Security of IoT Systems: Design Challenges and Opportunities

Size: px
Start display at page:

Download "Security of IoT Systems: Design Challenges and Opportunities"

Transcription

1 Seurity of IoT Systems: Design Challenges and Opportunities Teng Xu, James B. Wendt, and Miodrag Potkonjak Computer Siene Department University of California, Los Angeles {xuteng, jwendt, Astrat Computer-aided design (CAD), in its quest to failitate new design revolutions, is again on the rink of hanging its sope. Following oth historial and reent tehnologial and appliation trends, one an identify several emerging researh and development diretions in whih CAD approahes and tehniques may have major impats. Among them, due to the potential to fundamentally alter everyday life as well as how siene and engineering systems are designed and operated, the Internet of Things (IoT) stands out. IoT also poses an extraordinary system replete with oneptual and tehnial hallenges. For instane, greatly redued quantitative ounds on aeptale area and energy metris require qualitative reakthroughs in design and optimization tehniques. Most likely the most demanding of requirements for the widespread realization of many IoT visions is seurity. IoT seurity has an exeptionally wide sope in at least four dimensions. In terms of seurity sope it inludes rarely addressed tasks suh as trusted sensing, omputation, ommuniation, privay, and digital forgetting. It also asks for new and etter tehniques for the protetion of hardware, software, and data that onsiders the possiility of physial aess to IoT devies. Sensors and atuators are ommon omponents of IoT devies and pose several unique seurity hallenges inluding the integrity of physial signals and atuating events. Finally, during proessing of olleted data, one an envision many semanti attaks. Our strategi ojetive is to provide an impetus for the development of IoT CAD seurity tehniques. We start y presenting a rief survey of IoT hallenges and opportunities with an emphasis on seurity issues. Next, we disuss the potential of hardware-ased IoT seurity approahes. Finally, we onlude with several ase studies that advoate the use of stale PUFs and digital PPUFs for several IoT seurity protools. I. INTRODUCTION Six deades of omputer-aided design (eletroni design automation) have witnessed numerous hanges in its researh and development fous. For example, the dominant design metris have hanged from area (numer of transistors) in the 70 s, to delay in the 80 s to energy in the 90 s. These shifts orrespond to tehnology hanges where, initially, the ost of transistors is replaed with the need for speed, followed y power and energy onsumption emerging as the most onstraining metris. Reently, various seurity metris have attrated a great deal of attention. If we analyze at the level of astration, the sope has shifted from physial design to logi synthesis to register transfer level to ehavioral synthesis to system design. Targeted general purpose arhitetures have een hanging from mainframes to miniomputers, workstations, personal omputers and moile proessors. Similarly, appliation speifi omputing has shifted its targets from audio to video and, more reently, to multimedia and networking devies. We finish our survey with a disussion on proess variation, whih has had a signifiant impat on CAD algorithms and tehniques. Nevertheless, several properties of CAD proesses have eome permanent. For instane, a great emphasis has een onsistently plaed on aurate modeling of relevant design metris. The most onsistent CAD variale (and of paramount importane) is the optimization of systems with a large numer of strongly interating omponents. This type of synthesis is intrinsi to several types of important emerging systems suh as data enters and platforms for support of storing and proessing ig data. In partiular, it is ideally suited for handling millions, if not illions, of distriuted ommuniating devies envisioned in the Internet of Things (IoT). IoT is a rapidly emerging paradigm in whih the essential onept is that a great variety of ojets are instrumented in suh a way that they an e queried and operated over the Internet either diretly y the users or y programs that enapsulate their ehavior and ojetives [1] [2]. IoT will revolutionize the ways in whih individuals and organizations interat with the physial world as well among themselves. For example, the interation with home devies, ars, ustomer items, industrial plants, and weaponry will e fundamentally altered. Many servies, suh as health, learning, and resoure management, will e provided in new ways that are novel, etter organized, and ustomer-ustomized. Radio-frequeny identifiation (RFID) tags, as used for inventory management y ompanies suh as Walmart, provide a first glimpse into a very rudimentary IoT generation. The pratial realization of IoT requires the development of a numer of new versions of platforms and tehnologies inluding devie and proess identifiation and traking, sensing and atuation, ommuniation, omputational sensing, semanti knowledge proessing, oordinated and distriuted ontrol, and ehavioral, traffi, and user modeling [3]. The realization of IoT susystems will e sujeted to numerous onstraints that inlude ost, power, energy, and lifetime. However, there is a wide onsensus that the most hallenging of requirements will e seurity. It is widely aknowledged that the potential for maliious attaks an and will e greatly spread and atuated from the Internet to the physial word. Hene, seurity of IoT is of essential importane. One should also onsider a great diversity of IoT systems from fully organized to small individual nodes [4] [5] [6]. For example, things suh as ars, airplanes, and industrial /14/$ IEEE 417

2 equipment allow for muh more expensive instrumentation with muh high power and energy udgets in omparison to household IoT devies, suh as those for food, energy, and paper douments. Therefore, although for full impat, generi algorithms and protools are required, different ustomized solutions are also mandatory. This is in partiularly true for seurity solutions. IoT seurity enompasses several layers of astration and a numer of dimensions. The astration levels range from physial layers of sensors, omputation and ommuniation, and devies to the semanti layer in whih all olleted information is interpreted and proessed. We expet that a majority of seurity attaks will our at the software level eause it is urrently most popular and an simultaneously over a large numer of devies and proesses. From a researh point of view, most novel attaks are on physial signals and, in partiular, semanti attaks during data proessing and deision making steps. It is important to oserve that the lowest seurity at any level and at any dimension determines the overall seurity. A signifiant perentage of IoT devies will operate in passive mode without atteries. Their energy will either e harvested or reeived using a wireless medium. Many of these systems allow for only very minimal hardware, and thus, require an ultra ompat seurity solution with an ultra small footprint and energy udget, sine many IoT devies often operate in unproteted and potentially even hostile environments. Our main laim in this paper is that hardware-ased seurity is ideally suited to answer IoT seurity requirements. However, in order to realize the full potential of hardwareased seurity, very signifiant additional researh and engineering issues have to e addressed in novel and reative ways. Hardware-ased seurity provides a natural starting point for the realization of IoT protools and proedures due to their very low area and energy requirements. They are also naturally more resilient against side-hannel and physial attaks. Also very importantly, is that they enale the reation of seure and trusted information flows [7]. Finally, they provide elegant and effiient solutions to several prolems that lassial ryptography has not een ale to solve, suh as seure loation disovery. At the same time, it is important to reognize that hardware-ased seurity primitives and protools have several signifiant limitations. Among them, three are dominant. The first is that, until the invention of the puli physial unlonale funtion (PPUF), their appliation was restrited to seret key protools. While the PPUF eliminates this restrition, the first PPUF generation indued signifiant time and energy overhead on at least one partiipating party. The seond is that the key hardware-ased seurity physial unlonale funtion (PUF) is rather unstale with respet to operational (e.g. supply voltage) and environmental (e.g. temperature) onditions as well due to unavoidale devie aging. The third drawak is that the first generations of PUFs are analog iruitry and therefore are diffiult or at least umersome to integrate into digital designs. We riefly survey two reent hardware seurity results. The first is a very simple tehnique that transforms several lasses of analog PUFs into stale devies with respet to operational onditions. The proedure has very small hardware overhead and no delay and energy overheads. The key idea is to use only a small suset of hallenges that are stale under a wide range of onditions. Although the numer of used hallenges is signifiantly redued from the original hallenge spae, their ardinality is still exponential in the numer of its used y hallenges. This approah is appliale on several popular PUF strutures suh as delay ariter and ring osillator-ased PUFs. The seond is the digital PUF hardware seurity primitive. While it is initialized using stale analog PUFs, it is a digital iruit with very small gate ounts, low lateny, and ultra low energy requirements. Therefore, it an e diretly integrated with regular digital designs and failitate seure and trusted information flow, elimination of side-hannels, and puli key seurity protools with lateny of only a very few numer of gates. Digital PUFs an e used for the reation of new hardware seurity primitives suh as distriuted and synhronized hardware random numer generators. One of our tehnial ojetives is to initialize the quest for oneptually new hardware seurity primitives. For example, we envision that physial properties of hardware and materials used for implementation an reate novel seurity primitives that annot e realized using lassial mathematial and algorithmi tehniques. Speifially, the unidiretional evolution of material properties provides the potential for deteting if there was any interation with a partiular sensing devie sine the legitimate user s last interation. One physial phenomenon with suh potential is devie aging, however may not e fully pratial due to its long term irreversiility. Most likely, a etter andidate for the reation of suh a hardware seurity primitives is the memristor, where urrent-voltage trajetories are suh that passing through any partiular voltage-urrent point is very diffiult to repeat. We onlude our disussion with a proposal to searh for universal hardware seurity primitives that an e used for diverse tasks suh as for maliious alternations of design, for ryptographial and trust protools, and for ensuring seure and trusted information flow. II. IOT SECURITY DESIDERATA The IoT seurity desiderata an e grouped into two road lasses. The first lass onsists of required seurity tasks. As usual, the primary potential diffiulties are related ut ontraditory requirements of different tasks. For instane, the strength of authentiation and trust are in diret ontradition with a riterion of privay. The seond lass of desiderata is related to design metris suh as ost, size, lateny, and, in partiular, energy requirements. As usual, the key impat of these requirements is that they greatly onstrain aeptale seurity solutions. The most important seurity requirements inlude authentiation and traking, data and information integrity, mutual trust, privay, and digital forgetting. We expet that a dominant perentage of omputational sensing, deision making, ommuniation, and ativity organization will e onduted in data enters. Hene, there is a need for ensuring seurity in data enters as well oordinating seurity etween data enters and distriuted IoT devies [8]. 418

