Lecture Secure, Trusted and Trustworthy Computing Trusted Execution Environments Intel SGX

Size: px
Start display at page:

Download "Lecture Secure, Trusted and Trustworthy Computing Trusted Execution Environments Intel SGX"

Transcription

1 1 Lecture Secure, and Trustworthy Computing Execution Environments Intel Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Winter Term 2015/2016

2 Intel Software Guard Extensions () [ckeen et al, Hoekstra et al., Anati et al., HASP 13] Security critical code isolated in enclave Only CPU is trusted Transparent memory encryption 18 new instructions Enclaves cannot harm the system Only unprivileged code (CPU ring3) emory protection Designed for ulti-core systems ulti-threaded execution of enclaves Parallel execution of enclaves and untrusted code Enclaves are interruptible Programming Reference available APP1 APP2 Enclave Security Service Operating System CPU Hardware Slide Nr. 2, Lecture Secure, and Trustworthy Computing, WS 2015/16

3 Enclaves Enclaves are isolated memory regions of code and data One part of physical memory (RA) is reserved for enclaves It is called Enclave Page Cache (EPC) EPC memory is encrypted in the main memory (RA) hardware consists of the CPU-Die only EPC is managed by OS/V RA: Random Access emory OS: Operating System V: Virtual achine onitor (also known as Hypervisor) Slide Nr. 3, Lecture Secure, and Trustworthy Computing, WS 2015/16

4 Instructions and Data Structures 18 Instruction 13 Supervisor Instructions 5 User Instructions 13 Data Structures 8 data structures associated to a certain enclave 3 data structures associated to certain memory page(s) 2 data structures associated to overall resource management Slide Nr. 4, Lecture Secure, and Trustworthy Computing, WS 2015/16

5 Instructions Supervisor Instruction Description User Instruction Description ENCLS[EADD] Add a page ENCLU[EENTER] Enter an Enclave ENCLS[EBLOCK] Block an EPC page ENCLU[EEXIT] Exit an Enclave ENCLS[ECREATE] Create an enclave ENCLU[EGETKEY] Create a cryptographic key ENCLS[EDBGRD] Read data by debugger ENCLU[EREPORT] Create a cryptographic report ENCLS[EDBGWR] Write data by debugger ENCLU[ERESUE] Re-enter an Enclave ENCLS[EEXTEND] ENCLS[EINIT] ENCLS[ELDB] ENCLS[ELDU] ENCLS[EPA] ENCLS[EREOVE] ENCLS[ETRACK] ENCLS[EWB] Extend EPC page measurement Initialize an enclave Load an EPC page as blocked Load an EPC page as unblocked Add version array Remove a page from EPC Activate EBLOCK checks Write back/invalidate an EPC page Slide Nr. 5, Lecture Secure, and Trustworthy Computing, WS 2015/16

6 Data Structures Enclave Control Structure (SECS) Thread Control Structure (TCS) State Save Area (SSA) Page Information (PAGEINFO) Security Information (SECINFO) Paging Crypto etadata (PCD) Enclave Signature Structure (SIGSTRUCT) EINT Token Structure (EINITTOKEN) Report (REPORT) Report Target Info (TARGETINFO) Key Request (KEYREQUEST) Version Array (VA) Enclave Page Cache ap (EPC) Slide Nr. 6, Lecture Secure, and Trustworthy Computing, WS 2015/16

7 Data Structures Details Enclave Control Structure (SECS) Represents one enclave Contains, for instance, Hash, ID, size etc. Thread Control Structure (TCS) Each executing thread in the enclave is associated with a Thread Control Structure Contains, for instance, Entry point, pointer to SSA State Save Area (SSA) When an AEX occurs while running in an enclave, the architectural state is saved in the thread s SSA AEX: Asynchronous Enclave Exit Slide Nr. 7, Lecture Secure, and Trustworthy Computing, WS 2015/16

8 Data Structures Details Page Information (PAGEINFO) PAGEINFO is an architectural data structure that is used as a parameter to the EPC-management instructions Linear Address Effective address of the page (aka virtual address) SECINFO SECS Security Information (SECINFO) The SECINFO data structure holds meta-data about an enclave page Read/Write/Execute Page type (SECS, TCS, normal page or VA) Slide Nr. 8, Lecture Secure, and Trustworthy Computing, WS 2015/16

9 Data Structures Details Paging Crypto etadata (PCD) The PCD structure is used to keep track of crypto metadata associated with a paged-out page. Combined with PAGEINFO, it provides enough information for the processor to verify, decrypt, and reload a paged-out EPC page. EWB writes out (the reserved field and) AC values. ELDB/U reads the fields and checks the AC. Contains Enclave ID, SECINFO and AC AC: essage Authentication Code Slide Nr. 9, Lecture Secure, and Trustworthy Computing, WS 2015/16

10 Data Structures Details Version Array (VA) In order to securely store the versions of evicted EPC pages, defines a special EPC page type called a Version Array (VA). Each VA page contains 512 slots, each of which can contain an 8-byte version number for a page evicted from the EPC. When an EPC page is evicted, software chooses an empty slot in a VA page; this slot receives the unique version number of the page being evicted. When the EPC page is reloaded, a VA slot must hold the version of the page. If the page is successfully reloaded, the version in the VA slot is cleared. VA pages can be evicted, just like any other EPC page. When evicting a VA page, a version slot in some other VA page must be used to receive the version for the VA being evicted. Slide Nr. 10, Lecture Secure, and Trustworthy Computing, WS 2015/16

11 Data Structures Details Enclave Page Cache ap (EPC) EPC is a secure structure used by the processor to track the contents of the EPC. The EPC holds exactly one entry for each page that is currently loaded into the EPC. EPC is not accessible by software, and the layout of EPC fields are implementation specific. Contains, for instance, RWX, page type, linear address, state etc. Slide Nr. 11, Lecture Secure, and Trustworthy Computing, WS 2015/16

12 Data Structures Details Enclave Signature Structure (SIGSTRUCT) SIGSTRUCT contains information about the enclave from the enclave signer SIGSTRUCT includes ENCLAVEHASH as SHA256 SIGSTRUCT includes four 3072-bit integers (ODULUS, SIGNATURE, Q1, Q2) EINT Token Structure (EINITTOKEN) The EINIT token is used by EINIT to verify that the enclave is permitted to launch Contains, for instance, attributes, hash and signer of the enclave Authenticated with a cryptographic AC on EINITTOKEN using Launch key AC: essage Authentication Code Slide Nr. 12, Lecture Secure, and Trustworthy Computing, WS 2015/16

13 Data Structures Details Report (REPORT) The REPORT structure is the output of the EREPORT instruction Attributes of the enclave Hash of the enclave Signer of the enclave A set of data used for communication between the enclave and the target enclave A CAC on the report using report key Report Target Info (TARGETINFO) This structure is an input parameter to the EREPORT instruction. It is used to identify the enclave which will be able to cryptographically verify the REPORT structure returned by EREPORT Contains attributes and hash of target enclave Key Request (KEYREQUEST) This structure is an input parameter to the EGETKEY instruction. It is used for selecting the appropriate key and any additional parameters required in the derivation of that key. Slide Nr. 13, Lecture Secure, and Trustworthy Computing, WS 2015/16

14 emory Access Control Access control in two direction From enclaves to outside Isolating malicious enclaves Enclaves needs some means to communicate with the outside world, e.g., their host applications From outside to enclaves Enclave memory must be protected from Applications Privileged software (OS/V) Other enclaves OS: Operating System V: Virtual achine onitor (also known as Hypervisor) Slide Nr. 14, Lecture Secure, and Trustworthy Computing, WS 2015/16

