UCLA Electronic Theses and Dissertations

Total Page:16

File Type:pdf, Size:1020Kb

UCLA Electronic Theses and Dissertations UCLA UCLA Electronic Theses and Dissertations Title A Framework for Pervasive Context Awareness Permalink https://escholarship.org/uc/item/7bj942gr Author Shen, Chenguang Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California University of California Los Angeles A Framework for Pervasive Context Awareness A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Chenguang Shen 2016 c Copyright by Chenguang Shen 2016 Abstract of the Dissertation A Framework for Pervasive Context Awareness by Chenguang Shen Doctor of Philosophy in Computer Science University of California, Los Angeles, 2016 Professor Mani B. Srivastava, Chair The proliferation of pervasive computing devices with unprecedented sensing, communica- tion, and computation capabilities has enabled continuous and ubiquitous monitoring of users and their surrounding environments. While smartphones have evolved from only communi- cation devices into powerful personal computing platforms, connected devices such as smart- watches, cameras, motions sensors, thermostats, and energy meters, collectively dubbed as the Internet of Things, are also rapidly permeating our living spaces. The continuous stream of richly annotated, real-time data made available by tapping into the spectrum of sensors available on these devices has led to the emergence of a sprawling ecosystem of context-aware apps. These apps use sensors such as GPS, microphone, accelerometer, and gyroscope to make diverse inferences about user activities and contexts. Typical context-aware apps employ a suite of machine learning algorithms to extract semantically meaningful inferences from sensor data. However, today's connected devices and mobile operating systems are not designed to support sensing and inference workloads. Compared with the rich network stack on pervasive devices, where one can leverage protocols and abstractions in different layers, context inference apps are composed in a monolithic fashion. That is, developers have to implement all data collection and inference logic using the raw data. As a result, the development and execution of context inference apps today are accompanied by myriad difficulties. First, the limited sensor coverage from running inferences on a single device and the need of hand-picking high-level features have made it challenging ii to achieve high inference accuracy in building the classification model of apps. Second, the continuous execution of complex algorithms on the main app processor of smartphones and the use of energy-hungry sensors have resulted in high energy consumption of inference apps, especially when they are executed on battery-powered pervasive devices. Finally, the monolithic development practice limits the adoption of inference apps onto heterogeneous devices, and requires enormous amount of efforts from app developers in composing the apps. In this dissertation we make three research contributions towards building a framework for pervasive context awareness: • We first showcase that context-aware inferences can benefit from heterogeneous con- nected devices such as smartwatches. We develop an example app to autonomously in- fer workout exercises of users from only sensors on a commercial smartwatch, achieving 90% classification accuracy for both cardio and weightlifting exercises while extending the watch battery life by up to 19 hours compared with prior approaches. • Having identified the problems from our example app, we then perform three optimiza- tions of context inference apps. We have achieved (1) comparable inference accuracy as traditional models and acceptable latency using deep learning without hand-picking features; (2) up to 30× speed-up of deep learning tasks using mobile GPUs and up to 60% energy saving of off-loading inference tasks from the CPU to the DSP; and (3) up to 37% accuracy improvement and up to 67% less energy consumption for context- aware apps from watch-phone coordinations. • Finally, we close the loop by proposing the design and implementation of a program- ming framework for context inference apps, with a set of programming abstractions and an associated runtime. The framework helps reduce development tasks by up to 4:5× and source lines of code by up to 12×. It also tackles runtime challenges and achieves 3× better inference accuracy by handling environmental dynamics. With this work we have also created an open-source toolkit for developing and executing context inference apps using heterogeneous pervasive devices. iii The dissertation of Chenguang Shen is approved. Tyson Condie William J. Kaiser Jens Palsberg Mani B. Srivastava, Committee Chair University of California, Los Angeles 2016 iv Table of Contents 1 Introduction :::::::::::::::::::::::::::::::::::::: 1 1.1 Contribution....................................5 1.1.1 Motivating Example: Leveraging Smartwatches for Context Inferences5 1.1.2 Accuracy and Energy Optimization of Context Inferences.......6 1.1.3 Closing the Loop: A Programming Framework for Context Inferences6 1.2 Related Work...................................7 1.2.1 Workout Tracking.............................8 1.2.2 Deep Learning on Mobile and Wearable Sensor Data.........9 1.2.3 Leveraging Heterogeneous Processors in Mobile SoC.......... 10 1.2.4 Context Inferences on Smartwatches.................. 