Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Browse all Theses and Dissertations

Computer Engineering

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold Jan 2014

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold

Browse all Theses and Dissertations

Industrial Control Systems are vulnerable to integrity attacks because of connectivity to the external Internet and trusted internal networking components that can become compromised. Integrity attacks can be modeled, analyzed, and sometimes remedied by exploiting properties of physical devices and reasoning about the trust worthiness of ICS communication components.

Industrial control systems (ICS) monitor and control the processes of public utility that society depends on - the electric power grid, oil and gas pipelines, transportation, and water facilities. Attacks that impact the operations of these critical assets could have devastating consequences. The complexity and desire to interconnect ICS components have …


Dynamic Cache Partitioning For Multi-Core Systems, Yang Zhang Jan 2014

Dynamic Cache Partitioning For Multi-Core Systems, Yang Zhang

Browse all Theses and Dissertations

As the power consumption (power wall) is limiting the clock frequency increase, multi-core and many-core processors become the major-trend of the new generation of processors. One of the biggest challenges to achieve high performance in multi-core systems is the growing disparity between processor and memory speeds. The "memory wall"' problem, i.e., the growing disparity of speed between the processor and the memory, becomes even more serious in the multi-core systems. Caches have been highly successful in bridging the processor-memory performance gap by providing fast access to frequently used data. Caches also save power by limiting expensive off-chip memory accesses. In …