Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Random access memory
biblio
BitJabber: The World’s Fastest Electromagnetic Covert Channel
Submitted by grigby1 on Mon, 01/25/2021 - 10:30am
Acoustics
Air gaps
Bandwidth
Clocks
composability
Human behavior
Human Factors
Magnetoacoustic effects
Metrics
optical receivers
pubcrawl
Random access memory
resilience
Resiliency
Stimulated emission
biblio
High Performance Data Encryption with AES Implementation on FPGA
Submitted by grigby1 on Tue, 12/01/2020 - 12:46pm
AES
AES encryption algorithm
AES implementation
Big Data
BIGDATA
composability
Cryptography
Data Security
encryption
encryption speed
field programmable gate arrays
FPGA
high performance data encryption
high speed
IDS
intrusion detection system
low latency
Pipelines
pubcrawl
Random access memory
resilience
Resiliency
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
Internet of Things
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Computers
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
Cache-as-RAM
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
key-encryption key
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
biblio
Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
i-o systems security
I-O Systems
security
advanced Memway algorithm
application program interfaces
binary relocation step
cache storage
Computer bugs
disk
DRAM chips
Dynamic Random Access Memory cells
exploitable physical addresses
Hardware
Heuristic algorithms
in-memory swapping
in-memory waylaying acceleration
input-output programs
Kernel
Linux
Linux page cache
Linux tmpfs
mainstream platforms
Memway+fadvise relocation scheme
microarchitectural security threat
page cache eviction
parallel processing
powerful privilege-escalation attacks
program diagnostics
proof-of-concept Waylaying algorithm
pubcrawl
Random access memory
rowhammer attacks
Rowhammer bug
running time
Scalability
security of data
system memory
system monitoring
time 15.0 min to 200.0 min
unprivileged instructions
unprivileged posix fadvise API
victim binary
Waylaying algorithm
Waylaying method
biblio
An Accelerator-based Architecture Utilizing an Efficient Memory Link for Modern Computational Requirements
Submitted by grigby1 on Tue, 10/06/2020 - 1:02pm
Acceleration
accelerator-based architecture
automotive application
bussing system
composability
computer architecture
Concurrency
concurrency (computers)
configurable accelerators
CPS
cyber physical systems
efficient memory link
embedded system architecture
embedded systems
Hardware accelerator
Heterogeneous systems
Kernel
Metrics
On-Chip Communication Architectures
Program processors
pubcrawl
Random access memory
resilience
Resiliency
security
Task Analysis
biblio
Straggler Resilient Serverless Computing Based on Polar Codes
Submitted by grigby1 on Tue, 10/06/2020 - 12:40pm
channel coding
Cloud Computing
coded computation scheme
coded computation technique
coding methods
coding theory
Complexity theory
computational burden
Computational modeling
computationally effective manner
computationally expensive tasks
Computing Theory
Decoding
distributed computation
emerging cloud based computation model
encoding
gradient methods
hybrid computing framework
linear algebra
matrix multiplication
optimisation
polar codes
pubcrawl
Random access memory
resilience
Resiliency
sequential decoding
serverless computing mechanism
serverless platforms
Servers
straggler resilient serverless computing
straggler-resilience
Task Analysis
biblio
Asynchronous Rendering of Texts in iOS Applications
Submitted by aekwall on Mon, 07/27/2020 - 11:20am
mobile computing
Resiliency
pubcrawl
Metrics
text analysis
Mobile Applications
Random access memory
Human Factors
Compositionality
Instruction sets
Message systems
operating systems
iOS (operating system)
asynchronous methods
asynchronous text rendering
iOS applications
iOS operating system
rendering
rendering (computer graphics)
text information rendering
user interfaces
iOS Security
biblio
HSSM: High Speed Split Multiplier for Elliptic Curve Cryptography in IoT
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
Complexity theory
Cryptography
Elliptic curve cryptography
Elliptic curves
encryption
Metrics
Montgomery Curve
pubcrawl
Random access memory
resilience
Resiliency
Scalability
Scalar Point Multiplication
Twisted Edward Curve
biblio
Memory Efficient High-Performance Rotational Image Encryption
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
coalesce
composability
compute unified device architecture
Conferences
Cryptography
CUDA
cyber-physical systems
efficient encryption
encryption
gpu
graphics processing units
high-performance
high-performance device
high-performance reformulations
Image Processing
improved global memory utilization
Instruction sets
memory efficient high-performance rotational image encryption
optimisation
optimization
optimizations
parallel architectures
parallel rotational encryption technique
pubcrawl
Random access memory
real-time applications
real-time systems
resilience
Resiliency
rotated encrypted images
rotational image encryption technique
shadow image
storage management
visual cryptography
biblio
Towards a Generic Approach for Memory Forensics
Submitted by grigby1 on Wed, 06/03/2020 - 11:02am
Application's data
Data mining
data structures
debugging
Debugging information
digital evidence
Forensics
Human behavior
Human Factors
information forensics
Kernel
Memory Forensics
Metrics
microsoft windows
PDB file
pubcrawl
Random access memory
resilience
Resiliency
Scalability
1
2
3
4
5
next ›
last »