35 research outputs found

    On the use of error detecting and correcting codes to boost security in caches against side channel attacks

    Get PDF
    Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence is exploited to download its content after the microprocessor has been struck by a hard boot. If just in this moment, a crypto-algorithm was in execution, the memory data can be downloaded into a backup memory and specialized tools can be used to extract the secret keys. In the main memory data can be protected using efficient encryption techniques but in caches this is not possible unless the performance becomes seriously degraded. Recently, an interleaved scrambling technique (IST) was presented to improve the security of caches against cold boot attacks. While IST is effective for this particular kind of attacks, a weakness exists against side channel attacks, in particular using power analysis. Reliability of data in caches is warranted by means of error detecting and correcting codes. In this work it is shown how these kinds of codes can be used not only to improve reliability but also the security of data. In particular, a self-healing technique is selected to make the IST technique robust against side channel attacks using power analysis.Postprint (author’s final draft

    Connected Bike-smart IoT-based Cycling Training Solution

    Get PDF
    The Connected Bike project combines several technologies, both hardware and software, to provide cycling enthusiasts with a modern alternative solution for training. Therefore, a trainer can monitor online through a Web Application some of the important parameters for training, more specifically the speed, cadence and power generated by the cyclist. Also, the trainer can see at every moment where the rider is with the aid of a GPS module. The system is built out of both hardware and software components. The hardware is in charge of collecting, scaling, converting and sending data from sensors. On the software side, there is the server, which consists of the Back-End and the MQTT (Message Queues Telemetry Transport) Broker, as well as the Front-End of the Web Application that displays and manages data as well as collaboration between cyclists and trainers. Finally, there is the Android Application that acts like a remote command for the hardware module on the bike, giving the rider control over how and when the ride is monitored

    Ring signature with divided private key

    Get PDF
    The ring signature is a group signature without a group manager, so that a signer realizes a signature in the name of the group. In some situations it is necessary for a message to be signed by more than one persons. The scheme of the ring signature with divided key is an algorithm which ensures realizing a key signature by a group of k entities from a group of n entities. Because of the way this scheme is elaborated, each signer has his own private key, which he uses in the signing phase. Checking the key is realized by using a single common public key. The signature scheme is based on the problem of the discrete logarithm. This cryptographic primitive ensures the anonymity of the signature, which is a ring signature

    Implementation of an extended prediction self-adaptive controller using LabVIEW (TM)

    Get PDF
    The implementation of the Extended Prediction Self-Adaptive Controller is presented in this paper. It employs LabVIEWTM graphical programming of industrial equipment and it is suitable for controlling fast processes. Three different systems are used for implementing the control algorithm. The research regarding the controller design using graphical programming demonstrates that a single advanced control application can run on Windows, real time operating systems and FPGA targets without requiring significant program modifications. The most appropriate device may be selected according to the required processing time of the control signal and of the application. A relevant case study is used to exemplify the procedure

    Intelligent Control of an Aerodynamical System

    Get PDF
    The paper presents the designed prototype for a highly nonlinear, multi-input-multi-output aerodynamic system. The laboratory scale equipment is created to simulate the operations of unmanned aerial vehicles. The prototype is conceived to be cheap and easy to use, in order to be multiplied for laboratory works. It is also described the first tested control strategy, based on dynamic nonlinear model inversion using artificial neural networks. The experimental results prove the efficiency of the equipment, being able to test different real operation behaviors

    A Portable Implementation on Industrial Devices of a Predictive Controller Using Graphical Programming

    Get PDF
    This paper presents an approach for developing an Extended Prediction Self-Adaptive Controller employing graphical programming of industrial standard devices, for controlling fast processes. For comparison purposes, the algorithm has been implemented on three different FPGA (Field Programmable Gate Arrays) chips. The paper presents research aspects regarding graphical programming controller design, showing that a single advanced control application can run on different targets without requiring significant program modifications. Based on the time needed for processing the control signal and on the application, one can efficiently and easily select the most appropriate device. To exemplify the procedure, a conclusive case study is presented
    corecore