Dissertations / Theses on the topic 'RISC-V'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'RISC-V.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Barták, Jiří. "Model procesoru RISC-V." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255393.
Full textVavro, Tomáš. "Periferie procesoru RISC-V." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445553.
Full textBenna, Filip. "Generování objektových souborů pro RISC-V." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363865.
Full textSkála, Milan. "Prostředí pro spouštění testů kompatibility RISC-V." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-386021.
Full textMidéus, Gustav, and Chavez Antonio Morales. "RISC-V Thread Isolation : Using Zephyr RTOS." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279100.
Full textMånga inbyggda system saknar en enhet för minneshantering (s.k. MMU) och saknar därför oftast minnesskydd. Detta leder till att dessa system blir mindre robusta eftersom operativsystemet, processer och trådar inte längre är isolerade från varandra. Detta är också en säkerhetsbrist och med antalet inbyggda system som snabbt ökar på grund av tillväxten av Internet of things (IoT), så kan sårbarheter som denna bli ett stort problem. Med en nyligen introducerad uppdatering av RISC-Vprocessor arkitekturen, så introducerades en möjlighet till att isolera minne utan hjälp av en MMU. Denna studie syftar till att identifiera problem och möjligheter av att implementera sådant minneskydd med RISC-V. Baserat på en studie av litteratur och dokumentation om minnesskydd och RISC-V arkitekturen designades och implementerades en prototyp för att hjälpa till att fastställa problem och möjligheter samt göra en utvärdering med avseende på prestanda- och minneskostnader. Den utvecklade prototypen visade en fungerande implementering av minneskydd för minnesregioner med RISC-V. Utvärderingen av prototypen visade en ökad exekveringstid för kontextbyten och ökad minnesanvändning. Resultaten indikerar att det implementerade minneskyddet kommer med en ökad kostnad i prestanda med en konstant faktor och en liten omkostnad i minne. Därför rekommenderas att implementeringar som vill implementera minneskydd med RISC-V på mindre inbyggda system där tid och minne kan vara avgörande tar hänsyn till omkostnaderna. Ytterligare studier och tester behövs för att identifiera optimeringar som kan förbättra prestandan och upptäcka säkerhetsbrister.
Dalbom, Axel, and Tim Svensson. "Implementing the Load Slice Core on a RISC-V based microarchitecture." Thesis, Uppsala universitet, Datorarkitektur och datorkommunikation, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-424385.
Full textBardonek, Petr. "Specifikace scénářů portovatelných stimulů pro moduly procesoru RISC-V." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385914.
Full textJavor, Adrián. "Formalní verifikace RISC-V procesoru s využitím Questa PropCheck." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413219.
Full textChovančíková, Lucie. "Implementace mikroprocesoru RISC-V s rozšířením pro bitové manipulace." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413229.
Full textBjäreholt, Johan. "RISC-V Compiler Performance:A Comparison between GCC and LLVM/clang." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14659.
Full textChatterjee, Aakriti. "Development of an RSA Algorithm using Reduced RISC V instruction Set." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1617104502129937.
Full textAlmeida, Dos Santos Douglas. "Développement d'un processeur durci sur architecture RISC-V pour applications en environnement sévère." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMONS089.
Full textThis thesis explores the development and characterization of the HARV processor and its HARV-SoC version, specifically designed for operation in harsh environments. It begins by highlighting the challenges posed by harsh environments, particularly the impact of radiation on electronic devices and systems. The thesis categorizes harsh environments into space, atmospheric, and artificial radiation environments, each with its unique characteristics.In the artificial radiation environments, various experimental facilities are described, which provide different particle spectra, including neutrons, protons, and mixed fields. The thesis delves into the radiation effects on electronic devices, covering cumulative effects like total ionizing dose (TID) and displacement damage (DD), as well as single events leading to errors and system failures.The research introduces the RISC-V Instruction Set Architecture (ISA) as a widely adopted processor architecture known for its regular instruction formatting, cost-effective instruction decoding, and modular flexibility. The thesis emphasizes the importance of reliability in using processors in harsh environments and discusses techniques for error detection and correction, including spatial, temporal, and information redundancy.Acknowledging the increasing use of RISC-V processors in critical applications, the thesis summarizes related work, positioning HARV-SoC in the context of the latest developments. It then delves into the implementation of HARV, the initial version of the processor, emphasizing microarchitecture-level fault tolerance. Register protection using error-correcting codes and triple modular redundancy is highlighted.The work extends to developing an SoC with a multi-cycle architecture, allowing for more complex applications while maintaining essential peripherals. Fault injection simulations are conducted to analyze fault models comprehensively. Observability mechanisms are introduced to prepare HARV-SoC for experiments in particle accelerators, enabling a detailed analysis of errors within the processor, particularly with neutron radiation.Recognizing the limitations of error counters, an error handler is implemented to temporarily store information about detected errors. This information is reported to applications through exceptions, facilitating detailed error analysis and responses. The design is thoroughly characterized and evaluated in experiments involving various radiation environments.The analysis expands to testing operating systems and using software recovery techniques. In conclusion, the thesis comprehensively explores radiation-tolerant processors for harsh environments, providing valuable insights and techniques to enhance system reliability and performance in challenging scenarios
Ottavi, Gianmarco. "Sviluppo e Ottimizzazione di un Processore Configurabile con Unità di Calcolo a Precisione Variabile." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textTehrani, Etienne. "Cryptographic primitives adapted to connected car requirements." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. https://theses.hal.science/tel-03788940.