11 1.2.5 Programming Framework for Context Inferences............ 12 1.3 Organization................................... 13 2 Motivating Example: Context Inferences on Smartwatches :::::::: 15 2.1 Motivation and Contribution........................... 15 2.2 Challenges and Design Choices......................... 18 2.2.1 C1: Single-device Sensing........................ 18 2.2.2 C2: Automatic Segmentation...................... 18 2.2.3 C3: Weightlifting Exercise Tracking................... 19 2.2.4 C4: Efficient Resource Usage....................... 19 2.3 System Architecture............................... 20 2.3.1 Overview................................. 20 2.3.2 High-level Activity Classification.................... 22 v 2.3.3 Weightlifting Classification........................ 24 2.3.4 Context-aware Optimization....................... 32 2.4 Implementation.................................. 34 2.5 Evaluation..................................... 35 2.5.1 MiLift Tracking Accuracy........................ 36 2.5.2 Energy Efficiency of MiLift Models................... 42 2.5.3 User Task and Battery Life Analysis.................. 42 2.6 Discussion..................................... 45 2.7 Summary..................................... 46 3 Accuracy and Energy Optimization of Context Inferences ::::::::: 47 3.1 Overview and Challenges............................. 47 3.1.1 Inference Accuracy............................ 47 3.1.2 Energy Consumption........................... 49 3.1.3 Design Choices.............................. 50 3.2 Applying Deep Learning for Mobile Context Inferences............ 51 3.2.1 Overview................................. 51 3.2.2 Task: High-level Activity Classification................. 52 3.2.3 Training Workflow............................ 53 3.2.4 Evaluation................................. 54 3.3 Exploiting Co-Processors in Mobile SoCs.................... 55 3.3.1 Background: Processor Heterogeneity.................. 55 3.3.2 Using Mobile GPUs for Deep Learning................. 56 3.3.3 Leveraging DSPs for Classification................... 58 3.3.4 Learning on DSPs............................. 66 vi 3.4 Wearable-Mobile Coordination.......................... 74 3.4.1 Background: Smartwatch Basic Profiles................. 75 3.4.2 Design Goal................................ 77 3.4.3 Implementation.............................. 80 3.4.4 Evaluation................................. 81 3.5 Summary..................................... 91 4 Putting It Together: A Programming Framework for Context Inferences 92 4.1 Design Challenge and Contribution....................... 92 4.2 Beam Overview.................................. 95 4.2.1 Example Apps.............................. 95 4.2.2 Beam Abstractions............................ 96 4.3 Beam Runtime.................................. 100 4.3.1 Device Selection.............................. 100 4.3.2 Inference Partitioning for Efficiency................... 101 4.3.3 Disconnection Tolerance......................... 103 4.4 Implementation.................................. 104 4.4.1 Sample apps................................ 104 4.4.2 APIs.................................... 106 4.5 Evaluation..................................... 108 4.5.1 Development Approaches......................... 109 4.5.2 Evaluation of Inference Abstraction................... 110 4.5.3 Device Selection.............................. 115 4.5.4 Efficient Resource Usage......................... 116 4.5.5 Handling Disconnections......................... 118 vii 4.6 Discussion..................................... 119 4.7 Summary..................................... 120 5 Context Awareness Toolkit :::::::::::::::::::::::::::: 122 5.1 Data Collector................................... 122 5.1.1 Design................................... 123 5.1.2 Implementation.............................. 124 5.2 Inference Composer................................ 125 5.2.1 Design................................... 126 5.2.2 Implementation.............................. 127 5.3 Inference Executor................................ 129 5.3.1 Design..................................