15 AC from enclaves to outside From enclaves to outside All memory access has to conform to segmentation and paging policies by the OS/V Enclaves cannot manipulate those policies, only unprivileged instructions inside an enclave Code fetches from inside an enclave to a linear address outside that enclave will results in a #GP(0) exception AC: emory Access Control #GP(0): General Protection Fault Slide Nr. 15, Lecture Secure, and Trustworthy Computing, WS 2015/16

16 AC outside to enclaves From outside to enclaves Non-enclave accesses to EPC memory results in abort page semantics Direct jumps from outside to any linear address that maps to an enclave do not enable enclave mode and result in a about page semantics and undefined behavior Hardware detects and prevents enclave accesses using logical-to-linear address translations which are different than the original direct EA used to allocate the page. Detection of modified translation results in #GP(0) AC: emory Access Control EA: Enclave Access #GP(0): General Protection Fault Slide Nr. 16, Lecture Secure, and Trustworthy Computing, WS 2015/16

17 Control Structure Access No direct access to control structures Every EPC page has a type: SECS, TCS, normal page or VA Non are accessible from outside an enclave Only normal pages are accessible from inside an enclave SECS, TCS and VA are initialized and manipulated by the hardware Slide Nr. 17, Lecture Secure, and Trustworthy Computing, WS 2015/16

18 Keys SVNs Device Keys Owner Epoch Key Derivation Seal Key, Report Key, etc. SVN: Security Version Numbers Slide Nr. 18, Lecture Secure, and Trustworthy Computing, WS 2015/16

19 Create Enclave Loader User space Client driver Operating system SK/PK Hardware Slide Nr. 19, Lecture Secure, and Trustworthy Computing, WS 2015/16

20 Create Enclave 1 Loader User space Client driver Operating system SK/PK 1. Create App Hardware Slide Nr. 20, Lecture Secure, and Trustworthy Computing, WS 2015/16

21 Create Enclave 1 2 Loader User space Client driver Operating system SK/PK Hardware 1. Create App 2. Create app certificate (includes HASH(App) and Client PK) Slide Nr. 21, Lecture Secure, and Trustworthy Computing, WS 2015/16

22 Create Enclave Loader User space Client driver Operating system SK/PK Hardware 1. Create App 2. Create app certificate (includes HASH(App) and Client PK) 3. Upload App to Loader Slide Nr. 22, Lecture Secure, and Trustworthy Computing, WS 2015/16

23 Create Enclave Loader User space Client driver Operating system SK/PK Hardware 1. Create App 2. Create app certificate (includes HASH(App) and Client PK) 3. Upload App to Loader 4. Create enclave Slide Nr. 23, Lecture Secure, and Trustworthy Computing, WS 2015/16

24 Create Enclave Loader Enclave 5 User space Client driver 5 Operating system SK/PK Hardware 1. Create App 2. Create app certificate (includes HASH(App) and Client PK) 3. Upload App to Loader 4. Create enclave 5. Allocate enclave pages Slide Nr. 24, Lecture Secure, and Trustworthy Computing, WS 2015/16

25 Create Enclave Loader Enclave 5 User space Client driver 5 Operating system SK/PK Hardware 1. Create App 2. Create app certificate (includes HASH(App) and Client PK) 3. Upload App to Loader 4. Create enclave 5. Allocate enclave pages 6. Load & easure App Slide Nr. 25, Lecture Secure, and Trustworthy Computing, WS 2015/16

26 Create Enclave Loader Enclave 5 User space Client driver 5 Operating system SK/PK 7 Hardware 1. Create App 2. Create app certificate (includes HASH(App) and Client PK) 3. Upload App to Loader 4. Create enclave 5. Allocate enclave pages 6. Load & easure App 7. Validate certificate and enclave integrity Slide Nr. 26, Lecture Secure, and Trustworthy Computing, WS 2015/16

27 Create Enclave Loader Enclave 5 User space Client driver 5 Operating system SK/PK 7 8 K Hardware 1. Create App 2. Create app certificate (includes HASH(App) and Client PK) 3. Upload App to Loader 4. Create enclave 8. Generate enclave K key 5. Allocate enclave pages 6. Load & easure App 7. Validate certificate and enclave integrity Slide Nr. 27, Lecture Secure, and Trustworthy Computing, WS 2015/16

28 Create Enclave Loader Enclave 5 User space Client driver 5 Operating system SK/PK 7 K 8 Hardware 1. Create App 2. Create app certificate (includes HASH(App) and Client PK) 3. Upload App to Loader 4. Create enclave 8. Generate enclave K key 5. Allocate enclave pages 6. Load & easure App 7. Validate certificate and enclave integrity 9. Protect enclave Slide Nr. 28, Lecture Secure, and Trustworthy Computing, WS 2015/16

29 Enclave Enclave Creation Details Application Encl. Code EPC list OS EPC EPC RA U EE CPU # Key ID n n+1 EPC: Enclave Page Cache EPC: EPC ap EE: emory Encryption Engine U: emory anagement Unit SECS: Enclave Control Structure Slide Nr. 29, Lecture Secure, and Trustworthy Computing, WS 2015/16

30 Enclave Enclave Creation Details Application Encl. Code 1b. Allocate EP to App 1a. Request Enclave Pages EPC list OS EPC EPC RA U EE CPU # Key ID n n+1 EPC: Enclave Page Cache EPC: EPC ap EE: emory Encryption Engine U: emory anagement Unit SECS: Enclave Control Structure Slide Nr. 30, Lecture Secure, and Trustworthy Computing, WS 2015/16

31 SECS Enclave Enclave Creation Details Application 2a. ECREATE(SECS) Encl. Code 1b. Allocate EP to App 1a. Request Enclave Pages EPC list OS EPC EPC RA U EE CPU # Key ID n n+1 2b. Init SECS EPC: Enclave Page Cache EPC: EPC ap EE: emory Encryption Engine U: emory anagement Unit SECS: Enclave Control Structure Slide Nr. 31, Lecture Secure, and Trustworthy Computing, WS 2015/16

32 SECS Enclave Enclave Creation Details Application 2a. ECREATE(SECS) 3a. EADD(*src, *dest) 3b. copy Encl. Code 1b. Allocate EP to App 1a. Request Enclave Pages EPC list OS EPC EPC RA U EE CPU # Key ID n n+1 2b. Init SECS EPC: Enclave Page Cache EPC: EPC ap EE: emory Encryption Engine U: emory anagement Unit SECS: Enclave Control Structure Slide Nr. 32, Lecture Secure, and Trustworthy Computing, WS 2015/16

33 SECS Enclave Enclave Creation Details Application 2a. ECREATE(SECS) 3a. EADD(*src, *dest) 3b. copy Encl. 4a. EEXTEND(*src) Code 1b. Allocate EP to App 1a. Request Enclave Pages EPC list 4b. Hardware measures OS EPC EPC RA U EE CPU # Key ID n n+1 2b. Init SECS EPC: Enclave Page Cache EPC: EPC ap EE: emory Encryption Engine U: emory anagement Unit SECS: Enclave Control Structure Slide Nr. 33, Lecture Secure, and Trustworthy Computing, WS 2015/16

34 SECS Enclave Enclave Creation Details Application 2a. ECREATE(SECS) 3a. EADD(*src, *dest) 3b. copy Encl. 4a. EEXTEND(*src) Code 5a. EINT 1b. Allocate EP to App 1a. Request Enclave Pages EPC list 4b. Hardware measures OS EPC EPC 5b. Update HASH RA U EE CPU # Key ID n n+1 K PK 2b. Init SECS EPC: Enclave Page Cache EPC: EPC ap EE: emory Encryption Engine U: emory anagement Unit SECS: Enclave Control Structure Slide Nr. 34, Lecture Secure, and Trustworthy Computing, WS 2015/16

35 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ISR EPC list OS U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 35, Lecture Secure, and Trustworthy Computing, WS 2015/16

