A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Signature-based Intrusion Detection Hardware-Software Complex
2020
Information & Security An International Journal
The concept and the architecture of the developed hardware-software complex are described. ...
The hardware-software complex, which is the main subject of the presented research, serves as a firewall for the devices on one subnetwork with access to the Internet, simultaneously analysing and filtering ...
The intrusion Detection Hardware-Software Complex The Concept of the Development The solution is the developed hardware-software complex called Extendable Malware Detection System (EMDS). ...
doi:10.11610/isij.4715
fatcat:onf4b5xftzdy7bs7hudvwyslv4
SMASHUP: a toolchain for unified verification of hardware/software co-designs
2016
Journal of Cryptographic Engineering
Next, it proposes an evaluation of formal verification methods that have already been proposed for mixed hardware/software systems, with regards to the ideal method. ...
Many recent works offer practical hardware-assisted security solutions that take advantage of a tight cooperation between hardware and software to provide system-level security guarantees. ...
After surveying different methods applied to hardware/software co-designs, we presented a different approach based on ProVerif that answer part of our requirements. ...
doi:10.1007/s13389-016-0145-2
fatcat:3frsj6yb2batxmrlhquazcrmcu
Hardware-Software Co-Design: Not Just a Cliché
2015
Summit on Advances in Programming Languages
We reflect on the challenges and successes of approximation research and, with these lessons in mind, distill opportunities for future hardware-software co-design efforts. ...
It is time to embrace hardware-software co-design in earnest, to cooperate between programming languages and architecture to upend legacy constraints on computing. ...
We survey the opportunities for hardware software co-design in four broad categories. ...
doi:10.4230/lipics.snapl.2015.262
dblp:conf/snapl/SampsonBC15
fatcat:w53z5tuoujcx5eqfyn4c5s5eau
Hardware-Software Contracts for Secure Speculation
[article]
2020
arXiv
pre-print
Unfortunately, there are no hardware-software contracts that would turn this intuition into a basis for principled co-design. ...
Since the discovery of Spectre, a large number of hardware mechanisms for secure speculation has been proposed. ...
We would like to thank David Chisnall, Muntaquim Chowdhury, Matthew Fernandez, Cédric Fournet, Carlos Rozas, and Gururaj Saileshwar for feedback and discussions. ...
arXiv:2006.03841v3
fatcat:jkj3xiqbd5d4baalaqgprzzka4
Architectural support for safe software execution on embedded processors
2006
Proceedings of the 4th international conference on Hardware/software codesign and system synthesis - CODES+ISSS '06
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and more recently, system security ...
Our approach is completely automated, and applicable to any C program, making it a promising and practical approach for addressing the growing security and reliability concerns in embedded software. ...
While most studies for enhancing memory safety and security have been performed in the context of general-purpose computers, embedded systems, which are used to perform a wide range of critical functions ...
doi:10.1145/1176254.1176281
dblp:conf/codes/AroraRRJ06
fatcat:o6vwhg4gprg3zdtpajzjyp7esm
Internet-based hardware/software co-design framework for embedded 3D graphics applications
2011
EURASIP Journal on Advances in Signal Processing
In this article, we propose a hardware/software co-design environment for 3D graphics application development that includes the 3D graphics software, OpenGL ES application programming interface (API), ...
This results in controlled and secure transparency and reproducibility, granting leveled access to users of various roles. ...
Acknowledgements The authors would like to thank Himax Technologies Inc. for partially sponsoring our research and thank Professor Chung-Ho Chen of NCKU and his research team for helping the set up of ...
doi:10.1186/1687-6180-2011-25
fatcat:jq5d2c5cozckpdxo4lxxt5v2ia
SPI-SNOOPER
2012
Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis - CODES+ISSS '12
This paper makes the case for a joint hardware-software solution to this problem and advocates the use of a dedicated reliability co-processor that is tasked with monitoring the operation of the embedded ...
Over the years, many software-based solutions (in the form of debugging tools and protocols) have been proposed for in-situ system monitoring. ...
We believe that a joint hardware-software approach is both required and ideal to address the problem of post-deployment node monitoring and control. ...
doi:10.1145/2380445.2380460
dblp:conf/codes/HossainLR12
fatcat:njbhziiz3rbxpoz4w5fdyhzmly
Enhancing security through hardware-assisted run-time validation of program data properties
2005
Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis - CODES+ISSS '05
We present a hardware/software approach wherein such properties can be encoded as data attributes and enforced as security policies during program execution. ...
