Design Principles for Tamper-Resistant Smartcard Processors
|
|
|
- Hugo Morgan
- 9 years ago
- Views:
Transcription
1 Design Principles for Tamper-Resistant Smartcard Processors Oliver Kömmerling ADSR Markus G. Kuhn Computer Laboratory λ
2 Microprobing Classes of Attacks on Security Modules Open the package, access the chip surface with semiconductor test equipment, and observe and manipulate the internal data paths Software Attacks Use the normal communication interface and abuse security vulnerabilities found in the protocols, cryptographic algorithms, or their implementation Eavesdropping Without opening the package, try to get access to protected information by analyzing compromising signals in emanated electromagnetic radiation, supply current fluctuations, leakage currents on signal lines, and protocol timings Fault Generation Provoke malfunctions by operating the device under environmental stress conditions such as high/low temperature, supply voltage variations and spikes, clock-phase jumps, ionising radiation, protocol violations, partial resets, etc.
3 Tamper Resistance versus Tamper Evidence Invasive attacks Microprobing FIB editing Layout reconstruction violate tamper resistance requirement (FIPS Level 4) Require between hours and weeks in a specialized laboratory, therefore the owner of the card is likely to notice the attack and can revoke certificates for keys that might be lost. Non-invasive attacks Glitch attacks Power analysis Software vulnerabilities violate in addition tamper-evidence requirement (FIPS Level 2) Can be performed within a few seconds inside a Trojan terminal in a Mafia-owned shop, therefore card owner will not notice that card secrets have been stolen and will not revoke keys.
4 Preparation I: Depackaging the Processor 1) 2) Heat up card plastic, bend it, and remove chip module Dissolve package in 60 C fuming nitric acid, then wash in acetone, deionized water, and finally isopropanol. The etching should be carried out under very dry conditions.
5 Preparation II: Bonding into a Test Package A manual bonding station establishes reliable contacts to the supply, communication, and test pads of the microprocessor using ultrasonic welding of a fine aluminium wire.
6 Optical Reverse-Engineering of VLSI Circuits VCC A B A B B B A B polysilicon metal n-well A dopant areas GND A VCC B B A A B A B Confocal microscopes represent the different chip layers in different colors. In the right image, the metal interconnects have been removed with hydrofluoric acid. Both images together can be A read almost as easily as a circuit diagram. GND
7 Optical Access to Diffusion Layer ROM Content After all covering layers including the surrounding field oxide have been removed with hydrofluoric acid, the shape of the now visible diffusion areas will reveal the ROM content (here 16x10 bits). polysilicon row access line metal column access line ground connection
8 Optical Reconstruction of Ion Implantation ROM Content View of ROM with polysilicon intact Diffusion layer after crystallographic etch This type of ROM does not reveal the bit pattern in the shape of the diffusion areas, but a crystallographic staining technique (Dash etchand) that etches doped regions faster than undoped regions will still show the ROM bits.
9 Access to CPU Bus via Laser Depassivation and Microprobing Top: A complete microprobing station consisting of a microscope (Mitutoyo FS-60), laser cutter (New Wave QuikLaze), four micropositioners (Karl Suss), CCD camera, PC with DSP card for card protocol interface handling and data acquisition, oscilloscope, pattern generator, power supply, logic analyzer, etc. Right: Eight depassivated data bus lines. Photos: ADSR
10 Microprobing Access to All Memory Locations Passively monitoring and recording all memory-bus accesses might not be sufficient to attack all applications. Carefully designed smartcard software makes it difficult to trigger memory accesses to all secrets in a laboratory. Card software that calculates a full memory checksum after each reset simplifies attacks considerably! Solution for Attacker: Abuse existing processor hardware as an address generator that accesses all memory locations predictably. A single probing needle can now capture all memory values, probing one bus line at a time. Options: Disable instruction decoder, such that no JMP/CALL/RET/HALT instructions are executed (preferably only NOP-like instructions should be allowed). Disable program-counter load gate In many smartcard processors, this can be accomplished with just a single probe!