3 It is expeted that illions of devies will e a part of the IoT eosystem. Eah of these nodes should have a unique identifier. In addition, at any point in time the IoT infrastruture should e ale to trak eah item. Another level of diffiulty is that many nodes will e plaed in high densities and aess to them may e hindered or even loked. It is important to ensure that all olleted data is authenti. Some IoT sensors may have high andwidth and low lateny (real-time) data olletion rates. Therefore appropriate data integrity tehniques suh as enryption and watermarking are required. There is an essential need for ensuring that eah user an e guaranteed that the data presented y an IoT devie is trusted, i.e. that it is indeed olleted y the stated sensor at its stated loation and at its stated time. Reently, several shemes have een proposed for ensuring IoT trust. These solutions are ased on hardware seurity primitives and should e further optimized in terms of ost and energy. Also, hardware and software attestation tehniques may e used for trust related tasks. Interestingly, another important prolem is operator trust, in whih sensors and IoT devies an authorize and trust the instrutions of IoT users. A numer of definitions of privay have een proposed [9] [10]. They are ertainly useful in a numer of urrent senarios, however, a ompletely new level of omplexity is posed y IoT. Proaly the most diffiult privay task is one where the attaker integrates information from different sets and modalities at the semanti level. Comining different data from different soures of information at the semanti level an result in the extration of unexpeted information. Data revoation (i.e. digital forgetting) is the proess of provaly deleting all opies of a data set [11]. In addition to the tremendous amount of sensory data that IoT devies will ollet, there will e huge data sets related to ommuniation ativities etween various users and IoT devies. It is plausile to expet that a signifiant perentage of this data will ontain important information and knowledge aout the users and their ations and interests. There are several data revoation tehniques proposed in lassial ryptography [12]. All of them are ased on the simple and elegant idea that enrypted data is effetively deleted if the required deryption key is deleted. There are also several tehniques that employ distriuted data storage so that data is deleted due to unavoidale soial and tehnial proesses [13]. These ideas are valuale and essential to IoT systems whih an ollet large amounts of data that an seriously impat the privay of many individuals and even ompromise the seurity of eonomi entities and government institutions. A large perentage of devies will depend on harvested energy. In order to redue energy onsumption, omputation tasks will often e offloaded to data enters. Communiation will often use tehnologies that require less energy than those urrently widely used. Most likely, near-field ommuniation (NFC) will greatly inrease its market share. Other highly onstrained metris inlude ost and area. It is likely that new pakaging and integration tehnologies will emerge. An important oservation is that many deployed devies should e in operation for years if not deades. Replaing atteries an e expensive and impratial. Therefore, it is expeted that regardless of tehnology progress, most likely energy will eome the most expressed limitation. Intel has demonstrated that passive RFID an e utilized to form WISP network in whih eah devie ollets energy from a querying devie [14]. In their initial implementation, a very limited set of seurity and ryptographi tasks an e exeuted on the items themselves. However, the use of hardware-ased seurity primitives may alter that vision. We onlude this setion with a rief summary of system software requirements for IoT systems. These requirements may serve as a hek list for developers of IoT systems and CAD researh. Currently, it is widely assumed that seurity primitives reated y lassial ryptography will e used. We laim that hardware seurity primitives an e used to reate all expeted protools at a fration of hardware and energy requirements with muh higher resilieny against side-hannel attaks. IoT operating systems will have to provide a numer of servies and system software must e onsistent with standard Internet protools and servies. Targeted seurity protools inlude TLS, IPSe, VPN, SSH, SFTP, HTTPS, SNMP, and seure [15]. Also, standard enryption and deryption servies are required. Speial attention should e plaed on equipping eah IoT devie with a seure ootloader and automati failak. In addition, system software should e equipped with mehanisms for deteting and reporting physial and in partiular side-hannel attaks and seure wireless links should e provided. III. PUBLIC PUF PPUFs have extended the pratiality of PUFs y enaling the reation of puli key protools. While PUFs require that their haraterization and struture remain hidden and seret, the PPUF design and haraterization is dislosed to the puli. In this way, the design itself eomes the puli key. The puli nature of the PPUF makes it the premier primitive for seuring IoT devies sine its suseptiility to physial and side-hannel attaks is eliminated. Furthermore, PPUFs have small area footprint and orders of magnitude lower energy onsumption than their traditional ryptographi ounterparts. A. XOR Network Delay PPUF Bekmann et al. proposed the first PPUF model along with aompanying protools for puli key ryptography [16]. The puli key onsisted of the omplete haraterization of the design, inluding gate-level harateristis, suh as leakage energy and delay. Due to the effets of proess variation, inherent doping onentrations varianes and line-edge roughnesses manifested as different values of effetive hannel lengths and threshold voltages whih ultimately effet leakage energy and delay of eah transistor. In this way, the puli key was random, and unlonale, however, still ale to e simulated, although very arduous to do so due to the design. The arhiteture of Bekmann s PPUF is a gridded network of XOR gates. Due to inherent intrinsi manufaturing variaility, the physial harateristis of eah XOR gate differ. Speifially, due to variations in doping onentrations and line 419

4 δ ae 3 δ ei 7 δ e 4 δ fi 2 δ f 5 δ ej 5 δ df 4 δ fj 8 δ ag 4 δ gk 5 δ g 5 δ hk 4 δ h 8 δ gl 7 δ dh 4 δ hl 3 a d a d e f g h i j k l Fig. 1: Differential PPUF ooster ell example. The delay of a rising edge from input i to output j is denoted y δ ij. Fig. 3: Devie aging-ased mathed PPUF arhiteture. a d Fig. 2: Differential PPUF represser ell example. edge roughness, differenes in threshold voltages and effetive hannel lengths emerge. When sending an input through the gates, the rising edges will rae throughout the gridded network. Eah XOR gate will transition upon the arrival of a new rising or lowering edge and emit the output orresponding to its input at that partiular time. These signals will propagate throughout the iruit, ausing multiple transitions at eah XOR gate. The input hallenge is a omination of oth the input vetors (x(0), x(1)) as well as a time delay (t) at whih to read the outputs of the network. The design of this PPUF takes advantage of the glithing effets of multiple propagating and delayed signals throughout the XOR network. This arhiteture also requires ultra aurate, ultra preise, and ultra high frequeny loks in order to operate on the physial PPUF, and, for larger PPUFs, requires muh longer simulation times for the ommuniating parties wishing to initiate authorized ontat with a a PPUF owner. B. Differential PPUF The differential PPUF eliminates the need for ultra aurate lok manipulation for high preision timing as well as long simulation times [17]. Like its predeessor, the unlonaility of the differential PPUF relies on the inherent randomness in manufaturing variaility, speifially manifesting as varianes in gate delays. A key novelty of this arhiteture is that the hallenge vetor is redued from two input vetors plus a timestamp to a single input vetor. This eliminates the need for aurate lok apturing of glith temporal harateristis eause it only requires the measurement of the frontier signal. Consider the differential PPUF ooster example depited in Figure 1. If the input swithes from 0000 to 0101, output i will swith at times 6 and 11, j at times 9 and 12, k at times 8 and 9, and l at times 7 and 12. By plaing an ariter with inputs from i and k and a seond ariter with inputs from j and k, we eliminate the need for high preision timing y only apturing the first winner of the two paths. Hene, only frontier signals are neessary. However, sine one has to simulate only these frontier signals, an arhiteture in whih one an predit whih e frontier signals will not ause transitions is not seure. Thus, in addition to ooster ells, the differential PPUF inludes represser ells onsisting of a NAND gate network to terminate susets of propagating signals in an unpreditale manner, suh as the one depited in Figure 2. Together, the alternation of ooster ells followed y represser ells reates a highly non-linear system that is exponentially hard to simulate with a linear size inrease. C. Devie Aging and Mathed PPUFs All previously proposed PPUFs, inluding the differential PPUF, are potentially sujet to long-term reverse engineering attaks. The devie aging-ased PPUF design eliminates the possiility of these attaks through dynami reonfiguration. The key idea is to leverage devie aging to alter the PUF s physial properties, thus hanging its ehavior. Speifially, devie aging through tehniques suh as NBTI an permanently alter the threshold voltages of gates, thus inreasing their delay [18]. The key limitation to the original devie aging-ased PPUF, along with all other previously designed PPUFs, is that they employ a large time gap etween exeution and simulation to enale puli key ommuniation. While eah PPUF design provided faster simulation time on the part of the authentiation party than its predeessor, the fat remains that at least one partiipating party requires signifiant resoures for ommuniation in omparison to the partiipant in possession of the physial PPUF. The mathed PPUF arhiteture attempts to remove the need for simulation entirely y supplying oth ommuniating parties with physial PPUFs that are gloally unique post fariation, ut an e made idential through a novel mathing proedure. This proedure is exeuted in suh a way that only the two partiipating PPUFs eome idential while it is proailistially negligile that a third snooping adversary is ale to math as well. The arhiteture of the mathed PPUF utilizes ooster ells and represser ells, similar to those designed for the differential PPUF and depited in Figure 1 and 2. The first mathed PPUF arhiteture onsisted of h stages of ooster ells followed y r represser ells, and interstage networks onneting them as depited in Figure 3. Mathing is done post fariation when two ommuniating parties, eah with their own PPUF, enale, disale, and age their individual sets of gates until a portion of gates are mathed etween the two of them and their PPUFs now implement the same funtionality. An adversary snooping on the mathing protool is still only ale to math 58.3% of the onfiguration [19]. Attempting 420

