7 research outputs found

    N-variant Hardware Design

    Get PDF
    The emergence of lightweight embedded devices imposes stringent constraints on the area and power of the circuits used to construct them. Meanwhile, many of these embedded devices are used in applications that require diversity and flexibility to make them secure and adaptable to the fluctuating workload or variable fabric. While field programmable gate arrays (FPGAs) provide high flexibility, the use of application specific integrated circuits (ASICs) to implement such devices is more appealing because ASICs can currently provide an order of magnitude less area and better performance in terms of power and speed. My proposed research introduces the N-variant hardware design methodology that adds the sufficient flexibility needed by such devices while preserving the performance and area advantages of using ASICs. The N-variant hardware design embeds different variants of the design control part on the same IC to provide diversity and flexibility. Because the control circuitry usually represents a small fraction of the whole circuit, using multiple versions of the control circuitry is expected to have a low overhead. The objective of my thesis is to formulate a method that provides the following advantages: (i) ease of integration in the current ASIC design flow, (ii) minimal impact on the performance and area of the ASIC design, and (iii) providing a wide range of applications for hardware security and tuning the performance of chips either statically (e.g., post-silicon optimization) or dynamically (at runtime). This is achieved by adding diversity at two orthogonal levels: (i) state space diversity, and (ii) scheduling diversity. State space diversity expands the state space of the controller. Using state space diversity, we introduce an authentication mechanism and the first active hardware metering schemes. On the other hand, scheduling diversity is achieved by embedding different control schedules in the same design. The scheduling diversity can be spatial, temporal, or a hybrid of both methods. Spatial diversity is achieved by implementing multiple control schedules that use various parts of the chip at different rates. Temporal diversity provides variants of the controller that can operate at unequal speeds. A hybrid of both spatial and temporal diversities can also be implemented. Scheduling diversity is used to add the flexibility to tune the performance of the chip. An application of the thermal management of the chip is demonstrated using scheduling diversity. Experimental results show that the proposed method is easy to integrate in the current ASIC flow, has a wide range of applications, and incurs low overhead

    AEGIS : a single-chip secure processor

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.Includes bibliographical references (p. 225-240).Trust in remote interaction is a fundamental challenge in distributed computing environments. To obtain a remote party's trust, computing systems must be able to guarantee the privacy of intellectual property and the integrity of program execution. Unfortunately, traditional platforms cannot provide such guarantees under physical threats that exist in distributed environments. The AEGIS secure processor enables a physically secure computing platform to be built with a main processor as the only trusted hardware component. AEGIS empowers a remote party to authenticate the platform and guarantees secure execution even under physical threats. To realize the security features of AEGIS with only a single chip, this thesis presents a secure processor architecture along with its enabling security mechanisms. The architecture suggests a technique called suspended secure processing to allow a secure part of an application to be protected separately from the rest. Physical random functions provide a cheap and secure way of generating a unique secret key on each processor, which enables a remote party to authenticate the processor chip.(cont.) Memory encryption and integrity verification mechanisms guarantee the privacy and the integrity of off-chip memory content, respectively. A fully-functional RTL implementation and simulation studies demonstrate that the overheads associated with this single-chip approach is reasonable. The security components in AEGIS consumes about 230K logic gates. AEGIS, with its off-chip protection mechanisms, is slower than traditional processors by 26% on average for large applications and by a few percent for embedded applications. This thesis also shows that using AEGIS requires only minor modifications to traditional operating systems and compilers.by Gookwon Edward Suh.Ph.D

    Aeronautical engineering: A continuing bibliography with indexes, supplement 190

    Get PDF
    This bibliography lists 510 reports, articles and other documents introduced into the NASA scientific and technical information system in July 1985

    The core and the periphery in distributed and self-organizing innovation systems

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, 2006.Includes bibliographical references.The Internet has enabled the large-scale mobilization of individuals to self-organize and innovate outside of formal organizations. My dissertation consists of three studies examining the functioning of such self-organizing and distributed innovation systems. I focus on the differing roles of core and peripheral participants in the distributed innovation process and explore the potential generality of this new form of innovating. The first study explores a systematic method of broadcast search used by corporations to search for solutions to internal R & D problems by involving peripheral problem solvers - those who are outside of their organizations. I find that innovative solutions to difficult scientific problems can be effectively identified by broadcasting problems to a large group of diverse solvers in different fields. Broadcast search yields innovative solutions by peripheral solvers who are crossing scientific disciplines. The central characteristic of problems that were successfully solved is the ability to attract specialized peripheral solvers with heterogeneous scientific interests. The second study examines how participants jointly innovate in a Free and Open Source Software community. I find that members at the periphery - those outside of the core project team - are responsible for developing a majority of functionally novel software features.(cont.) In contrast, core members develop performance-related features. Peripheral members also initiate the majority of the development activity and provide critical input into the technical problem solving processes. Ongoing interactions between core and peripheral members are the primary enablers of collective problem solving. I discuss how core and peripheral members enact six work practices in jointly producing software in a distributed and virtual setting. The third study examines the motivation of core participants in 287 Free and Open Source Software communities. Theorizing on individual motivations for participating in communities has posited that external motivational factors in the form of extrinsic benefits as the main drivers of effort. I find that enjoyment-based intrinsic motivation, namely how creative a person feels when working on the project was the strongest and most pervasive driver of effort. I also find that user need, intellectual stimulation derived from writing code, and improving programming skills as top motivators for project participation.by Karim R. Lakhani.Ph.D

