enter search term and/or author name
FIDES: An advanced chip multiprocessor platform for secure next generation mobile terminals
Hiroaki Inoue, Junji Sakai, Sunao Torii, Masato Edahiro
Article No.: 1
We propose a secure platform on a chip multiprocessor, FIDES, in order to enable next generation mobile terminals to execute downloaded native applications for Linux. Its most important feature is the higher security based on multigrained...
Attack-tolerant localization via iterative verification of locations in sensor networks
Taejoon Park, Kang G. Shin
Article No.: 2
In sensor networks, secure localization—determining sensors' locations in a hostile, untrusted environment—is a challenging, but very important, problem that has not yet been addressed effectively. This paper presents an...
Average dwell time (ADT) properties characterize the rate at which a hybrid system performs mode switches. In this article, we present a set of techniques for verifying ADT properties. The stability of a hybrid system A can be verified by...
Quantitative analysis of the speed/accuracy trade-off in transaction level modeling
Gunar Schirner, Rainer Dömer
Article No.: 4
The increasing complexity of embedded systems requires modeling at higher levels of abstraction. Transaction level modeling (TLM) has been proposed to abstract communication for high-speed system simulation and rapid design space exploration....
Direct address translation for virtual memory in energy-efficient embedded systems
Xiangrong Zhou, Peter Petrov
Article No.: 5
This article presents a methodology for virtual memory support in energy-efficient embedded systems. A holistic approach is proposed, where the combined efforts of compiler, operating system, and hardware architecture achieve a significant system...
Quasistatic shared libraries and XIP for memory footprint reduction in MMU-less embedded systems
Jiyong Park, Jaesoo Lee, Saehwa Kim, Seongsoo Hong
Article No.: 6
Despite a rapid decrease in the price of solid state memory devices, system memory is still a very precious resource in embedded systems. The use of shared libraries and execution-in-place (XIP) is known to be effective in significantly reducing...
Analyzing the worst-case execution time for instruction caches with prefetching
Jun Yan, Wei Zhang
Article No.: 7
Time predictability is one of the most important design considerations for real-time systems. In this article, we study the impact of instruction prefetching on the worst-case performance of instruction caches. We extend the static cache...
Analysis and design of a hardware/software trusted platform module for embedded systems
Najwa Aaraj, Anand Raghunathan, Niraj K. Jha
Article No.: 8
Trusted platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. However, for many resource-constrained embedded systems, the size and cost overheads of a separate Trusted Platform Module...