Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
physical attacks
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
composability
critical embedded application
critical medical IoT device
Detection and Mitigation
embedded software developers
embedded systems
Fault Attacks
fault injection attack
fault injection attacks
Hardware Security
hardware security assessment approach
hardware security vulnerability assessment
Internet of Things
Internet of Things (IoT)
Metrics
microcontrollers
patient care
physical attacks
power system security
pubcrawl
resilience
Resiliency
resilient applications
safety-critical applications
safety-critical software
secure embedded IoT applications
security challenges
security of data
security risks
similar MCU-based applications
biblio
SACHa: Self-Attestation of Configurable Hardware
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
attestation
composability
computer architecture
configurable FPGA hardware
configurable hardware
device attestation
embedded device
embedded software
embedded systems
field programmable gate arrays
Field-Programmable Gate Arrays
FPGAs
Hardware
hardware-based attestation
hardware-software system
Human behavior
intended application code
Microprocessors
physical attacks
Protocols
pubcrawl
Read only memory
remote attacks
Resiliency
SACHa
self-attestation
Software
tamper-resistant hardware module
biblio
A multi-modelling based approach to assessing the security of smart buildings
Submitted by grigby1 on Thu, 07/16/2020 - 11:57am
Access Control
adversary model
building management systems
co-simulation
composability
CPS modeling
critical services
cyber-physical systems
fan coil unit
Fans
home automation
INTO-CPS tool chain
man-in-the-middle attacks
methodology
Metrics
multimodel methodology
multimodelling based approach
physical attacks
pubcrawl
resilience
Resiliency
security of data
simulations
smart buildings
system components
ubiquitous computing
biblio
Sequential Node/Link Recovery Strategy of Power Grids Based on Q-Learning Approach
Submitted by grigby1 on Mon, 03/02/2020 - 1:36pm
Cascading Failures
Cyber Attacks
grid defender
large-scale smart grids
learning (artificial intelligence)
Load flow
physical attacks
power engineering computing
power flow cascading failure
power generation
Power Grid
power grid test benchmarks
power grids
power system faults
Power system protection
power system reliability
power system restoration
pubcrawl
q-learning
Q-learning approach
recovery strategies
Reinforcement learning
resilience
Resiliency
restoration process
security of data
sequential node-link recovery strategy
sequential recovery
Smart Grids
smart power grids
System recovery
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
Servers
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
authentication
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
Physical attack
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
minimum human interventions
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
biblio
Hardware-enabled AI for Embedded Security: A New Paradigm
Submitted by aekwall on Mon, 02/17/2020 - 2:21pm
artificial intelligence security
Artificial Intelligence
Artificial Intelligence (AI)
chip power budget
chip security
composability
Cyber-Physical Attacks.
Cyber-Protection
decision making process
embedded security
hardware-enabled AI
heterogeneous security sensors
Human behavior
Intelligent sensors
learning (artificial intelligence)
learning procedures
low false positive detection rate
Metrics
Monitoring
multiple security sensors
physical attacks
privacy
pubcrawl
Resiliency
Scalability
security
security event handling
security of data
security-oriented AI logic
sensor security
signal processing security
silicon area
sufficient protection level
Temperature measurement
Temperature sensors
threat detection
biblio
Let's Shock Our IoT's Heart: ARMv7-M Under (Fault) Attacks
Submitted by grigby1 on Mon, 11/04/2019 - 12:35pm
Backdoor
buffer overflow
composability
Electromagnetic Fault Injection (EMFI)
Fault injection
Human behavior
Human Factors
microcontroller
physical attacks
pubcrawl
resilience
Resiliency
return oriented programming
rop attacks
Scalability
Vulnerability Insertion
biblio
Capacitive Multi-Channel Security Sensor IC for Tamper-Resistant Enclosures
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
security
embedded devices
Resiliency
Human behavior
pubcrawl
composability
Metrics
Capacitance
capacitance 35.0 aF
capacitance 460.0 aF
capacitance measurement
capacitive multichannel security sensor IC
capacitive sensors
capacitive touch technology
Capacitors
CMOS integrated circuits
CMOS technology
electrode matrix
Electrodes
integrated circuit packaging
integrated circuits
noise figure 94.6 dB
physical attacks
physical interaction
Semiconductor device measurement
sensor fusion
size 350.0 nm
SNR
tamper-resistant enclosures
time 19.7 ms
sensor security
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
pubcrawl
composability
encryption
physical attacks
Compositionality
Computers
Decoding
quantum computer
public key cryptography
side-channel analysis
quantum cryptography
adequate post-quantum cryptographic schemes
code-based cryptography
coding theory
discrete logarithm
elliptic curve
linear codes
McEliece scheme
NIST's announcement
number theory
number theory problems
oldest quantum-resistant proposition
polynomial time
polynomials
Post-quantum cryptography
post-quantum standardization
public-key cryptography
public-key cryptosystem
side-channel attacks
strong mathematical background
structural attacks
theoretical cryptography
biblio
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:29pm
actuator security
composability
CPS/ICS Security
cyber physical systems
Device Fingerprinting
Human behavior
Internet of Things (IoT)
IoT security
man-in-the-middle
Metrics
physical attacks
pubcrawl
Resiliency
security
sensor security
sensor spoofing
Sensors and Actuators
1
2
next ›
last »