11 Focused Ion Beam Workstations for IC Modification Focused ion-beam machines make high-resolution images of chip structures and allow us to both remove and deposit materials (metal and insulators) with 0.01 µm resolution. Gallium ions are accelerated with 30 kv and process gases like iodine or an organic compound are injected near the target location. Left Photo: Dept. of Material Sciences, University of Cambridge
12 Electron Beam Testing Modified scanning electron microscope (SEM) with voltage contrast function. Primary electrons (2.5 kv, 5 na) hit secondary electrons out of the target location. Number and energy of secondary electrons recorded by spectrometer and detector indicates local field potential. This allows contact-free signal measurements on the chip. Limitation: Measured signal is the low-pass filtered product of the beam current multiplied with a function of the signal voltage. Stroboscopic measurements allow to capture periodic signals with a bandwidth of several gigahertz Real-time voltage contrast observation of a non-periodic signal is limited to a few megahertz
13 Analog Circuit Characteristics Allow Non-Invasive Attacks Delays vary along various signal paths (RC and gate count) Flip-flops sample input during a short interval and compare it with the supply voltage levels. Flip-flop metastability Brief short-circuit when CMOS gate changes state Significant short-circuit when SRAM cell changes state Capacitive loads draw current when a gate changes state Static current consumption extremely small... plus many other physical and electronic effects... Smartcards are particularly vulnerable to non-invasive attacks because the attacker has full control over power and clock supply lines and environmental conditions. Careful security reviews must usually include detailed analog VLSI simulations. Smartcard security cannot be achieved by studying only a digital abstraction of the processor design.
14 Change Single Instructions Using Signal Glitches VCC CLK PROBE Fault model: R C Links between gates form RC delay elements R and C vary between links and individual chips Max. RC sum of any signal path determines max.clk frequency External electrical fields could open/close channels Transistors compare VCC and V, which allows VCC glitches C
15 Power Supply Current Forms a Significant Covert Channel Record current in VCC/GND connection with 12-bit, 30-MHz ADC, in order to reconstruct executed instruction sequence and observe cryptographic computations. Instruction 1: CLR C Instruction 2: XOR B Instruction 3: Characteristic current spikes can identify executed instruction Data values appear in power profiles either as differential Hamming weights (~0.5-1 ma/bit) or as individual bits, e.g. with multiplication or shift instructions Current signature depends on accessed memory type (SRAM-write short circuit, EEPROM read-out amplifier, etc.) Activation of EEPROM programming-voltage charge pump observable, which allows to abort before state changes (e.g., with bad retry counters)
16 Non-Deterministic Processors Complicate Observation Randomized Internal Clock Signal Hardware random-bit generator supplies internal clock signal. After 1000 external clock cycles, internal clock cycles have been executed internally (binomial distribution). Only timer and I/O shift registers are directly operated by external clock. Dummy loads are activated during rest periods to suppress the random sequence in the supply current. Randomized Instruction-Level Multithreading Every register and latch (except SRAM) is replicated, including stack pointer, program counter, and instruction register. Hardware random-bit generator schedules per instruction cycle between the two or more threads of execution that run on these register sets. Parallel encryption or background dummy operations introduce non-determinism and correlated covert-channel noise.
17 CLK Tamper-Resistant Low-Frequency Sensor Design Q CLK RST D Q :4 RST S Q R Bus Processor blocks between power-up and reset. External reset triggers sensor test, which then triggers internal reset. Internal reset terminates sensor test and thereby completes internal reset. Bus and control lines are immediately grounded by internal reset, which is also verified. Parts of the circuit are replicated (not shown here). No simple FIB or laser edit will allow real-time (single-shot) EBT bus recording
18 Destruction of Test Circuitry Attackers and test engineers share similar interests. Both need easy access to the on-chip bus lines with as few probes as possible. Commonly used test circuitry: Parallel/serial converters for full bus Full bus available on large probing pads Pads usually disabled by blowing a poly fuse, but can easily be reconnected via FIB. Solution: Test circuitry must not only be disabled by blowing fuses. It must be structurally destroyed. Blown polysilicon fuse near test pad (Motorola) Test circuitry can be located on the µm wide area between the dies that is removed during wafer cutting.