36 TCS Enclave Enclave Entry and Exit Details Stack Application AEP EENTER(TCS, AEP) EPC list ISR OS U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 36, Lecture Secure, and Trustworthy Computing, WS 2015/16

37 TCS Enclave Enclave Entry and Exit Details Stack Application AEP EENTER(TCS, AEP) EPC list ISR OS U CPU EPC EPC RA EE Lock TCS, start Enclave AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 37, Lecture Secure, and Trustworthy Computing, WS 2015/16

38 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ISR EPC list OS U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 38, Lecture Secure, and Trustworthy Computing, WS 2015/16

39 TCS Enclave Enclave Entry and Exit Details Application Stack AEP EEXIT ISR EPC list OS U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 39, Lecture Secure, and Trustworthy Computing, WS 2015/16

40 TCS Enclave Enclave Entry and Exit Details Application Stack AEP EEXIT ISR EPC list OS U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 40, Lecture Secure, and Trustworthy Computing, WS 2015/16

41 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ISR EPC list OS U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 41, Lecture Secure, and Trustworthy Computing, WS 2015/16

42 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ISR EPC list OS Interrupt U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 42, Lecture Secure, and Trustworthy Computing, WS 2015/16

43 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ISR EPC list OS Interrupt U CPU EPC EPC Save context in Enclave RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 43, Lecture Secure, and Trustworthy Computing, WS 2015/16

44 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ISR EPC list OS Interrupt U CPU EPC EPC Save context in Enclave RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 44, Lecture Secure, and Trustworthy Computing, WS 2015/16

45 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ISR EPC list OS U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 45, Lecture Secure, and Trustworthy Computing, WS 2015/16

46 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ISR EPC list OS U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 46, Lecture Secure, and Trustworthy Computing, WS 2015/16

47 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ERESUE EPC list ISR OS U CPU EPC EPC RA EE AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 47, Lecture Secure, and Trustworthy Computing, WS 2015/16

48 TCS Enclave Enclave Entry and Exit Details Application Stack AEP ERESUE EPC list ISR OS U CPU EPC EPC RA EE Resume Enclave AEP: Async Exit Point EPC: Encl. Page Cache EPC: EPC ap ISR: Int. Service Routine EE: em. Enc. Engine TCS: Thread Control Structure Slide Nr. 48, Lecture Secure, and Trustworthy Computing, WS 2015/16

49 Create Enclave Secure Channel Shared memory Enclave1 Enclave2 User space Operating system Slide Nr. 49, Lecture Secure, and Trustworthy Computing, WS 2015/16

50 Create Enclave Secure Channel 1 Shared memory Enclave1 Enclave2 User space Operating system 1. Generate DH params Slide Nr. 50, Lecture Secure, and Trustworthy Computing, WS 2015/16

51 Create Enclave Secure Channel 1 Shared memory Enclave1 Enclave2 User space 2 Operating system 1. Generate DH params 2. Create Report Slide Nr. 51, Lecture Secure, and Trustworthy Computing, WS 2015/16

52 Create Enclave Secure Channel 1 Shared memory Enclave1 Enclave2 User space 2 Operating system 3 1. Generate DH params 2. Create Report 3. Generate Report = (HASH(Enclave1), ID-Enclave2, DH-params) Slide Nr. 52, Lecture Secure, and Trustworthy Computing, WS 2015/16

53 Create Enclave Secure Channel 1 Shared memory Enclave1 Enclave2 User space 2 Operating system 3 1. Generate DH params 2. Create Report 3. Generate Report = (HASH(Enclave1), ID-Enclave2, DH-params) 4. Authenticate Report using AC with target enclave s shared key Slide Nr. 53, Lecture Secure, and Trustworthy Computing, WS 2015/16

54 Create Enclave Secure Channel 1 Shared memory 5 Enclave1 Enclave2 User space 2 Operating system 3 1. Generate DH params 2. Create Report 3. Generate Report = (HASH(Enclave1), ID-Enclave2, DH-params) 4. Authenticate Report using AC with target enclave s shared key 5. Pass Report (shared memory) Slide Nr. 54, Lecture Secure, and Trustworthy Computing, WS 2015/16

55 Create Enclave Secure Channel 1 Shared memory 5 Enclave1 Enclave2 User space 2 Operating system 3 1. Generate DH params 4. Authenticate Report using AC with target enclave s shared key 6. Get enclave s share key 2. Create Report 3. Generate Report = (HASH(Enclave1), ID-Enclave2, DH-params) Slide Nr. 55, Lecture Secure, and Trustworthy Computing, WS 2015/16 5. Pass Report (shared memory)

56 Create Enclave Secure Channel 1 Shared memory 5 7 Enclave1 Enclave2 User space 2 Operating system 3 1. Generate DH params 4. Authenticate Report using AC with target enclave s shared key 6. Get enclave s share key 2. Create Report 3. Generate Report = (HASH(Enclave1), ID-Enclave2, DH-params) 7. Validate report Slide Nr. 56, Lecture Secure, and Trustworthy Computing, WS 2015/16 5. Pass Report (shared memory)

57 Create Enclave Secure Channel 1 Shared memory 5 7 Enclave1 Enclave2 User space 2 Operating system 3 1. Generate DH params 4. Authenticate Report using AC with target enclave s shared key 6. Get enclave s share key 2. Create Report 3. Generate Report = (HASH(Enclave1), ID-Enclave2, DH-params) 7. Validate report 8. Repeat for other direction Slide Nr. 57, Lecture Secure, and Trustworthy Computing, WS 2015/16 5. Pass Report (shared memory)

58 Remote Attestation Enclave1 Quoting Enclave User space Operating system Slide Nr. 58, Lecture Secure, and Trustworthy Computing, WS 2015/16

59 Remote Attestation nonce Enclave1 Quoting Enclave User space Operating system 1. Verifier sends nonce Slide Nr. 59, Lecture Secure, and Trustworthy Computing, WS 2015/16

60 Remote Attestation nonce Enclave1 Quoting Enclave User space Operating system 1. Verifier sends nonce 2. Generate Report = (HASH(Enclave1), ID-Enclave0, nonce) Slide Nr. 60, Lecture Secure, and Trustworthy Computing, WS 2015/16

61 Remote Attestation nonce Enclave1 Quoting Enclave User space Operating system 1. Verifier sends nonce 3. Pass Report to Quoting Enclave 2. Generate Report = (HASH(Enclave1), ID-Enclave0, nonce) Slide Nr. 61, Lecture Secure, and Trustworthy Computing, WS 2015/16

62 Remote Attestation nonce Enclave1 Quoting Enclave User space Operating system 1. Verifier sends nonce 3. Pass Report to Quoting Enclave 2. Generate Report = (HASH(Enclave1), ID-Enclave0, nonce) 4. Quoting Enclave verifies Report Slide Nr. 62, Lecture Secure, and Trustworthy Computing, WS 2015/16

63 Remote Attestation nonce Enclave1 Quoting Enclave User space Operating system 1. Verifier sends nonce 3. Pass Report to Quoting Enclave 2. Generate Report = (HASH(Enclave1), ID-Enclave0, nonce) 4. Quoting Enclave verifies Report 5. Signs Report with Platform Key Slide Nr. 63, Lecture Secure, and Trustworthy Computing, WS 2015/16

64 Remote Attestation nonce Enclave1 Quoting Enclave User space Operating system 1. Verifier sends nonce 3. Pass Report to Quoting Enclave 6. Signed Report is send to verifier 2. Generate Report = (HASH(Enclave1), ID-Enclave0, nonce) 4. Quoting Enclave verifies Report Slide Nr. 64, Lecture Secure, and Trustworthy Computing, WS 2015/16 5. Signs Report with Platform Key

Lecture 14: Instruction Level Parallelism

Lecture 14: Instruction Level Parallelism Lecture 14: Instruction Level Parallelism Last time Pipelining in the real world Today Control hazards Other pipelines Take QUIZ 10 over P&H 4.10-15, before 11:59pm today Homework 5 due Thursday March