Recommended publications
  • SMART MOVEMENT DETECTION for ANDROID PHONES a Degree Thesis Submitted to the Faculty of the Escola Tècnica D'enginyeria De Tele
    SMART MOVEMENT DETECTION FOR ANDROID PHONES A Degree Thesis Submitted to the Faculty of the Escola Tècnica d'Enginyeria de Telecomunicació de Barcelona Universitat Politècnica de Catalunya by Pablo Navarro Morales In partial fulfilment of the requirements for the degree in TELECOMMUNICATION ENGINEERING Advisor: Sergio Bermejo Barcelona, October 2016 Abstract This project describes a decision tree based pedometer algorithm and its implementation on Android using machine learning techniques. The pedometer can count steps accurately and It can discard irrelevant motion. The overall classification accuracy is 89.4%. Accelerometer, gyroscope and magnetic field sensors are used in the device. When user puts his smartphone into the pocket, the pedometer can automatically count steps. A filter is used to map the acceleration from mobile phone’s reference frame to the direction of gravity. As a result of this project, an android application has been developed that, using the built-in sensors to measure motion and orientation, implements a decision tree based algorithm for counting steps. 2 Resumen Este proyecto describe un algoritmo para un podómetro basado en un árbol de decisiones y su aplicación en Android utilizando técnicas de aprendizaje automático. El podómetro puede contar los pasos con precisión y se puede descartar el movimiento irrelevante. La precisión de la clasificación general es del 89,4%. Un acelerómetro, un giroscopio y un sensor de campo magnético se utilizan en el dispositivo. Cuando el usuario pone su teléfono en el bolsillo, el podómetro puede contar automáticamente pasos. Un filtro se utiliza para asignar la aceleración del sistema de referencia de teléfono móvil a la dirección de la gravedad.
    [Show full text]
  • NVIDIA Tegra 4 Family CPU Architecture 4-PLUS-1 Quad Core
    Whitepaper NVIDIA Tegra 4 Family CPU Architecture 4-PLUS-1 Quad core 1 Table of Contents ...................................................................................................................................................................... 1 Introduction .............................................................................................................................................. 3 NVIDIA Tegra 4 Family of Mobile Processors ............................................................................................ 3 Benchmarking CPU Performance .............................................................................................................. 4 Tegra 4 Family CPUs Architected for High Performance and Power Efficiency ......................................... 6 Wider Issue Execution Units for Higher Throughput ............................................................................ 6 Better Memory Level Parallelism from a Larger Instruction Window for Out-of-Order Execution ...... 7 Fast Load-To-Use Logic allows larger L1 Data Cache ............................................................................. 8 Enhanced branch prediction for higher efficiency .............................................................................. 10 Advanced Prefetcher for higher MLP and lower latency .................................................................... 10 Large Unified L2 Cache .......................................................................................................................
    [Show full text]
  • Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and X86 Architectures
    Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures Matt Spisak Endgame, Inc. [email protected] Abstract the OS. With KPP in place, attackers are often forced to move malicious code to less privileged user-mode, to ele- In this paper, a novel hardware-assisted rootkit is intro- vate privileges enabling a hypervisor or TrustZone based duced, which leverages the performance monitoring unit rootkit, or to become more creative in their approach to (PMU) of a CPU. By configuring hardware performance achieving a kernel mode rootkit. counters to count specific architectural events, this re- Early advances in rootkit design focused on low-level search effort proves it is possible to transparently trap hooks to system calls and interrupts within the kernel. system calls and other interrupts driven entirely by the With the introduction of hardware virtualization exten- PMU. This offers an attacker the opportunity to redirect sions, hypervisor based rootkits became a popular area control flow to malicious code without requiring modifi- of study allowing malicious code to run underneath a cations to a kernel image. guest operating system [4, 5]. Another class of OS ag- The approach is demonstrated as a kernel-mode nostic rootkits also emerged that run in System Manage- rootkit on both the ARM and Intel x86-64 architectures ment Mode (SMM) on x86 [6] or within ARM Trust- that is capable of intercepting system calls while evad- Zone [7]. The latter two categories, which leverage vir- ing current kernel patch protection implementations such tualization extensions, SMM on x86, and security exten- as PatchGuard.
