2,935 Hits in 5.6 sec

Signature-based Intrusion Detection Hardware-Software Complex

Inna V. Stetsenko, Maksym Demydenko
2020 Information & Security An International Journal  
The concept and the architecture of the developed hardware-software complex are described.  ...  The hardware-software complex, which is the main subject of the presented research, serves as a firewall for the devices on one subnetwork with access to the Internet, simultaneously analysing and filtering  ...  The intrusion Detection Hardware-Software Complex The Concept of the Development The solution is the developed hardware-software complex called Extendable Malware Detection System (EMDS).  ... 
doi:10.11610/isij.4715 fatcat:onf4b5xftzdy7bs7hudvwyslv4

SMASHUP: a toolchain for unified verification of hardware/software co-designs

Florian Lugou, Ludovic Apvrille, Aurélien Francillon
2016 Journal of Cryptographic Engineering  
Next, it proposes an evaluation of formal verification methods that have already been proposed for mixed hardware/software systems, with regards to the ideal method.  ...  Many recent works offer practical hardware-assisted security solutions that take advantage of a tight cooperation between hardware and software to provide system-level security guarantees.  ...  After surveying different methods applied to hardware/software co-designs, we presented a different approach based on ProVerif that answer part of our requirements.  ... 
doi:10.1007/s13389-016-0145-2 fatcat:3frsj6yb2batxmrlhquazcrmcu

Hardware-Software Co-Design: Not Just a Cliché

Adrian Sampson, James Bornholt, Luis Ceze, Marc Herbstritt
2015 Summit on Advances in Programming Languages  
We reflect on the challenges and successes of approximation research and, with these lessons in mind, distill opportunities for future hardware-software co-design efforts.  ...  It is time to embrace hardware-software co-design in earnest, to cooperate between programming languages and architecture to upend legacy constraints on computing.  ...  We survey the opportunities for hardware software co-design in four broad categories.  ... 
doi:10.4230/lipics.snapl.2015.262 dblp:conf/snapl/SampsonBC15 fatcat:w53z5tuoujcx5eqfyn4c5s5eau

Hardware-Software Contracts for Secure Speculation [article]

Marco Guarnieri, Boris Köpf, Jan Reineke, Pepe Vila
2020 arXiv   pre-print
Unfortunately, there are no hardware-software contracts that would turn this intuition into a basis for principled co-design.  ...  Since the discovery of Spectre, a large number of hardware mechanisms for secure speculation has been proposed.  ...  We would like to thank David Chisnall, Muntaquim Chowdhury, Matthew Fernandez, Cédric Fournet, Carlos Rozas, and Gururaj Saileshwar for feedback and discussions.  ... 
arXiv:2006.03841v3 fatcat:jkj3xiqbd5d4baalaqgprzzka4

Architectural support for safe software execution on embedded processors

Divya Arora, Anand Raghunathan, Srivaths Ravi, Niraj K. Jha
2006 Proceedings of the 4th international conference on Hardware/software codesign and system synthesis - CODES+ISSS '06  
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and more recently, system security  ...  Our approach is completely automated, and applicable to any C program, making it a promising and practical approach for addressing the growing security and reliability concerns in embedded software.  ...  While most studies for enhancing memory safety and security have been performed in the context of general-purpose computers, embedded systems, which are used to perform a wide range of critical functions  ... 
doi:10.1145/1176254.1176281 dblp:conf/codes/AroraRRJ06 fatcat:o6vwhg4gprg3zdtpajzjyp7esm

Internet-based hardware/software co-design framework for embedded 3D graphics applications

Chi-Tsai Yeh, Chun-Hao Wang, Ing-Jer Huang, Weng-Fai Wong
2011 EURASIP Journal on Advances in Signal Processing  
In this article, we propose a hardware/software co-design environment for 3D graphics application development that includes the 3D graphics software, OpenGL ES application programming interface (API),  ...  This results in controlled and secure transparency and reproducibility, granting leveled access to users of various roles.  ...  Acknowledgements The authors would like to thank Himax Technologies Inc. for partially sponsoring our research and thank Professor Chung-Ho Chen of NCKU and his research team for helping the set up of  ... 
doi:10.1186/1687-6180-2011-25 fatcat:jq5d2c5cozckpdxo4lxxt5v2ia


Mohammad Sajjad Hossain, Woo Suk Lee, Vijay Raghunathan
2012 Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis - CODES+ISSS '12  
This paper makes the case for a joint hardware-software solution to this problem and advocates the use of a dedicated reliability co-processor that is tasked with monitoring the operation of the embedded  ...  Over the years, many software-based solutions (in the form of debugging tools and protocols) have been proposed for in-situ system monitoring.  ...  We believe that a joint hardware-software approach is both required and ideal to address the problem of post-deployment node monitoring and control.  ... 
doi:10.1145/2380445.2380460 dblp:conf/codes/HossainLR12 fatcat:njbhziiz3rbxpoz4w5fdyhzmly

Enhancing security through hardware-assisted run-time validation of program data properties

