A study on characterizing energy, latency and security for Intrusion Detection Systems on heterogeneous embedded platfor...
International audience
International audience
Embedded security is more and more crucial with the huge increase of IoT devices, enhancing efficiency and addressing challenges like industrial change and health. However, their widespread use also increases the attack surface, raising significant security concerns. These systems, handling sensitive data, are vulnerable to both software and physic...
Published in ITM Web of Conferences
SNCF Réseau introduces a novel multi-modal embedded monitoring system, addressing challenges in railway infrastructure maintenance. The design incorporates visual, inertial, and sound sensors, enhancing adaptability, improving overall detection precision, and could reduce operational costs. This study addresses visual defects detection that can be ...
Over the past few years, several research groups have introduced innovative hardware designs for Trusted Execution Environments (TEEs), aiming to secure applications against potentially compromised privileged software, including the kernel. Since 2015, a new class of software-enabled hardware attacks leveraging energy management mechanisms has emer...
As Next-Gen sequencing (NGS) technologies keep improving their accuracy and get largely deployed in human health care infrastructures, it is critical to design efficient reference-based compressors that fully leverage the capabilities of modern processors and hardware accelerators. This work proposes MiMyCS: a C++ software to achieve Mapping in Mem...
The memory wall, power wall, dark silicon, and even the adage "communication dominates arithmetic" are persistent challenges for computer architects and the High Performance Computing (HPC) community. The term "computer," derived from the Latin computare ("to calculate"), implies that computation is central to its purpose. However, HPC systems and ...
The dynamics of a two-wheeled vehicle represent a higher level of complexity, with a high variety of rider practices, peculiarly during the bend-taking maneuver. This complexity is one reason why research on motorcyclists’ practiced trajectories is limited compared to cars. Another reason is the low representation of motorcycles in the land motor v...
The virtual address space offered by existing instruction set architectures (ISA) is generally one-dimensional. That is, a virtual address is represented by a single number. We consider the possibility of a two-dimensional (2D) address space where a virtual address consists of two independent numbers, an X coordinate and a Y coordinate. We propose ...
Biological and artificial neural networks share a fundamental computational unit: the neuron. These neurons are coupled by synapses, forming complex networks that enable various functions. Similarly, neuromorphic hardware, or more generally neuro-computers, also require two hardware elements: neurons and synapses. In this work, we introduce a bio-i...
Wake-up radios (WuRx) are ultra-low power devices designed to continuously listen to the channel for an incoming message and activate the main node when necessary. The ultralow power consumption of such devices opens the door to their powering only by exploiting Radio-Frequency (RF) energy. This paper presents the integration of an RF harvester in ...