Results 11 - 20
of
6,005
Petrify: a tool for manipulating concurrent specifications and . . .
"... Petrify is a tool for (1) manipulating concurrent specifications and (2) synthesis and optimization of asynchronous control circuits. Given a Petri Net (PN), a Signal Transition Graph (STG), or a Transition System (TS) 1 it (1) generates another PN or STG which is simpler than the original descripti ..."
Abstract
-
Cited by 219 (34 self)
- Add to MetaCart
Petrify is a tool for (1) manipulating concurrent specifications and (2) synthesis and optimization of asynchronous control circuits. Given a Petri Net (PN), a Signal Transition Graph (STG), or a Transition System (TS) 1 it (1) generates another PN or STG which is simpler than the original
TROJAN ASTEROIDS
"... Recent studies suggest significant benefits from using 1st and 2nd generation Radioisotope Power Systems (RPS) as a power source for electric propulsion (EP) missions to the outer planets. This study focuses on trajectories to the Trojan asteroids. A high level analysis is performed with chemical tr ..."
Abstract
- Add to MetaCart
Recent studies suggest significant benefits from using 1st and 2nd generation Radioisotope Power Systems (RPS) as a power source for electric propulsion (EP) missions to the outer planets. This study focuses on trajectories to the Trojan asteroids. A high level analysis is performed with chemical
Effective bandwidths at multi-class queues
- Queueing Systems
, 1991
"... Consider a queue which serves traffic from a number of distinct sources and which is required to deliver a performance guarantee, expressed in terms of the mean delay or the probability the delay exceeds a threshold. For various simple models we show that an effective bandwidth can be associated wit ..."
Abstract
-
Cited by 203 (4 self)
- Add to MetaCart
Consider a queue which serves traffic from a number of distinct sources and which is required to deliver a performance guarantee, expressed in terms of the mean delay or the probability the delay exceeds a threshold. For various simple models we show that an effective bandwidth can be associated
Generic Global Placement and Floorplanning
, 1998
"... We present a new force directed method for global placement. Besides the well-known wire length dependent forces we use additional forces to reduce cell overlaps and to consider the placement area. Compared to existing approaches, the main advantage is that the algorithm provides increased flexibili ..."
Abstract
-
Cited by 203 (5 self)
- Add to MetaCart
We present a new force directed method for global placement. Besides the well-known wire length dependent forces we use additional forces to reduce cell overlaps and to consider the placement area. Compared to existing approaches, the main advantage is that the algorithm provides increased
Designing and implementing malicious hardware
"... Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself, and stra ..."
Abstract
-
Cited by 58 (6 self)
- Add to MetaCart
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself
Extraction of intrinsic structure for Hardware Trojan detection
, 2015
"... In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot. This structure is related to the design (place and route, power grid...) of the integr ..."
Abstract
- Add to MetaCart
...) of the integrated circuits which composes the lot. In case of additional circuitry this design will be modify and the extracted structure will be affected. After developing the extraction techniques we present a method-ology to insert detection of hardware trojan and counterfeit in different IC manufacturing steps
On Hardware Trojan Design and Implementation at Register-Transfer Level
"... Abstract—There have been a number of hardware Trojan (HT) designs at register-transfer level (RTL) in the literature, which mainly describe their malicious behaviors and trigger mechanisms. Generally speaking, the stealthiness of the HTs is shown with extremely low sensitization probability of the t ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract—There have been a number of hardware Trojan (HT) designs at register-transfer level (RTL) in the literature, which mainly describe their malicious behaviors and trigger mechanisms. Generally speaking, the stealthiness of the HTs is shown with extremely low sensitization probability
On the Synthesis of Strategies in Infinite Games
, 1995
"... . Infinite two-person games are a natural framework for the study of reactive nonterminating programs. The effective construction of winning strategies in such games is an approach to the synthesis of reactive programs. We describe the automata theoretic setting of infinite games (given by "gam ..."
Abstract
-
Cited by 192 (7 self)
- Add to MetaCart
switching circuits. These circuits were considered as transforming infinite input sequences into output sequences, and systems of restricted arithmetic served as specification formalisms ([Ch63]). With Buchi's decision procedure for the monadic second-order theory S1S of one successor ([Bu62
Hardware Trojan detection using path delay fingerprint.
- In IEEE International Workshop on Hardware-Oriented Security and Trust (HOST),
, 2008
"... Abstract-Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan detection method to complement traditional testing methods, a new behavior-oriented category method is proposed t ..."
Abstract
-
Cited by 66 (4 self)
- Add to MetaCart
aspect of the total characteristics of a genuine design. Chips are validated by comparing their delay parameters to the fingerprints. The comparison of path delays makes small Trojan circuits significant from a delay point of view. The experiment's results show that the detection rate on explicit
Randomization based probabilistic approach to detect Trojan circuits
- in Proc. IEEE High Assurance Syst. Eng. Symp
"... Abstract-In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be inserted into the design or fabrication mask by a malicious manufacturer such that it monitors for a specific ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
Abstract-In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be inserted into the design or fabrication mask by a malicious manufacturer such that it monitors for a
Results 11 - 20
of
6,005