The starting point for the activities in the MAIS project, concerning hardware architectures, might be summarized as follows: extract the most relevant and characteristic requirements on and the challenges to the hardware architecture presented by the MAIS applications, and perform an exploration of the architectural design space (at the level of both the individual processing nodes in a network and of the network itself), so as to optimize some particularly relevant figure of merit. Specifically, we take into account the performance, power consumption and robustness of security-oriented modules. This allows us to propose flexible solutions for CPU architectures, whose configuration can be exploited best at run time by the intrinsic characteristics of the applications, and to derive power models and frameworks, both at CPU and at protocol level, so as to model and subsequently optimize the power consumption locally and at network level. In particular, security is analyzed from the standpoint of side-channel attacks, exploring DFA attacks and examining the effectiveness and cost of a few proposed countermeasures.

Low-power Architectures for Mobile Systems

BREVEGLIERI, LUCA ODDONE;MAISTRI, PAOLO;MONCHIERO, MATTEO;NEGRI, LUCA;PALERMO, GIANLUCA;SAMI, MARIAGIOVANNA;SILVANO, CRISTINA;VILLA, ORESTE;
2006-01-01

Abstract

The starting point for the activities in the MAIS project, concerning hardware architectures, might be summarized as follows: extract the most relevant and characteristic requirements on and the challenges to the hardware architecture presented by the MAIS applications, and perform an exploration of the architectural design space (at the level of both the individual processing nodes in a network and of the network itself), so as to optimize some particularly relevant figure of merit. Specifically, we take into account the performance, power consumption and robustness of security-oriented modules. This allows us to propose flexible solutions for CPU architectures, whose configuration can be exploited best at run time by the intrinsic characteristics of the applications, and to derive power models and frameworks, both at CPU and at protocol level, so as to model and subsequently optimize the power consumption locally and at network level. In particular, security is analyzed from the standpoint of side-channel attacks, exploring DFA attacks and examining the effectiveness and cost of a few proposed countermeasures.
2006
Mobile Information Systems, Infrastructure and Design for Adaptivity and Flexibility
9783540310082
Mobile Systems, Low-power Design,
File in questo prodotto:
File Dimensione Formato  
CH7_Pernici.pdf

Accesso riservato

: Post-Print (DRAFT o Author’s Accepted Manuscript-AAM)
Dimensione 634.4 kB
Formato Adobe PDF
634.4 kB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11311/262914
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact