Shohreh Hosseinzadeh Security and Trust in Cloud Computing and Iot Through Applying Obfuscation, Diversification, and Trusted Co

Total Page:16

File Type:pdf, Size:1020Kb

Shohreh Hosseinzadeh Security and Trust in Cloud Computing and Iot Through Applying Obfuscation, Diversification, and Trusted Co Shohreh Hosseinzadeh Security and Trust in Cloud Computing and IoT through Applying Obfuscation, Diversification, and Trusted Computing Technologies Turku Centre for Computer Science TUCS Dissertations No 258, November 2020 Security and Trust in Cloud Computing and IoT through Applying Obfuscation, Diversification, and Trusted Computing Technologies Shohreh Hosseinzadeh To be presented, with the permission of the Faculty of Science and Engineering of the University of Turku, for public criticism in lecture hall XXII of Agora on November 28th, 2020, at 12 noon. University of Turku Department of Future Technologies 20014 Turun Yliopisto Finland 2020 Supervisors Professor Ville Lepp¨anen Department of Future Technologies University of Turku Finland Associate Professor Seppo Virtanen Department of Future Technologies University of Turku Finland Reviewers Professor Benoit Baudry Division of Software and Computer System KTH Royal Institute of Technology Lindstedtsv¨agen3, Stockholm Sweden Adjunct Professor Martin Gilje Jaatun Department of Electrical University of Stavanger Kjell Arholms gate 41, 4036 Stavanger Norway Opponent Professor Valtteri Niemi Department of Computer Science University of Helsinki Pietari Kalmin katu 5, 00014 Helsinki Finland The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin Originality Check service. ISBN 978-952-12-3992-2 ISSN 1239-1883 Abstract Cloud computing and Internet of Things (IoT) are very widely spread and commonly used technologies nowadays. The advanced services offered by cloud computing have made it a highly demanded technology. Enterprises and businesses are more and more relying on the cloud to deliver services to their customers. The prevalent use of cloud means that more data is stored outside the organization's premises, which raises con- cerns about the security and privacy of the stored and processed data. This highlights the significance of effective security practices to secure the cloud infrastructure. The number of IoT devices is growing rapidly and the technology is being employed in a wide range of sectors including smart healthcare, industry automation, and smart environments. These devices collect and exchange a great deal of information, some of which may contain critical and personal data of the users of the device. Hence, it is highly significant to protect the collected and shared data over the network; notwithstanding, the studies signify that attacks on these devices are increasing, while a high percentage of IoT devices lack proper security measures to protect the devices, the data, and the privacy of the users. In this dissertation, we study the security of cloud computing and IoT and propose software-based security approaches supported by the hardware- based technologies to provide robust measures for enhancing the security of these environments. To achieve this goal, we use obfuscation and diversifica- tion as the potential software security techniques. Code obfuscation protects the software from malicious reverse engineering and diversification mitigates the risk of large-scale exploits. We study trusted computing and Trusted Execution Environments (TEE) as the hardware-based security solutions. Trusted Platform Module (TPM) provides security and trust through a hardware root of trust, and assures the integrity of a platform. We also study Intel SGX which is a TEE solution that guarantees the integrity and confidentiality of the code and data loaded onto its protected container, enclave. More precisely, through obfuscation and diversification of the operating systems and APIs of the IoT devices, we secure them at the application level, i and by obfuscation and diversification of the communication protocols, we protect the communication of data between them at the network level. For securing the cloud computing, we employ obfuscation and diversification techniques for securing the cloud computing software at the client-side. For an enhanced level of security, we employ hardware-based security solutions, TPM and SGX. These solutions, in addition to security, ensure layered trust in various layers from hardware to the application. As the