enter search term and/or author name
Using Auxiliary Sensors for Pairwise Key Establishment in WSN
Qi Dong, Donggang Liu
Article No.: 59
Many techniques have been developed recently for establishing pairwise keys in sensor networks. However, some of them are vulnerable to a few compromised sensor nodes, while others could involve expensive protocols for establishing keys. This...
INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment
Divya Arora, Najwa Aaraj, Anand Raghunathan, Niraj K. Jha
Article No.: 60
Many information security attacks exploit vulnerabilities in “trusted” and privileged software executing on the system, such as the operating system (OS). On the other hand, most security mechanisms provide no immunity to...
Scheduling and Optimization of Fault-Tolerant Embedded Systems with Transparency/Performance Trade-Offs
Viacheslav Izosimov, Paul Pop, Petru Eles, Zebo Peng
Article No.: 61
In this article, we propose a strategy for the synthesis of fault-tolerant schedules and for the mapping of fault-tolerant applications. Our techniques handle transparency/performance trade-offs and use the fault-occurrence information to reduce...
Power Analysis Attack Resistance Engineering by Dynamic Voltage and Frequency Scaling
Shengqi Yang, Pallav Gupta, Marilyn Wolf, Dimitrios Serpanos, Vijaykrishnan Narayanan, Yuan Xie
Article No.: 62
This article proposes a novel approach to cryptosystem design to prevent power analysis attacks. Such attacks infer program behavior by continuously monitoring the power supply current going into the processor core. They form an important class of...
On Heuristic Solutions to the Simple Offset Assignment Problem in Address-Code Optimization
Hesham Shokry, Hatem M. El-Boghdadi
Article No.: 63
The increasing demand for more functionality in embedded systems applications nowadays requires efficient generation of compact code for embedded DSP processors. Because such processors have highly irregular data-paths, compilers targeting those...
Integrating Memory Optimization with Mapping Algorithms for Multi-Processors System-on-Chip
Bruno Girodias, Luiza Gheorghe Iugan, Youcef Bouchebaba, Gabriela Nicolescu, El Mostapha Abouhamid, Michel Langevin, Pierre Paulin
Article No.: 64
Due to their great ability to parallelize at a very high integration level, Multi-Processors Systems-on-Chip (MPSoCs) are good candidates for systems and applications such as multimedia. Memory is becoming a key player for significant improvements...
Event-driven localization has been proposed as a low-cost solution for node positioning in wireless sensor networks. In order to eliminate the costly requirement for accurate event control in existing methods, we present a practical design using...
Energy Conservation for Image Retrieval on Mobile Systems
Karthik Kumar, Yamini Nimmagadda, Yung-Hsiang Lu
Article No.: 66
Mobile systems such as PDAs and cell phones play an increasing role in handling visual contents such as images. Thousands of images can be stored in a mobile system with the advances in storage technology: this creates the need for better...
Instant Multiunit Resource Hardware Deadlock Detection Scheme for System-on-Chips
Jaehwan John Lee, Xiang Xiao
Article No.: 67
In this article, a brand new method of determining deadlock is presented. Most previous deadlock detection methods are algorithmic in the sense that they usually leverage some forms of Resource Allocation Graph (RAG) representations and then...
Network-Level Power-Performance Trade-Off in Wearable Activity Recognition: A Dynamic Sensor Selection Approach
Piero Zappi, Daniel Roggen, Elisabetta Farella, Gerhard Tröster, Luca Benini
Article No.: 68
Wearable gesture recognition enables context aware applications and unobtrusive HCI. It is realized by applying machine learning techniques to data from on-body sensor nodes. We present an gesture recognition system minimizing power while...
Randomized Instruction Injection to Counter Power Analysis Attacks
Jude A. Ambrose, Roshan G. Ragel, Sri Parameswaran
Article No.: 69
Side-channel attacks in general and power analysis attacks in particular are becoming a major security concern in embedded systems. Countermeasures proposed against power analysis attacks are data and table masking, current flattening, dummy...