Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 24, Issue 2March 2025Current IssueIssue-in-Progress
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1539-9087
EISSN:1558-3465
Skip Table Of Content Section
research-article
StreamNet++: Memory-Efficient Streaming TinyML Model Compilation on Microcontrollers
Article No.: 23, Pages 1–26https://doi.org/10.1145/3706107

The rapid growth of on-device artificial intelligence increases the importance of TinyML inference applications. However, the stringent tiny memory space on the microcontroller unit (MCU) raises the grand challenge when deploying deep neural network (DNN) ...

research-article
Open Access
SmartTBD: Smart Tracking for Resource-constrained Object Detection
Article No.: 24, Pages 1–19https://doi.org/10.1145/3703912

With the growing demand for video analysis on mobile devices, object tracking has demonstrated to be a suitable assistance to object detection under the Tracking-By-Detection (TBD) paradigm for reducing computational overhead and power demands. However, ...

research-article
Open Access
A Highly Hardware Efficient ML-KEM Accelerator with Optimised Architectural Layers
Article No.: 25, Pages 1–24https://doi.org/10.1145/3708469

The Module-Lattice-Based Key encapsulation Mechanism (ML-KEM) scheme, which is currently being standardised, is a quantum attack resistant KEM that is based on CRYSTALS-Kyber. CRYSTALS-Kyber is the only Public-key Encryption (PKE)/ KEM scheme selected in ...

research-article
Customized FPGA Implementation of Authenticated Lightweight Cipher Fountain for IoT Systems
Article No.: 26, Pages 1–26https://doi.org/10.1145/3643039

Authenticated Encryption with Associated-Data (AEAD) can ensure both confidentiality and integrity of information in encrypted communication. Distinctive variants are customized from AEAD to satisfy various requirements. In this paper, we take a 128-bit ...

research-article
Open Access
Implementing Privacy Homomorphism with Random Encoding and Computation Controlled by a Remote Secure Server
Article No.: 27, Pages 1–27https://doi.org/10.1145/3651617

Remote IoT devices face significant security risks due to their inherent physical vulnerability. An adversarial actor with sufficient capability can monitor the devices or exfiltrate data to access sensitive information. Remotely deployed devices such as ...

research-article
LiteHash: Hash Functions for Resource-Constrained Hardware
Article No.: 28, Pages 1–17https://doi.org/10.1145/3677181

The global paradigm shift toward edge computing has led to a growing demand for efficient integrity verification. Hash functions are one-way algorithms which act as a zero-knowledge proof of a datum’s contents. However, it is infeasible to compute hashes ...

research-article
APB-tree: An Adaptive Pre-built Tree Indexing Scheme for NVM-based IoT Systems
Article No.: 29, Pages 1–31https://doi.org/10.1145/3677179

With the proliferation of sensors and the emergence of novel applications, IoT data has grown exponentially in recent years. Given this trend, efficient data management is crucial for a system to easily access vast amounts of information. For decades, B+-...

research-article
Open Access
SENNA: Unified Hardware/Software Space Exploration for Parametrizable Neural Network Accelerators
Article No.: 30, Pages 1–26https://doi.org/10.1145/3705731

Parametrizable neural network accelerators enable the deployment of targeted hardware for specialized environments. Finding the best architecture configuration for a given specification, however, is challenging. A large number of hardware configurations ...

research-article
HeterogeneousRTOS: A CPU-FPGA Real-Time OS for Fault Tolerance on COTS at Near-Zero Timing Cost
Article No.: 31, Pages 1–50https://doi.org/10.1145/3712062

Ionizing particles in the atmosphere may strike circuits causing Single Event Upsets (SEU), affecting the output correctness. Critical real-time systems are traditionally custom-designed, featuring redundancy for guaranteeing fault resilience. The ...

research-article
PUF-Dilithium: Design of a PUF-Based Dilithium Architecture Benchmarked on ARM Processors
Article No.: 32, Pages 1–20https://doi.org/10.1145/3715328

Addressing the looming threat posed by quantum computers capable of breaching current public key cryptography schemes has become imperative. To this end, the National Institute of Standards and Technology (NIST) initiated a competition in Post-Quantum ...

research-article
Open Access
RAD-FS: Remote Timing and Power SCA Security in DVFS-augmented Ultra-Low-Power Embedded Systems
Article No.: 33, Pages 1–27https://doi.org/10.1145/3711836

High-performance crypto-engines have become crucial components in modern System-On-Chip (SoC) architectures across platforms, from servers to edge-IoTs’. Alas, their secure operation faces a significant obstacle caused by information-leakage accessed ...

research-article
A Compact and Parallel Swap-Based Shuffler Based on Butterfly Network and Its Complexity Against Side Channel Analysis
Article No.: 34, Pages 1–40https://doi.org/10.1145/3715961

A prominent countermeasure against side-channel attacks, the hiding countermeasure, typically involves shuffling operations using a permutation algorithm. This is especially crucial in the era of Post-quantum Cryptography, where computational ...

research-article
Open Access
A Hybrid Target Selection Model of Functional Safety Compliance for Autonomous Driving System
Article No.: 35, Pages 1–27https://doi.org/10.1145/3716631

The autonomous driving system faces challenges in selecting critical targets under dense environments with limited computation resources. Existing rule-based methods struggle with complex scenarios, while learning-based approaches lack interpretability ...

Subjects

Comments