• DPA

    Background: Side Channel Analysis is a group of attacks that utilize side effects of implementations of cryptographic hardware to gain access to secrets. One of such attacks is a Differential Power Analysis (DPA). DPA is an extremely powerful technique that uses power consumption as a source of leakage. For this, many power traces of execution of cryptographic algorithm are collected and processed. Machine learning techniques are then used to correlate between the power traces and the secret keys. It was first published in 1996, and since then hundreds of works have been published on successful DPA attacks of different types and on protection methods.

    Categories:
  • Climate1a
    בבניינים מרובי קומות (כגון הפקולטה שלנו) קימת בעיה קשה של חוסר מידע עדכני של הטמפרטורה והלחות בחדרי הבניין. רוב הבניין ממוזג על ידי מזגן מרכזי, במקרה של תקלה בחדר מסוים בו איש לא נמצא ביום יום (כגון חדרי שרתים) התקלה תתגלה רק אחרי מספר ימים, ולעתים אף חודשים. מטרת הפרויקט נדרש לפתח חישן   מחובר לרשת האינטרנט,  אשר ניתן יהיה להתקינו מקומית בקלות. החישן יהיה מסוגל למדוד טמפרטורה ולחות ולהעביר...
    Categories:
  • rpb-healtec
    ניתור מצבו של הכביש בדרכים בין עירוניות הינו קריטי למניעת תאונות ופקקי תנועה. לרוב ניתן לגלות סדקים או בורות תת קרקעיים לפני שהם הופכים לבעיה. אחת השיטות לניתור היא באמצעות הרעש שהכביש יוצר כאשר כלי רכב נעים עליו. כביש המכיל סדק יוצר רעש שונה מכביש בריא ללא סדקים. מטרת הפרויקט מימוש חישן חכם קטן וזול מאוד, אשר יהיה מסוגל לקלוט את הרעש שהכביש מיצר באמצעות מקרופון. מידע זה יועבר באלחוט...
    Categories:
  • eric_project

    Resistive Random Access Memory (RRAM) is an emerging technology based on the Memristor. It has made significant progress in the past decade as a competitive candidate for the next generation of non-volatile memory (NVM). But not only. Beyond the NVM applications, RRAM may also be used in Memristive Memory Computing applications. In this case RAM cells should go through a characterization procedure.

    Categories:
  • small_pic

    This project aim was to create an infrastructure who enable the end user to create and use hardware accelerators library using INtime for Windows RTOS and NetFPGA-SUME.
    Hardware accelerators are created with Xilinx Partial Reconfiguration technology that gives us the ability the ability to swap accelerators at real-time without affecting other operational part of the system.

    Categories:
  • 3dprinter

    Background
    In recent years, three-dimensional printers have developed from mere curiosities to Daily working tool to graphic artist, product engineers, mechanical engineers, and more. However, three-dimensional printer device remains very expensive, difficult to maintain and operate, and requires expensive spare parts.

    Categories:
  • gps_u

    Background

    The problem in common GPS systems is indoor use. In closed spaces there is no satellite reception. More over the error in a GPS system is more than a few meters. Using GPS based navigation systems in shopping centers will be useless.

    This project will implement a location system based on location and velocity of ultrasonic waves, for small spaces such as laboratories, conference halls and shopping malls. The system will be based on low price ARDUINO development boards.

    Categories:
  • D10112

    Background

    Vast majority of the modern digital VLSI devices utilize a technique called 'full scan' for production testing. This technique chains all the device registers (flip-flops or latches) in a few shift registers called 'scan chains'. In this configuration, a production tester may use the scan chains to drive logic values to the inputs of combinatoric circuits, sample the results from their outputs, output the results via the same scan chains and check them with the expected results. This method allows testing every chip for correct behavior, and make sure no defects were inserted during chip production. The full scan technique is an effective technique that allows reaching high test coverage in a short development time. However, in applications where security (e.g. data confidentiality, IP protection, etc) is a concern, it can introduce a serious threat.

  • res_mem

    Background: Resistive memory is a new technology based on a passive circuit element called Memristor, which changes its resistance value based on the current flowing through it. Memristors are nanoscale elements that can be easily integrated in a typical VLSI manufacturing process. Therefore, they present high potential as a super-sized embedded memory in various applications. One of them is security. Most of the semiconductor devices that deal with security need an embedded memory. Resistive RAM can be a good match for this purpose. But is it really secure? Various side channel attacks such as power analysis (SPA/DPA) are known today as an efficient attack that can reveal secrets from secure devices. The goal of this project is to check whether power analysis can reveal information about data read or written into resistive RAM.

    Categories:
  • fuel_f

    The fuel theft problem is one of the most difficult problems in managing fleets of vehicles. The theft itself can happen from the fuel transporter tanker itself and up to vehicles and trucks that uses the fuel.
    In recent years, several systems were developed to detect incidents of fuel theft in privet cars and trucks. The problem in trucks is critical since fuel tank hold more than 400 liter of fuel.
    One method for detecting theft is by monitoring the sensor signal that measures the amount of fuel in tank. This method is problematic since the sensor measures the fuel level in the tank, and not the volume of the fuel. Vibration of the vehicle, ups and downs, standing on a slope can create a lot of false alarms.

    Categories: