Trustworthy Reconfigurable Systems

Enhancing the Security Capabilities of Reconfigurable Hardware Architectures
Author: Thomas Feller
Publisher: Springer
ISBN: 3658070056
Category: Computers
Page: 212
View: 5273

Continue Reading →

​Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime.

Embedded Multimedia Security Systems

Algorithms and Architectures
Author: Amit Pande,Joseph Zambreno
Publisher: Springer Science & Business Media
ISBN: 1447144597
Category: Computers
Page: 146
View: 3174

Continue Reading →

Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.

Reconfigurable Computing: Architectures, Tools and Applications

9th International Symposium, ARC 2013, Los Angeles, CA, USA, March 25-27, 2013, Proceedings
Author: Philip Brisk,José Gabriel de Figueiredo Coutinho,Pedro C. Diniz
Publisher: Springer
ISBN: 3642368123
Category: Computers
Page: 238
View: 9426

Continue Reading →

This book constitutes the thoroughly refereed conference proceedings of the 9th International Symposium on Reconfigurable Computing: Architectures, Tools and Applications, ARC 2013, held in Los Angeles, CA, USA, in March 2013. The 28 revised papers presented, consisting of 20 full papers and 11 poster papers were carefully selected from 41 submissions. The topics covered are applications, arithmetic, design optimization for FPGAs, architectures, place and routing.

Design Methodologies for Secure Embedded Systems

Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Author: Alexander Biedermann,Gregor H Molter
Publisher: Springer Science & Business Media
ISBN: 3642167675
Category: Technology & Engineering
Page: 207
View: 1863

Continue Reading →

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Network and System Security

9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings
Author: Meikang Qiu,Shouhuai Xu,Moti Yung,Haibo Zhang
Publisher: Springer
ISBN: 3319256459
Category: Computers
Page: 542
View: 7271

Continue Reading →

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

Reconfigurable Computing: Architectures, Tools, and Applications

4th International Workshop, ARC 2008, London, UK, March 26-28, 2008, Proceedings
Author: Roger Woods,Katherine Compton,Christos Bourganis,Pedro C. Diniz
Publisher: Springer
ISBN: 3540786104
Category: Computers
Page: 346
View: 4337

Continue Reading →

Coverage in this proceedings volume includes DNA and string processing applications, reconfigurable computing hardware and systems, image processing, run-time behavior, instruction set extension, as well as random number generation and financial computation.

Advances in Computer Systems Architecture

10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005, Proceedings
Author: Thambipillai Srikanthan,Jingling Xue,Chip-Hong Chang
Publisher: Springer Science & Business Media
ISBN: 9783540296430
Category: Computers
Page: 833
View: 8329

Continue Reading →

This book constitutes the refereed proceedings of the 10th Asia-Pacific Computer Systems Architecture Conference, ACSAC 2005, held in Singapore in October 2005. The 65 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers are organized in topical sections on energy efficient and power aware techniques, methodologies and architectures for application-specific systems, processor architectures and microarchitectures, high-reliability and fault-tolerant architectures, compiler and OS for emerging architectures, data value predictions, reconfigurable computing systems and polymorphic architectures, interconnect networks and network interfaces, parallel architectures and computation models, hardware-software partitioning, verification, and testing of complex architectures, architectures for secured computing, simulation and performance evaluation, architectures for emerging technologies and applications, and memory systems hierarchy and management.

Networking and Information Technology Research and Development Program

Supplement to the President's Budget for Fiscal Year 2009
Author: Sally E. Howe
Publisher: DIANE Publishing
ISBN: 1437901794
Category:
Page: 32
View: 3858

Continue Reading →

Describes R&D activities in advanced networking, software, high-end computing and computational science, cyber security, and other leading-edge information technologies (IT) funded by the 13 Fed. Agencies in the Networking and IT R&D (NITRD) Program. Capabilities and tools generated through NITRD investments accelerate advances across the spectrum of science, engineering, and technology fields, supporting key national security and scientific missions of the Fed. Gov¿t. and enhancing the Nation's economic competitiveness. The Pres.¿s FY2009 Budget provides a 6% increase for the NITRD Program overall, reflecting the vital contributions of networking and IT to sustaining U.S. leadership in science and technology.

Annual Review of Communications:


Author: International Engineering Consortium
Publisher: International Engineering Consortium
ISBN: 9781931695534
Category: Business & Economics
Page: 750
View: 6281

Continue Reading →

An indispensable reference publication for telecommunication and information-industry professionals. Each year, the IEC brings together into one unique resource the most current thinking and practical experience of industry leaders around the world on a variety of topics facing their areas of specialization. This 700+ page reference tool is a must for executives, managers, engineers, analysts, and educators in all sectors of today's changing information industry.

Cybersecurity Systems for Human Cognition Augmentation


Author: Robinson E. Pino,Alexander Kott,Michael Shevenell
Publisher: Springer
ISBN: 3319103741
Category: Computers
Page: 209
View: 4355

Continue Reading →

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

FPGAs für Maker

Eine praktische Einführung in programmierbare Logik
Author: Cord Elias
Publisher: dpunkt.verlag
ISBN: 3960880316
Category: Technology & Engineering
Page: 454
View: 5124

Continue Reading →

Field Programmable Gate Arrays (FPGAs) sind relativ komplexe programmierbare Logikbausteine. Mithilfe von FPGAs können mittlerweile jedoch auch Maker und Elektronikbastler eigene Chips entwerfen. Wie das geht, zeigt Ihnen dieses Buch. Zunächst wird erklärt, was FPGAs sind und wie sie funktionieren. Es folgt eine Einführung in die Hardwarebeschreibungssprache VHDL, die für die Projekte in diesem Buch verwendet wird. Danach wird Schritt für Schritt anhand zunächst ganz einfacher Beispiele erläutert, wie man eine Schaltung mithilfe eines FPGA realisiert. Im weiteren Verlauf werden die Schaltungen anspruchsvoller. Den Abschluss bildet ein Projekt, bei dem das Spiel »Pong« in Hardware realisiert wird. Die Anzeige erfolgt auf einem RGB-LED-Matrix-Display, dessen Ansteuerung per FPGA im Detail beschrieben wird. Die Projekte im Buch werden auf Basis kostenlos verfügbarer FPGA-Entwicklungsumgebungen der Hersteller Altera, Lattice, Microsemi und Xilinx sowie günstiger FPGA-Boards konkret umgesetzt. Dabei wird auf die Übertragbarkeit auf andere Systeme geachtet. Die verwendeten Entwicklungsumgebungen und FPGA-Boards werden außerdem kurz vorgestellt. Cord Elias konzentriert sich primär auf die Vermittlung von Fähigkeiten zum selbstständigen Umgang mit FPGAs. Er nimmt die Leserinnen und Leser an die Hand und leitet sie sicher durch eine Vielzahl von Details. Dass der Spaß dabei nicht zu kurz kommt, versteht sich von selbst. Der Quellcode zu allen Design-Beispielen steht zum Download bereit.

FPGA ...

ACM/SIGDA International Symposium on Field Programmable Gate Arrays
Author: N.A
Publisher: N.A
ISBN: 9781595936004
Category: Field programmable gate arrays
Page: 234
View: 2886

Continue Reading →