More information

6.823 Computer System Architecture Prerequisite Self-Assessment Test Assigned Feb. 6, 2019 Due Feb 11, 2019

6.823 Computer System Architecture Prerequisite Self-Assessment Test Assigned Feb. 6, 2019 Due Feb 11, 2019 6.823 Computer System Architecture Prerequisite Self-Assessment Test Assigned Feb. 6, 2019 Due Feb 11, 2019 http://csg.csail.mit.edu/6.823/ This self-assessment test is intended to help you determine your

More information

Chapter 10 And, Finally... The Stack

Chapter 10 And, Finally... The Stack Chapter 10 And, Finally... The Stack Stacks: An Abstract Data Type A LIFO (last-in first-out) storage structure. The first thing you put in is the last thing you take out. The last thing you put in is

More information

Advanced Superscalar Architectures. Speculative and Out-of-Order Execution

Advanced Superscalar Architectures. Speculative and Out-of-Order Execution 6.823, L16--1 Advanced Superscalar Architectures Asanovic Laboratory for Computer Science M.I.T. http://www.csg.lcs.mit.edu/6.823 Speculative and Out-of-Order Execution Branch Prediction kill kill Branch

More information

Parallelism I: Inside the Core

Parallelism I: Inside the Core Parallelism I: Inside the Core 1 The final Comprehensive Same general format as the Midterm. Review the homeworks, the slides, and the quizzes. 2 Key Points What is wide issue mean? How does does it affect

More information

Proxy Lookup Service of the Bank of Lithuania. Market Infrastructure Department Banking Service

Proxy Lookup Service of the Bank of Lithuania. Market Infrastructure Department Banking Service Proxy Lookup Service of the Bank of Lithuania Market Infrastructure Department Banking Service 30 May 2018 About us One Access Point To Access to European payment systems: STEP2, RT1 & TIPS Full SEPA service

More information

What s cooking. Bernd Wiswedel KNIME.com AG. All Rights Reserved.

What s cooking. Bernd Wiswedel KNIME.com AG. All Rights Reserved. What s cooking Bernd Wiswedel 2016 KNIME.com AG. All Rights Reserved. Outline Continued development of all products, including KNIME Server KNIME Analytics Platform KNIME Big Data Extensions (discussed

More information

Smart Grid What is it all about? Smart Grid Scenarios. Incorporation of Electric Vehicles. Vehicle-to-Grid Interface applying ISO/IEC 15118

Smart Grid What is it all about? Smart Grid Scenarios. Incorporation of Electric Vehicles. Vehicle-to-Grid Interface applying ISO/IEC 15118 Corporate Technology Security Considerations for the Electric Vehicle Charging Infrastructure Rainer Falk Siemens AG, CT RTC ITS : +49 89 636 51653 : rainer.falk@siemens.com Steffen Fries Siemens AG, CT

More information

In-Place Associative Computing:

In-Place Associative Computing: In-Place Associative Computing: A New Concept in Processor Design 1 Page Abstract 3 What s Wrong with Existing Processors? 3 Introducing the Associative Processing Unit 5 The APU Edge 5 Overview of APU

More information

CERTIFICATE. Siemens AG Siemens Certification Authority. has implemented the specification listed below for the following certification services.

CERTIFICATE. Siemens AG Siemens Certification Authority. has implemented the specification listed below for the following certification services. CERTIFICATE This is to certify that Werner-von-Siemens-Straße 1 80333 München has implemented the specification listed below for the following certification services. Scope: / Trust Service Provider (TSP)

More information

Topics on Compilers. Introduction to CGRA

Topics on Compilers. Introduction to CGRA 4541.775 Topics on Compilers Introduction to CGRA Spring 2011 Reconfigurable Architectures reconfigurable hardware (reconfigware) implement specific hardware structures dynamically and on demand high performance

More information

Multi Core Processing in VisionLab

Multi Core Processing in VisionLab Multi Core Processing in Multi Core CPU Processing in 25 August 2014 Copyright 2001 2014 by Van de Loosdrecht Machine Vision BV All rights reserved jaap@vdlmv.nl Overview Introduction Demonstration Automatic

More information

5 5 Supervisor Engine GE (Active) VS S720 10G SAL1313MAFM

5 5 Supervisor Engine GE (Active) VS S720 10G SAL1313MAFM PJCCRCORE 01#sh mod Mod Ports Card Type Model Serial No. 1 48 CEF720 48 port 10/100/1000mb Ethernet WS X6748 GE TX SAD091501Z0 5 5 Supervisor Engine 720 10GE (Active) VS S720 10G SAL1313MAFM 7 48 CEF720

More information

Implementation of a Control Concept for the Car-in-the-Loop Test Rig on the IPG Xpack4 Real-Time Target

Implementation of a Control Concept for the Car-in-the-Loop Test Rig on the IPG Xpack4 Real-Time Target Implementation of a Control Concept for the Car-in-the-Loop Test Rig on the IPG Xpack4 Real-Time Target Kevin Engleson Control Concepts for the Car-in-the-Loop Test Rig Institut für Mechatronische Systeme

More information

ASAM ATX. Automotive Test Exchange Format. XML Schema Reference Guide. Base Standard. Part 2 of 2. Version Date:

ASAM ATX. Automotive Test Exchange Format. XML Schema Reference Guide. Base Standard. Part 2 of 2. Version Date: ASAM ATX Automotive Test Exchange Format Part 2 of 2 Version 1.0.0 Date: 2012-03-16 Base Standard by ASAM e.v., 2012 Disclaimer This document is the copyrighted property of ASAM e.v. Any use is limited

More information

Hewlett-Packard Company 5400/8200 zl Switch Series. FIPS Non-Proprietary Security Policy

Hewlett-Packard Company 5400/8200 zl Switch Series. FIPS Non-Proprietary Security Policy Hewlett-Packard Company 5400/8200 zl Switch Series Module Name: HP Networking 5400 zl [1,2] and 8200 zl [3,4] Switch Series Hardware Versions: 5406 zl [1] 5412 zl [2], 8206 zl [3], 8212 zl [4] [A]; Switches:

More information

PC-I 04/104. Passive PC/CAN Interface HARDWARE MANUAL ENGLISH

PC-I 04/104. Passive PC/CAN Interface HARDWARE MANUAL ENGLISH PC-I 04/104 Passive PC/CAN Interface HARDWARE MANUAL ENGLISH HMS Technology Center Ravensburg GmbH Helmut-Vetter-Straße 2 88213 Ravensburg Germany Tel.: +49 751 56146-0 Fax: +49 751 56146-29 Internet:

More information

Porting Applications to the Grid

Porting Applications to the Grid Porting Applications to the Grid Charles Loomis Laboratoire de l Accélérateur Linéaire, Université Paris-Sud 11, Orsay, France Lecture given at the Joint EU-IndiaGrid/CompChem GRID Tutorial on Chemical

More information

e-smart 2009 Low cost fault injection method for security characterization

e-smart 2009 Low cost fault injection method for security characterization e-smart 2009 Low cost fault injection method for security characterization Jean-Max Dutertre ENSMSE Assia Tria CEA-LETI Bruno Robisson CEA-LETI Michel Agoyan CEA-LETI Département SAS Équipe mixte CEA-LETI/ENSMSE

More information

Compatibility of STPA with GM System Safety Engineering Process. Padma Sundaram Dave Hartfelder

Compatibility of STPA with GM System Safety Engineering Process. Padma Sundaram Dave Hartfelder Compatibility of STPA with GM System Safety Engineering Process Padma Sundaram Dave Hartfelder Table of Contents Introduction GM System Safety Engineering Process Overview Experience with STPA Evaluation

