996 resultados para differential fault attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The end of Dennard scaling has promoted low power consumption into a firstorder concern for computing systems. However, conventional power conservation schemes such as voltage and frequency scaling are reaching their limits when used in performance-constrained environments. New technologies are required to break the power wall while sustaining performance on future processors. Low-power embedded processors and near-threshold voltage computing (NTVC) have been proposed as viable solutions to tackle the power wall in future computing systems. Unfortunately, these technologies may also compromise per-core performance and, in the case of NTVC, xreliability. These limitations would make them unsuitable for HPC systems and datacenters. In order to demonstrate that emerging low-power processing technologies can effectively replace conventional technologies, this study relies on ARM’s big.LITTLE processors as both an actual and emulation platform, and state-of-the-art implementations of the CG solver. For NTVC in particular, the paper describes how efficient algorithm-based fault tolerance schemes preserve the power and energy benefits of very low voltage operation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Methane-derived authigenic carbonate (MDAC) mound features at the Codling Fault Zone (CFZ), located in shallow waters (50-120m) of the western Irish Sea were investigated and provide a comparison to deep sea MDAC settings. Carbonates consisted of aragonite as the major mineral phase, with δ13C depletion to -50‰ and δ18O enrichment to~2‰. These isotope signatures, together with the co-precipitation of framboidal pyrite confirm that anaerobic oxidation of methane (AOM) is an important process mediating methane release to the water column and the atmosphere in this region. 18O-enrichment could be a result of MDAC precipitation with seawater in colder than present day conditions, or precipitation with 18O-enriched water transported from deep petroleum sources. The 13C depletion of bulk carbonate and sampled gas (-70‰) suggests a biogenic source, but significant mixing of thermogenic gas and depletion of the original isotope signature cannot be ruled out. Active seepage was recorded from one mound and together with extensive areas of reduced sediment, confirms that seepage is ongoing. The mounds appear to be composed of stacked pavements that are largely covered by sand and extensively eroded. The CFZ mounds are colonized by abundant Sabellaria polychaetes and possible Nemertesia hydroids, which benefit indirectly from available hard substrate. In contrast to deep sea MDAC settings where seep-related macrofauna are commonly reported, seep-specialist fauna appear to be lacking at the CFZ. In addition, unlike MDAC in deep waters where organic carbon input from photosynthesis is limited, lipid biomarkers and isotope signatures related to marine planktonic production (e.g. sterols, alkanols) were most abundant. Evidence for microbes involved in AOM was limited from samples taken; possibly due to this dilution effect from organic matter derived from the photic zone, and will require further investigation. 

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.