The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific sec...The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.展开更多
To efficiently exploit the performance of single instruction multiple data (SIMD) architectures for video coding, a parallel memory architecture with power-of-two memory modules is proposed. It employs two novel ske...To efficiently exploit the performance of single instruction multiple data (SIMD) architectures for video coding, a parallel memory architecture with power-of-two memory modules is proposed. It employs two novel skewing schemes to provide conflict-free access to adjacent elements (8-bit and 16-bit data types) or with power-of-two intervals in both horizontal and vertical directions, which were not possible in previous parallel memory architectures. Area consumptions and delay estimations are given respectively with 4, 8 and 16 memory modules. Under a 0.18-pm CMOS technology, the synthesis results show that the proposed system can achieve 230 MHz clock frequency with 16 memory modules at the cost of 19k gates when read and write latencies are 3 and 2 clock cycles, respectively. We implement the proposed parallel memory architecture on a video signal processor (VSP). The results show that VSP enhanced with the proposed architecture achieves 1.28× speedups for H.264 real-time decoding.展开更多
Accurate parameter identification is essential when designing controllers for inertially stabilized platforms (lSPs). But traditional identification methods suffer from observation measurement noise and operating re...Accurate parameter identification is essential when designing controllers for inertially stabilized platforms (lSPs). But traditional identification methods suffer from observation measurement noise and operating restrictions of ISPs. To address this issue, a novel identification method based on current command design and multilevel coordinate search (MCS) algorithm without any higher order measurement differentiations was proposed. The designed current commands were adopted to obtain parameter decoupled models with the platform operating under allowable conditions. MCS algorithm was employed to estimate the parameters based on parameter decoupled models. A comparison experiment between the proposed method and non-linear least square method was carried out and most of the relative errors of identified parameters obtained by the proposed method were below 10%. Simulation and experiment based on identified parameters were conducted. A velocity control structure was also developed with disturbance observer (DOB) for application in disturbance compensation control system of an ISR Experimental results show that the control scheme based on the identified parameters with DOB has the best disturbance rejection performance. It reduces the peak to peak value (PPV) of velocity error integral to 0.8 mrad which is much smaller than the value (10 mrad) obtained by the single velocity controller without DOB. Compared with the control scheme based on sweep model with DOB compensation, the proposed control scheme improves the PPV of velocity error integral by 1.625 times.展开更多
Wavelength converters are used in optical networks to overcome transparent wavelength channel insufficiency. However, current GMPLS control plane does not distribute wavelength con- verter information to network nodes...Wavelength converters are used in optical networks to overcome transparent wavelength channel insufficiency. However, current GMPLS control plane does not distribute wavelength con- verter information to network nodes. To overcome this situation, four wavelength converter information sharing methods for GMPLS-controUed optical networks are proposed. The first two, Conversion Capability during Signaling (CCS) and Conversion Availability during Signaling (CAS), are based on the RSVP-TE signaling protocol, while the others, Conversion Capability Advertisement (CCA) and Conversion Availability Advertisement ( CAA ) , are based on the OSPF-TE routing protocol. Simulations show that CAA obtains the lowest blocking, while CCS the highest. Moreover, CAA only slightly increases the control plane load compared to CAS.展开更多
Simulation is an important and useful technique helping users understand and model real life systems. Once built, the models can run proving realistic results. This supports making decisions on a more logical and scie...Simulation is an important and useful technique helping users understand and model real life systems. Once built, the models can run proving realistic results. This supports making decisions on a more logical and scientific basis. The paper introduces method of simulation, and describes various types of its application. The authors used the method of analysis of the creation and implementation of the programme code. The authors compared parallel instruction of computing defined to pipelined instructions. The power of simulation is that a common model can be used to design a large variety of systems. An important aspect of the simulation method is that a simulation model is designed to be repeated in actual computer systems, especially in multicore processors. For this reason, it is important to minimize average waiting time for fetch and decode stage instructions. The objective of the research is to prove that the parallel operation of programme code is faster than sequential operation code on the multi processor architecture. The system modeling uses methods and simulation on the parallel computer systems is very precise. The time benefit gained in simulation of mathematical model on the pipeline processor is higher than the one in simulation of mathematical model on the multi processors computer system.展开更多
基金This paper was supported by the National Natural Science Foundation of China under Grants No.91118006, No. 61202414 the Knowledge Innovation Project of Chinese Academy of Science under Grant No. ISCAS2009-DR14.