result of this PhD research, this dissertation addresses a number of security risks targeting IoT and cloud computing through the delivered publications and presents a brief outlook on the future research directions. ii Tiivistelm¨a Pilvilaskenta ja esineiden internet ovat nyky¨a¨anhyvin tavallisia ja laajasti sovellettuja tekniikkoja. Pilvilaskennan pitk¨allekehittyneet palvelut ovat tehneet siit¨ahyvin kysytyn teknologian. Yritykset enenev¨ass¨am¨a¨arinnojaa- vat pilviteknologiaan toteuttaessaan palveluita asiakkailleen. Vallitsevassa pilviteknologian soveltamistilanteessa yritykset ulkoistavat tietojensa k¨asitte- ly¨ayrityksen ulkopuolelle, mink¨avoidaan n¨ahd¨anostavan esiin huolia tal- tioitavan ja k¨asitelt¨av¨antiedon turvallisuudesta ja yksityisyydest¨a. T¨am¨a korostaa tehokkaiden turvallisuusratkaisujen merkityst¨aosana pilvi-infra- struktuurin turvaamista. Esineiden internet -laitteiden lukum¨a¨ar¨aon nopeasti kasvanut. Teknolo- giana sit¨asovelletaan laajasti monilla sektoreilla, kuten ¨alykk¨a¨ass¨atervey- denhuollossa, teollisuusautomaatiossa ja ¨alytiloissa.Sellaiset laitteet ker¨a¨a- v¨atja v¨alitt¨av¨atsuuria m¨a¨ari¨ainformaatiota, joka voi sis¨alt¨a¨alaitteiden k¨aytt¨ajienkannalta kriittist¨aja yksityist¨atietoa. T¨ast¨asyyst¨ajohtuen on eritt¨ainmerkityksellist¨asuojata verkon yli ker¨att¨av¨a¨aja jaettavaa tietoa. Monet tutkimukset osoittavat esineiden internet -laitteisiin kohdistuvien tie- toturvahy¨okk¨aysten m¨a¨ar¨anolevan nousussa, ja samaan aikaan suuri osuus n¨aist¨alaitteista ei omaa kunnollisia teknisi¨aominaisuuksia itse laitteiden tai niiden k¨aytt¨ajienyksityisen tiedon suojaamiseksi. T¨ass¨av¨ait¨oskirjassatutkitaan pilvilaskennan sek¨aesineiden internetin tietoturvaa ja esitet¨a¨anohjelmistopohjaisia tietoturval¨ahestymistapoja tur- vautumalla osittain laitteistopohjaisiin teknologioihin. Esitetyt l¨ahestymista- vat tarjoavat vankkoja keinoja tietoturvallisuuden kohentamiseksi n¨aiss¨a konteksteissa. T¨am¨ansaavuttamiseksi ty¨oss¨asovelletaan obfuskaatiota ja diversifiointia potentiaalisiana ohjelmistopohjaisina tietoturvatekniikkoina. Suoritettavan koodin obfuskointi suojaa pahantahtoiselta ohjelmiston takai- sinmallinnukselta ja diversifiointi torjuu tietoturva-aukkojen laaja-alaisen hy¨odynt¨amisenriski¨a. V¨ait¨oskirjaty¨oss¨atutkitaan luotettua laskentaa ja luotettavan laskennan suoritusalustoja laitteistopohjaisina tietoturvaratkai- suina. TPM (Trusted Platform Module) tarjoaa turvallisuutta ja luottamuk- sellisuutta rakentuen laitteistopohjaiseen luottamukseen. Pyrkimyksen¨aon taata suoritusalustan eheys. Ty¨oss¨atutkitaan my¨osIntel SGX:¨a¨ayhten¨a luotettavan suorituksen suoritusalustana, joka takaa suoritettavan koodin iii ja datan eheyden sek¨aluottamuksellisuuden pohjautuen suojatun s¨aili¨on, saarekkeen, tekniseen toteutukseen. Tarkemmin ilmaistuna ty¨oss¨aturvataan k¨aytt¨oj¨arjestelm¨a-ja sovellus- rajapintatasojen obfuskaation ja diversifioinnin kautta esineiden internet - laitteiden ohjelmistokerrosta. Soveltamalla samoja tekniikoita protokolla- kerrokseen, ty¨oss¨asuojataan laitteiden v¨alist¨atiedonvaihtoa verkkotasolla. Pilvilaskennan turvaamiseksi ty¨oss¨asovelletaan obfuskaatio- ja diversifioin- titekniikoita asiakaspuolen ohjelmistoratkaisuihin. Vankemman tietoturval- lisuuden saavuttamiseksi ty¨oss¨ahy¨odynnet¨a¨anlaitteistopohjaisia TPM- ja SGX-ratkaisuja. Tietoturvallisuuden lis¨aksin¨am¨aratkaisut tarjoavat moni- kerroksisen luottamuksen rakentuen laitteistotasolta ohjelmistokerrokseen asti. T¨am¨anv¨ait¨oskirjatutkimusty¨ontuloksena, osajulkaisuiden kautta, vas- tataan moniin esineiden internet -laitteisiin ja pilvilaskentaan kohdistuviin tietoturvauhkiin. Ty¨oss¨aesitet¨a¨anmy¨osn¨akemyksi¨ajatkotutkimusaiheista. iv Acknowledgments Undertaking this PhD has truly been a life-changing experience to me, and marks a milestone on my personal and professional life. Reaching this mile- stone would not have been possible without the guidance and support of many people. First and foremost, I would like to express my sincerest gratitude towards my supervisor, Professor Ville Lepp¨anenwho gave me the opportunity to conduct my research in his research group. I am grateful for all the sup- ports, encouragements, and inspiration throughout the whole journey. The freedom to choose topic of my interest, the smoothness and flexibility he was offering to the group, made it a joyful place to work for me. I greatly appreciate the support I received from