首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
FPGAs combine the programmability of processors with the performance of custom hardware. As they become more common in critical embedded systems, new techniques are necessary to manage security in FPGA designs. This article discusses FPGA security problems and current research on reconfigurable devices and security, and presents security primitives and a component architecture for building highly secure systems on FPGAs.  相似文献   

2.
As data sharing is growing continuously,this is constantly increasing the vulnerability of the operating systems.So the need for secure operating system is urgent.ACL is one of the basic characters of secure operating system.This paper describes how to enhance the Linux security with POSIX ACL embedded in it‘‘‘‘‘‘‘‘s kernel.  相似文献   

3.
本文运用两变量沃尔什-阿达马变换分析了一般多输出组合逻辑系统因软故障引起的系统错误概率,导出了计算某些特殊情况及常用的SUM-OF-PRODUCT和NAND-NAND系统错误概率的简化公式和快速算法.利用计算机研究了几个实例,它们揭示了由软故障引起的系统错误概率的特征,为设计多输入多输出组合逻辑系统,降低软故障对系统的影响,提供了有益的启示.  相似文献   

4.
In this article, we describe a low-cost, dual-virtual-CPU hardware technology for embedded-systems security. We also present a case study of a programmable software design to exploit such hardware. This design integrates a rich operating system without requiring significant changes to it, while maintaining preemptive and real-time properties, exception handling, and power management.  相似文献   

5.
Enhancing Security and Privacy in Traffic-Monitoring Systems   总被引:2,自引:0,他引:2  
Intelligent transportation systems increasingly depend on probe vehicles to monitor traffic: they can automatically report position, travel time, traffic incidents, and road surface problems to a telematics service provider. This kind of traffic-monitoring system could provide good coverage and timely information on many more roadways than is possible with a fixed infrastructure such as cameras and loop detectors. This approach also promises significant reductions in infrastructure cost because the system can exploit the sensing, computing, and communications devices already installed in many modern vehicles. This architecture separates data from identities by splitting communication from data analysis. Data suppression techniques can help prevent data mining algorithms from reconstructing private information from anonymous database samples  相似文献   

6.
阐述了网络互联背景下的嵌入式系统的安全问题,给出二种分析安全问题的方法在嵌入式系统中的应用,分析了影响系统安全的三种因素并介绍了几种有效的防御方法。  相似文献   

7.
基于FPGA的可重构系统的应用   总被引:8,自引:0,他引:8  
基于FPGA的可重构系统的出现,引发了计算和数字逻辑样式的变革。作为逻辑仿真系统,它的仿真速度比软件仿真要快数个量级;作为用户计算机,它在多种类型的应用实现中获得高效率的系统性能;作为多模式系统,它节省了硬件开支,并提供了真正意义上的通用硬件。  相似文献   

8.
Arazi  B. 《Computer》2006,39(10):106-107
Nanotechnology is useful not only for harnessing physical techniques in security applications but also to help researchers use physics theories to prove applications' security strength. Security strength depends on an adversary's inability to perform an operation that valid users can easily perform. Nanotechnology can help resolve the challenge of devising a means to execute this principle and accurately evaluate the adversary's limitations. The idea of enlisting physics theories to devise security applications and prove their strength isn't new. For example, quantum cryptography - which many consider as a revolutionary information security technology -facilitates secure ways to exchange secret keys. Theories from physics, not mathematics, provide the foundation to implement the application and prove its security strength  相似文献   

9.
由于受到系统资源和实时性的限制,对于嵌入式实时系统的安全扩展很难延用通用计算机系统的安全设计方法,因此需要对其进行专门的研究。为了在确保实时性的前提下使嵌入式实时系统的安全性达到最优,本文提出了一套完整的安全设计方法,包括安全任务图模型和安全评估模型,在此基础上,又提出了一种基于整数线性规划的安全策略优化生成方法ILPOS。该安全策略优化生成方法同时解决了安全算法选择和实时可调度性检测两方面的问题,克服了一般分阶段优化方法的不足,从而充分地利用系统可用时间来实现安全扩展。仿真实验结果表明,与传统的启发式安全设计算法相比,ILPOS方法在各种实时性约束条件下都能有效地提高系统的安全性。  相似文献   