Full textCommunications are one of the key functions in future vehicles and require protection. Cryptography is an obvious answer to secure communications, specifically we studied lightweight cryptography to fit the constrained resources of the environment. A second emerging problem, specific to embedded systems, is resilience to side-channel attacks.The main objectives of the thesis are to study the feasibility of implementing a wide variety of symmetric lightweight encryption algorithms and their protection. An optimal solution is to have an agile implementation, able to quickly execute different lightweight encryption algorithms, using few resources and guaranteeing protection against physical attacks. Our main architecture starts from a modification of the instruction set of a RISC-V processor to satisfy the agility property of lightweight cryptography algorithms. We have studied many encryption algorithms and have proposed a first approach with a fully hardware architecture and a second approach with a dedicated processor in order to efficiently implement Lightweight Cryptography and their protection in a constrained embedded system
Louetsi, Kenelm. "Un environnement de développement d'applications sur un processeur à beaucoup de cœurs parallélisant." Electronic Thesis or Diss., Perpignan, 2024. http://www.theses.fr/2024PERP0024.
Full textDigital objects of the future (domestic robots, autonomous vehicles, automatic spacecraft, ...) will need both computing power and safety. The Little Big Processor (LBP) is suitable for this challenge: it has an innovative approach to parallelism which offers the advantages of computing power while guaranteeing a certain determinism of execution. This execution determinism brings a level of operational safety essential in most devices interacting with the world and humans. In the present thesis we created a development environment for LBP, with a compiler, a loader and a debugger. These tools are classic but in this case, they will have to be adapted to the implementation of parallelized OpenMP applications for LBP. Following the creation of the development environment, we defined a deterministic parallel model for embedded bare-metal. This model has been evaluated on a embedded bare-metal platform, and this allowed us to confirm that it is possible to have a deterministic parallel execution which keeps the performance speedups from parallelism
Chai, Ke. "XBT: FPGA Accelerated Binary Translation." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1626692665154349.
Full textFuchs, Franz Anton. "Analysis of Transient-Execution Attacks on the out-of-order CHERI-RISC-V Microprocessor Toooba." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-291743.
Full textTransient-execution-attacker har utgjort ett stort hot för mikroarkitekturer i senaste årens forskning. I den här avhandlingen återskapar jag och utvecklar transient-execution-attacker mot RISC-V och CHERI-RISC-V mikroarkitekturer. CHERI är en instruction set architecture (ISA) security extension som ger finkornig memory protection och compartmentalisation. I avhandlingen genomför jag transient-execution-experiment på Toooba – en superscalar outof-order processor som implementerar CHERI-RISC-V. Jag presenterar en ny sorts transient-execution-attack som kallas Meltdown-CF(Capability Forgery). Därutöver har jag återskapat de fyra stora Spectre-style-attackerna och viktiga Meltdown-style-attacker. I avhandlingen analyserar jag dessa attacker och förklarar resultaten från experimenten utifrån de arkitektoniska och mikroarkitektoniska besluten tagna av respektive utvecklare. Medan de fyra Spectre-style-attackerna kunde återskapas med framgång verkar inte processorkärnorna vara sårbara för tidigare Meltdown-style-attacker. Jag kom fram till att Spectre-BTB och Spectre-RSB såväl som den nya sortens transientexecution-attack Meltdown-CF utgör ett stort hot för CHERI-system. Däremot bryter de fyra stora Spectre-style-attackerna och alla attacker av MeltdownCF-typen mot CHERI:s threat-model och kräver därmed säkerhetsmekanismer för att verkställas.
Saussereau, Jonathan. "AsteRISC : architectures de processeur RISC-V flexibles et outils pour l’exploration de l’espace de conception." Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0002.
