Trustworthy Reconfigurable Systems

Enhancing the Security Capabilities of Reconfigurable Hardware Architectures

Author: Thomas Feller

Publisher: Springer

ISBN: 3658070056

Category: Computers

Page: 212

View: 5980

​Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime.

Design Methodologies for Secure Embedded Systems

Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

Author: Alexander Biedermann,Gregor H Molter

Publisher: Springer Science & Business Media

ISBN: 3642167675

Category: Technology & Engineering

Page: 207

View: 5921

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Reconfigurable Computing: Architectures, Tools and Applications

9th International Symposium, ARC 2013, Los Angeles, CA, USA, March 25-27, 2013, Proceedings

Author: Philip Brisk,José Gabriel de Figueiredo Coutinho,Pedro C. Diniz

Publisher: Springer

ISBN: 3642368123

Category: Computers

Page: 238

View: 8174

This book constitutes the thoroughly refereed conference proceedings of the 9th International Symposium on Reconfigurable Computing: Architectures, Tools and Applications, ARC 2013, held in Los Angeles, CA, USA, in March 2013. The 28 revised papers presented, consisting of 20 full papers and 11 poster papers were carefully selected from 41 submissions. The topics covered are applications, arithmetic, design optimization for FPGAs, architectures, place and routing.

Network and System Security

9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings

Author: Meikang Qiu,Shouhuai Xu,Moti Yung,Haibo Zhang

Publisher: Springer

ISBN: 3319256459

Category: Computers

Page: 542

View: 8858

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

Reconfigurable Computing: Architectures, Tools, and Applications

4th International Workshop, ARC 2008, London, UK, March 26-28, 2008, Proceedings

Author: Roger Woods,Katherine Compton,Christos Bourganis,Pedro C. Diniz

Publisher: Springer

ISBN: 3540786104

Category: Computers

Page: 346

View: 3265

Coverage in this proceedings volume includes DNA and string processing applications, reconfigurable computing hardware and systems, image processing, run-time behavior, instruction set extension, as well as random number generation and financial computation.

Security Basics for Computer Architects

Author: Ruby B. Lee

Publisher: Morgan & Claypool Publishers

ISBN: 1627051562

Category: Computers

Page: 111

View: 7057

Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures.

Introduction to Hardware Security and Trust

Author: Mohammad Tehranipoor,Cliff Wang

Publisher: Springer Science & Business Media

ISBN: 9781441980809

Category: Technology & Engineering

Page: 427

View: 765

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

Dynamically Reconfigurable Systems

Architectures, Design Methods and Applications

Author: Marco Platzner,Norbert Wehn

Publisher: Springer Science & Business Media

ISBN: 9048134854

Category: Technology & Engineering

Page: 441

View: 5953

Dynamically Reconfigurable Systems is the first ever to focus on the emerging field of Dynamically Reconfigurable Computing Systems. While programmable logic and design-time configurability are well elaborated and covered by various texts, this book presents a unique overview over the state of the art and recent results for dynamic and run-time reconfigurable computing systems. Reconfigurable hardware is not only of utmost importance for large manufacturers and vendors of microelectronic devices and systems, but also a very attractive technology for smaller and medium-sized companies. Hence, Dynamically Reconfigurable Systems also addresses researchers and engineers actively working in the field and provides them with information on the newest developments and trends in dynamic and run-time reconfigurable systems.

Security Trends for FPGAS

From Secured to Secure Reconfigurable Systems

Author: Benoit Badrignans,Jean-Luc Danger,Viktor Fischer,Guy Gogniat,Lionel Torres

Publisher: Springer Science & Business Media

ISBN: 9789400713383

Category: Technology & Engineering

Page: 196

View: 7111

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Forbes

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Business

Page: N.A

View: 9157

Reconfigurable Computing

Accelerating Computation with Field-Programmable Gate Arrays

Author: Maya B. Gokhale,Paul S. Graham

Publisher: Springer Science & Business Media

ISBN: 0387261060

Category: Technology & Engineering

Page: 238

View: 4332

A one-of-a-kind survey of the field of Reconfigurable Computing Gives a comprehensive introduction to a discipline that offers a 10X-100X acceleration of algorithms over microprocessors Discusses the impact of reconfigurable hardware on a wide range of applications: signal and image processing, network security, bioinformatics, and supercomputing Includes the history of the field as well as recent advances Includes an extensive bibliography of primary sources