Associate Professor Seppo Virtanen in the final stage of my PhD with his advice and com- ments that greatly improved my thesis. I would also like to thank Professor Jouni Isoaho for his support and directing my thesis. I wish to especially thank Professor Benoit Baudry and Adjunct Pro- fessor Martin Gilje Jaatun who kindly reviewed my thesis, and provided fruitful comments and insights. I am as well greatly grateful to Professor Valtteri Niemi, for accepting to act as my opponent. I would like to warmly express my appreciation towards Professor Asokan for giving me the opportunity of a research visit at the Secure Systems Group in Aalto University. This has been a great chance for my thesis and for me to expand my knowledge, and my professional network. I also would like to thank Dr. Andrew Paverd and Dr. Hans Liljestrand for the very fruitful collaboration we had during
Recommended publications
  • SIMD Extensions
    SIMD Extensions PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 12 May 2012 17:14:46 UTC Contents Articles SIMD 1 MMX (instruction set) 6 3DNow! 8 Streaming SIMD Extensions 12 SSE2 16 SSE3 18 SSSE3 20 SSE4 22 SSE5 26 Advanced Vector Extensions 28 CVT16 instruction set 31 XOP instruction set 31 References Article Sources and Contributors 33 Image Sources, Licenses and Contributors 34 Article Licenses License 35 SIMD 1 SIMD Single instruction Multiple instruction Single data SISD MISD Multiple data SIMD MIMD Single instruction, multiple data (SIMD), is a class of parallel computers in Flynn's taxonomy. It describes computers with multiple processing elements that perform the same operation on multiple data simultaneously. Thus, such machines exploit data level parallelism. History The first use of SIMD instructions was in vector supercomputers of the early 1970s such as the CDC Star-100 and the Texas Instruments ASC, which could operate on a vector of data with a single instruction. Vector processing was especially popularized by Cray in the 1970s and 1980s. Vector-processing architectures are now considered separate from SIMD machines, based on the fact that vector machines processed the vectors one word at a time through pipelined processors (though still based on a single instruction), whereas modern SIMD machines process all elements of the vector simultaneously.[1] The first era of modern SIMD machines was characterized by massively parallel processing-style supercomputers such as the Thinking Machines CM-1 and CM-2. These machines had many limited-functionality processors that would work in parallel.
    [Show full text]
  • Generic Pipelined Processor Modeling and High Performance
    Generic Pipelined Processor Modeling and High Performance Cycle-Accurate Simulator Generation Mehrdad Reshadi, Nikil Dutt Center for Embedded Computer Systems (CECS), Donald Bren School of Information and Computer Science, University of California Irvine, CA 92697, USA. {reshadi, dutt}@cecs.uci.edu simulators were more limited or slower than their manually generated Abstract counterparts. Detailed modeling of processors and high performance cycle- Colored Petri Net (CPN) [1] is a very powerful and flexible accurate simulators are essential for today’s hardware and software modeling technique and has been successfully used for describing design. These problems are challenging enough by themselves and parallelism, resource sharing and synchronization. It can naturally have seen many previous research efforts. Addressing both capture most of the behavioral elements of instruction flow in a simultaneously is even more challenging, with many existing processor. However, CPN models of realistic processors are very approaches focusing on one over another. In this paper, we propose complex mostly due to incompatibility of a token-based mechanism for the Reduced Colored Petri Net (RCPN) model that has two capturing data hazards. Such complexity reduces the productivity and advantages: first, it offers a very simple and intuitive way of modeling results in very slow simulators. In this paper, we present Reduced pipelined processors; second, it can generate high performance cycle- Colored Petri Net (RCPN), a generic modeling approach for accurate simulators. RCPN benefits from all the useful features of generating fast cycle-accurate simulators for pipelined processors. Colored Petri Nets without suffering from their exponential growth in RCPN is based on CPN and reduces the modeling complexity by complexity.