Full textIn the electronic industry, designers are often faced with the challenge of evolving requirements throughout the development lifecycle and post-deployment of products. This challenge is compounded by the lengthy timespan from ASIC design to manufacturing and the inherent inflexibility of digital architectures once etched onto silicon. Thus, approaches allowing modification after manufacturing are attractive solutions.However, such flexibility typically incurs additional costs in resource utilization, performance overhead, and power consumption. To address this, designers must strike an optimal balance among these competing factors, crafting an architecture that minimizes extra costs while meeting the specific demands of the specifications.The research explores a processor-based solution as a viable alternative to the fixed one. The proposed design is a flexible RISC-V processor: AsteRISC. The originality of this core is to have optional registers at key points of its datapath, allowing the designer to have direct control over the critical path, in order to find the optimal one for the application. The chosen register configuration is selected through parameters before logic synthesis. Two architectural approaches are being explored: a non-pipelined approach, aimed at ensuring limited resource usage and offering a wide variety of different microarchitectures, and a flexible pipelined approach to extend the design space to architectures with higher performance capabilities.A flexible System-On-Chip (SoC) framework is proposed, featuring, a multi-target approach. An architecture exploration environment is also presented, enabling the parallel search for maximum operating frequency for many micro-architectures and facilitating result interpretation.Experimental results and analyses provide benchmarks, performance results on both FPGA devices and ASIC technologies. Results showcase the advantages of architectural flexibility to meet stringent performance demands. Indeed, they clearly demonstrate that each configuration exhibits distinct characteristics based on the targeted technology and the application context.The study is anchored in the development of a SoC for a radar aiming function, utilizing the proposed processor to address the challenge of processing data within tight timing constraints, while keeping a low hardware footprint. Implementation results, down the layout, demonstrate that it is possible to offer the same functionalities as the original fixed architecture while allowing dynamic modification of its behavior by changing the software. The impacts, especially in terms of used surface area, are presented, allowing for a nuanced understanding of the underlying trade-offs
Musasa, Mutombo Mike. "Evaluation of embedded processors for next generation asic : Evaluation of open source Risc-V processors and tools ability to perform packet processing operations compared to Arm Cortex M7 processors." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299656.
Full textNätverksprocessorer är en viktig byggsten av informationsteknik idag. I takt med att 5G nätverk byggs ut runt om i världen, många fler enheter kommer att kunna ta del av deras kraftfulla prestanda och programerings flexibilitet. Informationsteknik företag som Ericsson, spenderarmycket ekonomiska resurser på licenser för att kunna använda proprietära instruktionsuppsättnings arkitektur teknik baserade processorer från ARM holdings. Det är väldigt kostam att fortsätta köpa licenser då dessa arkitekturer är en byggsten till designen av många processorer och andra komponenter. Idag finns det en lovande ny processor instruktionsuppsättnings arkitektur teknik som inte är licensierad så kallad Risc-V. Tack vare Risc-V har många propietära och öppen källkod processor utvecklats idag. Det finns dock väldigt lite information kring hur bra de presterar i nätverksapplikationer är känt idag. Kan en öppen-källkod Risc-V processor utföra nätverks databehandling funktioner lika bra som en proprietär Arm Cortex M7 processor? Huvudsyftet med detta arbete är att bygga en test model som undersöker hur väl en öppen-källkod Risc-V baserad processor utför databehandlings operationer av nätverk datapacket jämfört med en Arm Cortex M7 processor. Detta har utförts genom att ta fram en C programmeringskod som simulerar en mottagning och behandling av 72 bytes datapaket. De följande funktionerna testades, inramning, parsning, mönster matchning och klassificering. Koden kompilerades och testades i både en Arm Cortex M7 processor och 3 olika emulerade öppen källkod Risc-V processorer, Arianne, SweRV core och Rocket-chip. Efter att ha testat några öppen källkod Risc-V processorer och använt test koden i en ArmCortex M7 processor, kan det hävdas att öppen-källkod Risc-V processor verktygen inte är tillräckligt pålitliga än. Denna rapport tyder på att öppen-källkod Risc-V emulatorer och verktygen behöver utvecklas mer för att användas i nätverks applikationer. Det finns ett behov av ytterligare undersökning inom detta ämne i framtiden. Exempelvis, en djupare undersökning av SweRV core processor, eller en öppen-källkod Risc-V byggd hårdvara krävs.
Leplus, Gaëtan. "Processeur résistant et résilient aux attaques de fautes et aux attaques par canaux auxiliaires." Electronic Thesis or Diss., Saint-Etienne, 2023. http://www.theses.fr/2023STET0059.