19 Restricted Program Counter A standard program-counter mechanism is too easily abused as an address-sequence generator. Tamper-resistant design of the instruction decoder is difficult. Watchdog circuitry requires many transistors and simple forms are also easily disabled. Solution: Replace the normal program counter (e.g., 16 bit) by a combination of a full-size segment register S and a short (e.g., 7 bit) offset register O. Instructions are fetched from address S+O. Only O is automatically incremented after every instruction. An overflow of O will halt the processor. A jump to address X is performed by loading X into S and setting O to zero. Unconditional jump commands must be less than 128 bytes apart, which an assembler preprocessor used by the developer can ensure automatically. Now, no simple FIB edit can cause the program counter to cover all addresses.
20 Example of a Top-Layer Sensor Mesh SENSE VCC GND SENSE The sensor line is checked during operation for interruptions or short-circuits, which trigger alarms (e.g., processor halt or flash erase). The power lines are at some places used to supply the circuits below. ST16SF48A
21 Sensor Meshes: Vulnerabilities and Attacks a) b) a) b) c) FIB workstation can be used to place a new via between mesh lines with an access cross on top for easy microprobing. Design flaw: redundant bus lines extend beyond the sensor mesh, allowing easy microprobing access ("Freedom for imprisoned crypto bits!"). Not all power supply lines are used, so they can be removed with a laser cutter to allow access to signals below the mesh. c)
22 Summary and Conclusions Invasive techniques break all currently available smartcards and have led to continued conditional-access smartcard piracy since 1994 Non-invasive attacks (glitching, current analysis) are the main concern only in tamper-evidence applications (banking, signatures), because microprobing is generally the far easier and more universal type of attack Examples for lowest-cost countermeasures that are not yet implemented widely or in effective ways: randomized clock tamper-resistant sensors instruction multi-threading top-layer sensor mesh constant-current regulators loosely coupled clock PLL destruction of test circuits Smartcard form probably unsuitable for strong tamper-resistance requirements (conditional access, copy protection), better use battery-backed SRAM Extremely careful engineering might lead to high tamper-evidence assurance for smartcards one day (for banking, authentication, digital signatures)
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Smart Card Security How Can We Be So Sure?
Smart Card Security How Can We Be So Sure? Ernst Bovelander TNO Centre for Evaluation of Instrumentation and Security Techniques PO Box 5013 2600 GA Delft, The Netherlands [email protected] 1. Introduction
Design Principles for Tamper-Resistant Smartcard Processors
Design Principles for Tamper-Resistant Smartcard Processors Oliver Kömmerling Markus G. Kuhn Advanced Digital University of Cambridge Security Research Computer Laboratory Mühlstraße 7 Pembroke Street
8-Bit Flash Microcontroller for Smart Cards. AT89SCXXXXA Summary. Features. Description. Complete datasheet available under NDA
Features Compatible with MCS-51 products On-chip Flash Program Memory Endurance: 1,000 Write/Erase Cycles On-chip EEPROM Data Memory Endurance: 100,000 Write/Erase Cycles 512 x 8-bit RAM ISO 7816 I/O Port
On a New Way to Read Data from Memory
On a New Way to Read Data from Memory David Samyde 1, Sergei Skorobogatov 2, Ross Anderson 2 and Jean-Jacques Quisquater 1 1: Université catholique de Louvain, UCL Crypto Group Place du Levant, 3, B-1348
An On-chip Security Monitoring Solution For System Clock For Low Cost Devices
An On-chip Security Monitoring Solution For System Clock For Low Cost Devices Frank Vater Innovations for High Performance Microelectronics Im Technologiepark 25 15236 Frankfurt (Oder), Germany [email protected]
Module 2. Embedded Processors and Memory. Version 2 EE IIT, Kharagpur 1
Module 2 Embedded Processors and Memory Version 2 EE IIT, Kharagpur 1 Lesson 5 Memory-I Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would Pre-Requisite
Secure Hardware PV018 Masaryk University Faculty of Informatics
Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators
Physical Attacks on Tamper Resistance: Progress and Lessons
Physical Attacks on Tamper Resistance: Progress and Lessons Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: [email protected] Why do we need tamper resistance? Theft of service: unauthorised
Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov
Local Heating Attacks on Flash Memory Devices Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: [email protected] Introduction Semi-invasive attacks were introduced in 2002 ( Optical fault induction
