Improving SWIFT Error Coverage by Fingerprint-Based State Comparison

نویسندگان

  • Christian Menard
  • Hermann Härtig
  • Björn Döbel
چکیده

Erklärung Hiermit erkläre ich, dass ich diese Arbeit selbstständig erstellt und keine anderen als die angegebenen Hilfsmittel benutzt habe.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fingerprinting: Hash-Based Error Detection in Microprocessors

Today’s commodity processors are tuned primarily for performance and power. As CMOS scaling continues into the deep sub-micron regime, soft errors and device wearout will increasingly jeopardize the reliability of unprotected processor pipelines. To preserve reliable operation, processor cores will require mechanisms to detect errors affecting the control and datapaths. Conventional techniques ...

متن کامل

Fingerprinting Across On-Chip Memory Interconnects

Pairs of cores in a chip multiprocessor (CMP) can execute programs redundantly to detect and recover from soft errors. Prior work assumes dedicated cross-core buses to compare the redundant cores’ outputs for error detection. In this paper, we investigate using the CMP’s existing on-chip memory interconnect for comparing hashes of architectural state updates, called fingerprints, across redunda...

متن کامل

Performance Study of Ecc-based Collusion-resistant Multimedia Fingerprinting

Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Fingerprinting based on error correction coding (ECC) handle the important issue of how to embed the fingerprint into host data in an abstract way known as the marking assumptions, which often do not fully account for multimedia specific ...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Improving the Ridge Based Fingerprint Recognition Method Using Sweat Pores

Among several biometric traits possible to be used for people identification, fingerprint is still the most used. Current automated fingerprint identification systems are based on ridge patterns and minutiae, classified as first and second level features, respectively. However, the development of new fingerprint sensors and the growing demand for more secure systems are leading to the use of ad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014