
attestation
biblio
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
attestation
channel attackers
client DNS queries
composability
computer network security
Cryptographic Protocols
data privacy
encryption
encryption protocol
hybrid protocol
initialization process
Intel SGX
internet
Internet infrastructure
IP networks
obfuscation protocol
privacy
privacy preservation
Protocols
pubcrawl
server attackers
Servers
service proxy
T2DNS
Third-Party DNS
third-party DNS service
Trusted Computing
trustworthiness
biblio
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System
Submitted by aekwall on Mon, 09/28/2020 - 11:11am
Monitoring
Software
attestation
Data models
Support vector machines
feature extraction
learning (artificial intelligence)
machine learning
Human behavior
pubcrawl
program testing
privacy
attacks
Anomaly Detection
cyber physical systems
program diagnostics
sensors
Human Factors
formal verification
Mutation testing
actuators
CPS
model checking
cyber-physical system
supervised machine learning
code mutation
code-modification attacks
cross-validation
data logs
invariants
learnt model
real-world water purification plant
Statistical Model Checking
SVM-based model
system modelling
water treatment systems
CPS Privacy
biblio
PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:37am
attestation
embedded systems
security service
invasive software
software state
Resiliency
Human behavior
pubcrawl
composability
microcontrollers
low-end embedded devices
compromised state
current memory state
erasure
formally verified RA architecture
functional state
important security services
low-end embedded systems
malware-free state
obtain proofs
provably secure software update
Prv memory
remote Prv
secure RA architecture
system-wide resets
trusted verifier
untrusted remote prover
useful security services
verified remote attestation
VRASED
VRF
biblio
Towards Systematic Design of Collective Remote Attestation Protocols
Submitted by aekwall on Mon, 08/17/2020 - 10:37am
data privacy
attestation
Hardware
security
performance evaluation
Protocols
Software
embedded systems
Resiliency
Human behavior
pubcrawl
composability
Topology
malware detection
Systematics
remote device
Collective Remote Attestation
collective remote attestation protocols
concrete collective RA scheme
embedded system security
networked embedded devices
place collective RA
prior collective RA schemes
remote exploits
single device
single-device RA
Systematic Design
towards systematic design
untrusted device
biblio
Decentralized Attestation of Conceptual Models Using the Ethereum Blockchain
Submitted by aekwall on Mon, 08/17/2020 - 10:36am
Cryptography
attestation
computer architecture
Resiliency
Human behavior
pubcrawl
composability
blockchain
Distributed databases
smart contracts
ethereum
certification
Ethereum blockchain
Hash functions
distributed ledger
ADOxx metamodeling platform
blockchain-based attestation
Conceptual Modeling
cryptographic verification
decentralized attestation methods
Decentralized Identifiers
Ethereum account
existence proofs
globally unique identifiers
software connector
biblio
SACHa: Self-Attestation of Configurable Hardware
Submitted by aekwall on Mon, 08/17/2020 - 10:36am
attestation
composability
computer architecture
configurable FPGA hardware
configurable hardware
device attestation
embedded device
embedded software
embedded systems
field programmable gate arrays
Field-Programmable Gate Arrays
FPGAs
Hardware
hardware-based attestation
hardware-software system
Human behavior
intended application code
Microprocessors
physical attacks
Protocols
pubcrawl
Read only memory
remote attacks
Resiliency
SACHa
self-attestation
Software
tamper-resistant hardware module
biblio
DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks
Submitted by aekwall on Mon, 08/17/2020 - 10:36am
application program interfaces
application usage
attestation
attestation criterion
authorisation
authorized DNN programs
composability
deep learning frameworks
deep neural networks
DeepAttest overhead
DeepAttest provisions
device provider
device-specific fingerprint
DNN applications
DNN benchmarks
DNN program
embedded fingerprint
end-to-end attestation framework
FP
hardware architectures
hardware-bounded IP protection impair
hardware-level intellectual property
hardware-software codesign
Human behavior
industrial property
intelligent devices
intelligent platforms
IP concern
ip protection
learning (artificial intelligence)
manufactured hardware
neural nets
on-device DNN attestation method
pubcrawl
queried DNN
Resiliency
Software/Hardware Codesign
target platform
TEE-supported platforms
Trusted Execution Environment
unregulated usage
usage control
biblio
RADIS: Remote Attestation of Distributed IoT Services
Submitted by aekwall on Mon, 08/17/2020 - 10:36am
computer network security
Monitoring
Internet of Things
IoT devices
attestation
security
performance evaluation
Protocols
Software
Trusted Computing
Resiliency
Human behavior
pubcrawl
composability
Cameras
open systems
Internet of Things systems
control-flow attestation technique
distributed IoT service
Distributed IoT Services
inter-operable IoT system
Interoperable IoT
interoperable IoT devices
malicious remote service
modified software detection
physical tampering attacks
RADIS
Remote Attestation
remote attestation of distributed IoT services
remote attestation protocols
remote trusted party
security technique
Service Flow
trust-worthiness
biblio
Towards lightweight and interoperable trust models: The entity attestation token
Submitted by aekwall on Mon, 08/17/2020 - 10:36am
security
attestation
Resiliency
Human behavior
pubcrawl
composability
Internet of Things
biblio
A Practical Attestation Protocol for Autonomous Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:35am
Internet of Things
attestation
Remote Attestation
security
performance evaluation
Protocols
embedded systems
Resiliency
Human behavior
pubcrawl
composability
Robustness
computer networks
Embedded System
Scalability
security guarantees
remote device
arbitrary device outages
autonomous embedded systems
autonomous networks
autonomous system
collective attestation
connected embedded devices
existing attestation protocols
low-end embedded devices
low-end prover devices
low-end verifier devices
Mesh networks
network disruptions
PASTA
safe operation
secure operation
1
2
3
4
next ›
last »