2021 IEEE 14th International Symposium on Embedded Multicore/Many-Core Systems-on-Chip (MCSoC) 2021
DOI: 10.1109/mcsoc51149.2021.00041
|View full text |Cite
|
Sign up to set email alerts
|

Trends and Challenges in Ensuring Security for Low-Power and High-Performance Embedded SoCs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 43 publications
0
4
0
Order By: Relevance
“…Investigations into the cyclicality of network usage, especially in correlation with shifts, patient visit patterns, and procedural timings, established a clear baseline of normal operational behaviors [16]. Deviations from their norms usually signaled potential security incidents or system malfunctions, thereby necessitating sophisticated monitoring systems to ensure data integrity and continuous patient care [17,18,19]. Additionally, the high volume of data transfers involving sensitive information accentuates the need for robust cybersecurity measures tailored to these unique operational characteristics [20,8].…”
Section: Healthcare Environments Inherently Exhibited Distinct Data Flowmentioning
confidence: 99%
“…Investigations into the cyclicality of network usage, especially in correlation with shifts, patient visit patterns, and procedural timings, established a clear baseline of normal operational behaviors [16]. Deviations from their norms usually signaled potential security incidents or system malfunctions, thereby necessitating sophisticated monitoring systems to ensure data integrity and continuous patient care [17,18,19]. Additionally, the high volume of data transfers involving sensitive information accentuates the need for robust cybersecurity measures tailored to these unique operational characteristics [20,8].…”
Section: Healthcare Environments Inherently Exhibited Distinct Data Flowmentioning
confidence: 99%
“…The decision module transmits a migration request packet (event 1) to the source PE (2). The source PE runs the task to be migrated until it reaches a safe migration state (3). Reaching this state, the OS stalls the task, sending a migration acknowledge (4) to the M P E .…”
Section: Os Layer Local Memorymentioning
confidence: 99%
“…Recent advances in the industry, such as the ET-SoC-1 [1], emphasize that many-core system-on-chip (MCSoC) is the predominant paradigm employed to meet high-performance computing required by Machine Learning applications or Cyber-Physical systems [2]. In this context, application testing and management of security, power consumption, and performance are important issues in MCSoCs design [3].…”
Section: Introductionmentioning
confidence: 99%
“…• The first and most important advantage of this work is the high bit error rate, which means that the vulnerability of the system will decrease significantly. Therefore, any possible TCC attacks can hardly happen in this methodology; • Low power consumption: one of the most important metrics of any embedded system is power consumption [51]. This is mainly because the increase in power consumption is a significant factor for elevated temperatures.…”
Section: Referencesmentioning
confidence: 99%