Existing functional validation approaches and postmanufacturing tests are inadequate to detect all hardware bugs and hardware Trojans in third-party intellectual property blocks (3PIPs). Especially for cryptographic IPs, a well-designed framework is needed for detecting and mitigating hardware security risks even after chip deployment. In this paper, we present an innovative multi-level architecture providing runtime hardware security detection and response. The proposed architecture consists of a controller and a security wrapper, enabling the collaborative operation of three different types of detection and three levels of response according to the potential malicious impact. We show that a field programmable gate array prototype of the proposed architecture can pursue 4 hardware bug and 6 hardware Trojan detection towards an AES IP, and make appropriate protective responses.
Desktop cloud has become a research focus of cloud computing. As 3D rendering, scientific computing and large data fields on the requirements of high performance computing, end user take more and more high request to the cloud desktop. Yet in the desktop cloud, the simulation of virtual graphics can only be used to display 2D graphics, but not to accelerate graphics hardware. This paper mainly discusses KVM/QEMU PCI device passthrough so as to use GPU in the virtual machine, and use the PCoIP Zero Client at the terminal to meet desktop cloud latency and bandwidth requirements. In the case graphics workstation would be greatly enhance the virtual desktop performance, graphics designers can run graphics intensive applications from PCoIP zero Client. The pass-through technique involved in this article is vfio-pci.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.