PESW 2015
The 3rd Prague Embedded Systems Workshop
July 2-4, 2015
Roztoky u Prahy, Czech Republic

Keynotes

System design, science or art?

Speaker: Robert Kvaček, ASICentrum

System design, probably the most difficult and most exciting engineering job. It is close to the art. It is a way of thinking. And it is not easy to describe it, to learn it and to do it. This presentation is a very small introduction to the amazing world of System Architecture.
System designer profile is the first chapter. Being like Leonardo da Vinci is a great advantage in this job. There is no need to be a leading expert in a specific domain, but it is absolutely necessary to have an advanced overview in all domains an architecture is built from.
System designer tools is the second part. Three main tools for making this art are pen, pencil and spreadsheet. And the engineer's creative brain.
The last part is a short guide to main system design activities. Decomposition, block specifications, key parameters estimation, modelling, testing. We will take a simple SoC Bluetooth device as an example.

On noise, humans and unpunished examplicides

Speaker: Jan Schmidt, FIT CTU

Any measurement, any observation is affected by noise. One can take the easy path of common assumptions and quantitative methods of evaluation. Yet there is a harder path that leads to understanding, and there one must be much more cautious with noise. If the input is of human origin, as is the case in Electronic Design Automation, valid assumptions are difficult and sometimes impossible to achieve. The question what characterizes human input has an interesting history, but has never been answered completely. Examples of real designs are a valuable asset. Yet it can shown that some of them had been treated so badly that that lost their human character. The consequences were, sadly, blind paths of research and lost time; we propose better ways to store and present industrial examples.

Cryptanalytical attacks on objects of daily usage

Speaker: Martin Novotný, FIT CTU

Cryptography finds its application area in many contemporary objects of daily usage. GSM communication, credit cards, tickets for public transport or RFID tags employ cryptographic features either to protect privacy or to ensure trustworthy authentication. However, many such objects are vulnerable to certain cryptanalytical attacks. In our presentation we will discuss how FPGA-based cryptanalytical hardware may compromise GSM communication, or how standard laboratory equipment may be used for breaking SmartCard security. Finally, we would debate one of recent cryptographic challenges, namely protection of dependable systems against cryptanalytical attacks.