The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of virtual devices in place of physical hardware is increasing in activities such as design, testing and debugging. Yet virtual devices are simply software applications, and like all software they are prone to faults. A full system simulator (FSS), is a class of virtual machine that includes a large set of virtual devices – enough to run the full target software stack. Defects in an FSS virtual...
Dynamic checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. In this paper we present a lightweight approach, Control-flow checking using branch sequence signatures (CFCBS), to checking violation of control flow integrity at run-time. Our solution assigns a unique branch sequence signature, which enhances the capability of fault coverage, to each...
This paper discloses improved existing or new fiscal cash registers and fiscal printers with improved existing or new internal or external communication devices with external computer devices relaying encrypted tax related data to tax administration server, receiving non-encrypted or encrypted additional service related data and running additional services.
Aspect oriented programming is a technique that separates the core and cross-cutting concerns thereby increasing the modularity of the software. One of the important problem faced in AOP is the possibility for occurrence of interference between modeled artifacts. Interference occurs when the logic of one artifact interfere with the logic of another artifacts. Detecting and removing interferences in...
The design of most consumer products can play a key role in their commercial success, and, therefore, the ability to protect new and innovative designs is an important part of a modern competitive marketplace. Since 1 April 2003, it has been possible to obtain European Union (EU)-wide design protection by means of a single registration made under the Community Design regulation (Council Regulation...
Software off-by-one stack based buffer overflow vulnerability may enable attacker to execute arbitrary code via a malformed input, causing persistent threat to computer and communication systems. However, current risk evaluation method is time-consuming and requires a group of people with security knowledge. This paper takes an insight investigation and presents a novel black-box off-by-one stack-based...
In safety-critical environments it is no longer sufficient to rely on legacy methodologies. Correctness should be built in all the way through the process. This paper presents a toolchain which allows theorem prover output to be interfaced to fault-tolerant FPGA circuitry. We show a shallow embedding of a lambda calculus executing on a Xilinx platform with the assistance of a choice of fault-tolerance...
Detecting vulnerabilities in binary codes is one of the most difficult problems due to the lack of type information and symbols. We propose a novel tool to perform symbolic execution inside the routines of binary codes, providing easy static analysis for vulnerability detection. Compared with existing systems, our tool has four properties: first, it could work on binary codes without source codes,...
This paper describes a framework which enables distributed object sharing in a multi agent environment. Shared objects are replicated across nodes in the distributed environment so that agents access a local copy rather than a remote one, thus minimizing network traffic. The framework solves issues related to replica coherence, consistency and management. Shared objects are serializable Java objects...
The correctness of PLC (Programmable Logic Controller) program in automatic control is vital to this kind of safety-critical applications. In this paper, we present a useful method of combinational testing for correctness of PLC programs. The method is based on the denotational semantics of PLC program and the semantic functions for basic instructions. It establishes the definition of denotational...
Universities require a fast and reliable system to provide academic advising to its students, register them into different courses, and to manage change requests. Currently in Bangladesh, academic advising is done mostly on paper, as seen in many of the public and private universities. In this paper, we propose a unique online-based system that would make the university course advising and registration...
Smart home system, makes home life more comfortable, more safe and more efficient by connecting application subsystem with each other. The disadvantages of ordinary home is not far to seek. Such as few functions, single interactive mode. Compared with ordinary home, smart home has many strengths, especially this smart home system. Our smart home system is composed of a lot of popular technology, for...
A current source system based on CAN bus was designed. The system is used for distributed control of the current source. The current source module of the system is controlled by the AT89C52 micro controller, and the output current is bidirectional and adjustable. The current source module has high linearity and stability. The system operates simply, and it has high reliability. The system provides...
Creativity of a computer engineer is always sought after due to the increasing demands in the production of embedded systems worldwide. To ensure teaching of computer architecture subject as interesting as possible to computer engineering students, a simulation software for understanding typical computer processors was introduced. For hardware realization, a hardware description language was also...
Binary translation is the emulation of one instruction set by another through translation of code. Sequences of instructions are translated from the source to the target instruction set. The semantic equivalence conversion of instructions is the core of a binary translation system. In order to simulate the behavior of a program on the target platform more accurately, the change of the special state...
This paper analyzes the basic principle of buffer overflow, and describes the basic methods of using the buffer overflow to attack the computer system. Through two sections of programs, this paper shows the process of the buffer overflow and its attacking actions in details. At last, several effective countermeasures to avoid the buffer overflow attacks are discussed.
This paper presents a Computer Architecture Lab based on a hypothetical pedagogical computer and its corresponding software simulator designed at the University of Vigo. This computer simulator permits to access both the architecture and microarchitecture level of the computer. The paper shows the simulator features at both levels, and introduces the use of embedded core for the learning of SoC (System...
An academic processor to be used in the “Computer Structure” subject has been developed in this work. During the lab sessions students will apply their knowledge about digital systems to design and implement this processor so they will interact with a real implementation of the system in several ways: modifying it to increase its functionality, programming it and watching its internal state while...
This paper introduces the structure of the experiment system for computer composition principle, which has been realized by making use of FPGA experimental instrument developed by ourselves and Quartus software. The design of experiment system for computer composition principle is analyzed in detail, including hardware design and software design. The hardware design mainly includes the fundamental...
At present, referees award marks manually for candidates in Sanda enrollment competetion in china, which has many disadvantages. The Sanda scoring system introduced here uses computer communication technology to connect multiple devices into a wireless network, and proceeds data management and output on PC. Adopting of this system will improve greatly the accuracy and efficiency of enrollment competions,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.