Measurement and Analysis Introduction of ISO7816 (Smart Card)
Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by
CHAPTER 11: Flip Flops
CHAPTER 11: Flip Flops In this chapter, you will be building the part of the circuit that controls the command sequencing. The required circuit must operate the counter and the memory chip. When the teach
MICROPROCESSOR. Exclusive for IACE Students www.iace.co.in iacehyd.blogspot.in Ph: 9700077455/422 Page 1
MICROPROCESSOR A microprocessor incorporates the functions of a computer s central processing unit (CPU) on a single Integrated (IC), or at most a few integrated circuit. It is a multipurpose, programmable
MICROPROCESSOR AND MICROCOMPUTER BASICS
Introduction MICROPROCESSOR AND MICROCOMPUTER BASICS At present there are many types and sizes of computers available. These computers are designed and constructed based on digital and Integrated Circuit
Hardware security Part 1: Smartcards and other tamper-resistant modules
Hardware security Part 1: Smartcards and other tamper-resistant modules Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/ mgk25/ Tamper-resistant modules 1) Single chip systems Consist of a microcontroller
RAM & ROM Based Digital Design. ECE 152A Winter 2012
RAM & ROM Based Digital Design ECE 152A Winter 212 Reading Assignment Brown and Vranesic 1 Digital System Design 1.1 Building Block Circuits 1.1.3 Static Random Access Memory (SRAM) 1.1.4 SRAM Blocks in
CHAPTER 7: The CPU and Memory
CHAPTER 7: The CPU and Memory The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
AUTOMATIC NIGHT LAMP WITH MORNING ALARM USING MICROPROCESSOR
AUTOMATIC NIGHT LAMP WITH MORNING ALARM USING MICROPROCESSOR INTRODUCTION This Project "Automatic Night Lamp with Morning Alarm" was developed using Microprocessor. It is the Heart of the system. The sensors
Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill
Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill Objectives: Analyze the operation of sequential logic circuits. Understand the operation of digital counters.
Advances in Smartcard Security
Advances in Smartcard Security Marc Witteman Introduction Over the last decade smartcards have entered our global community. Although initially they were only used as simple phone cards they now support
Atmel Norway 2005. XMEGA Introduction
Atmel Norway 005 XMEGA Introduction XMEGA XMEGA targets Leadership on Peripheral Performance Leadership in Low Power Consumption Extending AVR market reach XMEGA AVR family 44-100 pin packages 16K 51K
Evaluating AC Current Sensor Options for Power Delivery Systems
Evaluating AC Current Sensor Options for Power Delivery Systems State-of-the-art isolated ac current sensors based on CMOS technology can increase efficiency, performance and reliability compared to legacy
On Security Evaluation Testing
On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation
NTE2053 Integrated Circuit 8 Bit MPU Compatible A/D Converter
NTE2053 Integrated Circuit 8 Bit MPU Compatible A/D Converter Description: The NTE2053 is a CMOS 8 bit successive approximation Analog to Digital converter in a 20 Lead DIP type package which uses a differential
150127-Microprocessor & Assembly Language
Chapter 3 Z80 Microprocessor Architecture The Z 80 is one of the most talented 8 bit microprocessors, and many microprocessor-based systems are designed around the Z80. The Z80 microprocessor needs an
1.1 Silicon on Insulator a brief Introduction
Table of Contents Preface Acknowledgements Chapter 1: Overview 1.1 Silicon on Insulator a brief Introduction 1.2 Circuits and SOI 1.3 Technology and SOI Chapter 2: SOI Materials 2.1 Silicon on Heteroepitaxial
Programming Logic controllers
Programming Logic controllers Programmable Logic Controller (PLC) is a microprocessor based system that uses programmable memory to store instructions and implement functions such as logic, sequencing,
Low- Cost Chip Microprobing
Low- Cost Chip Microprobing Philipp Maier Karsten Nohl SRLabs Template v11 A few smart cards chips cover numerous security domains Security chip applica.ons Payment
Spacecraft Computer Systems. Colonel John E. Keesee
Spacecraft Computer Systems Colonel John E. Keesee Overview Spacecraft data processing requires microcomputers and interfaces that are functionally similar to desktop systems However, space systems require:
2.0 Command and Data Handling Subsystem
2.0 Command and Data Handling Subsystem The Command and Data Handling Subsystem is the brain of the whole autonomous CubeSat. The C&DH system consists of an Onboard Computer, OBC, which controls the operation
Reviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada
Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada BIOGRAPHY Yves Théroux, a Project Engineer with BAE Systems Canada (BSC) has eight years of experience in the design, qualification,
Flash Corruption: Software Bug or Supply Voltage Fault?