Full textIn today's technological landscape, the Internet of Things (IoT) has emerged as a ubiquitous element, yet it brings major security challenges. Fault injection and side-channel attacks are of particular concern, targeting systemic weaknesses and compromising data integrity and confidentiality. Processors, as the cornerstones of computing systems, are crucial in securing the IoT.This thesis focuses on securing the processor pipeline to counter these threats. The significance of this research is highlighted by the need to develop robust security mechanisms at the processor level, the core of all computation and control. Several countermeasures are proposed to enhance the resilience of different parts of the processor against attacks.To secure the data path, an integrity tagging method is proposed. Compatible with traditional masking techniques, this method aims to ensure data integrity throughout the processing pipeline, with minimal overhead.For the instruction path, a mechanism for masking the current instruction is proposed, where a mask is generated based on the previous instruction. This innovative technique enables effective instruction security with very low overhead.Regarding the desynchronization process, it introduces a robust method for inserting dummy instructions more efficiently than current techniques.These countermeasures, by targeting key components of the processor, contribute to a notable improvement in the security of IoT systems. They address the roots of vulnerabilities, thus providing enhanced protection against a wide range of attacks
Ducousso, Rieul. "Sécurisation des accès aux périphériques et depuis les périphériques dans une architecture multicœur RISC-V utilisée pour la virtualisation." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS040.
Full textToday, computer security is a major topic in various fields such as healthcare, transport, industry or defense. Systems integrated an ever increasing number of components developed by untrusted sources. Covert channel attacks subvert system mechanism to create a communication channel between entities that otherwise shouldn't be able to communicate thus breaching data confidentiality. These attacks circumvent classical isolation mechanisms by allowing processes or virtual machines to exchange and exfiltrate data. Most attacks target the processor and its neighbouring components. We propose a new side-channel attack exploiting the temporal variations due to the memory hierarchy to implement a communication channel. This attack breaks the isolation between peripherals of a virtualized system opening a communication channel between two malicious devices. This attack relies on the adaptation of principles exploited by covert channels on processors with specificities of peripherals. We show that it is possible to exchange data between two devices isolated by an IOMMU. Secondly, we modify the microarchitecture of the IOMMU to reduce the impact of such attacks. The defense strategy is to decorrelate the operations performed by the peripherals and the internal state of its components. We show in simulation and on a system incorporating a processor running Linux implemented on a board FPGA the effects of this countermeasure on the isolation as well as on the device performance. This countermeasure reduces the throughput covert channel without however negating it fully. The impact on performance of peripheral memory accesses is limited
MELO, Cecil Accetti Resende de Ataíde. "Projeto de uma arquitetura baseada num processador RISC-V para desenvolvimento de aplicações em software-defined radio." Universidade Federal de Pernambuco, 2016. https://repositorio.ufpe.br/handle/123456789/26036.
Full textApproved for entry into archive by Alice Araujo (alice.caraujo@ufpe.br) on 2018-08-29T21:40:28Z (GMT) No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) DISSERTAÇÃO Cecil Accetti Resende de Ataíde Melo.pdf: 2769633 bytes, checksum: f491d3b88b08cb65e70c14b653034fdf (MD5)
Made available in DSpace on 2018-08-29T21:40:28Z (GMT). No. of bitstreams: 2 license_rdf: 811 bytes, checksum: e39d27027a6cc9cb039ad269a5db8e34 (MD5) DISSERTAÇÃO Cecil Accetti Resende de Ataíde Melo.pdf: 2769633 bytes, checksum: f491d3b88b08cb65e70c14b653034fdf (MD5) Previous issue date: 2016-08-26
CNPq
Os sistemas de software-defined radio práticos normalmente se dividem em duas classes: arquiteturas reconfiguráveis em FPGA que implementam os algoritmos de processamento de digital de sinais, com granularidade alta e, as arquiteturas baseadas em processador. Um dos problemas no projeto de arquiteturas de processamento digital de sinais baseadas em processador é o do suporte a compiladores e linguagens de alto nível. Arquiteturas muito especializadas, com conjuntos de instruções extensos e muitos modos de endereçamento, dificultam a implementação de compiladores para linguagens de alto nível. Neste trabalho buscou-se explorar a viabilidade de um conjunto de instruções emergente, RISC-V, e uma extensão do seu conjunto de instruções para a aplicação em processamento digital de sinais de banda base, sobretudo nas funcionalidades de modem, em aplicações de software-defined radio. A análise das operações de um modem, para as modulações digitais mais utilizadas, revela que as operações feitas para modulação/ demodulação envolvem números complexos. No entanto, aritmética de complexos não é normalmente suportada pelo hardware em arquiteturas tradicionais. Além da arquitetura proposta para o processador, com suporte a novas instruções especializadas, os periféricos necessários para o front-end de rádio frequência e o software de suporte foram implementados, resultando num SoC para software defined radio.
Practical software-defined radio systems are usually classified in two main architecture classes: Reconfigurable architectures on FPGAs, that implement coarse grained digital signal processing algorithms, or processor-based architectures. One of the issues in the design of processor-based digital signal processing architectures is compiler and high-level languages support. Highly specialized architectures, with extensive instruction sets (ISA) and addressing modes turn high-level languages compiler design a complex task. In this work we explore the viability to extend the emerging RISC-V instruction set for baseband processing applications for software-defined radio, especially for modem applications. The analysis of modem functions, for the most used digital modulation schemes, reveals that the modulation/demodulation tasks involve complex number operations. Complex number arithmetic, however, is not supported on traditional architectures. The proposed platform includes a 3-stage pipelined processor with new specialized instructions, as well as the peripherals needed to the radio-frequency front-end and supporting software, resulting on a system-on-a-chip for software-defined radio applications. software-defined radio.
