Managing Security in FPGA-Based Embedded Systems
نویسندگان
چکیده
منابع مشابه
FPGA Based Embedded Vision Systems
Embedded micro-controller systems are becoming increasingly popular in image processing applications. Imaging algorithms can consume large amounts of the processing time on a CPU, which also needs to handle other tasks such as I/O. A significant amount of research has been performed in recent years into the acceleration of image processing algorithms using reconfigurable hardware logic devices ...
متن کاملManaging Trustworthiness in Component-based Embedded Systems
Component-based systems use software components to achieve their overall high-level functionality which, in turn, may be extended by initiating the download of new components. This action may detrimentally affect the system's overall dependability and security characteristics. We address the problem of the enhancement of dependability and security for component-based embedded systems that run, ...
متن کاملSorting Units for FPGA-Based Embedded Systems
Sorting is an important operation for a number of embedded applications. As sorting large datasets may impose undesired performance degradation, acceleration units coupled to the embedded processor can be an interesting solution for speeding-up the computations. This paper presents and evaluates three hardware sorting units, bearing in mind embedded computing systems implemented with FPGAs. The...
متن کامل“seis” – Security in Embedded Ip-based Systems
results in complex and cost-intensive E/E architectures. For this reason the innovation alliance for automobile electronics E|ENOVA initiated the research project “SEIS – Safety in Embedded IP-based Systems”, with the aim of creating a consistent security solution for internet protocol based communication inside the vehicle and for the vehicle’s communication with the environment. The project p...
متن کاملSecurity in Embedded Systems
Security has traditionally been a subject of intensive research in the area of computing and networking. However, security of embedded systems is often ignored during the design and development period of the product, thus leaving many devices vulnerable to attacks. The growing number of embedded systems today (mobile phones, pay-tv devices, household appliances, home automation products, indust...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Design & Test of Computers
سال: 2008
ISSN: 0740-7475
DOI: 10.1109/mdt.2008.166