: Software Bug or Supply Voltage Fault? Shyam Chandra, Lattice Semiconductor Answer: Both! Flash memory is commonly used to store firmware in embedded systems. Occasionally, the firmware stored in the
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
Semiconductor Memories
Semiconductor Memories Semiconductor memories array capable of storing large quantities of digital information are essential to all digital systems Maximum realizable data storage capacity of a single
1.Introduction. Introduction. Most of slides come from Semiconductor Manufacturing Technology by Michael Quirk and Julian Serda.
.Introduction If the automobile had followed the same development cycle as the computer, a Rolls- Royce would today cost $00, get one million miles to the gallon and explode once a year Most of slides
Note monitors controlled by analog signals CRT monitors are controlled by analog voltage. i. e. the level of analog signal delivered through the
DVI Interface The outline: The reasons for digital interface of a monitor the transfer from VGA to DVI. DVI v. analog interface. The principles of LCD control through DVI interface. The link between DVI
Design of an Insulin Pump. Purpose of an Insulin Pump:
Design of an Insulin Pump Purpose of an Insulin Pump: Insulin is a hormone central to regulating carbohydrate and fat metabolism in the body. It is secreted regularly within the body and aids in converting
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
X 4 CONFIDENTIAL X 4 OTHER PROGRAMME: CUSTOMER: CONTRACT NO.: WPD NO.: DRD NO.: CONTRACTUAL DOC.:
Date: Aug. 2002 Page: ii Contraves Space AG Schaffhauserstr. 580 CH-8052 Zurich Switzerland CLASS 1 UNRESTRICTED 1 2 INDUSTRY 2 3 RESTRICTED 3 CATEGORY CONFIGURED, FOR APPROVAL NOT CONFIGURED, FOR APPROVAL
Computer Systems Structure Main Memory Organization
Computer Systems Structure Main Memory Organization Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Storage/Memory
Parts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved
Parts of a Computer Preparation Grade Level: 4-9 Group Size: 20-30 Time: 75-90 Minutes Presenters: 1-3 Objectives This lesson will enable students to: Identify parts of a computer Categorize parts of a
Design of a High Speed Communications Link Using Field Programmable Gate Arrays
Customer-Authored Application Note AC103 Design of a High Speed Communications Link Using Field Programmable Gate Arrays Amy Lovelace, Technical Staff Engineer Alcatel Network Systems Introduction A communication
Phase-Locked Loop Based Clock Generators
Phase-Locked Loop Based Clock Generators INTRODUCTION As system clock frequencies reach 100 MHz and beyond maintaining control over clock becomes very important In addition to generating the various clocks
Homework # 2. Solutions. 4.1 What are the differences among sequential access, direct access, and random access?