Proceedings

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Computer engineering

Page: N.A

View: 5937

Functional Verification of Dynamically Reconfigurable FPGA-based Systems

Author: Lingkan Gong,Oliver Diessel

Publisher: Springer

ISBN: 3319068385

Category: Technology & Engineering

Page: 216

View: 6490

This book analyzes the challenges in verifying Dynamically Reconfigurable Systems (DRS) with respect to the user design and the physical implementation of such systems. The authors describe the use of a simulation-only layer to emulate the behavior of target FPGAs and accurately model the characteristic features of reconfiguration. Readers are enabled with this simulation-only layer to maintain verification productivity by abstracting away the physical details of the FPGA fabric. Two implementations of the simulation-only layer are included: Extended Re Channel is a System C library that can be used to check DRS designs at a high level; ReSim is a library to support RTL simulation of a DRS reconfiguring both its logic and state. Through a number of case studies, the authors demonstrate how their approach integrates seamlessly with existing, mainstream DRS design flows and with well-established verification methodologies such as top-down modeling and coverage-driven verification.

Networking and Information Technology Research and Development Program

Supplement to the President's Budget for Fiscal Year 2009

Author: Sally E. Howe

Publisher: DIANE Publishing

ISBN: 1437901794

Category:

Page: 32

View: 8909

Describes R&D activities in advanced networking, software, high-end computing and computational science, cyber security, and other leading-edge information technologies (IT) funded by the 13 Fed. Agencies in the Networking and IT R&D (NITRD) Program. Capabilities and tools generated through NITRD investments accelerate advances across the spectrum of science, engineering, and technology fields, supporting key national security and scientific missions of the Fed. Gov¿t. and enhancing the Nation's economic competitiveness. The Pres.¿s FY2009 Budget provides a 6% increase for the NITRD Program overall, reflecting the vital contributions of networking and IT to sustaining U.S. leadership in science and technology.

Embedded Multimedia Security Systems

Algorithms and Architectures

Author: Amit Pande,Joseph Zambreno

Publisher: Springer Science & Business Media

ISBN: 1447144597

Category: Computers

Page: 146

View: 6828

Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.

Electronic Design

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Electronic apparatus and appliances

Page: N.A

View: 1407

Enhancing the Resilience of the Nation's Electricity System

Author: National Academies of Sciences, Engineering, and Medicine,Division on Engineering and Physical Sciences,Board on Energy and Environmental Systems,Committee on Enhancing the Resilience of the Nation's Electric Power Transmission and Distribution System

Publisher: National Academies Press

ISBN: 0309463076

Category: Science

Page: 170

View: 9754

Americans’ safety, productivity, comfort, and convenience depend on the reliable supply of electric power. The electric power system is a complex “cyber-physical†system composed of a network of millions of components spread out across the continent. These components are owned, operated, and regulated by thousands of different entities. Power system operators work hard to assure safe and reliable service, but large outages occasionally happen. Given the nature of the system, there is simply no way that outages can be completely avoided, no matter how much time and money is devoted to such an effort. The system’s reliability and resilience can be improved but never made perfect. Thus, system owners, operators, and regulators must prioritize their investments based on potential benefits. Enhancing the Resilience of the Nation’s Electricity System focuses on identifying, developing, and implementing strategies to increase the power system’s resilience in the face of events that can cause large-area, long-duration outages: blackouts that extend over multiple service areas and last several days or longer. Resilience is not just about lessening the likelihood that these outages will occur. It is also about limiting the scope and impact of outages when they do occur, restoring power rapidly afterwards, and learning from these experiences to better deal with events in the future.

Semantic-Based Visual Information Retrieval

Author: Zhang, Yu-Jin

Publisher: IGI Global

ISBN: 1599043726

Category: Computers

Page: 368

View: 8006

"This book presents state-of-the-art advancements and developments in the field, and also brings a selection of techniques and algorithms about semantic-based visual information retrieval. It covers many critical issues, such as: multi-level representation and description, scene understanding, semantic modeling, image and video annotation, human-computer interaction, and more"--Provided by publisher.