{"title":"Robust event trigger generation for post silicon validation","authors":"Sumit Diware, S. B. Krishna","doi":"10.1109/ICCE-ASIA.2017.8307839","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307839","url":null,"abstract":"It is extremely difficult to eliminate all the design flaws that may exist in a complex integrated circuit design before fabrication due to limitations of pre-silicon verification methodology. Post-silicon validation has become pivotal in order to fix these design flaws which could not be identified during pre-silicon verification. One of the most effective silicon debug techniques is tracing internal signals during circuit's normal operation and using the gathered information to identify and fix the root cause of the problem. Trace-based technique involves logic analysis that works on the principle of event triggering. Existing trigger generation methods suffer from the false multi-triggering problem due to dependency on exact value of delay provided by internal delay elements and do not give a stable performance against PVT variations. This paper demonstrates a robust technique for generating these triggers which is independent of exact value of delay provided by internal delay elements and immune to false multi-triggering along with a consistent behavior across the PVT variations.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing networked control systems: Modeling attacks and defenses","authors":"J. Jithish, S. Sankaran","doi":"10.1109/ICCE-ASIA.2017.8309317","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309317","url":null,"abstract":"Networked Control Systems (NCS) have emerged as a viable solution to effectively manage critical infrastructures in smart cities and modern industrial settings. The networked architecture of NCS that facilitates the communication between its distributed components makes them vulnerable to cyber attacks. The vulnerabilities in the communication network coupled with safety critical nature of data necessitates the need to develop models to analyze the impact of cyber attacks on system stability and performance. In this work, we develop an analytical model for Denial of Service (DoS) and Deception attacks in NCS. Based on the insights from the model, we propose a mechanism based on symmetric key encryption to secure NCS from such attacks. The comparison of our security mechanism with the standard reference signal demonstrates that our approach is successful in securing the NCS with minimal performance overhead.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126143814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of load prediction and load flow patterns in an IoT enabled Smart Grid with a dynamic energy market","authors":"Kshama Dwarakanath","doi":"10.1109/ICCE-ASIA.2017.8309318","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309318","url":null,"abstract":"Smart Grid and Internet of Things (IoT) are the latest trends respectively in the domains of Power Engineering and Computer Science. The amalgamation of the two presents enormous potential to improve the efficiency, security and reliability of the power grid. In this paper, the authors review existing solutions and propose their ideas, as an improvement over existing techniques to realise the idea of a Smart Grid and a competitive Energy market by application of Mathematical and Statistical tools to analyse and predict load demand as well as agent behaviour in the present scenario.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123100733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach towards novel video steganography for consumer electronics","authors":"M. Sushmitha, H. N. Suresh, J. Manikandan","doi":"10.1109/ICCE-ASIA.2017.8307831","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307831","url":null,"abstract":"Videos have proven themselves to be the best medium to demand consumer attention. This has motivated the sharing of videos on Whatsapp, Facebook and other social media. Consumer electronics such as mobile phones, tablets and laptops are mainly used for video sharing. In this paper, a novel attempt is made to conceal a secret video in a cover video using the concepts of steganography and discrete wavelet transform, thus achieving the best of both worlds. Also, the proposed work is extended towards concealing two secret videos in a single cover video. The performance evaluation of proposed technique is reported in the paper. It is observed that the reconstructed videos have PSNR ranging from 74.30–90.12 dB and the PSNR of stego videos ranges from 68.66–70.80 dB. It is also observed that both, stego videos and reconstructed secret videos are visually indistinguishable from the original video.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kedar Chitnis, Jesse Villarreal, Brijesh Jadav, Mihir Mody, Lucas Weaver, V. Cheng, Kumar Desappan, Anshu Jain, P. Swami
{"title":"Novel OpenVX implementation for heterogeneous multi-core systems","authors":"Kedar Chitnis, Jesse Villarreal, Brijesh Jadav, Mihir Mody, Lucas Weaver, V. Cheng, Kumar Desappan, Anshu Jain, P. Swami","doi":"10.1109/ICCE-ASIA.2017.8309323","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309323","url":null,"abstract":"Heterogeneous multi-core systems (CPU, GPU, HWA, DSP) are becoming the de-facto norm for multiple computer vision applications across automotive, robotics, AR/VR, and industrial machine vision. This creates a need for a software framework which realizes high utilization of computing elements, low latency, real-time operation and ease of use. For specific applications, multiple proprietary solutions are offered to satisfy few of the above requirements. This paper proposes a solution based on the standard OpenVX specification to address heterogeneous systems. It introduces novel techniques of distributed graph execution across heterogeneous cores, data tiling to address diverse memory constraints and easy to use high-level graph description to describe the application. This novel solution is implemented on TI's TDA family of SoC for mono camera vision application with platform code generated from high-level graph description. The profiling confirms real time operation, low latency by reducing host CPU interaction and achieving 99% utilization across heterogeneous cores.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116439026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel architecture for cloud based next gen vehicle platform — Transition from today to 2025","authors":"Pramod Kumar Gurudatt, V. Umesh","doi":"10.1109/ICCE-ASIA.2017.8309326","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309326","url":null,"abstract":"The sole idea of the autonomous driving is to reduce the number of accidents which will be caused by human errors. There will be a phase where autonomous vehicles will have to take part with the human driven vehicles. In this phase autonomous vehicle and vehicle drivers must be careful in driving maneuvers, since it is impossible to just have autonomous vehicles on the road while the transition to fully autonomous driving takes place. To make the system more reliable and robust, authors feel that it must be substantially improved and to achieve this 3 methodologies have been proposed. The use cases are derived from the camera placed in the suitable positions of every vehicle. This creates several use cases with different driving behaviors, which truly reflects the conditions which the autonomous car needs to undergo in series. Authors propose several architectures to address the safety related issues. Since, the number of use cases are so random that it becomes practically impossible to manage data, so we propose to have a secured cloud storage. The cloud provides a secure and reliable data management system to the machine learning algorithm computation. The data management till now is effectively done via trained unique use cases. This make a big data which is encapsulation of different unique use cases under different driving conditions. So we conclude that the usage of ML and cloud based data management is the way forward for handling autonomous vehicle reliably. This may not be the complete solution, but nevertheless we are one step closer towards 2025. This concept can be implemented only in co-operation of the OEMs and Public authorities.