ECE337 / CS341, Fall 2005 Introduction to Computer Architecture and Organization Instructor: Victor Manuel Murray Herrera Date assigned: 09/19/05, 05:00 PM Due back: 09/30/05, 8:00 AM Homework # 2 Solutions
Fabrication and Manufacturing (Basics) Batch processes
Fabrication and Manufacturing (Basics) Batch processes Fabrication time independent of design complexity Standard process Customization by masks Each mask defines geometry on one layer Lower-level masks
Content Map For Career & Technology
Content Strand: Applied Academics CT-ET1-1 analysis of electronic A. Fractions and decimals B. Powers of 10 and engineering notation C. Formula based problem solutions D. Powers and roots E. Linear equations
Supply voltage Supervisor TL77xx Series. Author: Eilhard Haseloff
Supply voltage Supervisor TL77xx Series Author: Eilhard Haseloff Literature Number: SLVAE04 March 1997 i IMPORTANT NOTICE Texas Instruments (TI) reserves the right to make changes to its products or to
Advanced Computer Architecture-CS501. Computer Systems Design and Architecture 2.1, 2.2, 3.2
Lecture Handout Computer Architecture Lecture No. 2 Reading Material Vincent P. Heuring&Harry F. Jordan Chapter 2,Chapter3 Computer Systems Design and Architecture 2.1, 2.2, 3.2 Summary 1) A taxonomy of
Conversion Between Analog and Digital Signals
ELET 3156 DL - Laboratory #6 Conversion Between Analog and Digital Signals There is no pre-lab work required for this experiment. However, be sure to read through the assignment completely prior to starting
The Central Processing Unit:
The Central Processing Unit: What Goes on Inside the Computer Chapter 4 Objectives Identify the components of the central processing unit and how they work together and interact with memory Describe how
EE 42/100 Lecture 24: Latches and Flip Flops. Rev B 4/21/2010 (2:04 PM) Prof. Ali M. Niknejad
A. M. Niknejad University of California, Berkeley EE 100 / 42 Lecture 24 p. 1/20 EE 42/100 Lecture 24: Latches and Flip Flops ELECTRONICS Rev B 4/21/2010 (2:04 PM) Prof. Ali M. Niknejad University of California,
Chapter 2 Logic Gates and Introduction to Computer Architecture
Chapter 2 Logic Gates and Introduction to Computer Architecture 2.1 Introduction The basic components of an Integrated Circuit (IC) is logic gates which made of transistors, in digital system there are
Spike-Based Sensing and Processing: What are spikes good for? John G. Harris Electrical and Computer Engineering Dept
Spike-Based Sensing and Processing: What are spikes good for? John G. Harris Electrical and Computer Engineering Dept ONR NEURO-SILICON WORKSHOP, AUG 1-2, 2006 Take Home Messages Introduce integrate-and-fire
1. Oscilloscope is basically a graph-displaying device-it draws a graph of an electrical signal.
CHAPTER 3: OSCILLOSCOPE AND SIGNAL GENERATOR 3.1 Introduction to oscilloscope 1. Oscilloscope is basically a graph-displaying device-it draws a graph of an electrical signal. 2. The graph show signal change
Advanced VLSI Design CMOS Processing Technology
Isolation of transistors, i.e., their source and drains, from other transistors is needed to reduce electrical interactions between them. For technologies
A 5 Degree Feedback Control Robotic Arm (Haptic Arm)
A 5 Degree Feedback Control Robotic Arm (Haptic Arm) 1 Prof. Sheetal Nirve, 2 Mr.Abhilash Patil, 3 Mr.Shailesh Patil, 4 Mr.Vishal Raut Abstract: Haptics is the science of applying touch sensation and control
Digital Signal Controller Based Automatic Transfer Switch
Digital Signal Controller Based Automatic Transfer Switch by Venkat Anant Senior Staff Applications Engineer Freescale Semiconductor, Inc. Abstract: An automatic transfer switch (ATS) enables backup generators,
Modeling Sequential Elements with Verilog. Prof. Chien-Nan Liu TEL: 03-4227151 ext:34534 Email: [email protected]. Sequential Circuit
Modeling Sequential Elements with Verilog Prof. Chien-Nan Liu TEL: 03-4227151 ext:34534 Email: [email protected] 4-1 Sequential Circuit Outputs are functions of inputs and present states of storage elements
Low Power AMD Athlon 64 and AMD Opteron Processors
