35 research outputs found
On the use of error detecting and correcting codes to boost security in caches against side channel attacks
Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence is exploited to download its content after the microprocessor has been struck by a hard boot. If just in this moment, a crypto-algorithm was in execution, the memory data can be downloaded into a backup memory and specialized tools can be used to extract the secret keys.
In the main memory data can be protected using efficient encryption techniques but in caches this is not possible unless the performance becomes seriously degraded. Recently, an interleaved scrambling technique (IST) was presented to improve
the security of caches against cold boot attacks. While IST is effective for this particular kind of attacks, a weakness exists
against side channel attacks, in particular using power analysis.
Reliability of data in caches is warranted by means of error detecting and correcting codes. In this work it is shown how these
kinds of codes can be used not only to improve reliability but also the security of data. In particular, a self-healing technique is
selected to make the IST technique robust against side channel attacks using power analysis.Postprint (author’s final draft
Connected Bike-smart IoT-based Cycling Training Solution
The Connected Bike project combines several technologies, both hardware and software,
to provide cycling enthusiasts with a modern alternative solution for training. Therefore, a trainer
can monitor online through a Web Application some of the important parameters for training, more
specifically the speed, cadence and power generated by the cyclist. Also, the trainer can see at every
moment where the rider is with the aid of a GPS module. The system is built out of both hardware and
software components. The hardware is in charge of collecting, scaling, converting and sending data
from sensors. On the software side, there is the server, which consists of the Back-End and the MQTT
(Message Queues Telemetry Transport) Broker, as well as the Front-End of the Web Application that
displays and manages data as well as collaboration between cyclists and trainers. Finally, there is the
Android Application that acts like a remote command for the hardware module on the bike, giving
the rider control over how and when the ride is monitored
Ring signature with divided private key
The ring signature is a group signature without a group manager, so that a signer realizes a signature in the name of the group. In some situations it is necessary for a message to be signed by more than one persons. The scheme of the ring signature with divided key is an algorithm which ensures realizing a key signature by a group of k entities from a group of n entities. Because of the way this scheme is elaborated, each signer has his own private key, which he uses in the signing phase. Checking the key is realized by using a single common public key. The signature scheme is based on the problem of the discrete logarithm. This cryptographic primitive ensures the anonymity of the signature, which is a ring signature
Implementation of an extended prediction self-adaptive controller using LabVIEW (TM)
The implementation of the Extended Prediction Self-Adaptive Controller is presented in this paper. It employs LabVIEWTM graphical programming of industrial equipment and it is suitable for controlling fast processes. Three different systems are used for implementing the control algorithm. The research regarding the controller design using graphical programming demonstrates that a single advanced control application can run on Windows, real time operating systems and FPGA targets without requiring significant program modifications. The most appropriate device may be selected according to the required processing time of the control signal and of the application. A relevant case study is used to exemplify the procedure
Intelligent Control of an Aerodynamical System
The paper presents the designed prototype for a
highly nonlinear, multi-input-multi-output aerodynamic system.
The laboratory scale equipment is created to simulate the
operations of unmanned aerial vehicles. The prototype is
conceived to be cheap and easy to use, in order to be multiplied
for laboratory works. It is also described the first tested control
strategy, based on dynamic nonlinear model inversion using
artificial neural networks. The experimental results prove the
efficiency of the equipment, being able to test different real
operation behaviors
A Portable Implementation on Industrial Devices of a Predictive Controller Using Graphical Programming
This paper presents an approach for developing an Extended Prediction Self-Adaptive Controller employing graphical programming of industrial standard devices, for controlling fast processes. For comparison purposes, the algorithm has been implemented on three different FPGA (Field Programmable Gate Arrays) chips. The paper presents research aspects regarding graphical programming controller design, showing that a single advanced control application can run on different targets without requiring significant program modifications. Based on the time needed for processing the control signal and on the application, one can efficiently and easily select the most appropriate device. To exemplify the procedure, a conclusive case study is presented