بیــــــــوقفه

۳ مطلب در آذر ۱۳۹۲ ثبت شده است

۳۰ آذر ۹۲ ، ۱۰:۳۲

Tenselica re-configurable processors


About Tensilica
Tensilica was founded in July 1997 to address the growing need for optimized, application-specific microprocessor solutions in high-volume embedded applications. With a configurable and extensible microprocessor core called Xtensa, Tensilica is the only company that has automated and patented the time-consuming process of generating a customized microprocessor core along with a complete software development tool environment, producing new configurations in a matter of hours. For more information, visit www.tensilica.com.


Xtensa LX allows extension to the processor through Tensilica Instruction Extension (TIE) language which is similar to VHDL. It supports new instructions and registers, execution units and I/O ports.

۲۱ آذر ۹۲ ، ۲۳:۳۴

آموزش اکسپلویت نویسی

New Course "Hardware Trojan Detection and Prevention" will be Offered at UCONN by CHASE Faculty,  Prof. Domenic Forte, Spring 2014

Course Description: Hardware Trojans are malicious modifications made to original IC designs that reduce system reliability and security (changes to functionality, leakage of private data, etc.). With the potential for ICs containing Trojans to end up in commercial or military systems, there has been substantial interest not only in academia, but also in governmental agencies and industry to detect and prevent Trojan insertion. ECE 6095 - 005 is a graduate-level advanced-topics course that intends to help students:
  • Understand the challenges and impact of hardware Trojans.
  • Familiarize themselves with existing state-of-the-art research in the area.
  • Build a foundation of knowledge in overlapping areas such as signal processing, detection, and estimation theories.
  • Evaluate existing methods, improve upon them, and develop new research techniques for hardware Trojan detection and prevention.
  • Improve reading, writing, and presentation skills.
Topics to Be Covered:
  • Basics of VLSI design, synthesis, fabrication, and test
  • Introduction to hardware Trojans, Trojan taxonomy, and mitigation taxonomy including destructive, design-time, test-time, and run-time
  • Systematic methods of Trojan insertion
  • Post-silicon detection of Trojans
    • Destructive: Reverse-engineering
    • Nondestructive: Functional tests
    • Nondestructive: Side-channel analysis
      • Test-time vs. run-time
      • Embedded sensors: timing, power, temperature
  • Pre-silicon detection/prevention of Trojans
    • Design-for-security (DFS) based methods for Trojan detection
    • Formal verification and Proof Carrying Code (PCC)
  • Signal Processing, Estimation, and Detection Theory
    • Filtering-based estimation: Kalman filter, Extended Kalman filter, Particle filter
    • Introduction to detection theory: Hypothesis Testing, Neyman Pearson Theorem, Minimum Probability of Error and Bayes Risk
    • Potential applications in Trojan problem


____________________________________

publications of Mr Forte is attractive. check them.