Now showing items 1-5 of 5
Securing Software Intellectual Property on Commodity and Legacy Embedded Systems
(Virginia Tech, 2010-06-01)
The proliferation of embedded systems into nearly every aspect of modern infrastructure and society has seen their deployment in such diverse roles as monitoring the power grid and processing commercial payments. Software ...
Design Methods for Cryptanalysis
(Virginia Tech, 2012-11-29)
Security of cryptographic algorithms relies on the computational difficulty of deriving the secret key using public information. Cryptanalysis, including logical and implementation attacks, plays an important role in ...
FPGA-Roofline: An Insightful Model for FGPA-based Hardware Acceleration in Modern Embedded Systems
(Virginia Tech, 2015-01-17)
The quick growth of embedded systems and their increasing computing power has made them suitable for a wider range of applications. Despite the increasing performance of modern embedded processors, they are outpaced by ...
A Unifying Interface Abstraction for Accelerated Computing in Sensor Nodes
(Virginia Tech, 2011-08-09)
Hardware-software co-design techniques are very suitable to develop the next generation of sensornet applications, which have high computational demands. By making use of a low power FPGA, the peak computational performance ...
Flexible and Lightweight Cryptographic Engines for Constrained Systems
(Virginia Tech, 2015-06-04)
There is a significant effort in building lightweight cryptographic operations, yet the proposed solutions are typically single purpose modules that can only provide a fixed functionality. However, flexibility is an important ...