Filters








13,844 Hits in 5.9 sec

Transactional Memory: The Hardware-Software Interface

Austen McDonald, Brian D. Carlstrom, JaeWoong Chung, Chi Cao Minh, Hassan Chafi, Christos Kozyrakis, Kunle Olukotun
2007 IEEE Micro  
In current TM systems, the hardware-software interface is just a few instructions that define transaction boundaries.  ...  Several TM implementation proposals advocate using hardware, software, or hybrid techniques, 2 and all propose implementing two key mechanisms.  ...  For more information on this or any other computing topic, please visit our Digital Library at http://computer.org/ publications/dlib.  ... 
doi:10.1109/mm.2007.26 fatcat:ls5lkpagefcmpb7qcne7unpb7u

Formal co-validation of low-level hardware/software interfaces

Alex Horn, Michael Tautschnig, Celina Val, Lihao Liang, Tom Melham, Jim Grundy, Daniel Kroening
2013 2013 Formal Methods in Computer-Aided Design  
This paper demonstrates a new approach to co-validation of hardware/software interfaces by formal, symbolic co-execution of an executable hardware model combined with the software that interacts with it  ...  We provide experimental results that show our approach is both feasible as a bug-finding technique and scales to handle a significant degree of concurrency in the combined hardware/software model.  ...  We thank Anthony Liguori (IBM), Paolo Bonzini (Redhat), and Andreas Färber (SUSE) for their comments on the QEMU mailing list.  ... 
doi:10.1109/fmcad.2013.6679400 fatcat:ghkb7mhcirdidaxerfmtvfo7va

Hardware/Software Co-monitoring [article]

Li Lei, Kai Cong, Zhenkun Yang, Bo Chen, Fei Xie
2019 arXiv   pre-print
Hardware/Software (HW/SW) interfaces, mostly implemented as devices and device drivers, are pervasive in various computer systems.  ...  The results demonstrate the major potential of HW/SW co-monitoring in improving system reliability and security.  ...  The results demonstrate that hardware/software co-monitoring has major potential in improving system reliability and security.  ... 
arXiv:1905.03915v1 fatcat:auadrvububhmzdp5ttqykcdgau

Hardware/software IP protection

Marcello Dalpasso, Alessandro Bogliolo, Luca Benini
2000 Proceedings of the 37th conference on Design automation - DAC '00  
We propose a new technique for protecting the IP of both processor cores and application software in hardware/software systems.  ...  IP protection is particularly challenging for hardware/software systems, where an IP core runs embedded software: both the software and the core are valuable IP that must be protected.  ...  The run-time authorization paradigm described above provides a unique solution to the main security issues involved in mutual IPprotection of hardware/software systems.  ... 
doi:10.1145/337292.337588 dblp:conf/dac/DalpassoBB00 fatcat:bkevd67rvfflzhhurwqlgexfke

Hardware/Software Verification Process through Cloud Computing

Ousama Esbel, Ng Ah Ngan Mike Christian
2016 Lecture Notes on Software Engineering  
For the past decade, we have seen an introduction of hardware/software automated systems in our community, which offer new and interesting advantages to the associated sides.  ...  The paper will demonstrate how a microcontroller can be connected to a handheld device through cloud as well as providing solutions for mapping related devices and securing their channels from other devices  ...  In short, consolidating hardware/software through Cloud Network.  ... 
doi:10.7763/lnse.2016.v4.236 fatcat:lm4amcjsnbcqhgjs7nav2pebzq

Hardware-Software Contracts for Secure Speculation [article]

Marco Guarnieri, Boris Köpf, Jan Reineke, Pepe Vila
2020 arXiv   pre-print
Unfortunately, there are no hardware-software contracts that would turn this intuition into a basis for principled co-design.  ...  On the hardware side, we use the framework to provide the first formalization and comparison of the security guarantees provided by a representative class of mechanisms for secure speculation.  ...  Acknowledgments: Pepe Vila's work was done while at Microsoft Research.  ... 
arXiv:2006.03841v3 fatcat:jkj3xiqbd5d4baalaqgprzzka4

Offline Hardware/Software Authentication for Reconfigurable Platforms [chapter]

Eric Simpson, Patrick Schaumont
2006 Lecture Notes in Computer Science  
Compared to the Trusted Computing Platform's approach to hardware, software authentication, our solution is more lightweight and tightly integrates with existing FPGA security features.  ...  The scheme implements mutual authentication of the IP modules and the hardware platform, and enables us to provide authentication and integrity assurances to both the system developer and IP provider.  ...  Finally, a lowcost implementation of the offline, hardware, software authentication scheme is presented in Section 5.  ... 
doi:10.1007/11894063_25 fatcat:5yohzvldnfekvg533yp3hdfssi

Selective hardware/software memory virtualization

Xiaolin Wang, Jiarui Zang, Zhenlin Wang, Yingwei Luo, Xiaoming Li
2011 Proceedings of the 7th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '11  
Despite the fact that in over half of the cases, there is no noticeable gap between the two mechanisms, an up to 34% performance gap exists for a few benchmarks.  ...  However, the hardware assists do have their disadvantage compared to the conventional shadow mechanism -the page walk yields more memory accesses and thus longer latency.  ...  However, DMP introduces security issues, which prevents it from being applied in a security-sensitive public service environment.  ... 
doi:10.1145/1952682.1952710 dblp:conf/vee/WangZWLL11 fatcat:w6kt54uqs5g6djows3ml456fcy