Divya Arora, Anand Raghunathan, Srivaths Ravi, Niraj K. Jha
2005 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis - CODES+ISSS '05  
We present a hardware/software approach wherein such properties can be encoded as data attributes and enforced as security policies during program execution.  ...  The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective.  ...  Checker The checker is a separate hardware unit that performs SEC-TAG verification for the executing program.  ... 
doi:10.1145/1084834.1084884 dblp:conf/codes/AroraRRJ05 fatcat:mysyxhlujzearjdr7d24gbzvvy

P2P, CSC and TE: A Survey on Hardware, Software and Data

Brian O'Regan, Fabio Silva, Eoin O'Leidhin, Farah Tahir, Karen Mould, Barry Hayes, Vahid Hosseinnezhad, Ruzanna Chitchyan, Padraig Lyons
2021 Energies  
hardware, software and data components are.  ...  The result presents a concise overview of the hardware, software and data-related topics and structures within the P2P, TE and CSC energy generation and use models.  ...  This paper provides a concise overview of the current state of practice on hardware, software and data research topics for the P2P, CSC and TE energy business and sharing models.  ... 
doi:10.3390/en14133851 fatcat:bsyed7rcv5hrbhkedffb7s4auu

Adaptive virtual organisms: A compositional model for complex hardware-software binding [article]

Ciprian Ionut Paduraru, Gheorghe Stefanescu
2018 arXiv   pre-print
We briefly show how Agapia - a structured parallel, interactive programming language where dataflow and control flow structures can be freely mixed - may be used for getting quick implementations for VO's  ...  Our paper addresses this question with reference to computer science recent hardware and software advances, particularly in areas as robotics, AI-hardware, self-adaptive systems, IoT, CPS, etc.  ...  Background In computer science, the structure-function distinction occurs as the hardware-software dichotomy.  ... 
arXiv:1901.04983v1 fatcat:4yuovgqr6zcenngyp5pv3zgwfu

Development Practices of Embedded Systems: SMEs in SEE countries

Ivan Strugar, Jovana Zoroja, Božidar Jaković
2014 Business Systems Research  
Methods/Approach: The survey was conducted using the sample of SME software firms and the data on embedded systems development practices have been analysed.  ...  The market for the embedded systems development is rapidly increasing and this is one of the possible new markets for software firms striving for new competitive advantage.  ...  Process for best matching Hardware/Software co-simulation.  ... 
doi:10.2478/bsrj-2014-0005 fatcat:vjqeranf7vedfjouku3c33oxva


Yogesh V.G .
2014 International Journal of Research in Engineering and Technology  
The successful implementation of any such verification system depends mainly on how effectively the features have been extracted & used for classification.  ...  This paper presents the survey about the offline & online signature verification system. Feature extraction stage is the most important stage in both online & off-line signature verification.  ...  ACKNOWLEDGEMENTS We express our sincere gratitude to Dr .Mallikarjun Hangarge for supporting us in the entire manner for writing the paper.  ... 
doi:10.15623/ijret.2014.0315064 fatcat:3r63atgfgndzfpctubuhzwb5mi

Operating system verification—An overview

Gerwin Klein
2009 Sadhana (Bangalore)  
This paper gives a high-level introduction to the topic of formal, interactive, machine-checked software verification in general, and the verification of operating systems code in particular.  ...  We survey the state of the art, the advantages and limitations of machinechecked code proofs, and describe two specific ongoing larger-scale verification projects in more detail.  ...  Acknowledgements The author would like to thank Elisabeth Meister, Timothy Bourke, Mark Hillebrand, Tom in der Rieden, Norbert Schirmer, and Hendrik Tews for their feedback and for reading drafts of this  ... 
doi:10.1007/s12046-009-0002-4 fatcat:pl7j3msbsncnhmwg5w34r2uee4

A Survey on Testing for Cyber Physical System [chapter]

Sara Abbaspour Asadollah, Rafia Inam, Hans Hansson
2015 Lecture Notes in Computer Science  
It presents a detailed state-of-the-art survey on the testing approaches performed on the CPS. Further, it provides challenges in CPS testing.  ...  Cyber Physical Systems (CPS) bridge the cyber-world of computing and communications with the physical world and require development of secure and reliable software.  ...  Acknowledgments This research is supported by Swedish Foundation for Strategic Research (SSF) via the SYNOPSIS Project.  ... 
doi:10.1007/978-3-319-25945-1_12 fatcat:bd5dopncpnaudmvkyefgxxbym4

Embedded Systems Development Tools: A MODUS-oriented Market Overview

Michalis Loupis
2014 Business Systems Research  
As a result embedded system developers have adopted software methods that yield high quality. The qualitative approach to examining embedded systems development tools has been applied in this work.  ...  Objectives: The goal of the paper is to explore the versatility of the application in the embedded system development based on one FP7-SME project.  ...  creating new components Integrates SystemC models Design environment for embedded systems and SOCs Timed and untimed simulations In-depth non-intrusive hardware/software Integrates external  ... 
doi:10.2478/bsrj-2014-0001 fatcat:x2yblzjbrrf2rh5bg3j76injuu
« Previous Showing results 1 — 15 out of 2,935 results