Low Power AMD Athlon 64 and AMD Opteron Processors Hot Chips 2004 Presenter: Marius Evers Block Diagram of AMD Athlon 64 and AMD Opteron Based on AMD s 8 th generation architecture AMD Athlon 64 and AMD
CCD and CMOS Image Sensor Technologies. Image Sensors
CCD and CMOS Image Sensor Technologies Image Sensors There are Two Main types of Image Sensors are available today: CCD and CMOS Both were originally developed in the late 1960 s and 1970 s Defining Some
Introduction to Digital System Design
Introduction to Digital System Design Chapter 1 1 Outline 1. Why Digital? 2. Device Technologies 3. System Representation 4. Abstraction 5. Development Tasks 6. Development Flow Chapter 1 2 1. Why Digital
Chapter 1 Computer System Overview
Operating Systems: Internals and Design Principles Chapter 1 Computer System Overview Eighth Edition By William Stallings Operating System Exploits the hardware resources of one or more processors Provides
Implementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller
Implementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller Zafar Ullah Senior Application Engineer Scenix Semiconductor Inc. Leo Petropoulos Application Manager Invox TEchnology 1.0
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Question Bank Subject Name: EC6504 - Microprocessor & Microcontroller Year/Sem : II/IV
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Question Bank Subject Name: EC6504 - Microprocessor & Microcontroller Year/Sem : II/IV UNIT I THE 8086 MICROPROCESSOR 1. What is the purpose of segment registers
Introduction to VLSI Fabrication Technologies. Emanuele Baravelli
Introduction to VLSI Fabrication Technologies Emanuele Baravelli 27/09/2005 Organization Materials Used in VLSI Fabrication VLSI Fabrication Technologies Overview of Fabrication Methods Device simulation
Serial port interface for microcontroller embedded into integrated power meter
Serial port interface for microcontroller embedded into integrated power meter Mr. Borisav Jovanović, Prof. dr. Predrag Petković, Prof. dr. Milunka Damnjanović, Faculty of Electronic Engineering Nis, Serbia
Monitoring of Intravenous Drip Rate
Monitoring of Intravenous Drip Rate Vidyadhar V. Kamble, Prem C. Pandey, Chandrashekar P. Gadgil, and Dinesh S. Choudhary Abstract A drip rate meter, for monitoring intravenous infusion, is developed using
Chapter 13. PIC Family Microcontroller
Chapter 13 PIC Family Microcontroller Lesson 01 PIC Characteristics and Examples PIC microcontroller characteristics Power-on reset Brown out reset Simplified instruction set High speed execution Up to
Objective. Testing Principle. Types of Testing. Characterization Test. Verification Testing. VLSI Design Verification and Testing.
VLSI Design Verification and Testing Objective VLSI Testing Mohammad Tehranipoor Electrical and Computer Engineering University of Connecticut Need to understand Types of tests performed at different stages
Memory. The memory types currently in common usage are:
ory ory is the third key component of a microprocessor-based system (besides the CPU and I/O devices). More specifically, the primary storage directly addressed by the CPU is referred to as main memory
A Digital Timer Implementation using 7 Segment Displays
A Digital Timer Implementation using 7 Segment Displays Group Members: Tiffany Sham u2548168 Michael Couchman u4111670 Simon Oseineks u2566139 Caitlyn Young u4233209 Subject: ENGN3227 - Analogue Electronics
Security testing of hardware product
Alain MERLE CESTI LETI CEA Grenoble [email protected] Security testing of hardware product DCIS/SASTI/CESTI 1 Abstract «What are you doing in ITSEFs?» Testing, Security testing, Attacks, Evaluations,
How to design an insulin pump
How to design an insulin pump Learn about the purpose of an insulin pump, its overall workings, and the requirements needed for its design as well as implementation. By Asha Ganesan Applications Engineer
Chapter 6 PLL and Clock Generator
Chapter 6 PLL and Clock Generator The DSP56300 core features a Phase Locked Loop (PLL) clock generator in its central processing module. The PLL allows the processor to operate at a high internal clock