5 to math the remaining gates through simulation or speial purpose hardware is not quik enough to suessfully imitate the physial PUF. Furthermore, the task is made even more diffiult y inreasing the size of the PPUF, therey inreasing the total numer of unmathed adversarial gates whih has an exponential inrease in simulation omplexity. The mathing PPUF was later improved upon to allow for n-party ommuniation and does not require devie aging upon mathing, ut is aged immediately post-fariation to set quanta. Multiple party mathing is enaled on-the-fly through a quantized mathing sheme [20]. D. NanoPPUF A very natural enaling tehnology for PUFs are emerging nanotehnologies. Reently, PPUF designs have een proposed utilizing III-V nanowires and memristors [21] [22]. Not only do the enaling omponents of these devies (namely, the nanotehnologies themselves) exhiit very non-linear inputoutput responses (this is represented y I-V urves), and thus, are ale to etter satisfy Shannon s onfusion and diffusion priniples, they also exhiit randomness in their synthesis proesses. Most importantly though, they ontriute to the new notion of idiretionality whih enales an entirely new seurity dimension. Current IC designs rely on the most asi omponent of the IC, the transistor. This three terminal devie has a soure, a sink, and a gate, and an only e operated in a unidiretional manner. However, a memristor is a two terminal devie in whih either a negative or positive voltage an e plaed aross it, and will output differently depending upon its urrent state. In urrent IC implementations of PPUFs, input vetors are applied to input pins and flow through a iruit network ultimately produing an output at the assigned output pins. By utilizing partiular nanotehnologies, the input and output pins no longer need to e neessarily statially assigned, ut an e hosen at runtime. This introdues an entirely new dimension to the PPUF design spae. The NanoPPUF arhiteture is omposed of a network of non-linear nanotehnology omponents gridded together as depited in Figure 4. A hallenge onsists of a set of input loations and voltages. Upon applying the inputs the signals travel throughout the non-linear network omponents until settling at the remaining pins, yielding the output. A novel polyomino partitioning sheme enales for quik authentiation while maximizing seurity [22]. IV. HARDWARE OBFUSCATION IoT devies an often e installed in inseure or unattended loations whih an often e physially aessed y an attaker. Hardware logi ofusation is a tehnique that protets the hardware intelletual property of these devies and seures on-hip information speifially e preventing reverse engineering attaks. Wendt et al. have developed two tehniques for hardware ofusation using the standard delay-ased PUF [23]. The first method onnets pairs of wires together in suh a way that a PUF s output it determines whether the two wire values are swithed or not. Sine the original hip designer is the Fig. 4: Nanotehnology-ased PPUF example. Eah ell onsists of a random network of non-linear omponents. The shaded regions represent example polyomino partitions. only one who knows the orret funtionality of the iruit (i.e. whih wires should and should not e swapped) and is the only one who knows the funtionality of eah PUF after fariation, he an set the PUF inputs suh that the iruit will funtion orretly. Furthermore, wire swappings are plaed in suh a way that they produe an exponential numer of possile onfigurations. Furthermore, the speifi key used for eah IC will e different for eah IC sine eah IC will have a unique set of PUFs. The seond tehnique for hardware ofusation is the diret replaement of logi with a PUF and piee of programmale fari. Xu et al. improve upon this design y employing the first digital PUF for diret logi ofusation [24]. V. DIGITAL PUF The onept of the digital PUF was first proposed in [25]. There are two major omponents that ompose the digital PUF: a stale delay-ased PUF and a lookup tale (LUT) network. The analog delay-ased PUF is made stale y the tehniques disussed elow. A. Standard Delay-ased PUF Staility The onept of the delay-ased PUF was first proposed y Pappu et al. [26]. The PUF onsists of two delay paths with nominally the same propagation delay. However, due to proess variation, the atual delay in the two paths differ. An ariter plaed at the end of the two paths generates the output of the PUF ased on whih path is quiker. A major prolem of the delay-ased PUF is its instaility. Beause the propagation delay is extremely sensitive to the external environment (e.g. temperature and voltage) the delay of the two paths are also heavily influened y any variations. As a result, the PUF is onsidered not stale. Figure 5 depits an example of the delay-ased PUF. Eah stage is ontrolled y a single hallenge it. A rising edge is sent through the first stage and depending upon the hallenge it will either swap the trajetories (red) or remain (lue). Path differenes for different hallenges are depited in Tale I. Some hallenges (e.g. 1101) are ale to produe larger delay differenes ompared to other hallenges. The motivation is that if the first path is muh faster than the seond path, even if environmental onditions hange and affet the delays of oth paths, it is with high proaility that the first path will still e faster than the seond. We lael suh a hallenge and 421

6 Fig. 5: An example of delay-ased PUF with 4-it hallenge. Temp. Delay Ratio (T=300K) K K K TABLE II: Proaility that outputs of the 64-it PUF are stale over varying temperatures for different delay ratios. C d C d C d C d TABLE I: Delay differenes ( d) etween paths for all hallenges (C) in Figure 5. any other hallenges that are resilient to suh environmental hanges as stale inputs. Xu et al. define the notion of delay ratio to quantify the relative delay differene etween two paths [25]. The delay ratio is defined as the delay differene divided y the minimum of the two delays in question. Tale II depits the staility of inputs with a given delay ratio over varying operational onditions. Note that when the delay ratio reahes some threshold (e.g. 10%), the output of the orresponding hallenges remains stale regardless of environmental onditions. Thus, these hallenges are onsidered stale. B. Lookup Tale Network The lookup tale network is formed with a set of randomly onneted LUTs in a hierarhial struture as shown in Figure 6. Random shuffling is applied etween levels. For a LUT network with m inputs and n outputs, the hierarhial struture provides a mapping etween inputs and outputs. From an attaker s perspetive, it is extremely diffiult to derive the LUT onnetions and onfigurations diretly from the mapping. Therefore, if the attaker wants to implement a hardware lok that generates the same mapping, there is no way to reprodue the same original LUT network, instead, the attaker an only use rute fore to implement the omplex inputs-outputs mapping. Sine the size of the mapping grows exponentially with the size of the inputs, a linear inrease in its size reates an exponential inrease in diffiulty for an attaker. The use of randomly onneted LUT networks for seurity is first proposed in [27]. The outputs from a LUT network exhiit exellent statistial seurity properties; for example, they pass all NIST randomness tests [28]. They also satisfy the avalanhe riterion. In terms of appliation, they enale oth traditional protools suh as puli key ommuniation, as well as new protools suh as remote trust. They require orders of magnitude less energy in omparison to traditional ipher loks, and, most importantly, the LUT network is purely digital, and thus, resilient against variations in environmental and operational onditions. Fig. 6: Lookup tale network with m inputs and n outputs. C. Lookup Tale Initialization Before operation, the LUT network must e initialized and onfigured. Figure 7 depits the initialization proess. The user hooses a set of stale hallenges to apply to the supporting delay-ased PUFs. Then the stale outputs are used to initialize the ells in the LUT network. Note that oth the initialization hallenges as well as their assignment in the LUT network are hosen y the user, thus preventing maliious manufaturers from suverting the system. This integration of the stale delay-ased PUF with the LUT network omprises the digital PUF. The design preserves oth the unlonaility of the analog PUF as well as the digital property of the LUT network. By applying only stale hallenges to the delay-ased PUF at initialization, the output staility is guaranteed. Together with the intrinsi digital property of the LUT network, the whole system is resilient against environmental variations and an e plaed as any other omponent diretly inside digital logi. Furthermore, eause the initialization is dependent upon the delay-ased PUF and the delay-ased PUF an not e reprodued, the system remains unlonale. Therefore, even if an attaker steals information regarding what stale hallenges are used in initialization, he annot know the atual funtionality of the LUT network without reverse engineering delay-ased PUF. 422