文摘The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.
基金Project (No. 2005AA1Z1271) supported by the Hi-Tech Research and Development Program (863) of China
文摘To efficiently exploit the performance of single instruction multiple data (SIMD) architectures for video coding, a parallel memory architecture with power-of-two memory modules is proposed. It employs two novel skewing schemes to provide conflict-free access to adjacent elements (8-bit and 16-bit data types) or with power-of-two intervals in both horizontal and vertical directions, which were not possible in previous parallel memory architectures. Area consumptions and delay estimations are given respectively with 4, 8 and 16 memory modules. Under a 0.18-pm CMOS technology, the synthesis results show that the proposed system can achieve 230 MHz clock frequency with 16 memory modules at the cost of 19k gates when read and write latencies are 3 and 2 clock cycles, respectively. We implement the proposed parallel memory architecture on a video signal processor (VSP). The results show that VSP enhanced with the proposed architecture achieves 1.28× speedups for H.264 real-time decoding.
基金Project(50805144) supported by the National Natural Science Foundation of China
文摘Accurate parameter identification is essential when designing controllers for inertially stabilized platforms (lSPs). But traditional identification methods suffer from observation measurement noise and operating restrictions of ISPs. To address this issue, a novel identification method based on current command design and multilevel coordinate search (MCS) algorithm without any higher order measurement differentiations was proposed. The designed current commands were adopted to obtain parameter decoupled models with the platform operating under allowable conditions. MCS algorithm was employed to estimate the parameters based on parameter decoupled models. A comparison experiment between the proposed method and non-linear least square method was carried out and most of the relative errors of identified parameters obtained by the proposed method were below 10%. Simulation and experiment based on identified parameters were conducted. A velocity control structure was also developed with disturbance observer (DOB) for application in disturbance compensation control system of an ISR Experimental results show that the control scheme based on the identified parameters with DOB has the best disturbance rejection performance. It reduces the peak to peak value (PPV) of velocity error integral to 0.8 mrad which is much smaller than the value (10 mrad) obtained by the single velocity controller without DOB. Compared with the control scheme based on sweep model with DOB compensation, the proposed control scheme improves the PPV of velocity error integral by 1.625 times.
文摘Wavelength converters are used in optical networks to overcome transparent wavelength channel insufficiency. However, current GMPLS control plane does not distribute wavelength con- verter information to network nodes. To overcome this situation, four wavelength converter information sharing methods for GMPLS-controUed optical networks are proposed. The first two, Conversion Capability during Signaling (CCS) and Conversion Availability during Signaling (CAS), are based on the RSVP-TE signaling protocol, while the others, Conversion Capability Advertisement (CCA) and Conversion Availability Advertisement ( CAA ) , are based on the OSPF-TE routing protocol. Simulations show that CAA obtains the lowest blocking, while CCS the highest. Moreover, CAA only slightly increases the control plane load compared to CAS.
文摘Simulation is an important and useful technique helping users understand and model real life systems. Once built, the models can run proving realistic results. This supports making decisions on a more logical and scientific basis. The paper introduces method of simulation, and describes various types of its application. The authors used the method of analysis of the creation and implementation of the programme code. The authors compared parallel instruction of computing defined to pipelined instructions. The power of simulation is that a common model can be used to design a large variety of systems. An important aspect of the simulation method is that a simulation model is designed to be repeated in actual computer systems, especially in multicore processors. For this reason, it is important to minimize average waiting time for fetch and decode stage instructions. The objective of the research is to prove that the parallel operation of programme code is faster than sequential operation code on the multi processor architecture. The system modeling uses methods and simulation on the parallel computer systems is very precise. The time benefit gained in simulation of mathematical model on the pipeline processor is higher than the one in simulation of mathematical model on the multi processors computer system.