TYPES OF COMPUTERS AND THEIR PARTS MULTIPLE CHOICE QUESTIONS
MULTIPLE CHOICE QUESTIONS 1. What is a computer? a. A programmable electronic device that processes data via instructions to output information for future use. b. Raw facts and figures that has no meaning
ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG
ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, house security system becomes the best solution to overcome house
Module 7 : I/O PADs Lecture 33 : I/O PADs
Module 7 : I/O PADs Lecture 33 : I/O PADs Objectives In this lecture you will learn the following Introduction Electrostatic Discharge Output Buffer Tri-state Output Circuit Latch-Up Prevention of Latch-Up
ECE410 Design Project Spring 2008 Design and Characterization of a CMOS 8-bit Microprocessor Data Path
ECE410 Design Project Spring 2008 Design and Characterization of a CMOS 8-bit Microprocessor Data Path Project Summary This project involves the schematic and layout design of an 8-bit microprocessor data
DAC Digital To Analog Converter
DAC Digital To Analog Converter DAC Digital To Analog Converter Highlights XMC4000 provides two digital to analog converters. Each can output one analog value. Additional multiple analog waves can be generated
Alpha CPU and Clock Design Evolution
Alpha CPU and Clock Design Evolution This lecture uses two papers that discuss the evolution of the Alpha CPU and clocking strategy over three CPU generations Gronowski, Paul E., et.al., High Performance
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science. 6.002 Electronic Circuits Spring 2007
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.002 Electronic Circuits Spring 2007 Lab 4: Audio Playback System Introduction In this lab, you will construct,
CryptoFirewall Technology Introduction
CryptoFirewall Technology Introduction Cryptography Research, Inc. www.cryptography.com 575 Market St., 21 st Floor, San Francisco, CA 94105 1998-2007 Cryptography Research, Inc. Protected under issued
AN1837. Non-Volatile Memory Technology Overview By Stephen Ledford Non-Volatile Memory Technology Center Austin, Texas.
Order this document by /D Non-Volatile Memory Technology Overview By Stephen Ledford Non-Volatile Memory Technology Center Austin, Texas Introduction Today s microcontroller applications are more sophisticated
STM32 F-2 series High-performance Cortex-M3 MCUs
STM32 F-2 series High-performance Cortex-M3 MCUs STMicroelectronics 32-bit microcontrollers, 120 MHz/150 DMIPS with ART Accelerator TM and advanced peripherals www.st.com/mcu STM32 F-2 series The STM32
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
ABB Drives. User s Manual. Pulse Encoder Interface Module RTAC-01
ABB Drives User s Manual Pulse Encoder Interface Module RTAC-0 Pulse Encoder Interface Module RTAC-0 User s Manual 3AFE 64486853 REV A EN EFFECTIVE:.5.00 00 ABB Oy. All Rights Reserved. Safety instructions
GETTING STARTED WITH PROGRAMMABLE LOGIC DEVICES, THE 16V8 AND 20V8
GETTING STARTED WITH PROGRAMMABLE LOGIC DEVICES, THE 16V8 AND 20V8 Robert G. Brown All Rights Reserved August 25, 2000 Alta Engineering 58 Cedar Lane New Hartford, CT 06057-2905 (860) 489-8003 www.alta-engineering.com
Memory Basics. SRAM/DRAM Basics
Memory Basics RAM: Random Access Memory historically defined as memory array with individual bit access refers to memory with both Read and Write capabilities ROM: Read Only Memory no capabilities for
Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
Logical Operations. Control Unit. Contents. Arithmetic Operations. Objectives. The Central Processing Unit: Arithmetic / Logic Unit.
Objectives The Central Processing Unit: What Goes on Inside the Computer Chapter 4 Identify the components of the central processing unit and how they work together and interact with memory Describe how
Computer Architecture
Computer Architecture Random Access Memory Technologies 2015. április 2. Budapest Gábor Horváth associate professor BUTE Dept. Of Networked Systems and Services [email protected] 2 Storing data Possible