7 Fig. 7: LUT network initialization. VI. CONCLUSION The Internet of Things (IoT) will onnet illions of devies to the Internet and redefine how individuals, eonomi entities, and government organizations will interat with the physial world. The numer of IoT devies will outgrow the numer of personal omputers and even moile phones y several orders of magnitude. Optimization intensive CAD tehniques ompounded with their traditional aurate modeling are naturally suited to enale the design of highly optimized IoT devies. Two paramount onstraints for IoT devies are energy and seurity. Both onstraints an e addressed well using CAD tehniques and we analyze several reently proposed hardware seurity primitives that enale strong and omprehensive seurity under very strit ost (hardware) and seurity onstraints. We explain how stale PUFs an e reated y restriting hallenges to ones that are stale under a great variety of operational onditions. We also riefly surveyed reently a proposed digital PUF that enales the diret use of this hardware seurity primitive inside an aritrary digital logi to reate seure information flow and puli key protools that require only one lok yle. Our strategi goal in this paper is to provide a starting points for reating CAD tehniques that answer IoT design requirements. ACKNOWLEDGEMENTS This work was supported in part y the NSF under award CNS , award CNS , and award CCF , and y Samsung under award GRO REFERENCES [1] N. Counil, Disruptive ivil tehnologies: Six tehnologies with potential impats on us interests out to 2025, in Conferene Report CR, [2] L. Atzori, A. Iera, and G. Moraito, The internet of things: A survey, Computer Networks, vol. 54, no. 15, pp , [3] A. Juels, RFID seurity and privay: A researh survey, IEEE Journal on Seleted Areas in Communiations, vol. 24, no. 2, pp , [4] J.-P. Vasseur and A. Dunkels, Interonneting smart ojets with IP: The next internet. Morgan Kaufmann, [5] J. Hui, D. Culler, and S. Chakraarti, 6LoWPAN: Inorporating IEEE into the IP arhiteture internet protool for smart ojets (IPSO) alliane, white paper #3, [6] A. Dunkels and J. Vasseur, IP for smart ojets, internet protool for smart ojets (IPSO) alliane, white paper #1, [7] M. Potkonjak, S. Meguerdihian, and J. L. Wong, Trusted sensors and remote sensing, in IEEE Sensors, pp , [8] J. H. Kong, L.-M. Ang, and K. P. Seng, Minimalist seurity and privay shemes ased on enhaned AES for integrated WISP sensor networks, Journal of Communiation Networks and Distriuted Systems, vol. 11, no. 2, pp , [9] A. M. Dunn et al., Eternal sunshine of the spotless mahine: Proteting privay with ephemeral hannels., in Operating Systems Design and Implementation (OSDI), pp , [10] Y. Tang et al., CleanOS: Limiting moile data exposure with idle evition., in Operating Systems Design and Implementation (OSDI), vol. 12, pp , [11] Z. N. Peterson, R. C. Burns, J. Herring, A. Stulefield, and A. D. Ruin, Seure deletion for a versioning file system., in File and Storage Tehnologies (FAST), vol. 5, pp. 4 11, [12] D. Boneh and R. J. Lipton, A revoale akup system., in USENIX Seurity, pp , [13] S. Diesurg et al., TrueErase: Per-file seure deletion for the storage data path, in Anual Computer Seurity Appliations Conferene (AC- SAC), pp , [14] J. R. Smith et al., RFID-ased tehniques for human-ativity detetion, Communiations of the ACM, vol. 48, no. 9, pp , [15] K. Rowe, Seuring miroontroller RTOSes for the internet of things. Seuring-miroontroller-RTOSes-for-the-Internet-of-Things, [16] N. Bekmann and M. Potkonjak, Hardware-ased puli-key ryptography with puli physially unlonale funtions, in Information Hiding, pp , [17] M. Potkonjak, S. Meguerdihian, A. Nahapetian, and S. Wei, Differential puli physially unlonale funtions: arhiteture and appliations, in Design Automation Conferene (DAC), pp , [18] M. A. Alam and S. Mahapatra, A omprehensive model of PMOS NBTI degradation, Miroeletronis Reliaility, vol. 45, no. 1, pp , [19] S. Meguerdihian and M. Potkonjak, Mathed puli PUF: ultra low energy seurity platform, in International Symposium on Low Power Eletronis and Design (ISLPED), pp , [20] S. Meguerdihian and M. Potkonjak, Using standardized quantization for multi-party PPUF mathing: Foundations and appliations, in International Conferene on Computer-Aided Design (ICCAD), pp , [21] J. B. Wendt and M. Potkonjak, Nanotehnology-ased trusted remote sensing, in IEEE Sensors, pp , [22] J. B. Wendt and M. Potkonjak, The idiretional polyomino partitioned PPUF as a hardware seurity primitive, in Gloal Conferene on Signal and Information Proessing (GloalSIP), pp , [23] J. B. Wendt and M. Potkonjak, Hardware ofusation using PUFased logi, in International Conferene on Computer-Aided Design (ICCAD), pp. 1 8, [24] T. Xu, J. B. Wendt, and M. Potkonjak, Seure remote sensing and ommuniation using digital PUFs, in Symposium on Arhitetures for Networking and Communiations Systems (ANCS), pp. 1 12, [25] T. Xu and M. Potkonjak, Roust and flexile FPGA-ased digital PUF, in Field Programmale Logi and Appliations, pp. 1 6, [26] R. Pappu, B. Reht, J. Taylor, and N. Gershenfeld, Physial one-way funtions, Siene, vol. 297, no. 5589, pp , [27] T. Xu, J. B. Wendt, and M. Potkonjak, Digital imodal funtion: an ultra-low energy seurity primitive, in International Symposium on Low Power Eletronis and Design (ISLPED), pp , [28] A. Rukhin, J. Soto, J. Nehvatal, M. Smid, and E. Barker, A statistial test suite for random and pseudorandom numer generators for ryptographi appliations, teh. rep., DTIC Doument,

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

International Journal of Modern Trends in Engineering and Research  e-issn No.: , Date: 2-4 July, 2015 International Journal of Modern Trends in Engineering and esearh www.ijmter.om e-iss o.:349-9745, Date: -4 July, 5 A eview on VLSI Implementation of Multiplierless FI Filter ased On Distriuted Arithmeti

More information

Final Project: Musical Memory

Final Project: Musical Memory Final Projet: Musial Memory Jeff Kaufman May 12, 2008 Astrat This paper presents a mahine learning system for notes, apale of learning some aspets of tunes. Input is in the form of notes played on a penny

More information

A Wave-Pipelined On-chip Interconnect Structure for Networks-on-Chips

A Wave-Pipelined On-chip Interconnect Structure for Networks-on-Chips A Wave-Pipelined On-hip Interonnet Struture for Networks-on-Chips Jiang Xu and Wayne Wolf Dept. of ELE, Prineton University jiangxu@prineton.edu, wolf@prineton.edu Abstrat The paper desribes a strutured

More information

Designs and Implementations of Low-Leakage Digital Standard Cells Based on Gate- Length Biasing

Designs and Implementations of Low-Leakage Digital Standard Cells Based on Gate- Length Biasing Researh Journal of pplied Sienes, Engineering and Tehnology 5(10): 2957-2963, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Sientifi Organization, 2013 Submitted: September 15, 2012 epted: Otober 31,

More information

PMT EFFECTIVE RADIUS AND UNIFORMITY TESTING

PMT EFFECTIVE RADIUS AND UNIFORMITY TESTING PURDUE UNIVERSITY DEPARTMENT OF PHYSICS PMT EFFECTIVE RADIUS AND UNIFORMITY TESTING AUTHORS: MIHAI CARA, RUDY GILMORE, JOHN P. FINLEY January 14, 2002 ABSTRACT... 3 1. NOTATION... 3 2. RAW DATA FORMAT...

More information

Color Management of Four-Primary Digital Light Processing Projectors

Color Management of Four-Primary Digital Light Processing Projectors olor Management of Four-Primary Digital Light Proessing Projetors Journal of Imaging Siene and Tehnology vol. 50, no. 1, Jan./Feb. 2006 David. Wyble and Mithel. osen Shool of Eletrial Engineering and omputer

More information

Characterization of transmission line based on advanced SOLTcalibration: Review

Characterization of transmission line based on advanced SOLTcalibration: Review IOSR Journal of Eletronis and Communiation Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 4, Ver. II (Jul - Aug. 2014), PP 73-78 Charaterization of transmission line based

More information

A New Method for Tracking Modulations in Tonal Music in Audio Data Format 1

A New Method for Tracking Modulations in Tonal Music in Audio Data Format 1 A New Method for Traking Modulations in Tonal Musi in Audio Data Format 1 Hendrik Purwins, Benjamin Blankertz, and Klaus Obermayer CCRMA, Stanford Tehnial University Berlin, FR 2-1, FB 13, Franklinstr.