    [Show full text]
  • Demystifying Internet of Things Security Successful Iot Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M
    Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment — Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Ned Smith David M. Wheeler Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment Sunil Cheruvu Anil Kumar Chandler, AZ, USA Chandler, AZ, USA Ned Smith David M. Wheeler Beaverton, OR, USA Gilbert, AZ, USA ISBN-13 (pbk): 978-1-4842-2895-1 ISBN-13 (electronic): 978-1-4842-2896-8 https://doi.org/10.1007/978-1-4842-2896-8 Copyright © 2020 by The Editor(s) (if applicable) and The Author(s) This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material.
    [Show full text]
  • IXP43X Product Line of Network Processors Specification Update December 2008 2 Order Number: 316847; Revision: 005US Contents
    Intel® IXP43X Product Line of Network Processors Specification Update December 2008 Order Number: 316847; Revision: 005US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked “reserved” or “undefined.” Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families. See http://www.intel.com/products/processor_number for details. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
    [Show full text]
  • Intel® Itanium® Architecture Assembly Language Reference Guide
    Intel® Itanium® Architecture Assembly Language Reference Guide Copyright © 2000 - 2003 Intel Corporation. All rights reserved. Order Number: 248801-004 World Wide Web: http://developer.intel.com Intel(R) Itanium(R) Architecture Assembly Lanuage Reference Guide Page 2 Disclaimer and Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life saving, or life sustaining applications. This Intel® Itanium® Architecture Assembly Language Reference Guide as well as the software described in it is furnished under license and may only be used or copied in accordance with the terms of the license. The information in this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Intel Corporation. Intel Corporation assumes no responsibility or liability for any errors or inaccuracies that may appear in this document or any software that may be provided in association with this document. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Intel® 80219 General Purpose PCI Processor Based on Intel Xscale® Microarchitecture Adds Performance and Feature Integration at a Low Cost
    Product Brief Intel® 80219 General Purpose PCI Processor Based on Intel XScale® Microarchitecture Adds Performance and Feature Integration at a Low Cost Product Highlights I 32-bit high-performance CPU (400, 600 MHz) based upon Intel XScale® microarchitecture I Integrated 64-bit PCI/PCI-X interface (PCI 2.2, PCI-X 1.0a), 32-bit PCI supported I 200 MHz DDR SDRAM with ECC with support for up to 1 GB of 64-bit memory (32-bit mode supported) I Intel® Superpipelined RISC Technology (7-stage integer, 8-stage memory) Single-Chip General Purpose I 32 KB data cache, 32 KB instruction cache PCI Processor Based on ® I 2 KB mini-data cache Intel XScale Technology I ARM* Version 5TE compliant Intel® 80219 General Purpose PCI Processor I Programmable speed 32-bit local bus with Intel XScale microarchitecture is a single- (33, 66, or 100 MHz)/Flash I/F chip solution that opens the door to cost-sensitive, I 200 MHz internal bus delivers high-performance embedded application use. ~1.6 GB/s bandwidth The 64-bit PCI-X interface is one of several I 2-channel DMA controller (1024-byte registers) enticing features. The 80219 processor’s 64-bit I 2 I2C ports PCI-X interface is fully backward compatible to I Watchdog timer, 2 programmable timers PCI 2.2 standards enabling easy interface to (Auto-reload, programmed duration, lower-cost PCI components today, and the PCI-X selectable prescaling) 1.0a compatibility makes it simple to upgrade to I 4096-byte ATU buffers PCI-X in the future.
