Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024JUST ACCEPTED
An Operational Quality Model of Embedded Software Aligned with ISO 25000
ACM Transactions on Embedded Computing Systems (TECS), Just Accepted https://doi.org/10.1145/3691642Embedded systems omnipresent in everyday life and industry are mainly composed of hardware and software that must comply with a number of standards and regulations. However, there is no consensus on the quality characteristics and sub-characteristics of ...
- research-articleJune 2024
On-device Online Learning and Semantic Management of TinyML Systems
ACM Transactions on Embedded Computing Systems (TECS), Volume 23, Issue 4Article No.: 55, Pages 1–32https://doi.org/10.1145/3665278Recent advances in Tiny Machine Learning (TinyML) empower low-footprint embedded devices for real-time on-device Machine Learning (ML). While many acknowledge the potential benefits of TinyML, its practical implementation presents unique challenges. This ...
- research-articleJuly 2021
Skills Gaps in the Industry: Opinions of Embedded Software Practitioners
ACM Transactions on Embedded Computing Systems (TECS), Volume 20, Issue 5Article No.: 43, Pages 1–39https://doi.org/10.1145/3463340Many practitioners in the software-intensive embedded industry often face difficulties after beginning their careers due to misalignment of the skills learned at the university with what is required in the workplace. Companies spend crucial resources to ...
-
- editorialSeptember 2017
- research-articleJuly 2017
Collaborative PCA/DCA Learning Methods for Compressive Privacy
ACM Transactions on Embedded Computing Systems (TECS), Volume 16, Issue 3Article No.: 76, Pages 1–18https://doi.org/10.1145/2996460In the Internet era, the data being collected on consumers like us are growing exponentially, and attacks on our privacy are becoming a real threat. To better ensure our privacy, it is safer to let the data owner control the data to be uploaded to the ...
- research-articleJanuary 2017
On-Board Format-Independent Security of Functional Magnetic Resonance Images
- Arcangelo Castiglione,
- Raffaele Pizzolante,
- Francesco Palmieri,
- Barbara Masucci,
- Bruno Carpentieri,
- Alfredo De Santis,
- Aniello Castiglione
ACM Transactions on Embedded Computing Systems (TECS), Volume 16, Issue 2Article No.: 56, Pages 1–15https://doi.org/10.1145/2893474Functional magnetic resonance imaging (fMRI) provides an effective and noninvasive tool for researchers to understand cerebral functions and correlate them with brain activities. In addition, with the ever-increasing diffusion of the Internet, such ...
- research-articleFebruary 2016
Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems
ACM Transactions on Embedded Computing Systems (TECS), Volume 15, Issue 1Article No.: 21, Pages 1–24https://doi.org/10.1145/2847418This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (CPS) equipped with multiple sensors measuring the same physical variable. A malicious attacker may be able to disrupt system performance through compromising a ...
- research-articleFebruary 2016
Preaveraging and Carry Propagate Approaches to Side-Channel Analysis of HMAC-SHA256
ACM Transactions on Embedded Computing Systems (TECS), Volume 15, Issue 1Article No.: 4, Pages 1–19https://doi.org/10.1145/2794093Although HMAC-SHA has been standardized for over a decade, few published attacks on the single-cycle round implementation exist. In this research, new attack techniques are provided, for the first time, (1) to help to discriminate between values of ...
- research-articleJanuary 2016
Theory and Application of Delay Constraints in Arbiter PUF
ACM Transactions on Embedded Computing Systems (TECS), Volume 15, Issue 1Article No.: 10, Pages 1–20https://doi.org/10.1145/2815621Physically Unclonable Function (PUF) circuits are often vulnerable to mathematical model-building attacks. We theoretically quantify the advantage provided to an adversary by any training dataset expansion technique along the lines of security analysis ...
- research-articleSeptember 2015
A Sliding Window Phase-Only Correlation Method for Side-Channel Alignment in a Smartphone
ACM Transactions on Embedded Computing Systems (TECS), Volume 14, Issue 4Article No.: 80, Pages 1–22https://doi.org/10.1145/2783441Future wireless embedded devices will be increasingly powerful, supporting many more applications including one of the most crucial, security. Although many embedded devices offer resistance to bus probing attacks due to their compact size and high ...
- research-articleApril 2015
The Future of Real-Time Security: Latency-Optimized Lattice-Based Digital Signatures
ACM Transactions on Embedded Computing Systems (TECS), Volume 14, Issue 3Article No.: 43, Pages 1–18https://doi.org/10.1145/2724714Advances in quantum computing have spurred a significant amount of research into public-key cryptographic algorithms that are resistant against postquantum cryptanalysis. Lattice-based cryptography is one of the important candidates because of its ...
- research-articleApril 2015
A Novel Memristor-Based Hardware Security Primitive
ACM Transactions on Embedded Computing Systems (TECS), Volume 14, Issue 3Article No.: 60, Pages 1–20https://doi.org/10.1145/2736285Memristor is an exciting new addition to the repertoire of fundamental circuit elements. Alternatives to many security protocols originally employing traditional mathematical cryptography involve novel hardware security primitives, such as Physically ...
- editorialMarch 2015
- research-articleOctober 2014
Designing Trusted Embedded Systems from Finite State Machines
ACM Transactions on Embedded Computing Systems (TECS), Volume 13, Issue 5sArticle No.: 153, Pages 1–20https://doi.org/10.1145/2638555Sequential components are crucial for a real-time embedded system as they control the system based on the system's current state and real life input. In this article, we explore the security and trust issues of sequential system design from the ...
- research-articleMarch 2014
Message blinding method requiring no multiplicative inversion for RSA
ACM Transactions on Embedded Computing Systems (TECS), Volume 13, Issue 4Article No.: 80, Pages 1–10https://doi.org/10.1145/2560020This article proposes a new message blinding methods requiring no multiplicative inversion for RSA. Most existing message blinding methods for RSA additionally require the multiplicative inversion, even though computational complexity of this operation ...
- research-articleJanuary 2014
Reconfigurable vertical profiling framework for the android runtime system
ACM Transactions on Embedded Computing Systems (TECS), Volume 13, Issue 2sArticle No.: 59, Pages 1–25https://doi.org/10.1145/2544375.2544379Dalvik virtual machine in the Android system creates a profiling barrier between VM-space applications and Linux user-space libraries. It is difficult for existing profiling tools on the Android system to definitively identify whether a bottleneck ...