Trustworthy Reconfigurable Systems

Author: Thomas Feller
Publisher: Springer
ISBN: 3658070056
Format: PDF, Docs
Download Now
​Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime.

Reconfigurable Architectures and Design Automation Tools for Application Level Network Security

Author: Sascha Mühlbach
Publisher: Logos Verlag Berlin GmbH
ISBN: 3832539557
Format: PDF, ePub, Docs
Download Now
The relevance of the Internet has dramatically grown in the past decades. However, the enormous financial impact attracts many types of criminals. Setting up proper security mechanisms (e.g., Intrusion Detection Systems (IDS)) has therefore never been more important than today. To further compete with today's data transfer rates (10 to 100 Gbit/s), dedicated hardware accelerators have been proposed to offload compute intensive tasks from general purpose processors. As one key technology, reconfigurable hardware architectures, e.g., the Field Programmable Gate Array (FPGA), are of particular interest to this end. This work addresses the use of such FPGAs in the context of interactive communication applications, which goes beyond the regular packet level operations often seen in this area. To support rapid prototyping, a novel FPGA platform (NetStage) has been designed and developed, which provides a communication core for Internet communication and a flexible connection bus for attaching custom applications modules. A hardware honeypot (the MalCoBox) has been set up as a proof-of-concept application. Furthermore, to address the ongoing issue of hardware programming complexity, the domain-specific Malacoda language for abstractly formulating honeypot packet communication dialogs is presented and discussed. An associated compiler translates Malacoda into high-performance hardware modules for NetStage. Together, NetStage and Malacoda address some of the productivity deficiencies often recognized as major hindrances for the more widespread use of reconfigurable computing in communications applications. Finally, the NetStage platform has been evaluated in a real production environment.

Network and System Security

Author: Meikang Qiu
Publisher: Springer
ISBN: 3319256459
Format: PDF, Docs
Download Now
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

Reconfigurable Computing Architectures Tools and Applications

Author: Philip Brisk
Publisher: Springer
ISBN: 3642368123
Format: PDF, ePub
Download Now
This book constitutes the thoroughly refereed conference proceedings of the 9th International Symposium on Reconfigurable Computing: Architectures, Tools and Applications, ARC 2013, held in Los Angeles, CA, USA, in March 2013. The 28 revised papers presented, consisting of 20 full papers and 11 poster papers were carefully selected from 41 submissions. The topics covered are applications, arithmetic, design optimization for FPGAs, architectures, place and routing.

Applied Reconfigurable Computing Architectures Tools and Applications

Author: Nikolaos Voros
Publisher: Springer
ISBN: 3319788906
Format: PDF, ePub
Download Now
This book constitutes the proceedings of the 14th International Conference on Applied Reconfigurable Computing, ARC 2018, held in Santorini, Greece, in May 2018. The 29 full papers and 22 short presented in this volume were carefully reviewed and selected from 78 submissions. In addition, the volume contains 9 contributions from research projects. The papers were organized in topical sections named: machine learning and neural networks; FPGA-based design and CGRA optimizations; applications and surveys; fault-tolerance, security and communication architectures; reconfigurable and adaptive architectures; design methods and fast prototyping; FPGA-based design and applications; and special session: research projects.

Reconfigurable Computing Architectures Tools and Applications

Author: Roger Woods
Publisher: Springer
ISBN: 3540786104
Format: PDF, ePub, Docs
Download Now
Coverage in this proceedings volume includes DNA and string processing applications, reconfigurable computing hardware and systems, image processing, run-time behavior, instruction set extension, as well as random number generation and financial computation.

Security Basics for Computer Architects

Author: Ruby B. Lee
Publisher: Morgan & Claypool Publishers
ISBN: 1627051562
Format: PDF, Mobi
Download Now
Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures.

Introduction to Hardware Security and Trust

Author: Mohammad Tehranipoor
Publisher: Springer Science & Business Media
ISBN: 9781441980809
Format: PDF, Mobi
Download Now
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

Embedded Multimedia Security Systems

Author: Amit Pande
Publisher: Springer Science & Business Media
ISBN: 1447144597
Format: PDF, ePub, Docs
Download Now
Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.