    [Show full text]
  • Network Processors: Building Block for Programmable Networks
    NetworkNetwork Processors:Processors: BuildingBuilding BlockBlock forfor programmableprogrammable networksnetworks Raj Yavatkar Chief Software Architect Intel® Internet Exchange Architecture [email protected] 1 Page 1 Raj Yavatkar OutlineOutline y IXP 2xxx hardware architecture y IXA software architecture y Usage questions y Research questions Page 2 Raj Yavatkar IXPIXP NetworkNetwork ProcessorsProcessors Control Processor y Microengines – RISC processors optimized for packet processing Media/Fabric StrongARM – Hardware support for Interface – Hardware support for multi-threading y Embedded ME 1 ME 2 ME n StrongARM/Xscale – Runs embedded OS and handles exception tasks SRAM DRAM Page 3 Raj Yavatkar IXP:IXP: AA BuildingBuilding BlockBlock forfor NetworkNetwork SystemsSystems y Example: IXP2800 – 16 micro-engines + XScale core Multi-threaded (x8) – Up to 1.4 Ghz ME speed RDRAM Microengine Array Media – 8 HW threads/ME Controller – 4K control store per ME Switch MEv2 MEv2 MEv2 MEv2 Fabric – Multi-level memory hierarchy 1 2 3 4 I/F – Multiple inter-processor communication channels MEv2 MEv2 MEv2 MEv2 Intel® 8 7 6 5 y NPU vs. GPU tradeoffs PCI XScale™ Core MEv2 MEv2 MEv2 MEv2 – Reduce core complexity 9 10 11 12 – No hardware caching – Simpler instructions Î shallow MEv2 MEv2 MEv2 MEv2 Scratch pipelines QDR SRAM 16 15 14 13 Memory – Multiple cores with HW multi- Controller Hash Per-Engine threading per chip Unit Memory, CAM, Signals Interconnect Page 4 Raj Yavatkar IXPIXP 24002400 BlockBlock DiagramDiagram Page 5 Raj Yavatkar XScaleXScale
    [Show full text]
  • Intel® PXA270 Processor for Embedded Computing
    Product Brief Intel® PXA270 Processor For Embedded Computing Product Overview Today’s embedded applications demand a unique set of features, packaging, product life cycle and performance. Because Intel solutions deliver key technologies that help drive functionality to new heights, the Intel® PXA270 processor is designed to meet the growing demands of a new generation of leading-edge embedded products. Featuring advanced technologies that offer high performance, flexibility and robust functionality, the Intel PXA270 processor is packaged specifically for the embedded market and is ideal for the low-power framework of battery-powered devices. Intel is one of the leading suppliers of applica- Advanced Multimedia tion solutions for many of today’s most Capability innovative embedded devices. Designed from Instead of using additional processors or the ground up, the Intel PXA270 processor accelerators that can reduce battery life, redefines what an embedded device can do Intel Wireless MMX technology provides by incorporating innovative new features and an advanced set of multimedia instructions. enhancements from the world of the PC. These help bring desktop-like multimedia ■ The Intel PXA270 processor is the first Intel performance to Intel PXA270 processor- XScale® technology-based processor to based clients while minimizing the power include Intel® Wireless MMX™ technology. needed to run rich applications. This enables high-performance multimedia Intel Wireless MMX technology builds on the acceleration with an industry proven Intel® MMX™ technology originally introduced instruction set. in the Intel® Pentium® processor family. The ■ Another innovative feature is the Intel® large number of software developers already Quick Capture technology, which provides familiar with these instructions can create one of the industry’s most flexible and powerful camera interfaces for capturing digital images and video.
