Fostering Design and Automation of
Electronic and Embedded Systems

 

Magazine

  • News and Alerts

  • Design and Test is now on Twitter! twitter follow
  • Design & Test is happy to welcome Prof. Joerg Henkel (Karlsruhe Institute of Technology) as its new Editor in Chief!
  • Design & Test welcomes several new members to its editorial board, effective Jan. 1st 2016!

LATEST NEWSLETTER & ISSUE

 

Design & Test
Magazine
Volume 34, Issue 4 (July/August)

 

CEDA: IEEE Council on Electronic Design Automation
CAS: Circuits & Systems Society
TTTC: Test Technology Technical Council
SSCS: IEEE Solid-State Circuits Society
IEEE

Highlights
Special Issue on "Cyber-Physical Systems Security and Privacy"  
Survey on "Security and Privacy in Cyber-Physical Systems: A Survey of Surveys"
Tutorial on "Overview of 3-D Architecture Design Opportunities and Techniques"
Perspective from Gabe Moretti, "Accellera’s Support for ESL Verification and Stimulus Reuse"

July/August 2017 Content

From the EIC
Cyber-Physical Systems Security and Privacy
  View full article (PDF) here.

Cyber-Physical Systems Security and Privacy
Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy
  View full article (PDF) here.
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys
 
The following is a survey on surveys and may help the interested reader to find a way through the jungle of literature on the security and CPS topics out there already. In order to ease the search, the authors ... read more.
View full article (PDF) here.
Side Channels of Cyber-Physical Systems: Case Study in Additive Manufacturing
 
As 3-D printers are becoming increasingly relevant in various domains, including critical infrastructure, cyber-security questions naturally arise. This article investigates ... read more.
View full article (PDF) here.
Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications
 
This article focuses on detecting attacks to power system with the help of cyber-physical co-modeling. The foundational algorithm used to detect attacks is a ... read more.
View full article (PDF) here.
Data Attack Detection and Command Authentication via Cyber-Physical Comodeling
 
In this article, the authors study the problem of efficient authenticated encryption algorithms for use in embedded devices. In particular, they describe ... read more.
View full article (PDF) here.
Fault Diagnosis and Network Anomaly Detection in Water Infrastructures
 
Testing cybersecurity techniques for critical infrastructure on real-world setups is economically infeasible and lacks flexibility. In order to address this challenge, this article presents ... read more.
View full article (PDF) here.

General Interest Papers
A Platform to Analyze DDR3 DRAM’s Power and Retention Time
 
The authors explore the intrinsic trade-off in a DRAM between the power consumption (due to refresh) and the reliability. Their unique platform allows ... read more.
View full article (PDF) here.

Departments
Overview of 3-D Architecture Design Opportunities and Techniques
  Access Article (PDF) here.
Accellera’s Support for ESL Verification and Stimulus Reuse
  Access Article (PDF) here.
Report on DATE 2017 in Lausanne
  Access Article (PDF) here.
Practice Makes Perfect
  Free Access Article (PDF) here.


Click for Table-of-Contents.

Jörg Henkel, KIT, Karlsruhe
Editor-in-Chief
 

Current Issue Details (Vol. 34, Issue 2)

 

July August 17 Cover

Table of Contents

View Popular Articles

 
Early Access Articles Submit a Manuscript
Add Journal to My Alerts Subscribe via RSS