Network intrusion detection system collects information from network and identifies all the possible existing network security threats. Software based detection systems are common but are not good enough for the curre...
详细信息
ISBN:
(纸本)9788132225171;9788132225164
Network intrusion detection system collects information from network and identifies all the possible existing network security threats. Software based detection systems are common but are not good enough for the current network security requirements. Present day network intrusion detection needs wire-level data transfer to avoid the inefficiency in pattern matching process. Hardware based solutions like field programmable gate array which is known for its high processing capability can easily solve these issues. This paper implements a hardware based gigabit intrusion detection system using extended Bloom filter concepts. The paper presents a solution to reduce the high error rate of Bloom Filter by introducing a Reference Vector to the work and evaluates its performance. The reference vector verifies the Bloom filter output for any possible false positive results and reduces the error rate in the system.
In this study, we design the permanent magnet synchronous motor (PMSM) drive system using field programmable gate array (FPGA), and adopt variable structure control (VSC) to the current regulation. The system is first...
详细信息
ISBN:
(纸本)9781509041091
In this study, we design the permanent magnet synchronous motor (PMSM) drive system using field programmable gate array (FPGA), and adopt variable structure control (VSC) to the current regulation. The system is first modeled with Matlab/Simulink, and the controllers in the system, including the speed PI control and current variable structure control, are hardware implemented by Verilog HDL code. Finally, the resulting hardware system is co-simulated with the software motor model to evaluate the accuracy and performance. The resulting Verilog HDL codes can be as an IP format to hardware realize the vector control for PMSM, and with the properties of robustness to the parameter variations and fast responses on the current loop control.
Traditional FPGA flows that wait until the routing stage to tackle congestion are quickly becoming less effective. This is due to the increasing size and complexity of FPGA architectures and the designs targeted for t...
详细信息
ISBN:
(纸本)9781450344661
Traditional FPGA flows that wait until the routing stage to tackle congestion are quickly becoming less effective. This is due to the increasing size and complexity of FPGA architectures and the designs targeted for them. In this paper, we present two new congestion-aware placement tools for Xilinx UltraScale architectures, called GPlace-pack and GPlace-flat, respectively. The former placer participated in the ISPD 2016 Routability-driven Placement Contest for FPGAs, and finished in third place overall. The latter placer was subseqently developed based on our experience in the contest with GPlace-pack. Results obtained indicate that GPlace-flat is on average 5.3x faster than GPlace-pack. The post routing results show that GPlace-flat is able to obtain a further 22.5% improvement in wirelength and a 40.0% improvement in runtime compared to GPlace-pack.
In this paper field programmable gate array (FPGA) system level based methodology for control system design is proposed and described in details on the case study of three-axis positioning controller implementation. S...
详细信息
ISBN:
(纸本)9788080405298
In this paper field programmable gate array (FPGA) system level based methodology for control system design is proposed and described in details on the case study of three-axis positioning controller implementation. System level design tool, such as Xilinx System Generator (XSG), provides Simulink based FPGA design and automatic converting of XSG model into efficient Very high speed integrated circuit Hardware Description Language (VHDL) code, increasing productivity by reducing the design time. The optimal design, in terms of FPGA recourse occupancy, is provided using restructuring data flow graph (DFG) of control algorithm and specifying the optimal fixed-point format. The proposed approach is validated through real experiments on three-axis didactic radar platform.
Side-channel attack is a new area of research which exploits the leakages such as power consumption, execution time, EM radiation, etc., of crypto algorithms running on electronic circuitry to extract the secret key. ...
详细信息
ISBN:
(纸本)9789811004513;9789811004506
Side-channel attack is a new area of research which exploits the leakages such as power consumption, execution time, EM radiation, etc., of crypto algorithms running on electronic circuitry to extract the secret key. This paper describes the VHDL implementations of Advanced Encryption Standard (AES) algorithm on field programmable gate array board (Spartan 3E) employing Xilinx tool and discusses briefly about Correlation Power/EM Analysis attacks. These attacks have been mounted on part of power and EM traces corresponding to tenth round of AES algorithm. Power and EM traces are being acquired using current probe and EM probe station respectively with the help of oscilloscope and PC. Effects of different ways of implementations on these attacks have been explored. Studies have been carried out to find the effect of operating frequencies and number of samples per clock on the computational complexities in terms of number of traces required to extract the key.
In this paper we present a novel scheduling technique for partially-reconfigurable FPGA-based systems that allows to achieve high quality results in terms of overall application execution time. The proposed algorithm ...
详细信息
ISBN:
(纸本)9781509036820
In this paper we present a novel scheduling technique for partially-reconfigurable FPGA-based systems that allows to achieve high quality results in terms of overall application execution time. The proposed algorithm exploits the notion of resource efficient task implementations in order to reduce the overhead incurred by partial dynamic reconfiguration and increase the number of concurrent tasks that can be hosted on the reconfigurable logic as hardware accelerators. We evaluate a fast deterministic version of the scheduler that is able to find good quality solutions in a small amount of time and a randomized version of the approach that can be executed multiple times to improve the final result.
