Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Design & Test of Computers

Issue 6 • Nov.-Dec. 2007

Filter Results

Displaying Results 1 - 25 of 31
  • [Front cover]

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (664 KB)
    Freely Available from IEEE
  • IEEE Computer Society Digital Library

    Publication Year: 2007, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (252 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2007, Page(s): 513
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):514 - 515
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Trustworthy ICs for secure embedded computing

    Publication Year: 2007, Page(s): 516
    Request permission for commercial reuse | PDF file iconPDF (139 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2007, Page(s): 517
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction: Security and Trust in Embedded-Systems Design

    Publication Year: 2007, Page(s):518 - 520
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    Security and trust have become important considerations in the design of virtually all modern embedded systems. The requirements of secure and trusted design are unique: Secure design emphasizes information leakage (or prevention thereof) and dependable behavior. Even strong cryptographic algorithms are of little use if the underlying processor can be tricked into releasing cryptographic keys. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 2007, Page(s): 521
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • A Survey of Lightweight-Cryptography Implementations

    Publication Year: 2007, Page(s):522 - 533
    Cited by:  Papers (95)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    The tight cost and implementation constraints of high-volume products, including secure RFID tags and smart cards, require specialized cryptographic implementations. The authors review recent developments in this area for symmetric and asymmetric ciphers, targeting embedded hardware and software. In this article, we present a selection of recently published lightweight-cryptography implementations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OEM Component Authentication

    Publication Year: 2007, Page(s): 534
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (114 KB) | HTML iconHTML

    Counterfeiting of high-tech products is a major concern today. Legitimate companies sustain a direct financial burden from lost sales-plus deteriorated brand equity, which may have taken years to build. Unknowing consumers don't always benefit from purchasing counterfeit goods, because product safety may be jeopardized and presumed warranties voided. Proven cryptographic protocols offer powerful t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Analysis Attacks and Countermeasures

    Publication Year: 2007, Page(s):535 - 543
    Cited by:  Papers (26)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    This article focuses on power analysis attacks because they have received by far the most attention in recent years. They are powerful and can be executed relatively easily. This article provides an introduction to these attacks and discusses countermeasures against them. In particular, we focus on countermeasures that can be implemented at the cell level. This article presents an overview of powe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Faults, Injection Methods, and Fault Attacks

    Publication Year: 2007, Page(s):544 - 545
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    An active attacker can induce errors during the computation of the cryptographic algorithm and exploit the faulty results to extract information about the secret key in embedded systems. We call this kind of attack a fault attack. Fault attacks can break an unprotected system more quickly than any other kind of side-channel attack such as simple power analysis (SPA), differential power analysis (D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors

    Publication Year: 2007, Page(s):546 - 555
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1061 KB) | HTML iconHTML

    Side-channel attacks threaten the security of any electronic device. We have developed a comprehensive back-end design flow that natively protects constant-power cryptoprocessors against side-channel attacks that exploit instant power consumption. The proposed methodology uses a fully custom, balanced cell library and an innovative place-and-route method. All the design steps in this methodology t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware

    Publication Year: 2007, Page(s):556 - 569
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1480 KB) | HTML iconHTML

    A popular approach to efficient implementation of cryptographic algorithms is to use coprocessors that implement selected computations in conjunction with an embedded processor. This article presents a detailed trade-off between security and performance in the design of such a coprocessor for elliptic-curve cryptography. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aegis: A Single-Chip Secure Processor

    Publication Year: 2007, Page(s):570 - 580
    Cited by:  Papers (45)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB) | HTML iconHTML

    In this article, we introduce a single-chip secure processor called Aegis. In addition to supporting mechanisms to authenticate the platform and software, our processor incorporates mechanisms to protect the integrity and privacy of applications from physical attacks as well as software attacks. Therefore, physically secure systems can be built using this processor. Two key primitives, physical un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in SRAM FPGAs

    Publication Year: 2007, Page(s): 581
    Cited by:  Papers (11)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    As FPGAs have grown larger and more complex, the value of the IP implemented in them has grown commensurately. Since SRAM FPGAs reload their programming data every time they are powered up, an adversary can potentially copy the program as it is being loaded. FPGA manufacturers have added security features to protect designs from unauthorized copy, theft, and reverse-engineering as the bitstream is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing Embedded Security on Dual-Virtual-CPU Systems

    Publication Year: 2007, Page(s):582 - 591
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (642 KB) | HTML iconHTML

    In this article, we describe a low-cost, dual-virtual-CPU hardware technology for embedded-systems security. We also present a case study of a programmable software design to exploit such hardware. This design integrates a rich operating system without requiring significant changes to it, while maintaining preemptive and real-time properties, exception handling, and power management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting Critical Data

    Publication Year: 2007, Page(s): 592
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    TrustZone technology provides a defense against malicious software attempting to tamper with critical data such as digital-rights management (DRM) counters. The basic premise of our solution is that the state of the flash can serve as a point of reference to detect when rollback has occurred. Our solution is embodied in a trusted software application that needs the protection provided by the Trust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Distributed Systems Online - Information

    Publication Year: 2007, Page(s): 593
    Request permission for commercial reuse | PDF file iconPDF (328 KB)
    Freely Available from IEEE
  • DASC standards track IP-based design trends

    Publication Year: 2007, Page(s):594 - 595
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    The IEEE design Automation Standards Committee (DASC) has historically centered its standardization efforts around language-based design for electronics. Early work in this area began with the standardization of VHDL (IEEE Std 1076) in the 1980s, followed by standardization of Verilog (IEEE Std 1364) in the 1990s. These two languages significantly changed the electronic design automation (EDA) ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making a List...Checking it Twice

    Publication Year: 2007, Page(s):596 - 597
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • CEDA Currents

    Publication Year: 2007, Page(s):598 - 599
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Reports

    Publication Year: 2007, Page(s):600 - 601
    Request permission for commercial reuse | PDF file iconPDF (265 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Software 2008 Editorial Calendar

    Publication Year: 2007, Page(s): 602
    Request permission for commercial reuse | PDF file iconPDF (368 KB)
    Freely Available from IEEE
  • DATC Newsletter

    Publication Year: 2007, Page(s): 603
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE

Aims & Scope

This Periodical ceased production in 2012. The current retitled publication is IEEE Design & Test.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Krishnendu Chakrabarty