Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
security guarantees
biblio
A Practical Attestation Protocol for Autonomous Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:35am
Internet of Things
attestation
Remote Attestation
security
performance evaluation
Protocols
embedded systems
Resiliency
Human behavior
pubcrawl
composability
Robustness
computer networks
Embedded System
Scalability
security guarantees
remote device
arbitrary device outages
autonomous embedded systems
autonomous networks
autonomous system
collective attestation
connected embedded devices
existing attestation protocols
low-end embedded devices
low-end prover devices
low-end verifier devices
Mesh networks
network disruptions
PASTA
safe operation
secure operation
biblio
On the Impossibility of Approximation-Resilient Circuit Locking
Submitted by grigby1 on Thu, 03/12/2020 - 12:02pm
Adversary Models
algorithmic attacks
approximation-resiliency
approximation-resilient Circuit locking
benchmark circuits
boolean circuits
Boolean functions
cL
Computational modeling
Cryptography
digital signatures
exact-recovery-resiliency
exponentially approximation-resilient
formal approach
formally defined notions
Foundries
IC
Integrated Circuit Camouflaging
Integrated circuit modeling
learning (artificial intelligence)
logic locking
long-standing hardness assumptions
malicious foundry
microscopy
original circuit
pubcrawl
relaxed notion
resilience
Resiliency
Scalability
security guarantees
signature based defense
biblio
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
Submitted by grigby1 on Mon, 02/17/2020 - 5:07pm
bitlocker
critical security weaknesses
Cryptography
Data protection
encryption
encryption software
external models
firmware
flash memories
Hardware
hardware full-disk encryption
hardware-encryption
Human behavior
internal models
Metrics
microsoft windows
password
peripheral interfaces
policy-based governance
pubcrawl
resilience
Resiliency
reverse engineering
security guarantees
security weaknesses
Software
solid state drives
SSD
standards
vulnerabilities
biblio
Conifer: Centrally-Managed PKI with Blockchain-Rooted Trust
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
Monitoring
Scalability
secure communications
Resiliency
Human behavior
pubcrawl
bitcoin
Metrics
blockchain
internet
data structures
Public key
public key cryptography
flexibility
active attackers
blockchain-agnostic way
blockchain-rooted trust
blockchains
central trusted parties
centralized transparency
centrally-managed PKI
Conifer
CONIKS
cryptographic identities
domain names
highly decentralized trust
insecure networks
public keys
secure distributed ledger
secure naming systems
security guarantees
traditional centralized PKIs
traditional centralized-trust systems
trustworthy binding
user-facing names
PKI Trust Models