An approach of transmission network expan-sion planning with embedded constraints of short circuit currents and N-1 security is proposed in this paper.The problem brought on by the strong nonlinearity property of shor...An approach of transmission network expan-sion planning with embedded constraints of short circuit currents and N-1 security is proposed in this paper.The problem brought on by the strong nonlinearity property of short circuit currents is solved with a linearization method based on the DC power flow.The model can be converted to a mixed-integer linear programming problem,realizing the optimization of planning model that considers the constraints of linearized short circuit currents and N-1 security.To compensate the error caused by the assump-tions of DC power flow,the compensation factor is pro-posed.With this factor,an iterative algorithm that can compensate the linearization error is then presented.The case study based on the IEEE 118-bus system shows that the proposed model and approach can be utilized to:opti-mize the construction strategy of transmission lines;ensure the N-1 security of the network;and effectively limit the short circuit currents of the system.展开更多
The chain of trust in bootstrap process is the basis of whole system trust in the trusted computing group (TCG) definition. This paper presents a design and implementation of a bootstrap trust chain in PC based on t...The chain of trust in bootstrap process is the basis of whole system trust in the trusted computing group (TCG) definition. This paper presents a design and implementation of a bootstrap trust chain in PC based on the Windows and today's commodity hardware, merely depends on availability of an embedded security module (ESM). ESM and security enhanced BIOS is the root of trust, PMBR (Pre-MBR) checks the integrity of boot data and Windows kernel, which is a checking agent stored in ESM. In the end, the paper analyzed the mathematic expression of the chain of trust and the runtime performance compared with the common booring process. The trust chain bootstrap greatly strengthens the security of personal computer system, and affects the runtime performance with only adding about 12% booting time.展开更多
Fuzzing has become one of the best-established methods to uncover software bugs.Meanwhile,the market of embedded systems,which binds the software execution tightly to the very hardware architecture,has grown at a stea...Fuzzing has become one of the best-established methods to uncover software bugs.Meanwhile,the market of embedded systems,which binds the software execution tightly to the very hardware architecture,has grown at a steady pace,and that pace is anticipated to become yet more sustained in the near future.Embedded systems also beneft from fuzzing,but the innumerable existing architectures and hardware peripherals complicate the development of general and usable approaches,hence a plethora of tools have recently appeared.Here comes a stringent need for a systematic review in the area of fuzzing approaches for embedded systems,which we term'embedded fuzzing"for brevity.The inclusion criteria chosen in this article are semi-objective in their coverage of the most relevant publication venues as well as of our personal judgement.The review rests on a formal definition we develop to represent the realm of embedded fuzzing.It continues by discussing the approaches that satisfy the inclusion criteria,then defines the relevant elements of comparison and groups the approaches according to how the execution environment is served to the system under test.The resulting review produces a table with 42 entries,which in turn supports discussion suggesting vast room for future research due to the limitations noted.展开更多
We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON ...We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents(GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role.展开更多
In this era of pervasive computing, low-resource devices have been deployed in various fields. PRINCE is a lightweight block cipher designed for low latency, and is suitable for pervasive computing applications. In th...In this era of pervasive computing, low-resource devices have been deployed in various fields. PRINCE is a lightweight block cipher designed for low latency, and is suitable for pervasive computing applications. In this paper, we propose new circuit structures for PRINCE components by sharing and simplifying logic circuits, to achieve the goal of using a smaller number of logic gates to obtain the same result. Based on the new circuit structures of components and the best sharing among components,we propose three new hardware architectures for PRINCE. The architectures are simulated and synthesized on different programmable gate array devices. The results on Virtex-6 show that compared with existing architectures, the resource consumption of the unrolled, low-cost, and two-cycle architectures is reduced by 73, 119, and 380 slices, respectively. The low-cost architecture costs only 137 slices. The unrolled architecture costs 409 slices and has a throughput of 5.34 Gb/s. To our knowledge, for the hardware implementation of PRINCE, the new low-cost architecture sets new area records, and the new unrolled architecture sets new throughput records. Therefore, the newly proposed architectures are more resource-efficient and suitable for lightweight,latency-critical applications.展开更多
基金This work was supported by National Key Technology R&D Program of China(No.2013BAA01B02)National Natural Science Foundation of China(Nos.51325702,51407100).