Dechelotte, Jonathan. "Etude et mise en oeuvre d'un environnement d'exécution pour architecture hétérogène reconfigurable." Thesis, Bordeaux, 2020. http://www.theses.fr/2020BORD0025.
Full textToday, embedded systems have taken a leading role in our world. Whether for communication, travel, work or entertainment, their use is preponderant. Together, research and industry efforts are constantly developing various parts that make up these systems: processor, FPGA, memory, operating system.From an architectural point of view, the contribution of a generalist architecture coupled with a reconfigurable architecture positions SoC FPGA as popular targets for use in embedded systems. However, their implementation's complexity makes their adoption difficult. The abstraction of low-level layers seems to be an investigation's axis that would tend to reverse this trend. The use of an operating system seems suitable at first glance because they deliver an ecosystem of drivers and services for access to hardware resources, native scheduling capacities and libraries for security. However, this solution brings constraints and lead to evaluate other approaches.This manuscript evaluates the ability of a high-level language, Lua, to provide an execution environment in such a case that the implementation does not provide operating system. It gives, through an ecosystem named Lynq, the necessary building blocks for the management and allocation of resources present on the SoC FPGA as well as a method for isolation between applications. Besides the adoption of this execution environment, our work explores the capacity of generalist architectures such as CPUs to become specialized when implemented on a FPGA. This is done through a contribution allowing the generation of a RISC-V CPU and its associated microcode
Ducasse, Quentin. "Sécurisation matérielle de la compilation à la volée des machines virtuelles langage." Electronic Thesis or Diss., Brest, École nationale supérieure de techniques avancées Bretagne, 2024. http://www.theses.fr/2024ENTA0003.
Full textLanguage Virtual Machines (VMs) are the run-time environment of popular high level managed languages. They offer portability and memory handling for the developer and are deployed on most computing devices. Their widespread distribution, handling of untrusted user inputs, and low-level task execution make them interesting to attackers. Software-only solutions that isolate their different components often incur a high performance overhead incompatible with just-in-time (JIT) compilation. Hardware-accelerated run time protections are pushed in vendor processors as a solution to conciliate strong security guarantees with performance. To allow experimentation in the design and comparison of such solutions, this thesis is interested in the RISC-V instruction set and its extension capabilities. We present Gigue, a workload generator that outputs binaries similar to JIT code directly executable on RISC-V softcores. It provides an interface for custom instructions and guarantees their execution. We present an instruction-level domain isolation solution added to Gigue binaries and implemented in an application-class processor with processor modifications. The solution adds negligible performance overhead while enforcing strong properties on domains. As an effort to motivate deployment in real use cases, we extend the Pharo JIT compiler to the RISC-V instruction set along with its testing infrastructure
Fang, Gloria(Gloria Yu Liang). "Instruction-level power consumption simulator for modeling simple timing and power side channels in a 32-bit RISC-V micro-processor." Thesis, Massachusetts Institute of Technology, 2021. https://hdl.handle.net/1721.1/130686.
Full textCataloged from the official PDF of thesis.
Includes bibliographical references (pages 139-140).
We create a Python based RISC-V simulator that is capable of simulating any assembly code written in RISC-V, and even perform simple power analysis of RISC-V designs. The power consumption of non-privileged RISC-V RV32IM instructions are measured experimentally, forming the basis for our simulator. These instructions include memory loads and stores, PC jumps and branches, as well as arithmetic instructions with register values. The object-oriented simulator also supports stepping and debugging. In the context of designing software for hardware use, the simulator helps assess vulnerability to side channel attacks by accepting input power consumption values. The power consumption graph of any disassembled RISC-V code can be obtained if the power consumption of each instruction is given as an input; then, from the output power consumption waveforms, we can assess how vulnerable a system is to side channel attacks. Because the power values can be customized based on what's experimentally measured, this means that our simulator can be applied to any disassembled code and to any system as long as the input power consumption of each instruction is supplied. Finally, we demonstrate an example application of the simulator on a pseudorandom function for simple side channel power analysis.
by Gloria (Yu Liang) Fang.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Cong, Minh Thanh. "Hardware accelerated simulation and automatic design of heterogeneous architecture." Electronic Thesis or Diss., Université de Rennes (2023-....), 2023. https://ged.univ-rennes1.fr/nuxeo/site/esupversions/1ae038b9-380e-4e42-bcd4-fa3a28cb34b0.
