The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The integration of mixed signal circuits in Systems on Chip is a trend in modern systems and applications with important challenges. In particular, the simulation of this kind of systems is a very time-consuming process that is becoming more and more complex due to the size of current designs. This paper describes a HW/SW co-simulation environment for mixed-signal circuits. The analog components are...
A brief review of Protected Execution Mode (PEM) for user-space applications featured in Elbrus architecture is described first. Then, AddressSanitizer, a well-known utility by Google Inc, is considered as an example of a pure software technique of memory control. Comparative analysis of these solutions is given with performance flaws, applicability and boundary violation detection quality.
In this paper, we discuss the implementation of a CrOss-layer Based testbed with Analysis Tool (COmBAT). COmBAT is developed to enable the design and development process of next-generation cross-layer based wireless communication technologies for tactical ad-hoc networks. The COmBAT architecture comprises of two major components; (i) Adaptive cross-layer (AXL) framework implemented on each node in...
An unconventional software testing method, fault injection based on fault model, is enhanced to improve the software reliability testing and measurements. Dynamic fault models for injecting faults through software are investigated and reported in this paper including memory faults, CPU faults and communication fault models. Dynamic fault models can be used to simulate influences which are caused by...
Fault injection is an effective method for PHM and testability validation. However, with the increasing complexity of structures and functions, and with the promotion of integration levels for airborne prognostics and health management (PHM) and integrated modular avionics (IMA) systems, fault injection is often difficult to use in conventional “plug,” “probe,” or “adaptor plate” methods. Fault injection...
In this paper, a new hardware/software design and implementation of an Induction Machine (IM) drive control topology is presented. Power electronic applications such as three-phase inverter require highly accurate switching frequency. This design uses a System on Chip (SoC) approach and implemented on a Field Programmable Gate Array (FPGA). The on-chip processor is used for high level programing while...
As a maritime country that consist of 17.504 islands, data collection and central monitoring have been a pressing concern in Indonesia. An efficient data collection process can help the decision maker to collect the accurate data to be processed as a decision and policy in the future. With conservation mobile used by all of the forest ranger in Indonesia, not only the biodiversity and wildlife could...
Scan-path test, which is one of design-for-test techniques using a scan chain, can control and observe internal registers in an LSI chip. However, attackers can also use it to retrieve secret information from cipher circuits. Recently, scan-based attacks using a scan chain inside an LSI chip is reported which can restore secret information by analyzing the scan data during cryptographic processing...
The paper proposes an approach to instruction stream generation for verification of microprocessor designs. The approach is based on using formal specifications of the instruction set architecture as a source of knowledge about the design under verification. This knowledge is processed with generic engines implementing an extensible set of generation strategies to produce stimuli in the form of instruction...
The rapidly changing market of microcontrollers and affiliated compilers, as well as development board systems, introduces serious issues in code reusability when migrating to different software/hardware technologies. Subsequently, instructors encounter considerable difficulty in upgrading laboratory training, due to the demand of keeping pace with the latest technology. This paper presents strategies...
The first step of the K-nearest neighbor classification is to find the K-nearest neighbors of the query. A basic operation in calculating Jaccard distance is to count the number of ones in a binary vector - population count. This article focuses on finding the K-nearest neighbors in a high-dimensional Jaccard space. There are two main contributions. First, software methods for population count are...
The complexity and size of scientific and engineering challenges are continually increasing to the point where they are approaching exascale computing. One of the main challenges is to be able to run scientific software applications on these extremely large systems in an energy efficient manner, as power consumption will become one of the dominant cost factors that will govern the next generation...
Quantum computing promises new opportunities for solving hard computational problems, but harnessing this novelty requires breakthrough concepts in the design, operation, and application of computing systems. We define some of the challenges facing the development of quantum computing systems as well as software-based approaches that can be used to overcome these challenges. Following a brief overview...
HW/SW co-designed processors currently have a renewed interest due to their capability to boost performance without running into the power and complexity walls. By employing a software layer that performs dynamic binary translation and applies aggressive optimizations through exploiting the runtime application behavior, these hybrid architectures provide better performance/watt. However, a poorly...
We propose an approach for overapproximating the Worst-Case Execution Time (WCET) of embedded control software using formal methods. Model checking is iteratively applied to compute the WCET from the machine code of the software considering a platform and an environment model. We implemented the approach and present first experiments for a thermal controller application executed on a LEON3 processor...
To increase work efficiency of administration transaction, we have designed the Information-based management system of CHS. The system includes four subsidiary systems: The administration management handing system, evaluating system, searching system and statistics analytical system. The administration management handling system includes the application system of the CHS station(center), the examine...
Over the past few decades, the use of reconfigurable computing for aerospace applications has become increasingly common despite its sensitivity to ionizing radiation. Tools are needed to test and implement fault-mitigation mechanisms to increase the reliability of FPGAs in space. This paper introduces a tool called the JTAG Configuration Manager (JCM) that provides high-speed programmable access...
A MIPS 4Kc compliant embedded microprocessor design that incorporates architectural features for software controlled soft-error recovery is presented. The design leverages classical fault tolerance techniques, e.g., error detection and instruction restart, implemented at the micro-architectural level, and added instructions for error recovery. Soft-errors are detected as the instructions commit to...
Some researchers have recently showed that shellcode, a small piece of executable machine code, could be transformed into text. Although such shellcode-embedding text itself may elude defensive measures, due to the existence of a decoding routine attached the shellcode, it could be detected by them. In this paper, we propose a novel approach to building shellcode-embedding Korean text without a decoder...
Privacy leak is becoming a serious problem for every computer user. It will be a threat to user accounts, passwords and private documents. Privacy leak detection has been an important research point in security research community. Current privacy leak techniques mainly focus on static analysis and dynamic taint tracking. Static analysis often produces too many false positives. Dynamic taint tracking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.