Pub Date : 2024-07-26DOI: 10.1109/les.2024.3434379
Mathieu Perrin, William Guicquero, Bruno Paille, Gilles Sicard
{"title":"Hardware-Aware Bayesian Neural Architecture Search of Quantized CNNs","authors":"Mathieu Perrin, William Guicquero, Bruno Paille, Gilles Sicard","doi":"10.1109/les.2024.3434379","DOIUrl":"https://doi.org/10.1109/les.2024.3434379","url":null,"abstract":"","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"109 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141782194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-23DOI: 10.1109/LES.2024.3432593
Zhen Zhang;Yuezhong Zhang;Jinfeng Zhang;Jichao Xie;Shaoxun Liu
Intelligent connected vehicles (ICVs) are the result of technological advancements in the new era, greatly enhancing the driving experience. However, due to the complex nature of the system, the intelligence of devices, and the connectivity of data, a complex physical fusion system has been created. The in-vehicle Telematics Box (T-Box), serving as the central communication and data hub, faces challenges, such as network vulnerabilities, data privacy, and malicious attacks through untrusted software updates. Therefore, an in-vehicle T-Box with high reliability, security, and performance is an urgent product in the era of the Internet of Vehicles. This article investigates the endogenous security of the T-Box in ICV, with a focus on the integration of dynamic heterogeneous redundancy (DHR) architecture. The underlying idea is to transform the original system into multiple heterogeneous systems, where some of them handle the same business functions. By applying a consensus mechanism to detect malicious nodes and dynamically scheduling healthy nodes into the working mode, a self-purifying defense system with intrinsic security is formed. This design approach endows the T-Box with inherent defense capabilities against unknown vulnerabilities. Meanwhile, the in-vehicle T-Box is redesigned in the software and hardware implementation scheme. Experimental results demonstrate that the new design notably enhances and ensures the robust stability and elevated reliability of the in-vehicle T-Box. Evidently, the upgraded T-Box ensures the safe processing of in-vehicle CAN bus data.
{"title":"An Endogenous Security Study of Telematics Box in Intelligent Connected Vehicles","authors":"Zhen Zhang;Yuezhong Zhang;Jinfeng Zhang;Jichao Xie;Shaoxun Liu","doi":"10.1109/LES.2024.3432593","DOIUrl":"10.1109/LES.2024.3432593","url":null,"abstract":"Intelligent connected vehicles (ICVs) are the result of technological advancements in the new era, greatly enhancing the driving experience. However, due to the complex nature of the system, the intelligence of devices, and the connectivity of data, a complex physical fusion system has been created. The in-vehicle Telematics Box (T-Box), serving as the central communication and data hub, faces challenges, such as network vulnerabilities, data privacy, and malicious attacks through untrusted software updates. Therefore, an in-vehicle T-Box with high reliability, security, and performance is an urgent product in the era of the Internet of Vehicles. This article investigates the endogenous security of the T-Box in ICV, with a focus on the integration of dynamic heterogeneous redundancy (DHR) architecture. The underlying idea is to transform the original system into multiple heterogeneous systems, where some of them handle the same business functions. By applying a consensus mechanism to detect malicious nodes and dynamically scheduling healthy nodes into the working mode, a self-purifying defense system with intrinsic security is formed. This design approach endows the T-Box with inherent defense capabilities against unknown vulnerabilities. Meanwhile, the in-vehicle T-Box is redesigned in the software and hardware implementation scheme. Experimental results demonstrate that the new design notably enhances and ensures the robust stability and elevated reliability of the in-vehicle T-Box. Evidently, the upgraded T-Box ensures the safe processing of in-vehicle CAN bus data.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 4","pages":"501-504"},"PeriodicalIF":1.7,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141782193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Outdoor Air Quality Using Low-Cost MEMS-Based Electronic Nose and Gas Analyzer","authors":"Tushar Gawande, Raghavendra Deshmukh, Sharvari Deshmukh","doi":"10.1109/les.2024.3431214","DOIUrl":"https://doi.org/10.1109/les.2024.3431214","url":null,"abstract":"","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.1109/les.2024.3420934
