MT

M. Taouil

23 records found

Semi-Permeable Secure Air-Gap Technology

Hardware-enforced security with software adaptability

With the rapid rise of cyberattacks and state-sponsored cyber warfare, securing critical infrastructure has become increasingly urgent. Traditional defences such as firewalls and intrusion detection systems are frequently bypassed, leaving internal systems vulnerable. Air-gapped ...
Digital pre-distortion (DPD) is a well-established and highly effective technique for linearizing radio frequency power amplifiers. With the advent of 5.5G/6G base stations and Wi-Fi 7, DPD has become increasingly critical to support wideband signals and higher data rates. State- ...
This thesis presents the design and evaluation of a low-power wireless sensor system intended to operate in conjunction with a vibrational piezoelectric energy harvester and a power conditioning circuit inside a plane wing. The system was tested in a controlled laboratory environ ...
Driver drowsiness poses significant road safety risks to both drivers and other users. This thesis proposes and evaluates a novel grip-strength sensing system that leverages the Humantenna effect, in which the human body picks up ambient electric fields from power lines, to monit ...

Secure Task Management in FreeRTOS

A RISC-V Core Approach with Physical Memory Protection

The demand for embedded devices, such as intelligent sensors, smartwatches, medical implants, and computing chips in cars, has been rising steadily in the past and is expected to continue for the coming decade. Their high and increasing degree of connectivity expands the attack s ...
Chip forensics has become an important aspect of law enforcement for retrieving data from data carriers. Improving data encryption techniques, smaller technology nodes and increasing chip design complexity instigate the constant need for new software and hardware hacking methods. ...

Power Grid Simulation

Forecasting & Scenario

This thesis presents the process of design and implementation of a power grid simulator, with focus on the power grid configuration and load forecasting as part of a larger project. The overarching project aims to address the increasing complexity of power grids and the occurence ...
The n-body problem is the simulation of pair-wise interactions between n objects. This problem appears in many forms, with the classic example being the modeling of gravitational forces between point masses, necessary for cosmological simulations. Many approximation approaches ha ...
Resistive random access memory (RRAM) is an emerging memory technology that has the potential to replace dynamic random access memory (DRAM) or FLASH. The current memory technology suffer from scalability issues. RRAM can be used as potential replacement for Flash and DRAM. RRAM ...

FPGA-based soft error correction for the memory of microcontrollers

A generic methodology to transparent soft error correction for the off-chip memory of microcontrollers operating in space

Manufacturers of CubeSats prefer the use of COTS electronic components such as microcontrollers (MCU) and SDRAM but these components are vulnerable to errors caused by radiation. A specific type of error caused by radiation are soft errors which can be corrected by Error Detectio ...
In recent years, computers have found their way into nearly every part of life. This led to the creation of many embedded devices, which are usually quite different from the more commonly known computers and each other. The cause of this is the diversity in constraints that are p ...

Formjackers

Towards an Internet-scale Survey of Credit Card Skimming on the Web

We propose a novel, dynamic analysis-based detection solution for formjackers. The operating principle of these formjackers, or card skimmers on the web, is typically simple, yet effective: when making a payment on webshop that has been infected with a formjacker, the submitted p ...
Side-channel Attacks can be performed in various ways by measuring the power consumption, the electromagnetic emission, or even by measuring an algorithm's execution time on the targeted device. More or less sophisticated methods can be used to utilize this information in order t ...
Modern implementations of encryption algorithms on CPU’s that use frequent memory lookups of precomputed functions, are vulnerable to Cache based Side­Channel Attacks. The ρ­-VEX processor, a runtime reconfigurable VLIW processor developed at the Computer and Quantum Engineering ...

Modeling the physics of RRAM defects

A model simulating RRAM defects on a macroscopic physical level

Resistive RAM, or RRAM, is one of the emerging non-volatile memory (NVM) technologies, which could be used in the near future to fill the gap in the memory hierarchy between dynamic RAM (DRAM) and Flash, or even completely replace Flash. RRAM operates faster than Flash, but is st ...
Pavement undergoes a fast deterioration process either due to the damages induced by weather conditions, an increase in traffic flow and load, or passive factors like aging of infrastructure. Thus requiring periodic rehabilitation measures to maintain the condition of the underly ...
This report details the design of an instrumentation system to be used on a skeleton sled. The system will measure data during the run on a skeleton track using several sensors and process and visualise the data afterwards in order to shorten the learning curve of the athlete and ...