Issue Downloads
Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test
Unpredictability is an important security property of Physically Unclonable Function (PUF) in the context of statistical attacks, where the correlation between challenge-response pairs is explicitly exploited. In the existing literature on PUFs, the ...
CALM: Contention-Aware Latency-Minimal Application Mapping for Flattened Butterfly On-Chip Networks
With the emergence of many-core multiprocessor system-on-chips (MPSoCs), on-chip networks are facing serious challenges in providing fast communication among various tasks and cores. One promising on-chip network design approach shown in recent studies ...
Scalable SMT-Based Equivalence Checking of Nested Loop Pipelining in Behavioral Synthesis
In this article, we present a novel methodology based on SMT-solvers to verify equality of a high-level described specification and a pipelined RTL implementation produced by a high-level synthesis tool. The complex transformations existing in the high-...
Optimized Implementation of Multirate Mixed-Criticality Synchronous Reactive Models
Model-based design using Synchronous Reactive (SR) models enables early design and verification of application functionality in a platform-independent manner, and the implementation on the target platform should guarantee the preservation of application ...
Reducing the Complexity of Dataflow Graphs Using Slack-Based Merging
There exist many dataflow applications with timing constraints that require real-time guarantees on safe execution without violating their deadlines. Extraction of timing parameters (offsets, deadlines, periods) from these applications enables the use ...
Security in Automotive Networks: Lightweight Authentication and Authorization
- Philipp Mundhenk,
- Andrew Paverd,
- Artur Mrowca,
- Sebastian Steinhorst,
- Martin Lukasiewycz,
- Suhaib A. Fahmy,
- Samarjit Chakraborty
With the increasing amount of interconnections between vehicles, the attack surface of internal vehicle networks is rising steeply. Although these networks are shielded against external attacks, they often do not have any internal security to protect ...
On the Restore Time Variations of Future DRAM Memory
As the de facto main memory standard, DRAM (Dynamic Random Access Memory) has achieved dramatic density improvement in the past four decades, along with the advancements in process technology. Recent studies reveal that one of the major challenges in ...
A Hybrid DRAM/PCM Buffer Cache Architecture for Smartphones with QoS Consideration
Flash memory is widely used in mobile phones to store contact information, application files, and other types of data. In an operating system, the buffer cache keeps the I/O blocks in dynamic random access memory (DRAM) to reduce the slow flash ...
An Elastic Mixed-Criticality Task Model and Early-Release EDF Scheduling Algorithms
Many algorithms have recently been studied for scheduling mixed-criticality (MC) tasks. However, most existing MC scheduling algorithms guarantee the timely executions of high-criticality (HC) tasks at the expense of discarding low-criticality (LC) ...
Computation of Seeds for LFSR-Based n-Detection Test Generation
This article describes a new procedure that generates seeds for LFSR-based test generation when the goal is to produce an n-detection test set. The procedure does not use test cubes in order to avoid the situation where a seed does not exist for a given ...
Scale & Cap: Scaling-Aware Resource Management for Consolidated Multi-threaded Applications
As the number of cores per server node increases, designing multi-threaded applications has become essential to efficiently utilize the available hardware parallelism. Many application domains have started to adopt multi-threaded programming; thus, ...
Secure and Flexible Trace-Based Debugging of Systems-on-Chip
This work tackles the conflict between enforcing security of a system-on-chip (SoC) and providing observability during trace-based debugging. On one hand, security objectives require that assets remain confidential at different stages of the SoC life ...
A MATLAB Vectorizing Compiler Targeting Application-Specific Instruction Set Processors
- Ioannis Latifis,
- Karthick Parashar,
- Grigoris Dimitroulakos,
- Hans Cappelle,
- Christakis Lezos,
- Konstantinos Masselos,
- Francky Catthoor
This article discusses a MATLAB-to-C vectorizing compiler that exploits custom instructions, for example, for Single Instruction Multiple Data (SIMD) processing and instructions for complex arithmetic present in Application-Specific Instruction Set ...
Scrubbing Mechanism for Heterogeneous Applications in Reconfigurable Devices
Commercial off-the-shelf (COTS) reconfigurable devices have been recognized as one of the most suitable processing devices to be applied in nano-satellites, since they can satisfy and combine their most important requirements, namely processing ...
A Model-Driven Engineering Methodology to Design Parallel and Distributed Embedded Systems
In Model-Driven Engineering system-level approaches, the design of communication protocols and patterns is subject to the design of processing operations (computations) and to their mapping onto execution resources. However, this strategy allows us to ...
Worst-Case Response Time Analysis of a Synchronous Dataflow Graph in a Multiprocessor System with Real-Time Tasks
In this article, we propose a novel technique that estimates a tight upper bound of the worst-case response time (WCRT) of a synchronous dataflow (SDF) graph when the SDF graph shares processors with other real-time tasks. When an SDF graph is executed ...
Multiprocessor Scheduling of a Multi-Mode Dataflow Graph Considering Mode Transition Delay
The Synchronous Data Flow (SDF) model is widely used for specifying signal processing or streaming applications. Since modern embedded applications become more complex with dynamic behavior changes at runtime, several extensions of the SDF model have ...
A Survey of Parametric Dataflow Models of Computation
Dataflow models of computation (MoCs) are widely used to design embedded signal processing and streaming systems. Dozens of dataflow MoCs have been proposed in the past few decades. More recently, several parametric dataflow MoCs have been presented as ...
Symbolic Analyses of Dataflow Graphs
The synchronous dataflow model of computation is widely used to design embedded stream-processing applications under strict quality-of-service requirements (e.g., buffering size, throughput, input-output latency). The required analyses can either be ...