Full textThe design of heterogeneous system-on-chip platforms is complex with many possible combinations. Detailed simulation of different solutions is necessary to determine the best design. Existing simulation environments (such as gem5) are limited as they are purely software based and do not take into account heterogeneous architectures. To address these limitations, the use of reprogrammable FPGA components to accelerate simulation is motivated. Our work is divided into two parts. The first part is experimental and studied an approach to design heterogeneous architectures focusing on simulating performance models of architecture components (hardware accelerators and processor cores) on FPGA. The second part is methodological and concerns a flow to determine the best microarchitecture in terms of performance to energy consumption ratio. This flow combines a software architecture simulator and a hyperparameter optimization method to find the best combination of parallelism, loop unrolling strategies, and memory interfaces. Experiments were conducted on different problems to determine the most optimal solutions in terms of energy efficiency
Chechi, Dario. "Framework per il benchmarking comparativo dei componenti software su piattaforme embedded multi-core." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23752/.
Full textJames, Benjamin. "Compiler-Assisted Software Fault Tolerance for Bare Metal and RTOS Applications on Embedded Platforms." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/8958.
Full textVávra, Jan. "Grafický simulátor superskalárních procesorů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445476.
Full textCydlíková, Jana. "Implementace risk managementu v podniku." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-7691.
Full textSláma, Pavel. "Paralelismus na úrovni instrukcí v moderních procesorech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413231.
Full textMoussa, Imed. "Applications des circuits numériques en arseniure de gallium dans les systèmes à haut débit de communication et dans les calculateurs performants." Grenoble INPG, 1996. http://www.theses.fr/1996INPG0077.
Full textFabík, Peter. "Credit risk management v leasingové společnosti." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-1580.
Full textBach, Štěpán. "Standardy v oblasti Enterprise Risk Managementu." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-3662.
Full textPawlik, Jan. "Zavedení ISMS v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224837.
Full textLaukkanen, Antti. "Volkswagen V-Trek : The Rise of Mental Transportation." Thesis, Umeå universitet, Designhögskolan vid Umeå universitet, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-149717.
Full textOmishore, Abayomi. "Obytný soubor Brno Holásky, lokalita V Aleji." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2013. http://www.nusl.cz/ntk/nusl-225822.
Full textKravar, Jan. "Risk management pojišťovny v souvislosti s metodikou Solvency II." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-124922.
Full textOu, Po-Hsiang. "Climate change v Eurozone crisis : social and economic views of risk in inter-expert risk communication." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:f3619fc5-fd2a-483b-92b5-94aa90ce13d1.
Full textAlmeida, N?dia Rossi de. "Ocorr?ncia da infec??o pelo V?rus da Leucemia Felina (FeLV) em gatos dom?sticos do munic?pio do Rio de Janeiro e Baixada Fluminense e an?lise dos fatores de risco para a infec??o." Universidade Federal Rural do Rio de Janeiro, 2009. https://tede.ufrrj.br/jspui/handle/tede/877.
Full textThe present study had the aim to make a survey of the Feline Leukemia Virus infection in domestic cats of Rio de Janeiro city and Baixada Fluminense region and to analyze risk factors involved in this infection. For this purpose, peripheral blood smears of 1094 cats had been submitted to indirect immunofluorescence for viral antigen detection and data relative to the animals surveyed, such as sex, age, race, access to the street, sexual life, housing, number of contactants and symptoms and/or clinical signals had been registered in individual files. Among the analyzed samples, 11,52% were positive for the test, corresponding to 11,49% of the animals collected at the Rio de Janeiro city and 11,62% of the collected samples at Baixada Fluminense region. The qui-square test was used for the descriptive analysis of all the selected variables, where only the significant variable had been included in multivariate analysis, by logistic regression. In accordance to these analysis, the access to the street, the age range between 1 and 5 years old and the cohabitation with too much cats in groups among 6 to15 cats and above of 15 cats had been considered risk factors for FeLV infection.
O presente estudo teve como objetivo pesquisar a ocorr?ncia da infec??o pelo V?rus da Leucemia Felina (FeLV) em gatos dom?sticos do munic?pio do Rio de Janeiro e Baixada Fluminense e tamb?m analisar fatores de risco envolvidos na infec??o por este retrov?rus. Para esta finalidade, esfrega?os de sangue perif?rico de 1.094 gatos foram submetidos ao teste de imunofluoresc?ncia indireta para pesquisa de ant?geno viral e os dados relativos aos animais, tais como o sexo, idade, ra?a, acesso ? rua, vida sexual, moradia, n?mero de contactantes e sintomas e/ou sinais cl?nicos foram registrados em fichas individuais. Do total de amostras analisadas, 11,52% apresentaram positividade para o teste, correspondendo a 11,49% de ocorr?ncia da infec??o em animais do munic?pio do Rio de Janeiro e 11,62% da Baixada Fluminense. O teste de qui-quadrado foi utilizado para a an?lise descritiva de todas as vari?veis levantadas, onde apenas as vari?veis que apresentaram signific?ncia foram inclu?das na an?lise multivariada, atrav?s da regress?o log?stica. De acordo com estas an?lises, o acesso ? rua, a faixa et?ria entre 1 e 5 anos de idade e a conviv?ncia com demais gatos na faixa entre 6 e 15 gatos e acima de 15 gatos foram fatores de risco para a infec??o pelo FeLV.