More information

PROFESSIONAL D-ILA PROJECTOR

PROFESSIONAL D-ILA PROJECTOR PROFESSIONAL D-ILA PROJECTOR CONTENTS Prefae 3 Projetor Development History and Bakground 3 From ILA TM Projetors to D-ILA TM Projetors 4 Struture and Basi Operating Priniples of D-ILA TM 5 Features of

More information

This is a PDF file of an unedited manuscript that has been accepted for publication in Omega.

This is a PDF file of an unedited manuscript that has been accepted for publication in Omega. This is a PDF file of an unedited manusript that has been aepted for publiation in Omega. The manusript will undergo opyediting, typesetting, and review of the resulting proof before it is published in

More information

automatic source-changeover system with 2 devices

automatic source-changeover system with 2 devices MEL GE AC-EC292-1 MEL GE AC-EC292-1 U U U U Masterpat: funtions and harateristis mati soure-hangeover systems 025186 Masterpat mati soure-hangeover system 05061 05060 05058 Masterpat soure-hangeover systems

More information

Unit 6 Writing About Research April/May

Unit 6 Writing About Research April/May Teahers College Reading and Writing Projet Writing Curriular Calendar, Third Grade, 2017-2018 Unit 6 - Writing About Researh 1 Welome to the Unit Unit 6 Writing About Researh April/May Think of this unit

More information

Experiments in Digital Television

Experiments in Digital Television EUROGRAPHICS 99 / P. Brunet and R. Sopigno (Guest Editors) Volume 18 (1999), Number 3 Experiments in Digital Television Philipp Slusallek, Milton Chen, Brad Johanson Computer Siene Department, Stanford

More information

Texas Transportation Institute The Texas A&M University System College Station, Texas

Texas Transportation Institute The Texas A&M University System College Station, Texas 1. Report No. FHWA/TX-04/0-2101-3 2. Government Aession No. 3. Reipient's Catalog No. Tehnial Report Doumentation Page 4. Title and Subtitle FLEXURAL DESIGN OF HIGH STRENGTH CONCRETE PRESTRESSED BRIDGE

More information

FILTRON DP BUILT IN

FILTRON DP BUILT IN FILTR 246 + DP BUILT IN The FILTR 246 bakflushing ontroller designed and manufatured by TALGIL to meet the demands of a low ost easy to use ontroller. The FILTR 246 exists in 3 sizes - with 2, 4 or 6 stations.

More information

Give sequence to events Have memory y( (short-term) Use feedback from output to input to store information

Give sequence to events Have memory y( (short-term) Use feedback from output to input to store information Chapter 3 :: equential Logi esign igital esign and Computer Arhiteture avid Money Harris and arah L. Harris Chapter 3 :: Topis Introdution Lathes and Flip-Flops ynhronous Logi esign Finite tate Mahines

More information

AP Music Theory 2003 Scoring Guidelines

AP Music Theory 2003 Scoring Guidelines AP Musi Theory 2003 Soring Guidelines The materials inluded in these files are intended for use by AP teahers for ourse and exam preparation; permission for any other use must be sought from the Advaned

More information

Using Each Guide. Safety Instructions/Support and Service Guide. User's Guide (this guide) Quick Start Guide. 3D Glasses User's Guide

Using Each Guide. Safety Instructions/Support and Service Guide. User's Guide (this guide) Quick Start Guide. 3D Glasses User's Guide User's Guide Organization of the Guide and Notations in the Guide Using Eah Guide The guides for this projetor are organized as shown below. Safety Instrutions/Support and Servie Guide Contains information

More information

Dream On READING BEFORE YOU READ

Dream On READING BEFORE YOU READ UNIT 9 READING Dream On BEFORE YOU READ Read the following statements and deide whih ones are true for you. Then hoose one statement and disuss it with a partner. I have diffiulty realling my dreams. My

More information

Strategic Informative Advertising in a Horizontally Differentiated Duopoly

Strategic Informative Advertising in a Horizontally Differentiated Duopoly Strategi Informative Advertising in a Horizontally Differentiated Duopoly Levent Çelik Otober 006 Abstrat Consider a horizontally differentiated duopoly market where potential buyers are unertain about

More information

Using Each Guide. Safety Instructions/Support and Service Guide. User's Guide (this guide) Quick Start Guide. 3D Glasses User's Guide

Using Each Guide. Safety Instructions/Support and Service Guide. User's Guide (this guide) Quick Start Guide. 3D Glasses User's Guide User's Guide Organization of the Guide and Notations in the Guide Using Eah Guide The guides for this projetor are organized as shown below. Safety Instrutions/Support and Servie Guide Contains information

More information

Arduino Nixie Clock Modular Revision 2 Construction Manual

Arduino Nixie Clock Modular Revision 2 Construction Manual Arduino Nixie Clok Modular Revision 2 Constrution Manual ModularNixieClokConstrutionManualRev2 Contat Information If you want to get in ontat with us, please email to: nixie@protonmail.h We'll usually

More information

Using Each Guide. Safety Instructions/Support and Service Guide. User's Guide (this guide) Quick Start Guide. 3D Glasses User's Guide

Using Each Guide. Safety Instructions/Support and Service Guide. User's Guide (this guide) Quick Start Guide. 3D Glasses User's Guide User's Guide Organization of the Guide and Notations in the Guide Using Eah Guide The guides for this projetor are organized as shown below. Safety Instrutions/Support and Servie Guide Contains information

More information

UNIT-1 19 Acoustics 04 Microphones and Loud speakers 10 Magnetic recording 05. UNIT-2 20 Video disc recording 06 Monochrome TV 10 Remote controls 04

UNIT-1 19 Acoustics 04 Microphones and Loud speakers 10 Magnetic recording 05. UNIT-2 20 Video disc recording 06 Monochrome TV 10 Remote controls 04 Department of Tehnial Eduation DIPLOMA COURSE IN ELECTRONICS AND COMMUNICATION ENGINEERING Fourth Semester Sujet: Audio and Video Systems Contat Hrs/Week:4 Contat Hrs/Sem: 64 GENERAL EDUCATIONAL OBJECTIVES:-

More information

LETTER. Preplay of future place cell sequences by hippocampal cellular assemblies

LETTER. Preplay of future place cell sequences by hippocampal cellular assemblies doi:./nature Preplay of future plae ell sequenes y hippoampal ellular assemlies George Dragoi & Susumu Tonegawa During spatial exploration, hippoampal neurons show a sequential firing pattern in whih individual

More information

Using Each Guide. Safety Instructions/Support and Service Guide. User's Guide (this guide) Quick Start Guide. 3D Glasses User's Guide

Using Each Guide. Safety Instructions/Support and Service Guide. User's Guide (this guide) Quick Start Guide. 3D Glasses User's Guide User's Guide Organization of the Guide and Notations in the Guide Using Eah Guide The guides for this projetor are organized as shown below. Safety Instrutions/Support and Servie Guide Contains information

More information

Planet Earth. Vocabulary Aa Bb. 1 Complete the crossword. Vocabulary extension. 3 Complete the sentences with these prepositions.

Planet Earth. Vocabulary Aa Bb. 1 Complete the crossword. Vocabulary extension. 3 Complete the sentences with these prepositions. Planet Earth Voabulary Aa Bb 1 Complete the rossword. 2 1 3 4 6 3 4 5 7 8 5 6 9 Aross 1 a long line of very big hills 4 a long turning flow of water 5 an area with a lot of trees, plants and animals 8

More information

2008 English Standard Grade. Foundation, General and Credit Reading. Finalised Marking Instructions

2008 English Standard Grade. Foundation, General and Credit Reading. Finalised Marking Instructions 2008 English Standard Grade Foundation, General and Credit Reading Finalised Marking Instrutions Sottish Qualifiations Authority 2008 The information in this puliation may e reprodued to support SQA qualifiations

More information

ARTHROPOD MANAGEMENT

ARTHROPOD MANAGEMENT The Journal of Cotton Siene 13:189 195 (2009) http://journal.otton.org, The Cotton Foundation 2009 189 ARTHROPOD MANAGEMENT Comparative Effiay of Seleted Insetiide Alternatives for Boll Weevil (Coleoptera:

More information

LED TV. user manual. Still image warning. Important Warranty Information Regarding Television Format Viewing. Securing the Installation Space

LED TV. user manual. Still image warning. Important Warranty Information Regarding Television Format Viewing. Securing the Installation Space LED TV user manual Figures and illustrations in this User Manual are provided for referene only and may differ from atual produt appearane. Produt design and speifiations may be hanged without notie. Important

More information

Treatment of Minorities in Texas Government Textbooks

Treatment of Minorities in Texas Government Textbooks Treatment of in Texas Government Textbooks Debra P. Avara, Amarillo College John David Raush, jr, West Texas A&M University abstrat: The authors ompare Texas Government textbooks publishes between two

More information

QUESTIONS. EImplicit. Diagnostic Assessment Booklet. Making. Topic. Development. Explicit. Name: Connections

