Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
embedded hardware
biblio
Semantics-Directed Prototyping of Hardware Runtime Monitors
Submitted by
grigby1
on Mon, 11/04/2019 - 11:35am
Biomedical monitoring
building memory protection mechanisms
composability
embedded hardware
embedded processor
embedded systems
formal verification
Hardware
hardware monitor
hardware runtime monitors
Hardware Security
hardware-based protection
high level synthesis
Human behavior
Human Factors
Instruction sets
Model driven development
Monitoring
multiple memory accesses
pubcrawl
rapid-prototyping runtime monitors
reconfigurable architectures
resilience
Resiliency
rop attacks
ROP-style code reuse attacks
Runtime
Scalability
security of data
Semantics
semantics-directed prototyping
software monitor
software-based attacks
biblio
Embedded policing and policy enforcement approach for future secure IoT technologies
Submitted by
aekwall
on Mon, 03/11/2019 - 9:37am
additional threats
ARM TrustZone
Attack vectors
authentication mechanisms
authorisation
business operations
chain-of-trust
commercial building management
composability
computer network security
embedded applications
embedded hardware
embedded systems
end users
FPGA
hardware security policy engine
Internet of Things
IoT applications
malicious application
MPSoC
platform module
policy violation
potential technical vulnerabilities
pro-active policy
pubcrawl
Quality Control
Resiliency
Root-of-trust
secure IoT technologies
software security technologies
SPE approach
supply chain efficiencies
system communication bus
system resources
Trusted Platfrom Modules
Zero-day attacks
biblio
Secure-by-construction Composable Componentry for Network Processing
Submitted by
Heather Lucas
on Wed, 09/17/2014 - 5:32pm
Embedded Software
Systems Engineering
Science of Security
CPS Technologies
Foundations
100 Gbps
ACM CCS
Block and Stream Ciphers
CPS Technologies
Cryptography
Data Anonymization and Sanitization
Database and Storage Security
embedded hardware
embedded software
Embedded Systems Security
foundations
hardware-software co-design
line-speed processor
network processor
Science of Security
secure-by-construction
Security in Hardware
stream processing
Symmetric Cryptography and Hash Functions
systems engineering
Tamper-Proof/Resistant Designs
Cryptography
Block and Stream Ciphers
Data Anonymization and Sanitization
Embedded Systems Security
Database and Storage Security
Tamper-Proof/Resistant Designs
ACM CCS
Security in Hardware
Symmetric Cryptography and Hash Functions