Sciweavers

559 search results - page 27 / 112
» Designing secure systems on reconfigurable hardware
Sort
View
CN
2000
76views more  CN 2000»
13 years 7 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
FPL
2000
Springer
93views Hardware» more  FPL 2000»
13 years 11 months ago
Reconfigurable Computing between Classifications and Metrics - The Approach of Space/Time-Scheduling
Abstract. Reconfigurable computing receives its merits from scheduling timebased into space-based execution. This paper reviews some common parameters and introduces an additional ...
Christian Siemers
HOST
2008
IEEE
14 years 2 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
FPL
2009
Springer
179views Hardware» more  FPL 2009»
13 years 11 months ago
Building heterogeneous reconfigurable systems using threads
Field Programmable Gate Arrays (FPGAs) have long held the promise of allowing designers to create systems with performance levels close to custom circuits but with a software-like...
Jason Agron, David L. Andrews
APSEC
2006
IEEE
14 years 1 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han