479 research outputs found
Software design for a Smart Lock System for Home Automation
The idea that motivated this thesis work was to design a smart lock system and access control. This system was designed to control the access to a room using portable devices such as mobile phones or tablets. Its principal objective was to create a basic, but functional prototype that could be placed in a real room, and be implemented and integrated easily without much modification of the doors’ structure, yet accomplish its purpose.
To achieve this goal the work was divided in two separate parts the hardware part and the software part. This thesis focuses on the Software part. All progresses made and final results were obtained after using a design, implementation and test method. Working closely and in constant feedback with the hardware part, the programs and code developed has been always tested with the hardware to ensure that the right results were obtained and required modifications were made if needed.
In general, the project was carried out as follows. First the documentation process was completed and then, the devices, the coding languages and tools were selected. Next, the designing process was accomplished where the basic structure of the programs was developed and created. After that, the implementation and testing process were simultaneously done to perfect the result and obtain the best solution possible.
This process was completed when the real working prototype was obtained. The device successfully connected to a self-designed smartphone app and controlled the access to the room. The prototype could be mounted on a demonstration door to show how it is supposed to work in the real application. In general, all the main goals were achieved although some rectification and improvements are still to be studied more in depth and be applied on future expansions
Distributed Monitoring and Controlling Using Microcontroller and Virtual Internet Protocol
Nowadays, the applications based on TCP/IP (transmission control protocol/internet protocol) network are growing rapidly. By this application monitoring and control functions are easily and widely accessible through networks. Every PC (Personal Computer) can be connected to several microcontroller, but there are difficulties to access microcontroller directly through TCP/IP networks. This research study the use of virtual IP on a PC that connected with several microcontrollers, where each microcontroller is connected to a sensor device to monitoring temperature and a relay for controlling. In this method, each set of the microcontroller can be accessed directly using the IP. The results show that this system can be a distributed monitoring and controlling system which has the ability to record and display the results in the form of graphs.
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Machine learning has become mainstream across industries. Numerous examples
proved the validity of it for security applications. In this work, we
investigate how to reverse engineer a neural network by using only power
side-channel information. To this end, we consider a multilayer perceptron as
the machine learning architecture of choice and assume a non-invasive and
eavesdropping attacker capable of measuring only passive side-channel leakages
like power consumption, electromagnetic radiation, and reaction time.
We conduct all experiments on real data and common neural net architectures
in order to properly assess the applicability and extendability of those
attacks. Practical results are shown on an ARM CORTEX-M3 microcontroller. Our
experiments show that the side-channel attacker is capable of obtaining the
following information: the activation functions used in the architecture, the
number of layers and neurons in the layers, the number of output classes, and
weights in the neural network. Thus, the attacker can effectively reverse
engineer the network using side-channel information.
Next, we show that once the attacker has the knowledge about the neural
network architecture, he/she could also recover the inputs to the network with
only a single-shot measurement. Finally, we discuss several mitigations one
could use to thwart such attacks.Comment: 15 pages, 16 figure
Design of in-vehicle networked control system architectures through the use of new design to cost and weight processes : innovation report
Over the last forty years, the use of electronic controls within the automotive industry
has grown considerably. In-vehicle network technologies such as the Controller Area
Network (CAN) and Local Interconnect Network (LIN) are used to connect
Electronic Control Units (ECU) together, mainly to reduce the amount of wiring that
would be required if hardwired integration were used.
Modern passenger cars contain many networks, which means that for the
architecture designer, there is an almost overwhelming number of choices on how to
design/partition the system depending on factors such as cost, weight, availability of
ECUs, safety, Electro-Magnetic Compatibility (EMC) etc. Despite the increasing role
played by in-vehicle networks in automotive electrical architectures, its design could
currently be described as a “black art”. Not only is there an almost overwhelming
number of choices facing the designer, but there is currently a lack of a quantifiable
process to aid decision making and there is a dearth of published literature available.
NetGen is a software tool used to design CAN/J1939, LIN and FlexRay
networks. For the product to remain competitive, it is desirable to have novel features
over the competition. This report describes a body of work, the aim of which was to
research in-vehicle network design processes, and to provide an improvement to such
processes. The opportunities of customer projects and availability of customer
information resulted in the scope of the research focusing on the adoption of LIN
technology and whether the adoption of it could reduce the cost and weight of the
target architecture. The research can therefore be seen to address two issues: firstly
the general problem of network designers needing to design in-vehicle network based
architectures balancing the needs of many design targets such as cost, weight etc, and
secondly the commercial motivation to find novel features for the design tool, NetGen. The outcome of the research described in this report was the development of
design processes that can be used for the selection of low cost and weight automotive
electrical architectures using coarse information, such as that which would be easily
available at the very beginning of a vehicle design programme. The key benefit of
this is that a number of candidate networked architectures can be easily assessed for
their ability to reduce cost and weight of the electrical architecture
Eliminating stack overflow by abstract interpretation
ManuscriptAn important correctness criterion for software running on embedded microcontrollers is stack safety: a guarantee that the call stack does not overflow. Our first contribution is a method for statically guaranteeing stack safety of interrupt-driven embedded software using an approach based on context-sensitive dataflow analysis of object code. We have implemented a prototype stack analysis tool that targets software for Atmel AVR microcontrollers and tested it on embedded applications compiled from up to 30,000 lines of C. We experimentally validate the accuracy of the tool, which runs in under 10 sec on the largest programs that we tested. The second contribution of this paper is the development of two novel ways to reduce stack memory requirements of embedded software
- …