Ring oscillators analysis for security purposes in Spartan-6 FPGAs
Nowadays, many digital applications domains are arising and posing new design issued and challenges related to the security and trustworthiness. Physically Unclonable Functions (PUFs) are emergent and promising solutions in providing some security ...
Identification of IP control units by state encoding and side channel verification
Synchronous finite state machines (FSMs) are the backbone of an embedded controller design. We propose a non-destructive watermark embedding algorithm and a contactless verification method for protecting the design intellectual property (IP) of an ...
Dummy operations in scalar multiplication over elliptic curves
A large number of embedded systems require a high level of security. Elliptic curve cryptography is well suited for these constrained environments, but some countermeasures must be implemented to prevent leakage of critical data through side-channel ...
Clock generator behavioral modeling for supply voltage glitch attack effects analysis
Supply voltage glitch attack is an easy and efficient method to induce faults in electronic devices. This attack represents a serious threat for hardware security. Considering analog circuits, due to the high simulation times and the complexity of the ...
From secured logic to IP protection
Design and reuse has become a very common practice in the electronics design industry. IP cores are easily sold by designers to system integrators. However, several cases of counterfeiting and illegal copying have been reported and design protection ...
Improved ring oscillator PUF on FPGA and its properties
PUFs (Physical Unclonable Function) are increasingly used in proposals of security architectures for device identification and cryptographic key generation. Many PUF designs for FPGAs proposed up to this day are based on ring oscillators (RO). The ...
Analysis of laser-induced errors
Laser attacks are an effective threat against secure integrated circuits, due to their capability to inject very precise hardware faults. Evaluating the effect of such attacks from RTL descriptions provides designers a means to increase the security ...
Side-channel leakage models for RISC instruction set architectures from empirical data
Side-channel attacks are currently among the most serious threats for embedded systems. Popular countermeasures to mitigate the impact of such attacks are masking schemes, where secret intermediate values are split in two or more values by virtue of ...
Constant-weight coding based software implementation of DPA countermeasure in embedded microcontroller
Nowadays, firmware in low-cost microcontrollers (MCUs) must implement cryptographic primitives in order to support practical applications. Effective protections of such implementations against side-channel attacks, especially the differential power ...
Mixed real-time scheduling of multiple DAGs-based applications on heterogeneous multi-core processors
We present the fairness scheduling policy from a high performance perspective.We present the whole priority scheduling policy from a timing constraint perspective.We present mixed partial priority scheduling policy from both high performance and timing ...
GPU based real-time SLAM of six-legged robot
Vision and AHRS (attitude and heading reference system) sensors fusion strategy is prevalent in recent years for the legged robot's SLAM (Simultaneous Localization and Mapping), due to its low cost and effectiveness in the global positioning system. In ...
Application performance prediction method based on cross-core performance interference on multi-core processor
Due to the contention for shared resource, applications deployed on different cores would suffer from the performance interference. Therefore, how to predict applications performance reasonably has become the hotspot in current studies. A challenges of ...
Ai BCS
SKE is more accurate than the other models.SKE can help us to choose the best solution of parallel program and optimize the thread-block configurations for the different types of GPU.SKE can help the scheduling algorithm of GPU cluster to reduce the ...
Multi-scale stream reduction for volume rendering on GPUs
In this paper, we present a uniform acceleration framework for GPU-based interactive visualization of regular scalar fields. Firstly, in order to exploit the coherence of volume fields in both the object space and the image space, we propose a general ...
Design and application of parallel stereo matching algorithm based on CUDA
To accurately construct the topographic information of a six-legged walking robot in real time, this study proposes a stereo matching algorithm that can conduct disparity estimation on each pixel by using the Bayesian posterior probability model based ...
Hybrid swarm intelligent parallel algorithm research based on multi-core clusters
In order to solve poor fine searching capacity of artificial fish swarm algorithm and artificial bee colony swarm algorithm in late state to result in insufficient local optimization, hybrid swarm intelligent parallel algorithm research based on multi-...
A new data-grouping-aware dynamic data placement method that take into account jobs execute frequency for Hadoop
Recent years have seen an increasing number of scientists employing data parallel computing frameworks, such as Hadoop, in order to run data-intensive applications. Research on data-grouping-aware data placement for Hadoop has become increasingly ...
The improved (2D)2PCA algorithm and its parallel implementation based on image block
Both the one-dimensional method based on vector and the two-dimensional method based on matrix in image feature extraction are only suitable for the processing of small scale images. In this paper, we improved the (2D)2PCA algorithm based on image ...
MapReduce short jobs optimization based on resource reuse
Hadoop is an open-source implementation of MapReduce serving for processing large datasets in a massively parallel manner. It was designed aiming at executing large-scale jobs in an enormous number of computing nodes offering computing and storage. ...
Research on the selection method of multi-VM resource adjustment strategy in a single PM based on genetic algorithm
The selection method of resource adjustment strategy is a key step of multi-VM (Virtual Machine) resource adjustment in a single physical machine (PM). The traditional genetic algorithm (GA) do not evaluate and filter the initial population, and not ...
CTP
Performance, in terms of quality of service and resource utilization, is one of top attractions in cloud. However, in practice, most multi-tier applications today frequently present large scale fluctuations of response time during periods of high ...
Efficient FPGA implementation of modular multiplication based on Montgomery algorithm
In order to improve the efficiency of modular multiplication algorithm for FPGA implementation on the prime field modular, an efficient scheme is proposed to accomplish 256256 bits modular multiplication algorithm. The embedded IP cores of Xilinx FPGA ...
Modeling & analysis of an LTE-Advanced receiver using mode-controlled dataflow
Current multi-functional embedded systems such as smartphones and tablets support multiple 2G/3G/4G radio standards including Long Term Evolution (LTE) and LTE-Advanced. LTE-Advanced is the latest industry standard that improves upon LTE by introducing ...
Leakage aware resource management approach with machine learning optimization framework for partially reconfigurable architectures
Developing a comprehensive framework for integrating Genetic Algorithm and Machine Learning techniques to optimize our Leakage-aware RMA: from generating data to building predictive models and predicting Pareto fronts for new Task Graphs.Building a ...
Heterogeneous multi-mode access in smart grid using BeiDou communication
Communications in smart grid consist of multiple mode access technologies. To connect with remote area, BeiDou short-message communication provides a good solution to enlarge the coverage area and decrease the costs. Current research on heterogeneous ...