The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a practical power-analysisbased attack on KCipher-2 software implemented on microcontrollers. The key idea of the proposed attack is to exploit aspecific Hamming weight (HW) leakage from low-end microcontrollers or to skip a specific part of the software sequence by a fault injection on low-end microcontrollers in addition toa conventional power analysis available for KCipher-2...
This paper characterizes the scaling of maximum frequency in lower-performance and higher-performance field-programmable gate-array (FPGA) chips as a function of circuit size and complexity. The evaluation is based on synthesizing mesh and toroid circuit topologies with parameterized node count and interconnect width. Each node accepts two input bit vectors and generates two output bit vectors, and...
Post-silicon validation is the last level of inspecting the silicon before it is delivered to the customer. Automotive microcontrollers use Direct Memory Access (DMA) extensively in safety critical applications. This article explains how post-silicon validation can be improved to address the needs of the growing complexity of microcontrollers with a large number of Intellectual Property (IP). With...
The use of virtual devices in place of physical hardware is increasing in activities such as design, testing and debugging. Yet virtual devices are simply software applications, and like all software they are prone to faults. A full system simulator (FSS), is a class of virtual machine that includes a large set of virtual devices – enough to run the full target software stack. Defects in an FSS virtual...
Tracking long-term progress in engineering and applied science allows us to take stock of things we have achieved, appreciate the factors that led to them, and set realistic goals for where we want to go. We formulate seven hypotheses associated with the long term evolution of C programming in the Unix operating system, and examine them by extracting, aggregating, and synthesising metrics from 66...
Future IoT systems are tightly constraint by cost and size and will often be operated from an energy harvester's output. Since these batteryless systems operate on intermittent energy they have to be able to retain their state during the power outages in order to guarantee computation progress. Due to the lack of large energy buffers the state needs to be saved quickly using residual energy only....
Programmable Virtual Networks (PVNs) make the network more flexible and allow the fast introduction of new services. However, several shortcomings hamper their wider adoption, including: (i) the extensive knowledge required to configure and manage the NetApps, (ii) the lack of descriptors to detail all nuances of the NetApps, and (iii) there is no solution that enables to distribute and configure...
This paper presents an effective design space exploration strategy for the development of dependable systems using selective hardening techniques based on software. Instead of design space exploration approaches based on brute-force or time-consuming fault injection experiments, this strategy is grounded in an early estimation of the register file criticality in microprocessor-based systems. This...
The evolution dynamics of a software ecosystem depend on the activity of the developer community contributing to projects within it. Both social and technical changes affect an ecosystem's evolution and the research community has been investigating the impact of these modifications over the last few years. Existing studies mainly focus on temporary modifications, often ignoring the effect of permanent...
An ideal solution for soft error tolerance should hide the effect of soft errors from user and provide correct results at expected time. Software solutions are attractive because they can provide flexible reliability without imposing any hardware modifications. Our investigation of state-of-the-art error recovery techniques reveals that they suffer from poor coverage (ability to detect and correctly...
In the past decade, the number of reported security attacks exploiting unchecked input firmware values has been on the rise. To address this concerning trend, this work proposes a novel detection framework, called DOVE, capable of identifying unlikely firmware execution flows, specifically those that may reveal a security vulnerability. The DOVE framework operates by leveraging a symbolic simulation...
SoC design trends show increasing integration of special-purpose, third-party hardware blocks to accelerate diverse types of computation. These accelerator blocks interact with each other in unexpected ways when integrated into a complex, accelerator-rich SoC. In this work we propose a novel solution that guides verification engineers to the high-priority accelerator interaction scenarios during RTL...
Software crowdsourcing is an emerging approach that involves delegating varieties of tasks to a decentralized, multi-scale and unknown workforce. Preparing a complex development job for crowdsourcing markets requires careful attention to workflow design, the process of decomposing job into multiple subtasks. This paper presents a general-purpose approach to verify the complex task's decomposition...
Chip level Functional verification of processor based IC designs predominantly use directed test cases implemented in high level programming languages like "C". The verification test case software (SW) runs on the control core of the IC and configures different IPs to implement a particular functionality that verifies a set of functional requirements. Chip level verification environment...
Dynamic checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. In this paper we present a lightweight approach, Control-flow checking using branch sequence signatures (CFCBS), to checking violation of control flow integrity at run-time. Our solution assigns a unique branch sequence signature, which enhances the capability of fault coverage, to each...
Pairing-based cryptography has got a lot of attention the last years, since the proposition of the tripartite key exchange. The best type of pairing is optimal ate pairing over Barreto-Naehrig curves which are based on two steps: Miller Loop and final exponentiation. Most of the researches were done for the Miller Loop. In this paper, we present the different methods for computing the hard part of...
The integration of mixed signal circuits in Systems on Chip is a trend in modern systems and applications with important challenges. In particular, the simulation of this kind of systems is a very time-consuming process that is becoming more and more complex due to the size of current designs. This paper describes a HW/SW co-simulation environment for mixed-signal circuits. The analog components are...
A brief review of Protected Execution Mode (PEM) for user-space applications featured in Elbrus architecture is described first. Then, AddressSanitizer, a well-known utility by Google Inc, is considered as an example of a pure software technique of memory control. Comparative analysis of these solutions is given with performance flaws, applicability and boundary violation detection quality.
In this paper, we discuss the implementation of a CrOss-layer Based testbed with Analysis Tool (COmBAT). COmBAT is developed to enable the design and development process of next-generation cross-layer based wireless communication technologies for tactical ad-hoc networks. The COmBAT architecture comprises of two major components; (i) Adaptive cross-layer (AXL) framework implemented on each node in...
An unconventional software testing method, fault injection based on fault model, is enhanced to improve the software reliability testing and measurements. Dynamic fault models for injecting faults through software are investigated and reported in this paper including memory faults, CPU faults and communication fault models. Dynamic fault models can be used to simulate influences which are caused by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.