Поиск по строке:

Ассемблер для Raspberry Pi. Практическое руководство

Михаил Райтман, Брюс Смит

26 октября, 2023

Книги

68995285 [Михаил Райтман, Брюс Смит] Ассемблер для Raspberry Pi. Практическое руководство

Описание книги:

Рассмотрены основы программирования на языке ассемблера для процессоров ARM на примере Raspberry Pi с операционной системой Raspberry Pi OS. Приведены подробные сведения об архитектуре и особенностях ARM, вызовах операционной системы. Подробно описан синтаксис ассемблера для ARM. Рассмотрены компоновщик GCC, отладка с GDB, использование функций языка C в ассемблере с помощью библиотеки libc. Описаны функции GPIO, система команд ARM Neon и команды Thumb. Все разделы снабжены практическими примерами. Книга ориентирована на начинающих разработчиков, желающих освоить программирование на языке ассемблера для устройств с архитектурой ARM.

Электронный архив на сайте издательства содержит исходный код программ из книги.


Микродатчики и микросистемы

А. В. Гридчин

26 октября, 2023

Книги

69502672 [А. В. Гридчин] Микродатчики и микросистемы

Описание книги:

Представлены конструкции и принципы работы основных типов микродатчиков и микросистем, разработанных и применяемых в настоящее время. Даны определения основным терминам, используемым в микросистемной технике. Приведен перечень метрологических параметров, характеризующих микросистему как измерительный прибор. Отдельным вопросом рассмотрено компьютерное моделирование и проектирование микросистем на основе программного пакета ANSYS.

Для студентов, обучающихся по программам подготовки 12.04.01 «Приборостроение» и 28.03.01 «Нанотехнологии и микросистемная техника».


Processor Microarchitecture

Grigorios Magklis, Antonio Gonzalez, Fernando Latorre, Morgan & Claypool Publishers

27 ноября, 2021

Книги

55703919 [Grigorios Magklis, Antonio Gonzalez, Fernando Latorre, Morgan & Claypool Publishers] Processor Microarchitecture

Описание книги:

This lecture presents a study of the microarchitecture of contemporary microprocessors. The focus is on implementation aspects, with discussions on their implications in terms of performance, power, and cost of state-of-the-art designs. The lecture starts with an overview of the different types of microprocessors and a review of the microarchitecture of cache memories. Then, it describes the implementation of the fetch unit, where special emphasis is made on the required support for branch prediction. The next section is devoted to instruction decode with special focus on the particular support to decoding x86 instructions. The next chapter presents the allocation stage and pays special attention to the implementation of register renaming. Afterward, the issue stage is studied. Here, the logic to implement out-of-order issue for both memory and non-memory instructions is thoroughly described. The following chapter focuses on the instruction execution and describes the different functional units that can be found in contemporary microprocessors, as well as the implementation of the bypass network, which has an important impact on the performance. Finally, the lecture concludes with the commit stage, where it describes how the architectural state is updated and recovered in case of exceptions or misspeculations.

This lecture is intended for an advanced course on computer architecture, suitable for graduate students or senior undergrads who want to specialize in the area of computer architecture. It is also intended for practitioners in the industry in the area of microprocessor design. The book assumes that the reader is familiar with the main concepts regarding pipelining, out-of-order execution, cache memories, and virtual memory.

Table of Contents: Introduction / Caches / The Instruction Fetch Unit / Decode / Allocation / The Issue Stage / Execute / The Commit Stage / References / Author Biographies


Hardware Malware

Heidelinde Hobel, Adrian Dabrowski, Edgar Weippl, Christian Krieg, Morgan & Claypool Publishers

27 ноября, 2021

Книги

55706351 [Heidelinde Hobel, Adrian Dabrowski, Edgar Weippl, Christian Krieg, Morgan & Claypool Publishers] Hardware Malware

Описание книги:

In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.


Рекомендуем