Authenticated ciphers are cryptographic transformations which combine the functionality of confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) design to describe selected a...
详细信息
ISBN:
(纸本)9781509028160
Authenticated ciphers are cryptographic transformations which combine the functionality of confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) design to describe selected authenticated ciphers using a hardware description language (HDL), verifies their proper operation through functional simulation, and implements them on target FPGAs. The authenticated ciphers chosen for this research are the CAESAR Round Two variants of SCREAM, POET, and Minalpher. Ciphers are discussed from an engineering standpoint, and are compared and contrasted in terms of design features. To ensure conformity and standardization in evaluation, all three candidates are implemented with an identical version of the CAESAR Hardware API for authenticated ciphers. Functionally correct implementations of all three ciphers are realized, and results are compared against each other and previous results in terms of throughput, area, and throughput-to-area (T/A) ratio. SCREAM is found to have the highest T/A ratio of these three ciphers in the Virtex-6 FPGA, while Minalpher has the highest T/A ratio in the Virtex-7 FPGA.
Transient faults are a matter of increasing concern as advanced technologies scales to smaller and smaller feature technologies. Transient errors are random faults of the hardware, which also called as soft errors. Si...
详细信息
ISBN:
(纸本)9781509037513
Transient faults are a matter of increasing concern as advanced technologies scales to smaller and smaller feature technologies. Transient errors are random faults of the hardware, which also called as soft errors. Single Event Transients (SETs) are major part of the error events which will continue to grow in the next technology nodes and affect the system functionality. Varieties of electronic products are coming into market and most of them are incorporated with large memory components, which will lead to an increase in error rates. This paper presents a very fast and accurate technique to estimate the soft error rate of digital circuits in the occurrence of Single Event Transients (SETs). Analytical approach is implemented in the proposed method to estimate the total failure rate probability along different paths in a design which includes node error rate and error propagation error rate. Paper computed the probability that a hit at any gate has an impact in the desired function of the model and is implemented using path construction, topological sorting and propagation rules. Experiment on a circuit and comparison of the results with cube based error propagation probability(EPP) analysis showed that the proposed method shows more accurate evaluation in error rate estimation of a designed model. Implementation of the proposed system helps the designers to examine the gate-level designs and also provide detailed individual contribution of each gate that are vulnerable to soft errors.
This paper proposes a system-on-chip (SoC) FPGA - based real-time video processing platform for background and foreground identification. Background and foreground identification is a common feature in many tasks in v...
详细信息
ISBN:
(纸本)9781479953417
This paper proposes a system-on-chip (SoC) FPGA - based real-time video processing platform for background and foreground identification. Background and foreground identification is a common feature in many tasks in video content analytics (VCA), including object detection, tracking, segmentation and recognition. VCA is a relatively new field in video processing;it has generally been implemented using two chips, with the image signal processing (ISP) part in a DSP or an FPGA and the VCA part executed by a processor. However, a new generation of SoC FPGAs that incorporates a processor and an FPGA into a single chip makes it possible for a single chip to perform both ISP and VCA. This study details the hardware implementation of a real-time background and foreground identification algorithm in an SoC, including the capture, processing and display stages. The proposed platform uses photometric invariant color, depth data and local binary patterns (LBPs) to distinguish backgrounds from foregrounds. The system uses minimal cell resources and tries to implement modules using a pipeline technique.
Logic obfuscation is widely followed in intellectual property cores and chip designs as hardware protection mechanism against design security threats such as reverse engineering (RE), piracy, cloning, overbuilding, et...
详细信息
ISBN:
(纸本)9781467393379
Logic obfuscation is widely followed in intellectual property cores and chip designs as hardware protection mechanism against design security threats such as reverse engineering (RE), piracy, cloning, overbuilding, etc. In general, sequential obfuscation has two modes of operation such as obfuscated and functional modes. Finite state machines (FSM) are being used to implement the mode control. When a specific sequence of input vectors is applied during power up for user authentication, the circuit will enter into functional mode. Otherwise, FSM remains in obfuscated mode and do not perform the intended functionality. In general, hardware obfuscation technique is applicable to all programmable logic devices. However, we applied the structural modification based netlist obfuscation methodology to field programmable gate array devices. The software implementation of sequential obfuscation is performed for a set of ISCAS'89 benchmark circuits using Libero IDE v9.1 on Actel device. As simulation/structural analysis are the conventional methods to perform RE, we aimed to achieve a high percentage of simulation / structural mismatch during RE. We presented two scenarios of obfuscation: 1) For better structural mismatch during RE, insertion of obfuscation cells at different numbers of high fanout (HF) nets with minimum initialization sequence length (L). As per the designer's area constraint, the total number of nets to be obfuscated is chosen. 2) For better functional simulation mismatch during RE, FSM with different L values is included in the design with a minimum number of obfuscation cells. The initialization sequence length is decided concerning the system clock cycle (i.e. delay constraint). Based on the control signals derived from FSM, the values at HF obfuscated nets are decided. That is, the circuit executes the required functionality only in the functional mode. Hence, the simulation/structural RE complexity of PLDs is improved. This paper discusses the simulati
暂无评论