10.
为了解决目前无法以人工手段求解航空电子产品中可编程逻辑器件(PLD)大规模输出与输入的组合逻辑关系、影响航空产品维修这一问题,以FPGA为控制器开发用于遍历输入并读取相应输出的可操作不同机载PLD器件的硬件,并运用广义的动态规划方法设计逻辑反求算法,通过排除无关数据、查找顶层逻辑树、进行递归层层简化合并,从大数据中提取逻辑范式,研制了一款可以自动求解机载(PLD)大规模组合逻辑关系的反求装置。实验结果表明,本装置操作简单灵活,可以针对多种机载PLD器件,在较短的时间内准确求解大规模组合逻辑关系,所做研究对航空电子产品的电路原理分析与对电路板的深修有重要指导意义。  相似文献   

11.
12.
Design of fully self-testing combinational circuits was considered. A theorem defining the conditions for guaranteed logic complement-based design of fully self-testing circuit was proved. Examples were presented.__________Translated from Avtomatika i Telemekhanika, No. 8, 2005, pp. 161–172.Original Russian Text Copyright © 2005 by Goessel, Morozov, V. Sapozhnikov, Vl. Sapozhnikov.  相似文献   

13.
Classical logic has so far been the logic of choice in formal hardware verification. This paper proposes the application of intuitionistic logic to the timing analysis of digital circuits. The intuitionistic setting serves two purposes. The model-theoretic properties are exploited to handle the second-order nature of bounded delays in a purely propositional setting without need to introduce explicit time and temporal operators. The proof-theoretic properties are exploited to extract quantitative timing information and to reintroduce explicit time in a convenient and systematic way.We present a natural Kripke-style semantics for intuitionistic propositional logic, as a special case of a Kripke constraint model for Propositional Lax Logic (Information and Computation, Vol. 137, No. 1, 1–33, 1997), in which validity is validity up to stabilisation, and implication comes out as boundedly gives rise to. We show that this semantics is equivalently characterised by a notion of realisability with stabilisation bounds as realisers. Following this second point of view an intensional semantics for proofs is presented which allows us effectively to compute quantitative stabilisation bounds.We discuss the application of the theory to the timing analysis of combinational circuits. To test our ideas we have implemented an experimental prototype tool and run several examples.  相似文献   

14.
Enhancing PC Security with a U-Key   总被引:1,自引:0,他引:1  
A boot system that uses a U-Key can help ensure the integrity of fairly static PC components. Moreover, the associated two-factor authentication makes a mobile computer's theft less likely because a thief can't use it  相似文献   

15.
Enhancing Manufacturing Performance with Erp Systems   总被引:2,自引:0,他引:2  
This article presents five case studies indicating that enterprise resource planning (ERP) systems do enhance the performance of manufacturing organizations. the ERP systems studied are from SAP, Baan, and Oracle. in all five cases, better cross-functional integration was a critical success factor.  相似文献   

16.
A new method of functional checking of combinational circuits by the logic complement of the output function was proposed. A self-testing checker based on the 1-out-of-3 code was described. Results of experimental studies of the standard examples of the MCNC system were presented.  相似文献   

17.
ABSTRACT

Embedded devices are becoming ubiquitous in both domestic and commercial environments. Although smartphones, tablets, and video game consoles are all labeled by their primary function, most of these devices offer additional features and are capable of additional interactivity. Given the proprietary nature of such devices in terms of hardware and software and the protection mechanisms incorporated into these systems, it is and will continue to be extremely difficult to use “traditional digital forensics” methodologies to access storage media and acquire data for analysis. This paper examines how consumer law may be stifling research that the forensic community could ultimately depend upon to examine devices.  相似文献   

18.
OBDD在组合逻辑电路测试中的应用研究   总被引:2,自引:3,他引:2  
传统的组合逻辑电路测试方法在搜索过程中都不可避免地要进行反向回溯,由于反向回溯的次数过多,往往会降低算法的效率,文中利用OBDD来表示电路中每个节点所代表的逻辑函数,把传统算法中的反向回溯过程转换为OBDD图的问题,从而加快了故障测试的速度,同时,OBDD在测试矢量集的生成以及必要值的确定中也显示出一定的优越性。  相似文献   

19.
Neural Processing Letters - Nowadays, the success of neural networks as reasoning systems is doubtless. Nonetheless, one of the drawbacks of such reasoning systems is that they work as black-boxes...  相似文献   

20.
阐述了实时CORBA标准的内容,并给出了用它构建一个嵌入式系统的应用举例。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号