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. ...
Checker The checker is a separate hardware unit that performs SEC-TAG verification for the executing program. ...
doi:10.1145/1084834.1084884
dblp:conf/codes/AroraRRJ05
fatcat:mysyxhlujzearjdr7d24gbzvvy
P2P, CSC and TE: A Survey on Hardware, Software and Data
2021
Energies
hardware, software and data components are. ...
The result presents a concise overview of the hardware, software and data-related topics and structures within the P2P, TE and CSC energy generation and use models. ...
This paper provides a concise overview of the current state of practice on hardware, software and data research topics for the P2P, CSC and TE energy business and sharing models. ...
doi:10.3390/en14133851
fatcat:bsyed7rcv5hrbhkedffb7s4auu
Adaptive virtual organisms: A compositional model for complex hardware-software binding
[article]
2018
arXiv
pre-print
We briefly show how Agapia - a structured parallel, interactive programming language where dataflow and control flow structures can be freely mixed - may be used for getting quick implementations for VO's ...
Our paper addresses this question with reference to computer science recent hardware and software advances, particularly in areas as robotics, AI-hardware, self-adaptive systems, IoT, CPS, etc. ...
Background In computer science, the structure-function distinction occurs as the hardware-software dichotomy. ...
arXiv:1901.04983v1
fatcat:4yuovgqr6zcenngyp5pv3zgwfu
Development Practices of Embedded Systems: SMEs in SEE countries
2014
Business Systems Research
Methods/Approach: The survey was conducted using the sample of SME software firms and the data on embedded systems development practices have been analysed. ...
The market for the embedded systems development is rapidly increasing and this is one of the possible new markets for software firms striving for new competitive advantage. ...
Process for best matching Hardware/Software co-simulation. ...
doi:10.2478/bsrj-2014-0005
fatcat:vjqeranf7vedfjouku3c33oxva
OFFLINE AND ONLINE SIGNATURE VERIFICATION SYSTEMS: A SURVEY
2014
International Journal of Research in Engineering and Technology
The successful implementation of any such verification system depends mainly on how effectively the features have been extracted & used for classification. ...
This paper presents the survey about the offline & online signature verification system. Feature extraction stage is the most important stage in both online & off-line signature verification. ...
ACKNOWLEDGEMENTS We express our sincere gratitude to Dr .Mallikarjun Hangarge for supporting us in the entire manner for writing the paper. ...
doi:10.15623/ijret.2014.0315064
fatcat:3r63atgfgndzfpctubuhzwb5mi
Operating system verification—An overview
2009
Sadhana (Bangalore)
This paper gives a high-level introduction to the topic of formal, interactive, machine-checked software verification in general, and the verification of operating systems code in particular. ...
We survey the state of the art, the advantages and limitations of machinechecked code proofs, and describe two specific ongoing larger-scale verification projects in more detail. ...
Acknowledgements The author would like to thank Elisabeth Meister, Timothy Bourke, Mark Hillebrand, Tom in der Rieden, Norbert Schirmer, and Hendrik Tews for their feedback and for reading drafts of this ...
doi:10.1007/s12046-009-0002-4
fatcat:pl7j3msbsncnhmwg5w34r2uee4
A Survey on Testing for Cyber Physical System
[chapter]
2015
Lecture Notes in Computer Science
It presents a detailed state-of-the-art survey on the testing approaches performed on the CPS. Further, it provides challenges in CPS testing. ...
Cyber Physical Systems (CPS) bridge the cyber-world of computing and communications with the physical world and require development of secure and reliable software. ...
Acknowledgments This research is supported by Swedish Foundation for Strategic Research (SSF) via the SYNOPSIS Project. ...
doi:10.1007/978-3-319-25945-1_12
fatcat:bd5dopncpnaudmvkyefgxxbym4
Embedded Systems Development Tools: A MODUS-oriented Market Overview
2014
Business Systems Research
As a result embedded system developers have adopted software methods that yield high quality. The qualitative approach to examining embedded systems development tools has been applied in this work. ...
Objectives: The goal of the paper is to explore the versatility of the application in the embedded system development based on one FP7-SME project. ...
creating new
components
Integrates SystemC
models
Design environment for
embedded systems and SOCs
Timed and untimed simulations
In-depth non-intrusive
hardware/software
Integrates external ...
doi:10.2478/bsrj-2014-0001
fatcat:x2yblzjbrrf2rh5bg3j76injuu
« Previous
Showing results 1 — 15 out of 2,935 results