QUESTIONS. EImplicit. Diagnostic Assessment Booklet. Making. Topic. Development. Explicit. Name: Connections Topi ANSWER KEY Name: QUESTIONS Ontario Seondary Shool Literay Test (OSSLT) Diagnosti Assessment Booklet St. Ignatius of Loyola Note: You are not permitted to use ellphones, audio- or videoreording devies,

More information

LED TV. user manual. Still image warning. Securing the Installation Space. xif you use parts provided by another manufacturer, it may result in a

LED TV. user manual. Still image warning. Securing the Installation Space. xif you use parts provided by another manufacturer, it may result in a LED TV user manual Figures and illustrations in this User Manual are provided for referene only and may differ from atual produt appearane. Produt design and speifiations may be hanged without notie. Still

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This artile appeared in a journal published by Elsevier. The attahed opy is furnished to the author for internal non-ommerial researh and eduation use, inluding for instrution at the authors institution

More information

Class Piano Resource Materials

Class Piano Resource Materials Class Piano Resoure Materials Level One Fifth Edition Compiled and Edited y W. Daniel Landes Smith Creek Musi Class Piano Resoure Materials Level One (Fifth Edition) Compiled and edited y W. Daniel Landes

More information

Secure Remote Sensing and Communication using Digital PUFs

Secure Remote Sensing and Communication using Digital PUFs Secure Remote Sensing and Communication using Digital PUFs Teng Xu, James B. Wendt, and Miodrag Potkonjak Computer Science Department University of California, Los Angeles {xuteng, jwendt, miodrag}@cs.ucla.edu

More information

research is that it is descriptive in nature. What is meant by descriptive is that in a

research is that it is descriptive in nature. What is meant by descriptive is that in a CHAPTER III RESEARCH METHOD A. Type of Researh The researh onduted by the researher is using desriptive qualitative method. Aording to Wahyuni (2012:12), one of the harateristis of qualitative researh

More information

- - QUICK START. GUIDE. ~ Batteries. Welcome to your new TV! ~ AC/DC Adapter. Included in this box I. Attach the TV to the Stand.

- - QUICK START. GUIDE. ~ Batteries. Welcome to your new TV! ~ AC/DC Adapter. Included in this box I. Attach the TV to the Stand. QUICK START. GUIDE Welome to your new TV! The following instrutions over assembling, onneting, and setting up your new TV. Make sure you have the aessories listed below. Inluded in this box I Remote Controls

More information

I am proud of the fact that I never invented weapons to kill - Thomas Edison. All the News that we could jam into a little under 8 pages

I am proud of the fact that I never invented weapons to kill - Thomas Edison. All the News that we could jam into a little under 8 pages GILDERFLUKE & C o. 0 SOUTH FLOWER STREET BURBANK, CALIFORNIA 00 /0 00/ FAX /0 EAST COAST/FLORIDA OFFICE 0 GRAND NATIONAL DRIVE, SUITE d ORLANDO, FLORIDA 0/ FAX 0/ I am proud of the fat that I never invented

More information

TeSys contactors LC1-D09pp (5) LC1-D12pp (5) 0.325

TeSys contactors LC1-D09pp (5) LC1-D12pp (5) 0.325 Referenes For motor ontrol up to 75 kw at 400 V, in ategory AC-3 Control iruit: a.., d.. or low onsumption 3-pole ontators for onnetion by srew lamp terminals or onnetors (1) 810356 Standard power ratings

More information

Sounds Abound! Junction City/Fort Riley School District April 17, 2017

Sounds Abound! Junction City/Fort Riley School District April 17, 2017 April 17, 2017 Sounds Abound! Brent Holl Desription In this session we ll elebrate the timbres of the Orff instruments as we look at their ustifiation and use in the musi lassroom We will play arrangements

More information

Visvesvaraya Technological University,Belgaum Ph.D/M.Sc (Engg.,) by Research Course Work Examinations April/May-2014 Provisional Result Sheet

Visvesvaraya Technological University,Belgaum Ph.D/M.Sc (Engg.,) by Research Course Work Examinations April/May-2014 Provisional Result Sheet Visvesvaraya Technological University,elgaum Ph.D/M.Sc (Engg.,) by Research ourse Work Examinations April/May-2014 Provisional Result Sheet 19th June 2014 SLNO USN Subject Title-I Result Subject Title-II

More information

Introduction to Orff Schulwerk We Sing, We Move, We Play, We Create

Introduction to Orff Schulwerk We Sing, We Move, We Play, We Create Introdution to Orff Shulwerk We Sing, We Move, We Play, We Create with Kerri Lynn Nihols, Patrik Ware and Brent Holl Speeh and Song In the Shulwerk Kerri Lynn Nihols - Presenter www.kerri-oke.om Choral

More information

Teaching Old Tricks to Young Pups

Teaching Old Tricks to Young Pups TeahingOTtoYP /6/07 :5 AM Page b e f w h e k m n q t Teahing Old Triks to Young Pups Gat Beginnings and Strategies for Suess that Develop Musi Literay through Listening and Singing Skills, Rhythmi and

More information

Effect pressure INTODUCTION. a swirl-type. in this study. marine diesel. engines. The. agent, urea is. (UWS), con- NH 3 slip, and 1 G.

Effect pressure INTODUCTION. a swirl-type. in this study. marine diesel. engines. The. agent, urea is. (UWS), con- NH 3 slip, and 1 G. SNAK, 014 Int. J. Nav. N Arhit. Oean Eng. (014) 6:7~38 http://dx.doi.org/10.478/ijnaoe-013-01611 pissn: 09-678, eissn: 09-67900 Taewha Park 1, Yonmo Sung 1, Taekyung Kim 1, Inwon Lee, Gyungmin Choi 3 and

More information

Sharif University of Technology. SoC: Introduction

Sharif University of Technology. SoC: Introduction SoC Design Lecture 1: Introduction Shaahin Hessabi Department of Computer Engineering System-on-Chip System: a set of related parts that act as a whole to achieve a given goal. A system is a set of interacting

More information

TeSys GV2 and GV3 Manual Starter and Protector

TeSys GV2 and GV3 Manual Starter and Protector www.shneider-eletri.us GV2ME GV2P2 with GV2GH7 installed Starters TeSys GV2 and GV3 Manual Starter and Protetor Refer to 2520CT000 The GV family of produts are 3-pole, horsepower rated, UL 508 listed,

More information

1. Preliminary remark regarding the connection of terminology, method and theory

1. Preliminary remark regarding the connection of terminology, method and theory Herbert Ernst Wiegand Hybrid text onstituent strutures of ditionary artiles. A ontribution to the expansion of the theory of textual ditionary strutures Abstrat Firstly it is indiated with whih different

More information

SHARP News. Conferences 1. Contents. Volume 25, Number SHARP 2016 Reflections. Global Book History at Paris

SHARP News. Conferences 1. Contents. Volume 25, Number SHARP 2016 Reflections. Global Book History at Paris SHARP News Volume 25, Number 2 2016 Conferenes SHARP 2016 Refletions SHARP 2016 was a whirlwind of intelletual disussion in Paris. It was my first time attending a SHARP onferene, and I was really struk

More information

LINCOLNSHIRE POSY Works for Wind Ensemble

LINCOLNSHIRE POSY Works for Wind Ensemble Eloq uene LINCOLNSHIRE POSY Works for Wind Ensemble GRAINGER PERSICHETTI KHACHATURIAN HARTLEY ROGERS Eastman Wind Ensemble Frederik Fennell 1 2 3 4 5 6 7 8 9 0! @ $ % ^ & PERCY GRAINGER (1882-1961) Linolnshire

More information

Û Û Û Û J Û . Û Û Û Û Û Û Û. Û Û 4 Û Û &4 2 Û Û Û Û Û Û Û Û. Û. Û. Û Û Û Û Û Û Û Û Û Û Û. œ œ œ œ œ œ œ œ. œ œ œ. œ œ.