More information

CS 152 Computer Architecture and Engineering

CS 152 Computer Architecture and Engineering CS 152 Computer Architecture and Engineering Lecture 23 Synchronization 2006-11-16 John Lazzaro (www.cs.berkeley.edu/~lazzaro) TAs: Udam Saini and Jue Sun www-inst.eecs.berkeley.edu/~cs152/ 1 Last Time:

More information

Enhancing Energy Efficiency of Database Applications Using SSDs

Enhancing Energy Efficiency of Database Applications Using SSDs Seminar Energy-Efficient Databases 29.06.2011 Enhancing Energy Efficiency of Database Applications Using SSDs Felix Martin Schuhknecht Motivation vs. Energy-Efficiency Seminar 29.06.2011 Felix Martin Schuhknecht

More information

Direct-Mapped Cache Terminology. Caching Terminology. TIO Dan s great cache mnemonic. UCB CS61C : Machine Structures

Direct-Mapped Cache Terminology. Caching Terminology. TIO Dan s great cache mnemonic. UCB CS61C : Machine Structures Lecturer SOE Dan Garcia inst.eecs.berkeley.edu/~cs61c UCB CS61C : Machine Structures Lecture 31 Caches II 2008-04-12 HP has begun testing research prototypes of a novel non-volatile memory element, the

More information

Field Programmable Gate Arrays a Case Study

Field Programmable Gate Arrays a Case Study Designing an Application for Field Programmable Gate Arrays a Case Study Bernd Däne www.tu-ilmenau.de/ra Bernd.Daene@tu-ilmenau.de de Technische Universität Ilmenau Topics 1. Introduction and Goals 2.

More information

SEDONA FRAMEWORK BEST OPPORTUNITY FOR OPEN CONTROL

SEDONA FRAMEWORK BEST OPPORTUNITY FOR OPEN CONTROL Next- Generation Hardware Technology SEDONA FRAMEWORK BEST OPPORTUNITY FOR OPEN CONTROL ZACH NETSOV PRODUCT SPECIALIST, CONTEMPORARY CONTROLS May 9, 2017 THE NEED FOR OPEN CONTROLLERS Open protocols such

More information

How to generate the Sbox of Luffa

How to generate the Sbox of Luffa How to generate the Sbox of Luffa ESC2010@Remich (Jan.11.2010) Dai Watanabe SDL, Hitachi Luffa is a registered trademark of Hitachi, Ltd. 1 Outline Topic How to find an 4-bit sbox optimized for bit slice

More information

Lecture 31 Caches II TIO Dan s great cache mnemonic. Issues with Direct-Mapped

Lecture 31 Caches II TIO Dan s great cache mnemonic. Issues with Direct-Mapped CS61C L31 Caches II (1) inst.eecs.berkeley.edu/~cs61c UC Berkeley CS61C : Machine Structures Lecture 31 Caches II 26-11-13 Lecturer SOE Dan Garcia www.cs.berkeley.edu/~ddgarcia GPUs >> CPUs? Many are using

More information

Computer Architecture: Out-of-Order Execution. Prof. Onur Mutlu (editted by Seth) Carnegie Mellon University

Computer Architecture: Out-of-Order Execution. Prof. Onur Mutlu (editted by Seth) Carnegie Mellon University Computer Architecture: Out-of-Order Execution Prof. Onur Mutlu (editted by Seth) Carnegie Mellon University Reading for Today Smith and Sohi, The Microarchitecture of Superscalar Processors, Proceedings

More information

Setup of a multi-os platform based on the Xen hypervisor. An industral case study. Paolo Burgio

Setup of a multi-os platform based on the Xen hypervisor. An industral case study. Paolo Burgio Setup of a multi-os platform based on the Xen hypervisor An industral case study Paolo Burgio paolo.burgio@unimore.it Roberto Cavicchioli Ignacio Sanudo Olmedo Marco Solieri Who are we? High-Performance

More information

MAX PLATFORM FOR AUTONOMOUS BEHAVIORS

MAX PLATFORM FOR AUTONOMOUS BEHAVIORS MAX PLATFORM FOR AUTONOMOUS BEHAVIORS DAVE HOFERT : PRI Copyright 2018 Perrone Robotics, Inc. All rights reserved. MAX is patented in the U.S. (9,195,233). MAX is patent pending internationally. AVTS is

More information

FLEXIBILITY FOR THE HIGH-END DATA CENTER. Copyright 2013 EMC Corporation. All rights reserved.

FLEXIBILITY FOR THE HIGH-END DATA CENTER. Copyright 2013 EMC Corporation. All rights reserved. FLEXIBILITY FOR THE HIGH-END DATA CENTER 1 The World s Most Trusted Storage Platform More Than 20 Years Running the World s Most Critical Applications 1988 1990 1994 2000 2003 2005 2009 2011 2012 New Symmetrix

More information

TRITON ERROR CODES ERROR CODE MODEL SERIES DESCRIPTION RESOLUTION

TRITON ERROR CODES ERROR CODE MODEL SERIES DESCRIPTION RESOLUTION 0 8100, 9100, 9600, 9610, 9615, 9640, No errors 9650, 9700, 9710, 9705, 9750, RL5000 (SDD),RL5000 (TDM), RT2000, 9800, MAKO, SuperScrip 1 9615 Unsolicited note channel 1 2 9615 Unsolicited note channel

More information

Phaser 4600/4620 Laser Printer. Service Manual. Xerox Internal-Use Only

Phaser 4600/4620 Laser Printer. Service Manual. Xerox Internal-Use Only Phaser 4600/4620 Laser Printer Phaser 4600/4620 Service Manual Xerox Internal-Use Only About This Manual... How To Use This Manual... Service Safety Summary... Symbols Used On The Product... Voltage Measurement

More information

Organized by Hosted by In collaboration with Supported by

Organized by Hosted by In collaboration with Supported by technische universität dortmund Communication Networks Institute Evaluation of OCPP and IEC 61850 for Smart 1, Claus AmtrupAndersen 2, Christian Wietfeld 1 1 Dortmund University of Technology, Communication

More information

SENTRY ISOBUS Tip Flow Monitor. Software Version 1.00

SENTRY ISOBUS Tip Flow Monitor. Software Version 1.00 SENTRY 6141 U S E R M A N U A L ISOBUS Tip Flow Monitor Software Version 1.00 Copyrights 2016 TeeJet Technologies. All rights reserved. No part of this document or the computer programs described in it

More information

Series 905-IV16(E) CAN/CANopen Input Modules Installation and Operating Manual

Series 905-IV16(E) CAN/CANopen Input Modules Installation and Operating Manual Series 905-IV16(E) CAN/CANopen Input Modules Installation and Operating Manual Model 905 IV16 DC Input Module. Page 2 Operations Manual Table of Contents Table of Contents...2 Module Installation Procedure...3

More information

QS 100 LSM Power Management

QS 100 LSM Power Management 990000717 Revision A Table of Contents Revision History...2 Overview...3 Soft Start not complete fault...3 Under voltage fault...4 Under voltage warning limit...5 Over voltage maximum limit...5 Over voltage

More information

CIS 371 Computer Organization and Design

CIS 371 Computer Organization and Design CIS 371 Computer Organization and Design Unit 10: Static & Dynamic Scheduling Slides developed by Milo Martin & Amir Roth at the University of Pennsylvania with sources that included University of Wisconsin

More information

RAM-Type Interface for Embedded User Flash Memory

RAM-Type Interface for Embedded User Flash Memory June 2012 Introduction Reference Design RD1126 MachXO2-640/U and higher density devices provide a User Flash Memory (UFM) block, which can be used for a variety of applications including PROM data storage,

More information

Announcements. Programming assignment #2 due Monday 9/24. Talk: Architectural Acceleration of Real Time Physics Glenn Reinman, UCLA CS