    [Show full text]
  • A Tour of the ARM Architecture and Its Linux Support
    Linux Conf Australia 2017 A tour of the ARM architecture and its Linux support Thomas Petazzoni Bootlin [email protected] - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 1/1 I Since 2012: Linux kernel contributor, adding support for Marvell ARM processors I Core contributor to the Buildroot project, an embedded Linux build system I From Toulouse, France Thomas Petazzoni I Thomas Petazzoni I CTO and Embedded Linux engineer at Bootlin I Embedded Linux expertise I Development, consulting and training I Strong open-source focus I Linux kernel contributors, ARM SoC support, kernel maintainers embedded Linux and kernel engineering - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 2/1 I Core contributor to the Buildroot project, an embedded Linux build system I From Toulouse, France Thomas Petazzoni I Thomas Petazzoni I CTO and Embedded Linux engineer at Bootlin I Embedded Linux expertise I Development, consulting and training I Strong open-source focus I Linux kernel contributors, ARM SoC support, kernel maintainers I Since 2012: Linux kernel contributor, adding support for Marvell ARM processors - Kernel, drivers and embedded Linux - Development, consulting, training and support - https://bootlin.com 2/1 I From Toulouse, France Thomas Petazzoni I Thomas Petazzoni I CTO and Embedded Linux engineer at Bootlin I Embedded Linux expertise I Development, consulting and training I Strong open-source focus I Linux kernel contributors,
    [Show full text]
  • Modem Product Portfolio
    Blogger Workshop Benchmark Summary: MDP Tablet Featuring APQ8064 Quad-Core © 2012 QUALCOMM Incorporated. All rights reserved. 1 Executive Overview . On July 24th, 2012, 30 bloggers (15 International, 15 U.S) descended into San Francisco, CA to take part in a blogger’s workshop where they spent unsupervised time benchmarking and testing our latest tablet MDP equipped with the APQ8064, otherwise known as the Snapdragon S4 Pro. The tone of coverage overall was extremely positive. Bloggers who attended the workshop raved about the performance of the quad-core devices and the potential benefits for developers. The graphics garnered particular acclaim, especially in comparison to competitor’s quad-core devices. The articles from the workshop attendees spurred a second wave of global coverage, especially in China, that took note of their reviews as well as the availability of the MDP. Below is a compilation of benchmark data pulled from various third party sources, including Anandtech, TheVerge, SlashGear, and Android Community. This benchmark data reflects performance across multiple vectors in the Snapdragon S4 Pro, including CPU, GPU and browsing. In the same deck, commercial devices featuring our dual core Snapdragon S4 processor has been updated to reflect data from the Samsung Galaxy S3 (MSM8960). © 2012 QUALCOMM Incorporated. All rights reserved. 2 Snapdragon S4 Pro APQ8064 MDP HEADLINE: “Qualcomm Snapdragon S4 Pro quad-core developer tablet shows off stunning benchmark performance” “It's fast, handily eclipsing the Samsung Galaxy SIII’s Exynos 4 Quad, the HTC One X’s Tegra 3, and Qualcomm's own Snapdragon S4 on a spate of synthetic benchmarks.” – Nate Ralph, TheVerge Source: TheVerge by Nate Ralph 7/24/2012 http://www.theverge.com/2012/7/24/3185016/qualcomm-snapdragon-s4-pro-APQ8064 © 2012 QUALCOMM Incorporated.