Û Û Û Û J Û . Û Û Û Û Û Û Û. Û Û 4 Û Û &4 2 Û Û Û Û Û Û Û Û. Û. Û. Û Û Û Û Û Û Û Û Û Û Û. œ œ œ œ œ œ œ œ. œ œ œ. œ œ. Basi patterns (Maxixe): R 3 Samba Samba evolved from maxixe around the 190s Two elements were ruial for the definition of its style: the patterns reated by new and old perussion instruments that would

More information

A Survey of Local Library Cataloging Tool and Resource Utilization

A Survey of Local Library Cataloging Tool and Resource Utilization I A Survey of Loal Library Cataloging Tool and Resoure Utilization Shawne D. Miksa This stujy addresses lhl: support ofalaloging prol:dures by examining the loal ataloging environment of the North Texas

More information

Class Piano Resource Materials

Class Piano Resource Materials Class Piano Resoure Materials Level To Fifth Edition Compiled and Edited y W Daniel Landes Smith Creek Musi Class Piano Resoure Materials Level To (Fifth Edition) Compiled and edited y W Daniel Landes

More information

The Implications of Bach's Introduction of New Fugal Techniques and Procedures in the Well-Tempered Clavier Book Two

The Implications of Bach's Introduction of New Fugal Techniques and Procedures in the Well-Tempered Clavier Book Two The Impliations of Bah's Introdution of New Fugal Tehniques and Proedures in the Well-Tempered Clavier Book Two Tomita, Y. (2011). The Impliations of Bah's Introdution of New Fugal Tehniques and Proedures

More information

Bach s Musical Revolution

Bach s Musical Revolution Clik here for Full Issue of EIR Volume 27, Numer 25, une 23, 2000 Cognition vs Information Panel II Bah s Musial Revolution y Anno Hellenroih This speeh opened the onferene panel on May 28 Mr Hellenroih

More information

Modifying the Scan Chains in Sequential Circuit to Reduce Leakage Current

Modifying the Scan Chains in Sequential Circuit to Reduce Leakage Current IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 3, Issue 1 (Sep. Oct. 2013), PP 01-09 e-issn: 2319 4200, p-issn No. : 2319 4197 Modifying the Scan Chains in Sequential Circuit to Reduce Leakage

More information

Mushroom Soup for Percussion Ensemble SAMPLE. By Michael Varner

Mushroom Soup for Percussion Ensemble SAMPLE. By Michael Varner Mushroom Soup for Perussion Ensemle By Mihael Varner Mushroom Soup is a flashy fusion omposition for 11 players featuring drumset and Eletri Bass Although the drumset, ass, and perussion parts are written

More information

What happened? Vocabulary. Goal: describe past experiences. Grammar: past simple and past continuous. Vocabulary: describing feelings and events

What happened? Vocabulary. Goal: describe past experiences. Grammar: past simple and past continuous. Vocabulary: describing feelings and events 2A What happened? Goal: desribe past experienes Grammar: past simple and past ontinuous Voabulary: desribing feelings and events C E A D B Voabulary 1 Look at the photos and disuss the questions. 1 What

More information

Leakage Current Reduction in Sequential Circuits by Modifying the Scan Chains

Leakage Current Reduction in Sequential Circuits by Modifying the Scan Chains eakage Current Reduction in Sequential s by Modifying the Scan Chains Afshin Abdollahi University of Southern California (3) 592-3886 afshin@usc.edu Farzan Fallah Fujitsu aboratories of America (48) 53-4544

More information

Internet of Things (IoT): The Big Picture

Internet of Things (IoT): The Big Picture Internet of Things (IoT): The Big Picture Tampere University of Technology, Tampere, Finland Vitaly Petrov: vitaly.petrov@tut.fi IoT at a glance q Internet of Things is: o A concept o A trend o The network

More information

triode tube power monoblocs

triode tube power monoblocs 1 BALDUR 70 triode triode tube power monoblos ::: mono tube triode power amplifier ::: We ongratulate you with the purhase of this superb AUDIOVALVE HiFi omponent. This handrafted produt has been manufatured

More information

Stringed instruments and technology of their making in Italian acoustics

Stringed instruments and technology of their making in Italian acoustics Stringed instruments and tehnology of their making in Italian aoustis S. Cingolani Dipartimento di Ingegneria Meania, Università degli Studi di Bresia Via Branze 38, I-25123 Bresia, Italy e-mail: ingolan@ing.unibs.it

More information

Aural Skills Quiz (Introduction)

Aural Skills Quiz (Introduction) 03/22/07 Trevor de Clerq Aural Skills Quiz (Introdution) For this aural skills quiz, I have targeted an audiene of students ho should be relatively omfortable ith hearing sale degrees in both maor and

More information

Follow this and additional works at:

Follow this and additional works at: SHARP News Volume 23 Number 1 Artile 1 Winter 2014 Volume 23, Number 1 Follow this and additional works at: http://sholarworks.umass.edu/sharp_news Reommended Citation (2014) "Volume 23, Number 1," SHARP

More information

Teachers College Reading and Writing Project Reading User s Guide, Kindergarten, Emergent Reading (If Then )

Teachers College Reading and Writing Project Reading User s Guide, Kindergarten, Emergent Reading (If Then ) Teahers College Reading and Writing Projet 1 A User s Guide for Emergent Reading (If...Then ) Otober/November Benhmark Reading Level: Emergent Storybooks & Shared Reading Texts and A/B with Book Intro

More information

PV 10AT PV 10BT Compact Mixer

PV 10AT PV 10BT Compact Mixer PV AT PV BT Compat Mixer /4 -Hi-Z CH.4 Only.5mm STEEO USB A FS MAIN OUTPUTS DIECT OUT DIECT OUT DIECT OUT DIECT OUT 4 5/6 7/8 5 6 PAIING 9 SEND STEEO IN PV AT INPUT STEEO MIXE WITH DIGITA EFFECTS, MEDIA

More information

GRAMMAR AND LISTENING. Work it out. B Night was falling and the Moon was shining. Beethoven. A One day in the 1920s, the great American composer

GRAMMAR AND LISTENING. Work it out. B Night was falling and the Moon was shining. Beethoven. A One day in the 1920s, the great American composer Inspiration Read, listen and talk about artists and writers; inspiration; important moments. Pratise the Past Simple and the Past Continuous; time expressions. Fous on reounting past events; phrasal verbs.

More information

Home Monitoring System Using RP Device

Home Monitoring System Using RP Device International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Issue 05, Volume 4 (May 2017) SPECIAL ISSUE www.irjcs.com Home Monitoring System Using RP Device Mrs. Sudha D 1, Mr. Sharveshwaran

More information

FEATURES. I Highly Reliable Playback System I

FEATURES. I Highly Reliable Playback System I Sine the introdution of the worlds first 0-1 Component Oigital VTR, the OVR-1000/0VPC-1000, SonyO-1 VTRs have earned a well deserved reputation for exellene in omponent digital signal reording. Component

More information

BIOMAT ~ ~ FINGERPRINT READER TECHNICAL CHARACTERISTICS CONNECTION PROGRAMMING OF MASTER CODE EMERGENCY PROCEDURE COPYING MEMORIES

BIOMAT ~ ~ FINGERPRINT READER TECHNICAL CHARACTERISTICS CONNECTION PROGRAMMING OF MASTER CODE EMERGENCY PROCEDURE COPYING MEMORIES BIOMAT TEHNIAL HARATERISTIS FINGERPRINT READER ONNETION BIOMAT02-06112101 EN Supply voltage : 12/24v D Max. consumption : 280 ma Temperature : -20 to +50 Tightness : IP54 omplete fingerprint reader (capacitive

More information

Grammar Past continuous I can use the past continuous.

Grammar Past continuous I can use the past continuous. Adventure Voabulary Landsapes A I an desribe landsapes Complete the labels Put the letters in order to make adjetives that desribe landsapes Then irle the landsape feature that an go with eah adjetive

More information

nmos transistor Basics of VLSI Design and Test Solution: CMOS pmos transistor CMOS Inverter First-Order DC Analysis CMOS Inverter: Transient Response

nmos transistor Basics of VLSI Design and Test Solution: CMOS pmos transistor CMOS Inverter First-Order DC Analysis CMOS Inverter: Transient Response nmos transistor asics of VLSI Design and Test If the gate is high, the switch is on If the gate is low, the switch is off Mohammad Tehranipoor Drain ECE495/695: Introduction to Hardware Security & Trust

More information

Minimizing Leakage of Sequential Circuits through Flip-Flop Skewing and Technology Mapping

Minimizing Leakage of Sequential Circuits through Flip-Flop Skewing and Technology Mapping JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.7, NO.4, DECEMER, 2007 215 Minimizing Leakage of Sequential Circuits through Flip-Flop Skewing and Technology Mapping Sewan Heo and Youngsoo Shin Abstract

More information

Non-Chord Tones. œ œ. () œ. () œ. () œ œ. ( œ œ œ œ) œ

Non-Chord Tones. œ œ. () œ. () œ. () œ œ. ( œ œ œ œ) œ Non-Chord Tones Non-Chord Tones (NCT) - Notes that are not part of the strutural harmony (also alled emellishing tones) - sed to smooth out and deorate eah melodi line - Typially preeded and followed y

More information

24. Scaling, Economics, SOI Technology

24. Scaling, Economics, SOI Technology 24. Scaling, Economics, SOI Technology Jacob Abraham Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017 December 4, 2017 ECE Department, University

More information

EXCHANGE PARTNERS COURSE EQUIVALENCIES REPORT Report Date: Wednesday, December 12, 2018

EXCHANGE PARTNERS COURSE EQUIVALENCIES REPORT Report Date: Wednesday, December 12, 2018 AH2002 ART, ULTURE AND POLITIS, FROM 1900 TO NOW ARTH 226/3.0 E 04-Sep-18 AH1003 EUROPEAN ART & ARHITETURE IN THE ARTH 2UNS (0.5) E 22-Jan-10 SEVENTEENTH AND EIGHTEENTH ENTURIES (0.5) AH3130 APPROAHES

More information

Advanced Topics in Information Technology-1 Internet of Things(IT623)