Announcements. Programming assignment #2 due Monday 9/24. Talk: Architectural Acceleration of Real Time Physics Glenn Reinman, UCLA CS Lipasti, artin, Roth, Shen, Smith, Sohi, Tyson, Vijaykumar GAS STATION Pipelining II Fall 2007 Prof. Thomas Wenisch http://www.eecs.umich.edu/courses/eecs470 Slides developed in part by Profs. Austin,

More information

UKSM: Swift Memory Deduplication via Hierarchical and Adaptive Memory Region Distilling

UKSM: Swift Memory Deduplication via Hierarchical and Adaptive Memory Region Distilling UKSM: Swift Memory Deduplication via Hierarchical and Adaptive Memory Region Distilling Nai Xia* Chen Tian* Yan Luo + Hang Liu + Xiaoliang Wang* *: Nanjing University +: University of Massachusetts Lowell

More information

License Model Schedule Actuate License Models for the Open Text End User License Agreement ( EULA ) effective as of November, 2015

License Model Schedule Actuate License Models for the Open Text End User License Agreement ( EULA ) effective as of November, 2015 License Model Schedule Actuate License Models for the Open Text End User License Agreement ( EULA ) effective as of November, 2015 1) ACTUATE PRODUCT SPECIFIC SOFTWARE LICENSE PARAMETERS AND LIMITATIONS

More information

Formation Flying Experiments on the Orion-Emerald Mission. Introduction

Formation Flying Experiments on the Orion-Emerald Mission. Introduction Formation Flying Experiments on the Orion-Emerald Mission Philip Ferguson Jonathan P. How Space Systems Lab Massachusetts Institute of Technology Present updated Orion mission operations Goals & timelines

More information

Advanced Superscalar Architectures

Advanced Superscalar Architectures Advanced Suerscalar Architectures Krste Asanovic Laboratory for Comuter Science Massachusetts Institute of Technology Physical Register Renaming (single hysical register file: MIPS R10K, Alha 21264, Pentium-4)

More information

SmarTire TPMS Maintenance Hand Tool. Revision User Manual

SmarTire TPMS Maintenance Hand Tool. Revision User Manual SmarTire TPMS Maintenance Hand Tool Revision 1.03 User Manual Page 2 Table of Contents FCC Compliance Label...4 User Interface Illustration...4 Introduction...5 Testing Tire Sensors...5 Main Menu...6 Main

More information

Performance Analysis with Vampir

Performance Analysis with Vampir Performance Analysis with Vampir Bert Wesarg Technische Universität Dresden Outline Part I: Welcome to the Vampir Tool Suite Mission Event trace visualization Vampir & VampirServer The Vampir displays

More information

SmarTire TPMS Maintenance Hand Tool. Revision User Manual

SmarTire TPMS Maintenance Hand Tool. Revision User Manual SmarTire TPMS Maintenance Hand Tool Revision 1.04 User Manual Page 2 Table of Contents FCC Compliance Label... 4 User Interface Illustration... 4 Introduction... 5 Testing Tire Sensors... 5 Main Menu...

More information

Practical Resource Management in Power-Constrained, High Performance Computing

Practical Resource Management in Power-Constrained, High Performance Computing Practical Resource Management in Power-Constrained, High Performance Computing Tapasya Patki*, David Lowenthal, Anjana Sasidharan, Matthias Maiterth, Barry Rountree, Martin Schulz, Bronis R. de Supinski

More information

Fiorano ESB 2007 Oracle Enterprise Gateway Integration Guide

Fiorano ESB 2007 Oracle Enterprise Gateway Integration Guide An Oracle White Paper June 2011 Fiorano ESB 2007 Oracle Enterprise Gateway Integration Guide 1 / 25 Disclaimer The following is intended to outline our general product direction. It is intended for information

More information

PRODUCT DESCRIPTIONS AND METRICS

PRODUCT DESCRIPTIONS AND METRICS PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - AEM 5.6.1 Subscription OnPremise (2013v3) The Products and Services described in this PDM are subject to the applicable Sales Order, the terms of this PDM,

More information

Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code

Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code Jakub Breier, Xiaolu Hou and Yang Liu 10 September 2018 1 / 25 Table of Contents 1 Background and Motivation 2 Overview

More information

Computer Architecture ELE 475 / COS 475 Slide Deck 6: Superscalar 3. David Wentzlaff Department of Electrical Engineering Princeton University

Computer Architecture ELE 475 / COS 475 Slide Deck 6: Superscalar 3. David Wentzlaff Department of Electrical Engineering Princeton University Computer Architecture ELE 475 / COS 475 Slide Deck 6: Superscalar 3 David Wentzlaff Department of Electrical Engineering Princeton University 1 Agenda SpeculaJon and Branches Register Renaming Memory DisambiguaJon

More information

IN SPRINTS TOWARDS AUTONOMOUS DRIVING. BMW GROUP TECHNOLOGY WORKSHOPS. December 2017

IN SPRINTS TOWARDS AUTONOMOUS DRIVING. BMW GROUP TECHNOLOGY WORKSHOPS. December 2017 IN SPRINTS TOWARDS AUTONOMOUS DRIVING. BMW GROUP TECHNOLOGY WORKSHOPS. December 2017 AUTOMATED DRIVING OPENS NEW OPPORTUNITIES FOR CUSTOMERS AND COMMUNITY. MORE SAFETY MORE COMFORT MORE FLEXIBILITY MORE

More information

CS 152 Computer Architecture and Engineering. Lecture 15 - Advanced Superscalars

CS 152 Computer Architecture and Engineering. Lecture 15 - Advanced Superscalars CS 152 Comuter Architecture and Engineering Lecture 15 - Advanced Suerscalars Krste Asanovic Electrical Engineering and Comuter Sciences University of California at Berkeley htt://www.eecs.berkeley.edu/~krste

More information

Energy Efficient Content-Addressable Memory

Energy Efficient Content-Addressable Memory Energy Efficient Content-Addressable Memory Advanced Seminar Computer Engineering Institute of Computer Engineering Heidelberg University Fabian Finkeldey 26.01.2016 Fabian Finkeldey, Energy Efficient

More information

FUNCTIONAL SAFETY FOR AUTONOMOUS DRIVING

FUNCTIONAL SAFETY FOR AUTONOMOUS DRIVING FUNCTIONAL SAFETY FOR AUTONOMOUS DRIVING Dr. Justyna Zander, NVIDIA January 30, 2017 IS&T Int. Symposium on Electronic Imaging 2017; Autonomous Vehicles and Machines 2017; 29 January - 2 February, 2017

More information

Technical Information

Technical Information Technical Service 2/14 ENU WE02 9 WE02 - Re-programming Instrument Cluster (Workshop Campaign) Important Note: CRITICAL WARNING - THIS CAMPAIGN INCLUDES STEPS WHERE SEVERAL CONTROL UNITS IN THE VEHICLE

More information

SPARC T4-4 Server with. Oracle Database 11g Release 2

SPARC T4-4 Server with. Oracle Database 11g Release 2 SPARC T4-4 Server with Oracle Database 11g Release 2 TPC-H Rev. 2.14.2 TPC-Pricing 1.6.0 Report Date: September 26, 2011 Total System Cost Composite Query per Hour Metric Price / Performance $925,525 USD

More information

Technical Service Bulletin

Technical Service Bulletin 17 Oil pressure light on and/or rattle noise from engine at cold start 17 08 23 2015411/6 November 21, 2008. Supersedes Technical Service Bulletin Group 17 number 08-05 dated July 22, 2008 for reasons

More information

ELD DRIVER GUIDE June 21, 2018

ELD DRIVER GUIDE June 21, 2018 ELD DRIVER GUIDE June 21, 2018 Contents Getting Started with PrePass ELD...4 Enroll in the PrePass ELD Program... 4 For a Carrier Enroll in the ELD Service... 4 For a Driver Get Driver Login Information...