Whitworth, Lloyd R. "Software risk management : a case study of the V-22 program /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA307865.
Full textVrátil, Tomáš. "Analýza a řízení rizik podnikatelského subjektu provozujícího svoji hospodářskou činnost v zemědělském odvětví." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-96395.
Full textDe, Sancho Maria. "Risk factors for clinical manifestations in carriers of Factor V Leiden and prothrombin gene mutations /." Access full-text from WCMC, 2008. http://proquest.umi.com/pqdweb?did=1695109691&sid=1&Fmt=2&clientId=8424&RQT=309&VName=PQD.
Full textKneblová, Jana. "Metody analýzy korporátních ukazatelů a jejich využití v rámci preventivního Risk managementu pro Škoda Auto a.s." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224954.
Full textFotso, Milly. "Risk Gene v. Safety Net: An Analysis of the Factors the Drive Individuals to Become Entrepreneurs." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1216.
Full textSmoleňák, Ivo. "Rizikové investice v rodinném portfoliu." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76896.
Full textHu, Lijiao. "ECONOMIC ANALYSIS OF CARBON SEQUESTRATION UNDER CATASTROPHIC RISK AND PRICE UNCERTAINTY IN KENTUCKY." UKnowledge, 2014. http://uknowledge.uky.edu/agecon_etds/25.
Full textPinto, Flávia Morais Gomes. "Desinfecção das canetas de alta rotação com álcool 70% p/v sem limpeza prévia: avaliação do risco de infecção cruzada." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/7/7139/tde-20092013-091255/.
Full textIntroduction: In dental clinical practice, decontamination of high-speed dental equipment (HSDE) by direct use of 70% ethanol without previous cleaning, justified by practicality, the short-time available between appointments, together with inadequate predicting and provision of HSDE, is a reality. This procedure, a priori, contradicts the processing protocols recommended to prevent cross-infection. Objective: to evaluate the disinfection of HSDE with 70% ethanol without previous cleaning, with views of cross-infection risk. Method: the present study was characterized as a pragmatic research in a Dental Office, which practices of interest to the study were routinely performed. The experimental group consisted of 100 samples of HSDE used in different treatments after rubbing the disinfectant for 90 seconds on its outer surface. To evaluate the results, gauze moistened with saline solution was used as a carrier for obtaining microorganisms from the disinfected surfaces. Half of the samples (50) were analyzed by membrane filtration (Method I - quantitative), with the gauze being immersed in 300 mL of saline solution. Sequentially, the sample was exposed to sonication and agitation. After that, the lavage was filtered in three equal parts for different analyses, through a membrane with 0.45 m porosity and seeded on blood agar culture medium, for recovery of aerobic and anaerobic microorganisms, as well as those specifically found in the human oral microbiota. The other 50 samples were analyzed by direct immersion of the gauze in culture medium (Method II - Qualitative): after rubbing the wet gauze on the outer surface of the HSDE, it was placed directly in Fluid Thioglycollate culture medium. The tube containing the gauze was shaken in a vortex mixer and then incubated at 37 ° C for 21 days. Results: samples analyzed by Method I, showed positive growth in 27/50 (54%) of the samples within the range of 100 to 102 CFU/sample. Of this total, 7 different microorganisms were identified, represented by 37.1% of coagulase-negative Staphylococcus, 28.5% of Bacillus spp, 17.1% of non-sporulating Gram-positive bacillus, 5.7% of Micrococcus spp, 5.7 % of Penicillium spp, 2.8% of Acinetobacter baumannii and 2.8% of Candida spp. In the group analyzed by Method II, the total number of tubes with positive growth was 12/50 (24%) samples. Of this total, we identified 2 different microorganisms, being 38.4% of Gram-positive bacillus nonspecific, followed by Staphylococcus spp and Peptococcus spp with the same percentage of positivity of 30.7% each. The negative control group, composed of samples subjected to cleaning and sterilization consecutive showed satisfactory results. The average growth found in the positive control group was 17.5 CFU/sample, except for one sample that showed growth uncountable. Conclusion: the results of the present study do not support the practice of decontamination of HSDE with 70% ethanol without previous cleaning, based on the evidence of microorganism survival that did not meet the expected bactericidal and fungicidal action of alcohol as an intermediate level disinfectant. Another aspect that reinforces the disapproval this practice, it is the consideration that the micro-organisms recovered, even being low pathogenic potential, may behave as anfibionte, which are capable of harming the host when the environmental and immune conditions are favorable to micro-organisms, causing infection.