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130190935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel thermocouple for ultra high temperature applications: Design and computational analysis","authors":"A. Purwar, S. Deep","doi":"10.1109/ICCE-ASIA.2017.8307852","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307852","url":null,"abstract":"The development of high temperature sensors for accurately measuring temperature has become critical for structural health monitoring of high temperature structures viz. gas turbines, furnaces and hypersonic space vehicles. Conventional thermocouples have limitations owing to the maximum operational temperature of metallic alloys. In this perspective, it is imperative to explore new material systems which can extend the operational range of thermocouples up to 2500K temperature. Current work investigates a novel thermocouple design which employs Zirconium diboride based ultra-high temperature ceramics for providing protection to metallic thermocouple wires in oxidizing environments in heat flux as high as 2.5MW/m2 for up to 120s duration. The performance evaluation of this novel thermocouple design has been carried using Finite element based computational modelling. This demonstrates that the proposed thermocouple design has good sensitivity of 3V/K in relevant hot environment.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130581284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mihir Mody, Rajshekar Allu, Niraj Nandan, Gang Hua, Hetul Sanghvi, Shashank Dabral, Brijesh Jadav, Sujith Shivalingappa, Jason Jones
{"title":"Flexible and efficient perspective transform engine","authors":"Mihir Mody, Rajshekar Allu, Niraj Nandan, Gang Hua, Hetul Sanghvi, Shashank Dabral, Brijesh Jadav, Sujith Shivalingappa, Jason Jones","doi":"10.1109/ICCE-ASIA.2017.8309322","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309322","url":null,"abstract":"Perspective transform (or Homography) is commonly used in image and computer vision processing, which typically solved using a back mapping algorithm. It is used in multiple use-cases e.g. view point change, fish-eye lens distortion correction, chromatic aberration correction, stereo image pair alignments etc. Prior work in literature addresses individual use-case by selecting data format, interpolation method and block sizes due to constraints of irregular data fetch. In this paper, we propose an area efficient and flexible solution for perspective transform engine to address multiple use-cases with software controlled data format, interpolation method and block size. The proposed solution consists of multiple innovative techniques namely On-The-Fly (OTF) transform, Off-line mesh based Look up Table (LUT) with optional down-sampling, corner pre-fetch and dual interpolation. The proposed solution achieves clock up- to 300 MHz with output pixel throughput of 1 cycle/pixel and 0.21 mm2 of silicon area in 28nm LP-CMOS process node.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132878600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of transformed malwares using permission flow graphs","authors":"R. Seth, Rishabh Kaushal","doi":"10.1109/ICCE-ASIA.2017.8309324","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8309324","url":null,"abstract":"With growing popularity of Android, it's attack surface has also increased. Prevalence of third party android marketplaces gives attackers an opportunity to plant their malicious apps in the mobile eco-system. To evade signature based detection, attackers often transform their malware, for instance, by introducing code level changes. In this paper we propose a lightweight static Permission Flow Graph (PFG) based approach to detect malware even when they have been transformed (obfuscated). A number of techniques based on behavioral analysis have also been proposed in the past; how-ever our interest lies in leveraging the permission framework alone to detect malware variants and transformations without considering behavioral aspects of a malware. Our proposed approach constructs Permission Flow Graph (PFG) for an Android App. Transformations performed at code level, often result in changing control flow, however, most of the time, the permission flow remains invariant. As a consequences, PFGs of transformed malware and non-transformed malware remain structurally similar as shown in this paper using state-of-the-art graph similarity algorithm. Furthermore, we propose graph based similarity metrics at both edge level and vertex level in order to bring forth the structural similarity of the two PFGs being compared. We validate our proposed methodology through machine learning algorithms. Results prove that our approach is successfully able to group together Android malware and its variants (transformations) together in the same cluster. Further, we demonstrate that our proposed approach is able to detect transformed malware with a detection accuracy of 98.26%, thereby ensuring that malicious Apps can be detected even after transformations.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131324649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dependence of hall effect flow sensor frequency on the attached inlet and outlet pipe size","authors":"J. Lalnunthari, H. H. Thanga","doi":"10.1109/ICCE-ASIA.2017.8307842","DOIUrl":"https://doi.org/10.1109/ICCE-ASIA.2017.8307842","url":null,"abstract":"Hall Effect flow sensor YF-S201 is one of the most common, inexpensive, reliable and accurate flow sensor used in many applications for liquid flow rate measurement. The accuracy of the sensor is due to the linear relationship between the sensor pulse frequency and the flowrate. However, there are various factors that could affect the calibration model, one of them being the attached pipe size configuration. The present work investigates how the Hall Effect sensor calibration curve parameters are affected by the externally attached pipe diameters. The result shows that as the attached pipe size become smaller than the internal diameter of the sensor, the slope and intercept of the calibration curve is found to decrease and increase respectively. This means that the slope of 7.5 Hz per liter per minute (calibration factor) as specified by the by manufacturer of YF-S201 Hall Effect flow sensor cannot be used for higher accuracy requirement when the externally attached pipe size is smaller than the sensor internal diameter.","PeriodicalId":202045,"journal":{"name":"2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}