Power-Aware Design Techniques of Secure Multimode Embedded Systems
暂无分享,去创建一个
[1] Petr Fiedler,et al. Performance evaluation of symmetric cryptography in embedded systems , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.
[2] Scott A. Mahlke,et al. Heterogeneous microarchitectures trump voltage scaling for low-power cores , 2014, 2014 23rd International Conference on Parallel Architecture and Compilation (PACT).
[3] Wei Jiang,et al. Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint , 2012, 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.
[4] Lothar Thiele,et al. Multiobjective Optimization Using Evolutionary Algorithms - A Comparative Case Study , 1998, PPSN.
[5] Anuj Pathania,et al. Integrated CPU-GPU power management for 3D mobile games , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[6] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[7] Hendrikus J. M. Veendrick,et al. Short-circuit dissipation of static CMOS circuitry and its impact on the design of buffer circuits , 1984 .
[8] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[9] Edward A. Lee,et al. Aspect-oriented modeling of attacks in automotive Cyber-Physical Systems , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[10] Petru Eles,et al. Optimization of message encryption for distributed embedded systems with real-time constraints , 2011, 14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems.
[11] Srivaths Ravi,et al. Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..
[12] Sri Parameswaran,et al. SHIELD: A software hardware design methodology for security and reliability of MPSoCs , 2008, 2008 45th ACM/IEEE Design Automation Conference.
[13] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[14] Eyal Kushilevitz,et al. Improved Cryptanalysis of RC5 , 1998, EUROCRYPT.
[15] Wei Zhao,et al. An energy-efficient slack distribution technique for multimode distributed real-time embedded systems , 2005, IEEE Transactions on Parallel and Distributed Systems.
[16] Roman L. Lysecky,et al. Autonomous hardware/software partitioning and voltage/frequency scaling for low-power embedded systems , 2009, TODE.
[17] Serge Vaudenay,et al. On the Weak Keys of Blowfish , 1996, FSE.
[18] Dengguo Feng,et al. New Results on Impossible Differential Cryptanalysis of Reduced AES , 2007, ICISC.
[19] Petru Eles,et al. Co-design techniques for distributed real-time embedded systems with communication security constraints , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[20] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[21] Naehyuck Chang,et al. Accurate Modeling of the Delay and Energy Overhead of Dynamic Voltage and Frequency Scaling in Modern Microprocessors , 2013, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[22] Petru Eles,et al. Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors , 2013, RTNS '13.
[23] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[24] Jongsung Kim,et al. New Impossible Differential Attacks on AES , 2008, INDOCRYPT.
[25] Soonhoi Ha,et al. Hardware-software cosynthesis of multi-mode multi-task embedded systems with real-time constraints , 2002, Proceedings of the Tenth International Symposium on Hardware/Software Codesign. CODES 2002 (IEEE Cat. No.02TH8627).
[26] O. Khan,et al. ACM Transactions on Embedded Computing Systems continued on back cover , 2018 .
[27] Xiao Qin,et al. Improving security for periodic tasks in embedded systems through scheduling , 2007, TECS.
[28] Petru Eles,et al. Quality-driven synthesis of embedded multi-mode control systems , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[29] Catherine H. Gebotys. A table masking countermeasure for low-energy secure embedded systems , 2006, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[30] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[31] Tei-Wei Kuo,et al. Energy-Efficient Real-Time Task Scheduling for a DVS System with a Non-DVS Processing Element , 2006, 2006 27th IEEE International Real-Time Systems Symposium (RTSS'06).
[32] Meikang Qiu,et al. Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.
[33] Petru Eles,et al. On-line thermal aware dynamic voltage scaling for energy optimization with frequency/temperature dependency consideration , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[34] Christof Paar,et al. Secure In-Vehicle Communication , 2006 .
[35] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[36] Willi Meier,et al. Correlations in RC6 with a Reduced Number of Rounds , 2000, FSE.
[37] Lui Sha,et al. SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems , 2013, 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS).
[38] Srivaths Ravi,et al. Security in embedded systems: Design challenges , 2004, TECS.
[39] Kees G. W. Goossens,et al. Throughput-constrained voltage and frequency scaling for real-time heterogeneous multiprocessors , 2013, SAC '13.
[40] Petru Eles,et al. Optimization of secure embedded systems with dynamic task sets , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[41] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[42] Riccardo Bettati,et al. Imprecise computations , 1994, Proc. IEEE.
[43] Trevor Mudge,et al. Combined dynamic voltage scaling and adaptive body biasing for lower power microprocessors under dynamic workloads , 2002, ICCAD 2002.
[44] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[45] Petru Eles,et al. Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks , 2014, 2014 IEEE Computer Society Annual Symposium on VLSI.
[46] Meikang Qiu,et al. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software , 2006, IEEE Transactions on Computers.