Wesley Grignani, Douglas A. Santos, Felipe Viel, Luigi Dilillo, Douglas R. Melo
{"title":"A Dependable and Low-Cost CCSDS 123 Hyperspectral Image Compressor","authors":"Wesley Grignani, Douglas A. Santos, Felipe Viel, Luigi Dilillo, Douglas R. Melo","doi":"10.1109/les.2024.3420934","DOIUrl":"https://doi.org/10.1109/les.2024.3420934","url":null,"abstract":"","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"27 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-27DOI: 10.1109/les.2024.3420226
Vishnu Padmakumar, Titu Mary Ignatius, Thockchom Birjit Singha, Roy Paily Palathinkal, Shaik Rafi Ahamed
{"title":"Boosting AES Intrinsic Resilience Using Split SubBytes Round Function Against Power Attacks","authors":"Vishnu Padmakumar, Titu Mary Ignatius, Thockchom Birjit Singha, Roy Paily Palathinkal, Shaik Rafi Ahamed","doi":"10.1109/les.2024.3420226","DOIUrl":"https://doi.org/10.1109/les.2024.3420226","url":null,"abstract":"","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"33 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.1109/les.2024.3417413
Hang Yin, Jingxin Dai, Yansong Lv, Yuhuan Wang, Rui Lv
{"title":"Software Implementation of Fast List Decoder for PAC Codes","authors":"Hang Yin, Jingxin Dai, Yansong Lv, Yuhuan Wang, Rui Lv","doi":"10.1109/les.2024.3417413","DOIUrl":"https://doi.org/10.1109/les.2024.3417413","url":null,"abstract":"","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"18 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-19DOI: 10.1109/les.2024.3416820
Ana Fernandes, Luís Crespo, Nuno Neves, Pedro Tomás, Nuno Roma, Gabriel Falcao
{"title":"Functional Validation of the RISC-V Unlimited Vector Extension","authors":"Ana Fernandes, Luís Crespo, Nuno Neves, Pedro Tomás, Nuno Roma, Gabriel Falcao","doi":"10.1109/les.2024.3416820","DOIUrl":"https://doi.org/10.1109/les.2024.3416820","url":null,"abstract":"","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"5 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141937440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hardware Trojan insertion in high-level synthesis (HLS) generated intellectual property (IP) designs can pose strong security concern for the designers. Backdoor hardware Trojans can be inserted in the HLS design flow to compromise the produced register transfer level (RTL) IP design. This letter presents a novel malevolent HLS (M-HLS) framework introducing the possibility of two different hardware Trojan insertion [i.e., performance degradation hardware Trojan (PD-HT) and Denial of Service hardware Trojan (DoS-HT)] in multiplexer (mux)-based interconnect stage of HLS generated watermarked IP design. The proposed framework is validated on the watermarked MESA Horner Bezier’s IP, which indicates strong performance degradation and DoS achievable by an attacker at minimal area and power overhead.
{"title":"M-HLS: Malevolent High-Level Synthesis for Watermarked Hardware IPs","authors":"Anirban Sengupta;Aditya Anshul;Vishal Chourasia;Nitish Kumar","doi":"10.1109/LES.2024.3416422","DOIUrl":"10.1109/LES.2024.3416422","url":null,"abstract":"Hardware Trojan insertion in high-level synthesis (HLS) generated intellectual property (IP) designs can pose strong security concern for the designers. Backdoor hardware Trojans can be inserted in the HLS design flow to compromise the produced register transfer level (RTL) IP design. This letter presents a novel malevolent HLS (M-HLS) framework introducing the possibility of two different hardware Trojan insertion [i.e., performance degradation hardware Trojan (PD-HT) and Denial of Service hardware Trojan (DoS-HT)] in multiplexer (mux)-based interconnect stage of HLS generated watermarked IP design. The proposed framework is validated on the watermarked MESA Horner Bezier’s IP, which indicates strong performance degradation and DoS achievable by an attacker at minimal area and power overhead.","PeriodicalId":56143,"journal":{"name":"IEEE Embedded Systems Letters","volume":"16 4","pages":"497-500"},"PeriodicalIF":1.7,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141937617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}