Lipovský, Tomáš. "Modelování rizik v dopravě." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2016. http://www.nusl.cz/ntk/nusl-241283.
Full textKrindges, Cris Aline. "Regula??o emocional, satisfa??o sexual e comportamento sexual de risco em mulheres v?timas de abuso sexual na inf?ncia." Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2016. http://tede2.pucrs.br/tede2/handle/tede/6745.
Full textMade available in DSpace on 2016-06-03T18:21:56Z (GMT). No. of bitstreams: 1 DIS_CRIS_ALINE_KRINDGES_PARCIAL.pdf: 254839 bytes, checksum: 77badb2f05a6fc3ec73c1c32e78f2f50 (MD5) Previous issue date: 2016-03-04
Child sexual abuse (CSA) is considered a public health problem. It includes social, cultural, psychological, medical and legal aspects, and it can be an inciting factor of different consequences for the human development. This thesis aimed to observe women who were CSA victims and the consequences for adulthood, concerning emotion regulation, sexual satisfaction and risky sexual behavior. The research consists of two articles: the literature narrative review and the empirical study. The literature narrative review focuses on the CSA through empirical studies review on this theme. Some significant CSA consequences were verified in the sexual satisfaction scope, such as the lack of pleasure, besides the sexual aversion and avoidance. However, there are some opposite results in which CSA victims also presented major excitation, sexual desire and satisfaction in sexual relations. The review study showed there is no unanimity in literature and the CSA may affect the sexual satisfaction in different ways. In the empirical study, I aimed to investigate the CSA consequences for emotion regulation, sexual satisfaction and risky sexual behavior based on a descriptive and exploratory analysis. Eight women over the age of 18 and presenting some CSA episode were subjects for this study. The evaluation occurred through self-report scale and semi-structured interview and results showed that all the evaluated CSA victims presented different levels of emotion dysregulation. In regard to sexual satisfaction, in some cases, women reported difficulties, whereas others reported the preservation of their sexual desire and satisfaction. Risky sexual behaviors were identified in only two cases and remitted the sexual experiences of the past. These results are relevant for understanding potential long-term CSA repercussions and helping with effective psychological intervention for specific cases of women with history of sexual victimization in childhood.
O abuso sexual na inf?ncia (ASI) ? considerado um problema de sa?de p?blica, englobando aspectos sociais, culturais, psicol?gicos, m?dicos e jur?dicos e pode ser fator desencadeante de diferentes consequ?ncias para o desenvolvimento humano. Esta disserta??o objetivou avaliar mulheres v?timas de ASI e as consequ?ncias para a vida adulta, em rela??o ? regula??o emocional, satisfa??o sexual e comportamento sexual de risco. A disserta??o ? composta por dois artigos, sendo um estudo de revis?o narrativa da literatura e um estudo emp?rico. O estudo de revis?o narrativa da literatura aborda as consequ?ncias do ASI por meio da revis?o de estudos emp?ricos nesta tem?tica. Foram verificadas consequ?ncias significativas do ASI no ?mbito da satisfa??o sexual, como aus?ncia de prazer, avers?o e evita??o sexual. Por?m, resultados opostos foram identificados, nos quais v?timas de ASI tamb?m possu?am maior excita??o e desejo sexual, assim como satisfa??o nas rela??es sexuais. O estudo de revis?o indicou n?o haver um consenso na literatura e que o ASI pode afetar a satisfa??o sexual de diferentes formas. No estudo emp?rico buscou-se investigar as consequ?ncias do ASI para a regula??o emocional, satisfa??o sexual e comportamento sexual de risco a partir de uma an?lise descritiva e explorat?ria. Participaram deste estudo oito mulheres com idade acima de 18 anos e com algum epis?dio de ASI. A avalia??o ocorreu por meio de escalas de autorrelato e entrevista semiestruturada. Os resultados demonstraram que todas as v?timas de ASI avaliadas possu?am dificuldades de regula??o emocional, em diferentes n?veis. Em rela??o ? satisfa??o sexual, em alguns casos as mulheres relataram dificuldades, no entanto outras relataram desejo e satisfa??o sexual preservados. Comportamentos sexuais de risco foram identificados em apenas dois casos e remetidos a experi?ncias sexuais do passado. Estes resultados s?o relevantes para compreender poss?veis repercuss?es da ASI em longo prazo e para subsidiar interven??es psicol?gicas efetivas para demandas espec?ficas de mulheres com hist?rico de vitimiza??o sexual na inf?ncia.