    [Show full text]
  • ARM NEON Assembly Optimization Dae-Hwan Kim Department of Computer and Information, Suwon Science College, 288 Seja-Ro, Jeongnam-Myun, Hwaseong-Si, Gyeonggi-Do, Rep
    Journal of Multidisciplinary Engineering Science and Technology (JMEST) ISSN: 2458-9403 Vol. 3 Issue 4, April - 2016 ARM NEON Assembly Optimization Dae-Hwan Kim Department of Computer and Information, Suwon Science College, 288 Seja-ro, Jeongnam-myun, Hwaseong-si, Gyeonggi-do, Rep. of Korea [email protected] Abstract—ARM is one of the most widely used The ARMv8 architecture [3, 4] introduces a 64-bit 32-bit processors, which is embedded in architecture, named AArch64, and a new A64 smartphones, tablets, and various electronic instruction set to the existing instruction set to support devices. The ARM NEON is the SIMD engine inside the 64-bit operation and the virtual addressing. ARM core which accelerates multimedia and In this paper, various assembly software signal processing algorithms. NEON is widely optimization techniques are proposed for the ARM incorporated in the recent ARM processors for NEON architecture. Practical example code is given to smartphones and tablets. In this paper, various the optimization technique, whose performance is assembly level software optimizations are analyzed, compared to the original code. provided such as instruction scheduling, instruction selection, and loop unrolling for the The rest of this paper is organized as follows. NEON architecture. The proposed techniques are Section II shows the overview of the assembly expected to be applied directly in the software optimizations, and Section III presents each technique development for the ARM NEON processors. in detail with an example. Conclusions are presented in Section IV. Keywords—ARM; NEON; embedded processor; software optimization; assembly II. ASSEMBLY OPTIMIZATION OVERVIEW NEON is the SIMD (Single Instruction Multiple Data) I.
    [Show full text]
  • 1 in the United States District Court for the Northern
    Case: 1:18-cv-06255 Document #: 1 Filed: 09/13/18 Page 1 of 19 PageID #:1 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION COMPLEX MEMORY, LLC, Plaintiff Civil Action No.: 1:18-cv-6255 v. PATENT CASE MOTOROLA MOBILITY LLC Jury Trial Demanded Defendant COMPLAINT FOR PATENT INFRINGEMENT Plaintiff Complex Memory, LLC (“Complex Memory”), by way of this Complaint against Defendant Motorola Mobility LLC (“Motorola” or “Defendant”), alleges as follows: PARTIES 1. Plaintiff Complex Memory is a limited liability company organized and existing under the laws of the State of Texas, having its principal place of business at 17330 Preston Road, Suite 200D, Dallas, Texas 75252. 2. On information and belief, Defendant Motorola is a Delaware limited liability company headquartered at 222 W. Merchandise Mart Plaza, Chicago, IL 60654. JURISDICTION AND VENUE 3. This is an action under the patent laws of the United States, 35 U.S.C. §§ 1, et seq., for infringement by Motorola of claims of U.S. Patent Nos. 5,890,195; 5,963,481; 6,658,576; 6,968,469; and 7,730,330 (“the Patents-in-Suit”). 4. This Court has subject matter jurisdiction pursuant to 28 U.S.C. §§ 1331 and 1338(a). 5. Motorola is subject to personal jurisdiction of this Court because, inter alia, on 1 Case: 1:18-cv-06255 Document #: 1 Filed: 09/13/18 Page 2 of 19 PageID #:2 information and belief, (i) Motorola is registered to transact business in the State of Illinois; (ii) Motorola conducts business in the State of Illinois and maintains a facility and employees within the State of Illinois; and (iii) Motorola has committed and continues to commit acts of patent infringement in the State of Illinois, including by making, using, offering to sell, and/or selling accused products and services in the State of Illinois, and/or importing accused products and services into the State of Illinois.