Selective hardware/software memory virtualization

Xiaolin Wang, Jiarui Zang, Zhenlin Wang, Yingwei Luo, Xiaoming Li
2011 SIGPLAN notices  
Despite the fact that in over half of the cases, there is no noticeable gap between the two mechanisms, an up to 34% performance gap exists for a few benchmarks.  ...  However, the hardware assists do have their disadvantage compared to the conventional shadow mechanism -the page walk yields more memory accesses and thus longer latency.  ...  However, DMP introduces security issues, which prevents it from being applied in a security-sensitive public service environment.  ... 
doi:10.1145/2007477.1952710 fatcat:6rg5owa5ancklmu6usjeycjq4q

Hardware/Software Security Patches for Internet of Trillions of Things [article]

John A. Stankovic, Tu Le, Abdeltawab Hendawi, Yuan Tian
2019 arXiv   pre-print
Our proposal for a new direction is to create "smart buttons" and collections of them called "smart blankets" as hardware/software security patches rather than software-only patches.  ...  With the rapid development of the Internet of Things, there are many interacting devices and applications. One crucial challenge is how to provide security.  ...  There would be a button-tobutton communication interface with the following characteristics: wirelessly communicates, can reach at least 100 feet to potentially limit the numbers of buttons needed (e.g  ... 
arXiv:1903.05266v1 fatcat:zlyciopvz5c37nam2kfymdlvxu

Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture [chapter]

Andrew Zonenberg, Bülent Yener
2016 Lecture Notes in Computer Science  
This work presents Antikernel, a novel operating system architecture consisting of both hardware and software components and designed to be fundamentally more secure than the state of the art.  ...  The kernel is a single entity which provides many services (memory management, interfacing to drivers, context switching, IPC) having no real relation to each other, and has the ability to observe or tamper  ...  The general guiding principles of "no all-powerful component", "hardware-software codesign", and "safe design" are very similar to our work, as well as the conclusion that privilege rings are an archaic  ... 
doi:10.1007/978-3-662-53140-2_12 fatcat:twdntldmvfa6nmdxdd2oqxycou

IBM PowerNP network processor: Hardware, software, and applications

J. R. Allen, B. M. Bass, C. Basso, R. H. Boivie, J. L. Calvignac, G. T. Davis, L. Frelechoux, M. Heddes, A. Herkersdorf, A. Kind, J. F. Logan, M. Peyravian (+4 others)
2003 IBM Journal of Research and Development  
IBM PowerNP network processor: Hardware, software, and applications Deep packet processing is migrating to the edges of service provider networks to simplify and speed up core functions.  ...  As a result, more services will have to be performed at the edges, on behalf of both the core and the end users.  ...  Acknowledgments We gratefully acknowledge the significant contributions of a large number of our colleagues at IBM who, through years of research, design, and development, have helped to create and document  ... 
doi:10.1147/rd.472.0177 fatcat:nn4smaizkjdxbp7tz4hbrjzvhq

Hardware-software collaboration for secure coexistence with kernel extensions

Daniela Oliveira, Nicholas Wetzel, Max Bucci, Jesus Navarro, Dean Sullivan, Yier Jin
2014 ACM SIGAPP Applied Computing Review  
Security approaches at the OS and virtual machine layers do not cooperate with each other or with the hardware.  ...  This paper advocates a new paradigm for OS defense based on close collaboration between an OS and the hardware infrastructure, and describes a hardware-software architecture realizing this vision.  ...  Acknowledgments This research is funded by the National Science Foundation under grant CNS-1149730.  ... 
doi:10.1145/2670967.2670969 fatcat:k6enjbklwnbbbeoqeo7gvxip2u

Hardware Software Co-Design of a Farming Robot

Gridsada Phanomchoeng, Muhammad Saadi, Pruk Sasithong, Jedsada Tangmongkhonsuk, Sanika K. Wijayasekara, Lunchakorn Wuttisittikulkij
2020 Engineering Journal  
This paper talks about the development of hardware software co-design of agricultural farming robot.  ...  This is the most fundamental human necessity and food security is one of the major global concern of this century.  ...  In this paper, we have presented a hardware software co-design of a farming robot which has the ability to grow multiple types of crops in the soil bay and this idea was inspired by Farmbot [16] [17]  ... 
doi:10.4186/ej.2020.24.1.199 fatcat:7twb27e6hje33casduccxn425q

Security for distributed SOA at the tactical edge

R. William Maule, William C. Lewis
2010 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE  
Yet, many of the new services arriving at the tactical edge for Fleet testing are based on web services-meaning that SOA is somewhat inevitable.  ...  Service-Oriented Architecture (SOA) presents new paradigms for security and information assurance. Security processes for legacy systems are not sufficient to secure a distributed SOA.  ...  Service-Oriented Architecture (SOA) presents an opportunity to significantly increase overall information technology effectiveness and performance, while substantially reducing hardware, software, and  ... 
doi:10.1109/milcom.2010.5680146 fatcat:mefjtt2jh5a4nltnj6ntldzlpm
« Previous Showing results 1 — 15 out of 13,844 results