Advanced Topics in Information Technology-1 Internet of Things(IT623) Advanced Topics in Information Technology-1 Internet of Things(IT623) Problem Solver Generations of Informatique 3RD PLATFORM BILLIONS OF USERS Mobile Cloud Big Data Open Data Social Media IoT Mobile

More information

Review pages of the Glossary of Usage for information on the correct use of the following words or word groups:

Review pages of the Glossary of Usage for information on the correct use of the following words or word groups: Glossary of sage A Review pages 596-97 of the Glossary of sage for information on the orret use of the a, an aept,exept affet, effet ain't all the farther, all the faster a lot and et. anyways, anywheres,

More information

The Orff Source. Sample. 89 Orff arrangements of traditional folk songs and singing games

The Orff Source. Sample. 89 Orff arrangements of traditional folk songs and singing games The Orff Soure 89 Orff arrangements of traditional folk songs and singing games Correlates to Musiplay 1-5 sequened aording to tone set: sm lsm smd mrd s mrd ls mrd d l,s, ls mrd l,s, major minor by Denise

More information

Hybrid STT-CMOS Designs for Reverse-engineering Prevention

Hybrid STT-CMOS Designs for Reverse-engineering Prevention Hybrid STT-CMOS Designs for Reverse-engineering Prevention Hamid Mahmoodi San Francisco State University mahmoodi@sfsu.edu Theodore Winograd George Mason University twinogra@gmu.edu Kris Gaj George Mason

More information

DETECTION OF KEY CHANGE IN CLASSICAL PIANO MUSIC

DETECTION OF KEY CHANGE IN CLASSICAL PIANO MUSIC i i DETECTION OF KEY CHANGE IN CLASSICAL PIANO MUSIC Wei Chai Barry Vercoe MIT Media Laoratory Camridge MA, USA {chaiwei, v}@media.mit.edu ABSTRACT Tonality is an important aspect of musical structure.

More information

Market Evaluation & Identification of Key Prospects

Market Evaluation & Identification of Key Prospects Market Evaluation & Identifiation of Key Prospets Summary 2 1. Estimation of TV hannels numbers 3 2. Segmentation by TV-hannel ategory 5 3. Segmentation by ountry ategory 7 4. Different ategories of installations

More information

High Performance Microprocessor Design and Automation: Overview, Challenges and Opportunities IBM Corporation

High Performance Microprocessor Design and Automation: Overview, Challenges and Opportunities IBM Corporation High Performance Microprocessor Design and Automation: Overview, Challenges and Opportunities Introduction About Myself What to expect out of this lecture Understand the current trend in the IC Design

More information

04/17/07 Trevor de Clercq TH521 Laitz HARMONY HOMEWORK

04/17/07 Trevor de Clercq TH521 Laitz HARMONY HOMEWORK 04/17/07 Trevor de Clerq TH21 Laitz HARMONY HOMEWORK This harmony homework serves as an introdution to the sumediant harmony in some ommon settings or oth maor and minor modes. have tried to devise exerises

More information

Follow this and additional works at:

Follow this and additional works at: SHARP News Volume 23 Number 2 Artile 1 Spring 2014 Volume 23, Number 2 Follow this and additional works at: http://sholarworks.umass.edu/sharp_news Reommended Citation (2014) "Volume 23, Number 2," SHARP

More information

Overview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED)

Overview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED) Chapter 2 Overview of All Pixel Circuits for Active Matrix Organic Light Emitting Diode (AMOLED) ---------------------------------------------------------------------------------------------------------------

More information

The Orff Source Volume 2. Sample. Correlates to Musicplay 1-4 Sequenced according to tone set

The Orff Source Volume 2. Sample. Correlates to Musicplay 1-4 Sequenced according to tone set The Orff Soure olume 2 63 Orff arrangements of traditional and omposed folk songs and singing games orrelates to Musiplay 1-4 Sequened aording to tone set With arrangements y Roert A. Amhin, Denise Gagné,

More information

Peak Dynamic Power Estimation of FPGA-mapped Digital Designs

Peak Dynamic Power Estimation of FPGA-mapped Digital Designs Peak Dynamic Power Estimation of FPGA-mapped Digital Designs Abstract The Peak Dynamic Power Estimation (P DP E) problem involves finding input vector pairs that cause maximum power dissipation (maximum

More information

RECENT TRENDS AND ISSUES IN IOT

RECENT TRENDS AND ISSUES IN IOT RECENT TRENDS AND ISSUES IN IOT *K.Yogitha, **V.Alamelumangai *Research Scholar, Department of E&I, Annamalai University **Professor, Department of E&I, Annamalai University ABSTRACT The term IOT refers

More information

Automatic Repositioning Technique for Digital Cell Based Window Comparators and Implementation within Mixed-Signal DfT Schemes

Automatic Repositioning Technique for Digital Cell Based Window Comparators and Implementation within Mixed-Signal DfT Schemes utomti Repositioning Tehnique for Digitl ell sed Window omprtors nd Implementtion within Mixed-Signl DfT Shemes D. De Venuto DEE- Politenio di ri, Itly, d.devenuto@polib.it M. J. Ohletz MI Semiondutor,

More information

Area and Speed Efficient Implementation of Symmetric FIR Digital Filter through Reduced Parallel LUT Decomposed DA Approach

Area and Speed Efficient Implementation of Symmetric FIR Digital Filter through Reduced Parallel LUT Decomposed DA Approach Circuits and Systems, 216, 7, 1379-1391 Pulished Online June 216 in SciRes. http://www.scirp.org/journal/cs http://dx.doi.org/1.4236/cs.216.78121 Area and Speed Efficient Implementation of Symmetric FIR

More information

Class Piano Resource Materials

Class Piano Resource Materials Class Piano Resoure Materials Level Three Fifth Edition Compiled and Edited y W. Daniel Landes Smith Creek Musi Class Piano Resoure Materials Level Three (Fifth Edition) Compiled and edited y W. Daniel

More information

Synchronous Digital Logic Systems. Review of Digital Logic. Philosophy. Combinational Logic. A Full Adder. Combinational Logic

Synchronous Digital Logic Systems. Review of Digital Logic. Philosophy. Combinational Logic. A Full Adder. Combinational Logic Synchronous igital Logic Systems Review of igital Logic Prof. Stephen. Edwards Raw materials: MOS transistors and wires on Is Wires are excellent conveyors of voltage Little leakage Fast, but not instantaneous

More information

Upper Iowa University. Nicolet College. ~~ Course Equivalency List January 2018

Upper Iowa University. Nicolet College. ~~ Course Equivalency List January 2018 ID and Niolet ollege (WI) ~~ quivaleny List January 208 ID ANTHROPOLOGY ANTH 0 Intro to ultural Anthropology ANTH 20 ulture and Differene ANTH 206 Intro to the Hmong ulture & Language ANTH 24 Visual Anthropology

More information

REVISIONS IB (NA) A. *The manual number is given on the bottom left of the back cover. Revision. Print Date Jan., 1992.

REVISIONS IB (NA) A. *The manual number is given on the bottom left of the back cover. Revision. Print Date Jan., 1992. REVSONS Print Date Jan., 992 *Manual Number B (NA) 6636A *The manual number is given on the bottom left of the bak over. ~ First edition Revision ...P.... NTRODUCTON.5! Thank you for hoosing the Mitsubishi

More information

Bus-Switch Coding, for Dynamic Power Management in off-chip communication channels.

Bus-Switch Coding, for Dynamic Power Management in off-chip communication channels. in off-chip communication channels. Mauro Olivieri *, Francesco Pappalardo ** and Giuseppe Visalli **. * Department of Electronic Engineering, University of La Sapienza Rome, Italy ** Advanced System Technology,

More information

The best thrilling scenes arising from people in all over the world have been carried

The best thrilling scenes arising from people in all over the world have been carried The best thrilling senes arising from people in all over the world have been arried through the best quality images and voies by TACHII's Cable Tehnology. TACHII will ontinuously work to arry people's

More information

True Random Number Generation with Logic Gates Only

True Random Number Generation with Logic Gates Only True Random Number Generation with Logic Gates Only Jovan Golić Security Innovation, Telecom Italia Winter School on Information Security, Finse 2008, Norway Jovan Golic, Copyright 2008 1 Digital Random

More information

A Reconfigurable, Power-Efficient Adaptive Viterbi Decoder

A Reconfigurable, Power-Efficient Adaptive Viterbi Decoder 1 A Reconfigurale, Power-Efficient Adaptive Viteri Decoder Russell Tessier, Sriram Swaminathan, Ramaswamy Ramaswamy, Dennis Goeckel and Wayne Burleson Astract Error-correcting convolutional codes provide

More information

A conductor's study of George Rochberg's three psalm settings

A conductor's study of George Rochberg's three psalm settings Louisiana State University LSU Digital Commons LSU Maor Papers Graduate Shool 2002 A ondutor's study of George Rohberg's three psalm settings David Lawrene Louisiana State University and Agriultural and

More information