More information

Issue 2.0 December EPAS Midi User Manual EPAS35

Issue 2.0 December EPAS Midi User Manual EPAS35 Issue 2.0 December 2017 EPAS Midi EPAS35 CONTENTS 1 Introduction 4 1.1 What is EPAS Desktop Pro? 4 1.2 About This Manual 4 1.3 Typographical Conventions 5 1.4 Getting Technical Support 5 2 Getting Started

More information

CALIBRATION PROCEDURE NI Channel, ±10 V, 16-Bit Analog Voltage Output Module

CALIBRATION PROCEDURE NI Channel, ±10 V, 16-Bit Analog Voltage Output Module CALIBRATION PROCEDURE NI 9264 16-Channel, ±10 V, 16-Bit Analog Voltage Output Module This document contains the verification and adjustment procedures for the National Instruments 9264. For more information

More information

PowerChute TM Network Shutdown v4.0. User Guide. VMware

PowerChute TM Network Shutdown v4.0. User Guide. VMware PowerChute TM Network Shutdown v4.0 User Guide VMware 990-4595C-001 Publication Date: January 2015 Table of Contents Introduction... 1 UPS Configuration... 2 Network Configuration... 3 UPS Configuration

More information

VT-HACD-DPQ Digital Controller for electro-hydraulic Injection Molding Machines

VT-HACD-DPQ Digital Controller for electro-hydraulic Injection Molding Machines VT-HACD-DPQ Digital Controller for electro-hydraulic Injection Molding Machines Start-up DeviceNet Interface RE 30146-03-Z/08.07 2/120 Bosch Rexroth AG Hydraulics Start-up DeviceNet Interface RE 30146-03-Z/08.07

More information

Cloudprinter.com Integration

Cloudprinter.com Integration Documentation Cloudprinter.com Integration Page 1/ Cloudprinter.com Integration Description Integrating with a Cloudprinter.com has never been easier. Receiving orders, downloading artwork and signalling

More information

Finite Element Based, FPGA-Implemented Electric Machine Model for Hardware-in-the-Loop (HIL) Simulation

Finite Element Based, FPGA-Implemented Electric Machine Model for Hardware-in-the-Loop (HIL) Simulation Finite Element Based, FPGA-Implemented Electric Machine Model for Hardware-in-the-Loop (HIL) Simulation Leveraging Simulation for Hybrid and Electric Powertrain Design in the Automotive, Presentation Agenda

More information

Chapter 3: Computer Organization Fundamentals. Oregon State University School of Electrical Engineering and Computer Science.

Chapter 3: Computer Organization Fundamentals. Oregon State University School of Electrical Engineering and Computer Science. Chapter 3: Computer Organization Fundamentals Prof. Ben Lee Oregon State University School of Electrical Engineering and Computer Science Chapter Goals Understand the organization of a computer system

More information

Dell EMC SCv ,000 Mailbox Exchange 2016 Resiliency Storage Solution using 10K drives

Dell EMC SCv ,000 Mailbox Exchange 2016 Resiliency Storage Solution using 10K drives Dell EMC SCv3020 14,000 Mailbox Exchange 2016 Resiliency Storage Solution using 10K drives Microsoft ESRP 4.0 Abstract This document describes the Dell EMC SCv3020 storage solution for Microsoft Exchange

More information

Sinfonia: a new paradigm for building scalable distributed systems

Sinfonia: a new paradigm for building scalable distributed systems CS848 Paper Presentation Sinfonia: a new paradigm for building scalable distributed systems Aguilera, Merchant, Shah, Veitch, Karamanolis SOSP 2007 Presented by Somayyeh Zangooei David R. Cheriton School

More information

A14-18 Active Balancing of Batteries - final demo. Lauri Sorsa & Joonas Sainio Final demo presentation

A14-18 Active Balancing of Batteries - final demo. Lauri Sorsa & Joonas Sainio Final demo presentation A14-18 Active Balancing of Batteries - final demo Lauri Sorsa & Joonas Sainio Final demo presentation 06.12.2014 Active balancing project before in Aalto Respectable research was done before us. Unfortunately

More information

ZT-USB Series User Manual

ZT-USB Series User Manual ZT-USB Series User Manual Warranty Warning Copyright All products manufactured by ICP DAS are under warranty regarding defective materials for a period of one year, beginning from the date of delivery

More information

CS 152 Computer Architecture and Engineering. Lecture 14 - Advanced Superscalars

CS 152 Computer Architecture and Engineering. Lecture 14 - Advanced Superscalars CS 152 Comuter Architecture and Engineering Lecture 14 - Advanced Suerscalars Krste Asanovic Electrical Engineering and Comuter Sciences University of California at Berkeley htt://www.eecs.berkeley.edu/~krste

More information

Ampl2m. Kamil Herman Author of Ampl2m conversion tool. Who are you looking at

Ampl2m. Kamil Herman Author of Ampl2m conversion tool. Who are you looking at Who are you looking at Kamil Herman Author of conversion tool Senior automation engineer Working in Automation with ABB control systems since 1995 6 years in ABB Slovakia 2 year working for ABB Mannheim,

More information

CIPHERING & DECIPHERING UNITS

CIPHERING & DECIPHERING UNITS CIPHERING & DECIPHERING UNITS High throughput Ciphering / Deciphering Unit Telecommand Deciphering Unit HIGH THROUGHPUT CIPHERING / DECIPHERING UNIT Satellite Telecommand / Telemeasure Protection, Spreading

More information

PCT200 Powercast High-Function RFID Sensor Datalogger

PCT200 Powercast High-Function RFID Sensor Datalogger DESCRIPTION The PCT200 SuperTag is a high-functioning, datalogging RFID tag capable of measuring temperature, humidity, and light level with high accuracy. It contains a wirelessly rechargeable battery

More information

Tractor/Implement Electrification: Opportunities and Challenges

Tractor/Implement Electrification: Opportunities and Challenges Tractor/Implement Electrification: Opportunities and Challenges Prof. Dr. Jens Onno Krah, Cologne Univ. of Applied Sciences Dr. Joachim Sobotzik, Ag&Turf Global Platform Services, ETIC Mark Hambloch, PE

More information

FUNCTIONAL SAFETY SOLUTIONS in Solenoid Valves

FUNCTIONAL SAFETY SOLUTIONS in Solenoid Valves FUNCTIONAL SAFETY SOLUTIONS in Solenoid Valves Safety is reality and is part of our daily business. The same applies to ASCO; it is reality and part of your safety. You can rely on our focus on reliable

More information

Design and evaluate vehicle architectures to reach the best trade-off between performance, range and comfort. Unrestricted.

Design and evaluate vehicle architectures to reach the best trade-off between performance, range and comfort. Unrestricted. Design and evaluate vehicle architectures to reach the best trade-off between performance, range and comfort. Unrestricted. Introduction Presenter Thomas Desbarats Business Development Simcenter System

More information

Errors with S1/S2/S3/S4 Safety cards

Errors with S1/S2/S3/S4 Safety cards 30.04.2018 Valid for S1, S1-2 (S3), S2, S2-2 (S4) safety cards, version 0.1 to 1.0 Use for the list of errors Error numbers with index for errors of the safety card are shown on the LED display: Order

More information

JMS Performance Comparison Performance Comparison for Publish Subscribe Messaging

JMS Performance Comparison Performance Comparison for Publish Subscribe Messaging JMS Performance Comparison Performance Comparison for Publish Subscribe Messaging Entire contents 2002 2011, Fiorano Software and Affiliates. All rights reserved. Reproduction of this document in any form

More information

CALIBRATION PROCEDURE NI Channel, ±0.5 V, 24-Bit Simultaneous, Channel-to-Channel Isolated Analog Input Module

CALIBRATION PROCEDURE NI Channel, ±0.5 V, 24-Bit Simultaneous, Channel-to-Channel Isolated Analog Input Module CALIBRATION PROCEDURE NI 9238 4-Channel, ±0.5 V, 24-Bit Simultaneous, Channel-to-Channel Isolated Analog Input Module This document contains the verification and adjustment procedures for the NI 9238.