文摘An approach of transmission network expan-sion planning with embedded constraints of short circuit currents and N-1 security is proposed in this paper.The problem brought on by the strong nonlinearity property of short circuit currents is solved with a linearization method based on the DC power flow.The model can be converted to a mixed-integer linear programming problem,realizing the optimization of planning model that considers the constraints of linearized short circuit currents and N-1 security.To compensate the error caused by the assump-tions of DC power flow,the compensation factor is pro-posed.With this factor,an iterative algorithm that can compensate the linearization error is then presented.The case study based on the IEEE 118-bus system shows that the proposed model and approach can be utilized to:opti-mize the construction strategy of transmission lines;ensure the N-1 security of the network;and effectively limit the short circuit currents of the system.
基金Supported by the National Natural Science Foun-dation of China (90104005 ,60373087 ,60473023) Network andInformation Security Key Laboratory Programof Ministry of Educa-tion of China
文摘The chain of trust in bootstrap process is the basis of whole system trust in the trusted computing group (TCG) definition. This paper presents a design and implementation of a bootstrap trust chain in PC based on the Windows and today's commodity hardware, merely depends on availability of an embedded security module (ESM). ESM and security enhanced BIOS is the root of trust, PMBR (Pre-MBR) checks the integrity of boot data and Windows kernel, which is a checking agent stored in ESM. In the end, the paper analyzed the mathematic expression of the chain of trust and the runtime performance compared with the common booring process. The trust chain bootstrap greatly strengthens the security of personal computer system, and affects the runtime performance with only adding about 12% booting time.
文摘Fuzzing has become one of the best-established methods to uncover software bugs.Meanwhile,the market of embedded systems,which binds the software execution tightly to the very hardware architecture,has grown at a steady pace,and that pace is anticipated to become yet more sustained in the near future.Embedded systems also beneft from fuzzing,but the innumerable existing architectures and hardware peripherals complicate the development of general and usable approaches,hence a plethora of tools have recently appeared.Here comes a stringent need for a systematic review in the area of fuzzing approaches for embedded systems,which we term'embedded fuzzing"for brevity.The inclusion criteria chosen in this article are semi-objective in their coverage of the most relevant publication venues as well as of our personal judgement.The review rests on a formal definition we develop to represent the realm of embedded fuzzing.It continues by discussing the approaches that satisfy the inclusion criteria,then defines the relevant elements of comparison and groups the approaches according to how the execution environment is served to the system under test.The resulting review produces a table with 42 entries,which in turn supports discussion suggesting vast room for future research due to the limitations noted.
文摘We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents(GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role.
基金Project supported by the Scientific Research Fund of Hunan Provincial Education Department,China (Nos. 19A072 and 20C0268)the Science and Technology Innovation Program of Hunan Province,China (No. 2016TP1020)+2 种基金the Application-Oriented Special Disciplines,Double First-Class University Project of Hunan Province,China (No. Xiangjiaotong [2018] 469)the Scienceof Hengyang Normal University,China (No. 18D23)the Postgraduate Scientific Research Innovation Project of Hunan Province,China (No. CX20190980)。
文摘In this era of pervasive computing, low-resource devices have been deployed in various fields. PRINCE is a lightweight block cipher designed for low latency, and is suitable for pervasive computing applications. In this paper, we propose new circuit structures for PRINCE components by sharing and simplifying logic circuits, to achieve the goal of using a smaller number of logic gates to obtain the same result. Based on the new circuit structures of components and the best sharing among components,we propose three new hardware architectures for PRINCE. The architectures are simulated and synthesized on different programmable gate array devices. The results on Virtex-6 show that compared with existing architectures, the resource consumption of the unrolled, low-cost, and two-cycle architectures is reduced by 73, 119, and 380 slices, respectively. The low-cost architecture costs only 137 slices. The unrolled architecture costs 409 slices and has a throughput of 5.34 Gb/s. To our knowledge, for the hardware implementation of PRINCE, the new low-cost architecture sets new area records, and the new unrolled architecture sets new throughput records. Therefore, the newly proposed architectures are more resource-efficient and suitable for lightweight,latency-critical applications.