    The drivers of Corporate Social Responsibility in the supply chain. A case study.

    Get PDF
    Purpose: The paper studies the way in which a SME integrates CSR into its corporate strategy, the practices it puts in place and how its CSR strategies reflect on its suppliers and customers relations. Methodology/Research limitations: A qualitative case study methodology is used. The use of a single case study limits the generalizing capacity of these findings. Findings: The entrepreneur’s ethical beliefs and value system play a fundamental role in shaping sustainable corporate strategy. Furthermore, the type of competitive strategy selected based on innovation, quality and responsibility clearly emerges both in terms of well defined management procedures and supply chain relations as a whole aimed at involving partners in the process of sustainable innovation. Originality/value: The paper presents a SME that has devised an original innovative business model. The study pivots on the issues of innovation and eco-sustainability in a context of drivers for CRS and business ethics. These values are considered fundamental at International level; the United Nations has declared 2011 the “International Year of Forestry”

    Manned Mars System Study (MMSS): Mars transportation and facility infrastructure study. Volume 2: Technical report

    Get PDF
    The Manned Mars System Study (MMSS) was conducted for the Marshall Space Flight Center (MSFC) over the 35 month period between May 15, 1987 and April 30, 1990. During the course of the study, the NASA Office of Exploration (OEXP; Code Z) was created and MSFC was subsequently designated the Transportation Integration Agent (TIA) for support of the OEXP Mission Analysis and Systems Engineering (MASE) team. As a result of this action, modifications to the contract redirected the efforts to be consistent with NASA's overall objectives, including lunar transportation system design. A large number of written submittals were required in order to provide TIA support to MASE. A list summarizing the documents which have been prepared and delivered by Martin Marietta under this contract during the course of this work is presented. In nearly all cases, full sets of view-graphs were also provided to the MSFC COTR, and in several cases magnetic media were provided as well. To incorporate all of these materials (more than 2,000 pages) into the present report would obviously produce an extremely unwieldy and confusing document. Therefore, a summary of key findings are presented in this final report, supplemented by other material produced under this contract but not already available in the widespread literature

    You Can\u27t Get There from Here: Movement SF and the Picaresque

    Get PDF
    This dissertation examines the crisis of authenticity in postmodern culture and argues that contemporary science fiction, specifically the subgenre of Movement SF, has evolved a unique answer to this crisis by adopting, perhaps spontaneously, the picaresque narrative structure. Postmodern fiction has a tenuous relationship with the issue of authenticity, such that the average postmodern subject is utterly without true authenticity at all, alternately victim to the socioeconomic conditions of his or her culture and to the elision of the self as a result of the homogenizing effects of advertising, television, etc. Postmodern SF also carries this bleak perception of the possibility of agency; William Gibson\u27s Sprawl and Bridge trilogies are rife with negations of human agency at the metaphorical hands of various aspects and incarnations of what Fredric Jameson terms the technological sublime. This dissertation puts forth the argument that a group of post-Eighties SF texts all participate in a spontaneous revival of the picaresque mode, using the picaresque journey and related motifs to re-authenticate subjects whose identity and agency are being erased by powerful social and economic forces exterior to and normally imperceptible by the individual. This dissertation is organized around three loosely connected parts. Part 1 attempts to define Movement SF by separating the various, often confusing marketing labels (such as cyberpunk, postcyberpunk, etc.) and extracting a cluster of core characteristics that have shaped the genre since its inception in the early 80s. Part 1 further examines how these core characteristics (or premises) of Movement SF provide fertile ground for picaresque narrative strategies. Part 2 describes in detail the picaresque as it appears in Movement SF, examining worldbuilding strategies, the persistence and evolution of tropes and motifs common to the traditional picaresque, and the generation of new tropes and motifs unique to Movement picaresques. Part 3 examines the spatial tactics used in Movement picaresque narratives to enable picaresque marginality in totalized, globalized environments. Furthermore, Part 3 examines the use of psychological plurality as an internal tactic to escape closed environments
    corecore