    [Show full text]
  • Eurotech's Low Power Intel Atom-Based Catalyst Module Design
    EUROTECH’S LOW POWER INTEL® ATOM™ - BASED CATALYST MODULE DESIGN: The industry’s lowest power Intel ® Atom ™ – based modules. Whitepaper By Glenn DeYoung; Field Applications Engineer, Eurotech 1 Abstract The low power Intel® AtomTM Processor family delivers Intel Architecture (IA) compatibility and performance at a fraction of the power consumption of a laptop or desktop computer. This feature set has enabled embedded designs to take advantage of IA compatibility while maintaining low power dissipation, thus eliminating the need for fans or heat sinks. In order to achieve the lowest power dissipation, designers must understand details of the hardware, software and overall system architecture that affect power dissipation. With this knowledge, designers can select the right low power Intel® AtomTM processor-based solution for their embedded design. Introduction Since the Intel® AtomTM processor family was introduced, many embedded control companies have introduced Intel Atom-based solutions targeting low power applications. The Intel® AtomTM processor’s low power dissipation, with IA performance and compatibility has enticed many designers to move their designs to this platform. Choosing the right solution is critical when embedded systems require an optimized design for very low power dissipation. This paper outlines the design considerations implemented by Eurotech which makes the Intel® AtomTM - based Catalyst family which started with the Catalyst XL, the lowest power Computer-on- Module (COM) in the industry and makes it the compelling choice for power optimized embedded systems. The Eurotech Catalyst XL is based on the Intel® AtomTM Z500 processor series and the Intel® System Controller Hub US15W (Intel® SCH US15W). Eurotech’s background in low power solutions Eurotech has offered low power ARM-based solutions for many years including several designs based on processors from the former Intel XScale processor family.
    [Show full text]
  • Jamaicavm Provides Hard Realtime Guarantees for Most Common Realtime Operating Systems Are Sup- All Primitive Java Operations
    ��������� Java-Technology for Critical Embedded Systems ��������� �������� ���������� ����������� ������� ���������� ������� ������� ���������� ����������� ���������� ������ ��������� Java-Tools for developers of critical software applications. Key Technologies Interoperability Hard realtime execution Ported to standard RTOSes The JamaicaVM provides hard realtime guarantees for Most common realtime operating systems are sup- all primitive Java operations. This enables all of Java’s ported by JamaicaVM, ports for VxWorks, QNX, Linux- features to be used for your hard realtime tasks. Fea- variants, RTEMS, etc. exist. The supported architectures tures essential to object-oriented software develop- include SH4, PPC, x86, ARM, XScale, ERC32, and many ment like dynamic allocation of objects, inheritance, more. To support your specific system, we can provide and dynamic binding become available to the real- you with the required porting service. time developer. ROMable code Realtime Garbage Collection Class files and the Jamaica Virtual Machine may be The JamaicaVM provides the only Java implementa- linked into a standalone binary for execution out of tion with an efficient hard realtime garbage collector. ROM. A filesystem in not necessary for running Java It operates in small increments of only a few machine code. instructions and guarantees to recycle all garbage memory, to avoid memory fragmentation, and to Library and JNI Native Code bound the execution time for allocations. Existing library code or low level performance critical code for hardware access can be embedded into Fast & Small your realtime application using the Java Native Inter- A highly optimizing static compiler ensures best runtime face. performance. A profiling tool gathers information for providing the best trade-off between runtime perfor- mance and code size. Jamaica Toolset Sophisticated automatic class file compaction, dead- � � � � � � � � � � code elimination and profile-guided partial compila- tion techniques reduce the code footprint to the bare ���������� minimum.
    [Show full text]
  • Intel® Xeon® Processors and Intel® Many Integrated Core (Intel MIC) Architecture
    Programming Models for Intel® Xeon® processors and Intel® Many Integrated Core (Intel MIC) Architecture Scott McMillan Senior Software Engineer Software & Services Group April 11, 2012 TACC-Intel Highly Parallel Computing Symposium Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS”. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO THIS INFORMATION INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. Buyers should consult other sources of information to evaluate the performance of systems or components they are considering purchasing. For more information on performance tests and on the performance of Intel products, reference www.intel.com/software/products. BunnyPeople, Celeron, Celeron Inside, Centrino, Centrino Atom, Centrino Atom Inside, Centrino Inside, Centrino logo, Cilk, Core Inside, FlashFile, i960, InstantIP, Intel, the Intel logo, Intel386, Intel486, IntelDX2, IntelDX4, IntelSX2, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logo, Intel. Leap ahead., Intel. Leap ahead. logo, Intel NetBurst, Intel NetMerge, Intel NetStructure, Intel SingleDriver, Intel SpeedStep, Intel StrataFlash, Intel Viiv, Intel vPro, Intel XScale, Itanium, Itanium Inside, MCS, MMX, Oplus, OverDrive, PDCharm, Pentium, Pentium Inside, skoool, Sound Mark, The Journey Inside, Viiv Inside, vPro Inside, VTune, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S.
    [Show full text]