    [Show full text]
  • Cache Attacks on ARM
    Moritz Lipp Cache Attacks on ARM Master thesis Graz, University Of Technology NOTICE If you want to cite this work based on last-level cache attacks on ARM, please cite the following research paper instead: •L ipp, Moritz ; Gruss, Daniel ; Spreitzer, Raphael ; Maurice, Clementine´ ;Mangard, Stefan: ARMageddon: Cache Attacks on Mobile De- vices. In: 25th USENIX Security Symposium (USENIX Security 16). Austin, TX : USENIX Association, August 2016. – ISBN 978–1–931971– 32–4, 549–564 If you want to cite this work in respect to rowhammer on ARM-based devices, please cite the following publication instead: •V een, Victor van d. ; Fratantonio, Yanick ; Lindorfer, Martina ; Gruss, Daniel ; Maurice, Clementine´ ; Vigna, Giovanni ; Bos, Her- bert ; Razavi, Kaveh ; Giuffrida, Christiano: Drammer : Determinis- tic Rowhammer Attacks on Commodity Mobile Platforms. In: ACM Conference on Computer and Communications Security – CCS, 2016 Contents 1 Introduction 1 1.1 Motivation . .3 1.2 Key Challenges and Results . .4 1.3 Contributions . .5 1.4 Test devices . .6 1.5 Outline . .7 2 Background 9 2.1 CPU caches . .9 2.2 Cache coherence . 18 2.3 Shared memory . 29 2.4 Cache Attacks . 31 2.5 DRAM . 39 3 Attack primitives 43 3.1 Timing Measurements . 43 3.2 Cache Eviction . 47 3.3 Defeating the Cache-Organization . 53 4 Attack Case Studies 57 4.1 High Performance Covert-Channels . 58 4.2 Spying on User input . 62 4.3 Attacks on Cryptographic Algorithms . 69 4.4 Rowhammer on ARM . 75 5 Countermeasures 79 6 Conclusion 81 i List of tables . 83 List of figures . 86 List of acronyms .
    [Show full text]
  • Heterogeneous Resource Mobile Sensing: Computational Offloading
    Heterogeneous resource mobile sensing: computational offloading, scheduling and algorithm optimisation Petko Georgiev Corpus Christi College University of Cambridge January 2017 This dissertation is submitted for the degree of Doctor of Philosophy Declaration This dissertation is the result of my own work and includes nothing which is the outcome of work done in collaboration except where specifically indicated in the text. This dissertation does not exceed the regulation length of 60 000 words, including tables and footnotes. Heterogeneous resource mobile sensing: computational offloading, scheduling and algorithm optimisation Petko Georgiev Summary Important mobile apps such as digital assistants (Google Now, Apple Siri) rely on sensor data and require low-overhead accurate inferences. Although many sensor types are found in devices, the microphone with its high sampling rates arguably poses one of the greatest sensor-related mobile resource utilisation challenges and has similar generic problems faced by all sensors { e.g., efficient background operation, or obtaining accurate inferences in real time. Resource-heavy inference algorithms often employed by audio sensing apps, and the growing number of simultaneously running on-device audio background services, result in app deployments that routinely struggle to reach a day worth of operation alongside other existing services with a single battery charge. In this dissertation we address the challenges presented by emerging audio workloads on smartphone and wearable devices { we enable accurate and efficient multi-app microphone sensing by carefully managing the full range of heterogeneous processors available to high-end mobile platforms. We devise three general classes of resource optimisation techniques to empower micro- phone sensing apps with continuous, accurate, and more energy efficient operation.
    [Show full text]
  • Huawei's Mobile Processors
    Huawei's mobile processors Dezső Sima Vers. 2.1 November 2018 Sima Dezső, 2018 Huawei's mobile processors • 1. Overview • 2. Examples: The Kirin 950 • 2.1 The Kirin 950 • 2.2 The Kirin 960 • 2.3 The Kirin 970 • 2.4 The Kirin 980 • 3. References 1. Overview 1. Overview (1) Huawei [1] • Huawei Technologies Co. Ltd. is a Chinese multinational networking and telecommunications equipment and services company headquartered in Shenzhen China. • It was founded in 1987 and became the world's largest telecom equipment manufacturer. • The name Huawei (华为) means Chinese achievement. • Recently it has about 180 000 employees. Figure: Huawei's logo [1] Figure: Huawei's headquarter in Shenzen [1] 1. Overview (2) HiSilicon [2] • HiSilicon, a global fabless semiconductor and IC design company, headquartered in Shenzhen, China. • It was founded in 2004 as a subsidiary of Huawei. • It has offices and research centers worldwide, the number of the employees is about 7000. • HiSilicon purchases licenses mainly from ARM and designs in the first line application processors for mobiles. It filed over 5,000 patents. 1. Overview (3) 1. Overview Worldwide smartphone shipments by vendors Q4/2009 to Q4/2016 (million units) [3] 1. Overview (4) Worldwide market share of application processors in 2015 used in smartphones (based on revenue) [4] Market Processor lines Vendor Cores ISA share (examples) Qualcomm Snapdragon Qualcomm designed Krait cores ARMv7 42 % (USA) 200-800 ARM Cortex A line ARMv7/v8 Apple Apple A7-A9 Apple designed Cyclone core 21 % ARMv8 (USA) Apple A10 2xbig./4x LITTLE cores 8xARM Cortex A53 ARMv7 MediaTek Helio x10 (ARM big.LITTLE) 19 % (Taiwan) Helio X20 2xARM Cortex A72/8x A53 ARMv8 (ARM big.LITTLE) Samsung Exynos ARM Cortex A line ARMv7 (S.
