Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
With the emergence of Internet of Things, mobile devices are generating more network traffic than ever. TrustZone is a hardware-enabled trusted execution environment for ARM processors. While TrustZone is effective in...
详细信息
ISBN:
(纸本)9781538641286
With the emergence of Internet of Things, mobile devices are generating more network traffic than ever. TrustZone is a hardware-enabled trusted execution environment for ARM processors. While TrustZone is effective in providing the much needed memory isolation, we observe that it is possible to derive secret information from secure world using the cache contention, due to its high-performance cache sharing design. In this work, we propose TruSense to study the timing-based cache side-channel information leakage of TrustZone. TruSense can be launched from not only the normal world operating system but also a non-privileged user application. Without access to virtual-to-physical address mapping in user applications, we devise a novel method that uses the expected channel statistics to allocate memory for cache probing. We also show how an attacker might use the less accurate performance event interface as a timer. Using the T-table based AES implementation in OpenSSL 1.0.1f as an example, we demonstrate how a normal world attacker can steal fine-grained secret in the secure world. We also discuss possible mitigations for the information leakage.
Resilience/fault-tolerance has become a key challenge for large-scale parallel systems. To ensure reliability of highperformance computing systems, various kinds of techniques have been proposed, such as hardware-lev...
详细信息
The proceedings contain 17 papers. The special focus in this conference is on Tools and Methods of program Analysis. The topics include: Layered layouts for software systems visualization using nested Petri nets;unity...
ISBN:
(纸本)9783319717333
The proceedings contain 17 papers. The special focus in this conference is on Tools and Methods of program Analysis. The topics include: Layered layouts for software systems visualization using nested Petri nets;unity application testing automation with appium and image recognition;compositional process model synthesis based on interface patterns;using functional directives to analyze code complexity;generating cost-aware covering arrays for free;statically checking conventionality of array objects in JavaScript;a survey of high-performance computing for software verification;predicate abstraction based configurable method for data race detection in Linux Kernel;Extended context-free grammars parsing with generalized LL;defect report classification in accordance with areas of testing;technology and tools for developing industrial software test suites based on formal models and implementing scalable testing process on supercomputer;dl-Check: Dynamic potential deadlock detection tool for Java programs;a survey on model-based testing tools for test case generation;functional parser of markdown language based on monad combining and monoidal source stream representation;Simple type-based alias analysis for a VLIW processor.
Recent advancements in deep learning present new opportunities for enhanced scientific methods, autonomous operations, and intelligent applications for space missions. Semantic segmentation is a powerful computer-visi...
详细信息
Recent advancements in deep learning present new opportunities for enhanced scientific methods, autonomous operations, and intelligent applications for space missions. Semantic segmentation is a powerful computer-vision process using convolutional neural networks (CNNs) to classify objects within an image. Semantic segmentation has numerous space-science and defense applications, from semantic labeling of Earth observations for insights about our changing planet, to monitoring natural disasters for damage control, to gathering intelligence for national defense and security. Despite these advantages, CNNs can be computationally expensive and prohibited on traditional radiation-hardened space processors, which are often generations behind their commercial-off-the-shelf counterparts in terms of performance and energy-efficiency. FPGA-based hybrid System-on-Chips (SoCs), which combine fixed-logic CPUs with reconfigurable-logic FPGAs, present numerous architectural advantages well-suited to address the computational capabilities required for high-performance, intelligent spacecraft. To enable semantic segmentation for on-board space processing, we propose a hybrid (hardware/software partitioned) approach using our reconfigurable CNN accelerator (ReCoN) for accelerating CNN inference on hybrid SoCs. When evaluated on the Xilinx Zynq SoC and Xilinx Zynq UltraScale+ MPSoC platforms, our hybrid approach demonstrates an improvement in performance and energy-efficiency up to two orders of magnitude compared to a software-only baseline on the hybrid SoC. Furthermore, fault injection and wide-spectrum neutron beam-testing was performed to characterize the ReCoN architectural response to injected errors and susceptibility to neutron irradiation.
The 12-year Basic Education Curriculum Guidelines by the Ministry of Education in Taiwan includes learning performances related to computational thinking and programming languages in technology courses. The students w...
详细信息
ISBN:
(纸本)9783319997377;9783319997360
The 12-year Basic Education Curriculum Guidelines by the Ministry of Education in Taiwan includes learning performances related to computational thinking and programming languages in technology courses. The students will develop other important competence through programming. Learning a programming language should not only involve focus on writing the programs, but should also stimulate students' computational thinking competence and allow them to solve daily problems through information techniques. Situated learning emphasizes students' learning in real scenarios where knowledge is applied as the tool in these real situations. Without such scenarios, the tool has limited value. Like-wise, computational thinking competence can be translated as effective problem-solving by the means of information technology. Hence, the thinking process involves analyzing the problems resulting in answers. In addition, the Bebras learning model is based on a concept of informatics which supports comprehension of information science phenomenon and development of computational thinking. This study explored the effects of computational thinking competence on the Bebras test performance. The study targeted senior high school students' who learned program design using a situated learning strategy. The results confirm the importance of the situated learning strategy when cultivating students' computational thinking competence. Based on homogeneity of two groups of students, the experimental group's posttest score of computational thinking is higher than that of control group. The experimental group were exposed to a situated learning strategy and the control group was not. Significant difference between the two groups shows that the situated learning strategy reinforces computational thinking competence.
One of "urban legends" of today’s computer science is: use of semantic technologies can become a serious performance bottleneck. It is even possible that this, widely spread, belief is one of the reasons of...
详细信息
The concept of cloaking has never failed to fascinate scientific *** recent years,the idea has ignited a whole new trend of research effort when extended to temporal domain.A typical temporal cloak conceals events fro...
详细信息
The concept of cloaking has never failed to fascinate scientific *** recent years,the idea has ignited a whole new trend of research effort when extended to temporal domain.A typical temporal cloak conceals events from probing light by creating a temporal intensity gap(cloaking time)that will later be closed back by manipulating the speed of light leveraging the chromatic dispersion in dielectric media.
Micro Aerial Vehicles (MAVs) rely on onboard attitude and position sensors for autonomous flight. Due to their size, weight, and power (SWaP) constraints, most modern MAVs use miniaturized inertial measurement units (...
Micro Aerial Vehicles (MAVs) rely on onboard attitude and position sensors for autonomous flight. Due to their size, weight, and power (SWaP) constraints, most modern MAVs use miniaturized inertial measurement units (IMUs) to provide attitude feedback, which is critical for flight stabilization and control. However, recent adversarial attack studies have demonstrated that many commonly used IMUs are vulnerable to attacks exploiting their physical characteristics. Conventional redundancy-based approaches are not effective against such attacks because redundant IMUs have the same or similar physical vulnerabilities. In this paper, we present a novel fault-tolerant solution for IMU compromised scenarios, using separate position and heading information to restore the failed attitude states. Rather than adding more IMU alternatives for recovery, the proposed method is intended to minimize any modifications to the existing system and control program. Thus, it is particularly useful for vehicles that have tight SWaP constraints while requiring simultaneous highperformance and safety demands. To execute the recovery logic properly, a robust estimator was designed for fine-grained detection and isolation of the faulty sensors. The effectiveness of the proposed approach was validated on a quadcopter MAV through both simulation and experimental flight tests.
The long short-Term memory (LSTM) language model (LM) has been widely investigated for automatic speech recognition (ASR) and natural language processing (NLP). Although excellent performance is obtained for large voc...
详细信息
暂无评论