More information

CHAPTER 25. SUBSTANTIVE RULES APPLICABLE TO ELECTRIC SERVICE PROVIDERS.

CHAPTER 25. SUBSTANTIVE RULES APPLICABLE TO ELECTRIC SERVICE PROVIDERS. 25.211. Interconnection of On-Site Distributed Generation (DG). (a) (b) (c) Application. Unless the context indicates otherwise, this section and 25.212 of this title (relating to Technical Requirements

More information

Release Notes. Scania Diagnos & Programmer 3 Version 2.28

Release Notes. Scania Diagnos & Programmer 3 Version 2.28 en-gb Release Notes Scania Diagnos & Programmer 3 Version 2.28 Version 2.28 replaces version 2.27 of Scania Diagnos & Programmer 3 and supports the systems for vehicles in the P, G, R, S and T series,

More information

Fixing the Hyperdrive: Maximizing Rendering Performance on NVIDIA GPUs

Fixing the Hyperdrive: Maximizing Rendering Performance on NVIDIA GPUs Fixing the Hyperdrive: Maximizing Rendering Performance on NVIDIA GPUs Louis Bavoil, Principal Engineer Booth #223 - South Hall www.nvidia.com/gdc Full-Screen Pixel Shader SM TEX L2 DRAM CROP SM = Streaming

More information

Extrusion Plastomelter -Standard Operating Procedure [Updated June 30, 2015]

Extrusion Plastomelter -Standard Operating Procedure [Updated June 30, 2015] Tinius Olsen MP 600 Melt Indexer Location of Machine: Composites Lab, RFM 1218 Location of SOP and Machine Operating & Safety Manual: Composites Lab website under resources; Composites Lab TRACS site;

More information

Challenges of Precision Testing of EV Drives

Challenges of Precision Testing of EV Drives Challenges of Precision Testing of EV Drives Future Powertrain Conference 2017 David Meek (M.Eng and Man) Chief Engineer 1 st March 2017 What We Do What We Do Everyday Where Which Economic Sectors Assurance

More information

Computer Architecture 计算机体系结构. Lecture 3. Instruction-Level Parallelism I 第三讲 指令级并行 I. Chao Li, PhD. 李超博士

Computer Architecture 计算机体系结构. Lecture 3. Instruction-Level Parallelism I 第三讲 指令级并行 I. Chao Li, PhD. 李超博士 Computer Architecture 计算机体系结构 Lecture 3. Instruction-Level Parallelism I 第三讲 指令级并行 I Chao Li, PhD. 李超博士 SJTU-SE346, Spring 2018 Review ISA, micro-architecture, physical design Evolution of ISA CISC vs

More information

Installing Proactive Monitoring for PowerCenter Operations 2.0 HotFix 1 on Solaris

Installing Proactive Monitoring for PowerCenter Operations 2.0 HotFix 1 on Solaris Installing Proactive Monitoring for PowerCenter Operations 2.0 HotFix 1 on Solaris 2012-2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means

More information

MetaXpress PowerCore System Installation and User Guide

MetaXpress PowerCore System Installation and User Guide MetaXpress PowerCore System Installation and User Guide Version 1 Part Number: 0112-0183 A December 2008 This document is provided to customers who have purchased MDS Analytical Technologies (US) Inc.

More information

Welcome to the waitless world. CBU for IBM i. Steve Finnes

Welcome to the waitless world. CBU for IBM i. Steve Finnes CBU for IBM i Steve Finnes finnes@us.ibm.com CBU for IBM i Offering for IBM i HA/DR environments Consolidation environments (AIX, i and Linux) for HA/DR operations Offering Supports Optional permanent

More information

Customer Training Catalog Training Proposal. Training Description for Network Energy COMMERCIAL IN CONFIDENCE 1

Customer Training Catalog Training Proposal. Training Description for Network Energy COMMERCIAL IN CONFIDENCE 1 Customer Catalog Proposal Description for Network Energy COMMERCIAL IN CONFIDENCE 1 Customer Catalog Proposal CONTENTS 1 Path... 3 1.1 Power Supply Path... 4 1.2 Data Center Facility Path... 5 1.3 UPS

More information

Lecture 20: Parallelism ILP to Multicores. James C. Hoe Department of ECE Carnegie Mellon University

Lecture 20: Parallelism ILP to Multicores. James C. Hoe Department of ECE Carnegie Mellon University 18 447 Lecture 20: Parallelism ILP to Multicores James C. Hoe Department of ECE Carnegie Mellon University 18 447 S18 L20 S1, James C. Hoe, CMU/ECE/CALCM, 2018 18 447 S18 L20 S2, James C. Hoe, CMU/ECE/CALCM,

More information

RS232. CAN. Integration with Tachograph Continental VDO DTCO

RS232. CAN. Integration with Tachograph Continental VDO DTCO RS232. CAN. Integration with Tachograph Continental VDO DTCO User Manual www.galileosky.com Contents Necessary Tools, Equipment and Materials... 3 General Information... 4 Connecting tachograph to the

More information

KNIME Server Workshop

KNIME Server Workshop KNIME Server Workshop KNIME.com AG 2017 KNIME.com AG. All Rights Reserved. Agenda KNIME Products Overview 11:30 11:45 KNIME Analytics Platform Collaboration Extensions Performance Extensions Productivity

More information

Using cloud to develop and deploy advanced fault management strategies

Using cloud to develop and deploy advanced fault management strategies Using cloud to develop and deploy advanced fault management strategies next generation vehicle telemetry V 1.0 05/08/18 Abstract Vantage Power designs and manufactures technologies that can connect and

More information

Fluid Monitoring Station

Fluid Monitoring Station Fluid Monitoring Station Executive Summary The Option Industries Fluid Monitoring Station (FMS) is a portable unit which monitors and records fluid rates and total volumes of water pulled from location.

More information

Use of the ERD for administrative monitoring of Theta:

Use of the ERD for administrative monitoring of Theta: Use of the ERD for administrative monitoring of Theta: Re-implementing xthwerrlog, sedc and related Cray utilities in Go alexk@anl.gov ALCF 1 Argonne Leadership Computing Facility Who we are The Argonne

More information

Memory Analysis RECon2010. Looking In The Eye Of The Bits By Assaf Nativ

Memory Analysis RECon2010. Looking In The Eye Of The Bits By Assaf Nativ Memory Analysis RECon21 Looking In The Eye Of The Bits By Assaf Nativ Who am I? Wandering in memory land 1 2 3 4 5 6 7 8 9 A B C D E F 1 11 12 13 14 A 11 FF 1F FF 1F FF 1F FF 18F FF 1F FF 1F FF 1F FF

More information

INTRODUCTION AND INTEGRATION OF DRIVEWORKS ON DRIVE PX2. Aaraadhya Narra, Alessandro Ferrari

INTRODUCTION AND INTEGRATION OF DRIVEWORKS ON DRIVE PX2. Aaraadhya Narra, Alessandro Ferrari INTRODUCTION AND INTEGRATION OF DRIVEWORKS ON DRIVE PX2 Aaraadhya Narra, Alessandro Ferrari WHAT WILL YOU LEARN IN THIS LAB? Overview Introduction to Drive PX2 Hardware setup with Drive PX2 Developing

More information

Powermite 599 MT Series SSC Electronic Valve Actuator, 24 Vac Floating Control

Powermite 599 MT Series SSC Electronic Valve Actuator, 24 Vac Floating Control Powermite 599 MT Series SSC Electronic Valve Actuator, 24 Vac Floating Control Document No. 155-314P25 EA 599-16 Description Features Application Product Numbers The Powermite 599 MT Series SSC81U and

More information