    [Show full text]
  • Sig Nature Redacted
    Platform Ecosystem: ARM's answer to Intel's dominance by Tanmoy Sen B.E. Electronics and Communication Engineering (2001) Delhi College of Engineering, University of Delhi Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering and Management at the Massachusetts Institute of Technology Jan 2014 [FC- -Zo"t'J C 2014 Tanmoy Sen All rights reserved The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. __Signature redacted Signature of Author Tanmoy Sen System Design and Management Program Jan 17th, 2014 Certified by Signature redacted- 'I V Michael Cusumano Thesis Supervisor SMR Distinguished Pr essor of Management & Engineering Systems MIT S Schoo of Unaement ___Sig nature Accepted by redacted -Patrick Hale Director MASSACHUSETTS INSTITUTE System Design and Management Program OF TECH NOLOGY JUN 2 3 2016 LIBRARIES ARCHIVES SDM Thesis Platform Ecosystem: ARM's Answer to Intel's Dominance Abstract The personal computing industry has witnessed significant changes with more users moving from desktop PCs to battery-operated mobile devices. These dynamics have prompted chip-design companies to evaluate ways to lower the power consumption of devices, thereby elongating battery life. With its lower power microprocessor-core architecture, a newer and smaller company, ARM Holdings, has been able to challenge the much bigger incumbent Intel and capture significant market share by creating a powerful ecosystem based on strategic partnerships. This thesis will evaluate how ARM's 'design and license' business model based on a platform ecosystem- partnerships with Original Equipment Manufacturers (OEMs), semiconductor companies, and software developers, has been able to counter Intel's vertically-integrated business model.
    [Show full text]
  • A Study on Hardware Trojan Detection and Taxonomy
    A STUDY ON HARDWARE TROJAN DETECTION AND TAXONOMY Abhishek Gaikwad* Electrical Engineering California State University, Fullerton CA 92831, USA E-mail: [email protected] *Corresponding Author Sunil Kumar Anasuri Computer Engineering California State University, Fullerton CA 92831, USA E-mail: [email protected] Yoonsuk Choi Computer Engineering California State University, Fullerton CA 92831,USA E-mail: [email protected] ABSTRACT Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit. Hardware Trojan is completely characterized by its physical representation and its behavior. Thus there should be some means of Trojan detection and timely elimination of such threats in the designed circuitry. Through this research, we analyzed detail taxonomy of Trojans. Then perform side channel analysis on the performance of the designed system before and after introduction of Trojans in the programming logic embedded in the Integrated circuit. Then the degree of corruption will be analyzed by comparing the bandwidth of side channel of the signals obtained before and after introduction of Trojans. Also protocols will be defined to eliminate such introduced Trojans and to define methods to recover from potential Trojan attacks. Also a case study about Trojan attacks in fiber optic system and its effects will be discussed in the paper. Keywords- Bandwidth, embedded, elimination, fiber optic system, integrated circuit, protocols, side channel analysis. 1. INTRODUCTION In today’s era, digital systems are an integral part of almost all relevant mechanisms and phenomena driving them. Thus with the increase in reliance on digital systems, their security remains an issue of utmost importance. There could be a breach in the security and performance of these systems and indirectly their performance through myriad of ways.
    [Show full text]