Platforms and Applications in Hardware Security: Trends and Challenges
نویسنده
چکیده
This paper introduces a few research studies being conducted that are using multicore embedded systems, highlighting the challenges and questions relevant to R&D (Research and Development) in computer systems architecture, focusing on design aspects and optimization of embedded systems that needs to run security solutions or cryptographical algorithms using hardware acceleration, aiming for good performance, code optimizations, and the lowest energy consumption. Another aspects are the design of dedicated processors for specific purposes, multicore systems and GPUs for security solutions and specific applications requiring high performance, with the possibility to work with FPGAs or embedded platforms with embedded multicore paradigm.
منابع مشابه
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملTrends in big data analytics
One of themajor applications of future generation parallel and distributed systems is in big-data analytics. Data repositories for such applications currently exceed exabytes and are rapidly increasing in size. Beyond their sheermagnitude, these datasets and associated applications’ considerations pose significant challenges formethod and software development. Datasets are oftendistributed and ...
متن کاملThe Challenges and Trends of Deploying Blockchain in the Real World for the Users’ Need
Blockchain technology is a decentralized and open database maintained by a peer-to-peer network, offering a “trustless trust” for untrusted parties. Despite the fact that some researchers consider blockchain as a bubble, blockchain technology has the genuine potential to solve problems across industries. In this article, we provide an overview of the development that Blockchain technology has h...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملChallenges related to the government Role in cyberspace Provide: Grounded theory
Introduction: Because if messengers and social networking channels are formed and hosted on foreign service platforms, we will see political, cultural, and so on threats. In this case, the control and monitoring of social emotions and the observation of political currents are out of reach of outsiders and the aliens take over the public opinion by analyzing the content. In the meantime, the cou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013