Index

Symbols

32-bit ARM architecture 273-275

32-bit ARM assembly language 282-284

ARM addressing modes 277

ARM instruction categories 279

ARM register set 275, 276

data types 274

distinct execution privilege levels 274

64-bit ARM architecture 284

64-bit ARM assembly language 286, 287

instruction set 285

limitations 285

64-bit RISC-V 310, 311

256-bit Secure Hashing Algorithm (SHA-256) 130

6502 addressing modes 66

absolute addressing mode 67, 68

absolute indexed addressing mode 68-70

immediate addressing mode 66

indirect indexed addressing mode 70, 71

6502 architecture

instruction categories, implementing 71

6502 architecture, instruction categories

arithmetic instructions 73

branching instructions 74

interrupt-related instructions 75

logical instructions 74

memory load instructions 72

memory store instructions 72

NOP instruction 76

processor flag instructions 75

register-to-register data transfer instructions 72

stack instructions 72, 73

subroutine call and return instructions 75

6502 flags 20, 21

6502 instruction set 22-24

6502 microprocessor 18-22

6502 processor 54, 55

Arithmetic Logic Unit (ALU) 54, 58-63

control unit 54-57

functional units 54

interrupt handling 76

registers 64, 65

register set 54

6502 processor, interrupt input

BRK instruction processing 79, 80

IRQ processing 76-78

NMI processing 78

8087 floating-point coprocessor 237, 238

80386 processor

features 250, 251

A

A64 284

AArch64 284

abort exception 325

absolute addressing mode 67, 68

absolute indexed addressing mode 68-70

accelerometer 428

access violation exception 181

accumulator addressing mode 74

activation function 165

Ada programming language 47

Adaptive Cruise Control (ACC) 423

adders 41

addressing mode 22

address space layout randomization (ASLR) 176

adiabatic quantum computation 460, 461

Advanced Micro Devices (AMD) 250

Advanced RISC Machine (ARM) 126

Advanced Schottky Transistor-Transistor Logic (AS) TTL 44

Advanced Vector Extensions (AVX) 222

air-gapped computing 379

aliasing 204

Alienware Aurora Ryzen Edition R10 gaming desktop 347

Nvidia GeForce RTX 3090 GPU 348, 349

Ryzen 9 5950X branch prediction 348

subsystems 350, 351

altcoins 417

AMD64 268

AMD virtualization (AMD-V) 327

amperes (amps) 28

analog 152

analog-to-digital converter (ADC) 152-155

AND gate 33

Android Debug Bridge (adb) tool 284

Android Studio integrated development environment (IDE) 282

Android Studio Native Development Kit (NDK) 283

Antminer S19 Pro 414

AntPool

reference link 413

Apple Neural Engine 344

application binary interface (ABI) 296

application software

security, ensuring 390

application virtualization 322

architectural level

security, designing 386

architecture-independent device drivers 126

arithmetic instructions 73

Arithmetic Logic Unit (ALU) 54, 58-63

ARM addressing modes 277

double register indirect 279

double register indirect, with scaling 279

immediate 277

register direct 278

register indirect 278

register indirect, with offset 278

register indirect with offset, post-incremented 278

register indirect with offset, pre-incremented 278

ARM architectures 273

ARM instruction categories

arithmetic and logic 280

breakpoint 281

comparisons 280

conditional execution 281, 282

control flow 281

load/store 279

other instruction categories 282

register movement 280

stack manipulation 279

supervisor mode 281

ARM processor virtualization 334

ARMv8-A 275

Ars Technica

URL 465

artificial intelligence (AI) 165

artificial neural networks (ANNs) 165, 435

ASICs

used, for bitcoin mining 413-416

assembly language 22

associative memory 189

atomic 149

atomic memory operation (AMO) 307

automated computing devices

Charles Babbage's Analytical Engine 2, 3

Electronic Numerical Integrator and Computer (ENIAC) 4

evolution 2

IBM PC 5

iPhone 9, 10

autonomous driving stages

edge cases, handling 425, 426

obstacle avoidance 425

road following 425

traffic rules, obeying 425

autonomous vehicle

components and processes 444

computing architecture 443, 444

state and surroundings, sensing 427

Avalanche 344

B

backing store 196

bandpass filter 159

bandstop filter 159

bare metal hypervisor 321

Base Pointer (BP) 6

B extension 309

bfloat16 format 365

bi-endianness 67

big data 164

binary coded decimal (BCD) 21, 238

binary number 14-18

binary semaphore 150

binary translation 327

BIOS 124, 125

BIOS boot 128

bipolar 89

bipolar junction transistor (BJT) 89

bit 15

bitcoin 396-399

full node 403

genesis block 399

miners 397

transaction fees 407

bitcoin block header fields

bitcoin version number 410

bits 410

Merkle root 410

nonce 410

previous block hash 410

time 410

Bitcoin cash 418

bitcoin core software 403

download link 403

bitcoin mining

economics 416

with ASICs 413-416

with CPU 408

with FPGAs 411, 412

with GPU 408, 409

bitcoin mining computer architectures 409, 410

bitcoin mining pool 405-408

bitcoin mining process 404, 405

bitcoin mining systems 397

bitcoin network

block, updating with new transactions 404

data, modifying in transaction header 405

timestamp, altering within block 404

bitline 94

Bitmain 413

reference link 413

Blizzard 344

blockchain 396-399

boot configuration data (BCD) 129

boot loader 128

boot priority order

versus multi-booting 128

boot process 127, 128

BIOS boot 128

embedded devices 131

trusted boot 130

UEFI boot 128, 129

bot-herder 372

botnet 372

branching instructions 74, 213

branch prediction 219

Break flag 21

BRK instruction processing 79, 80

brute force algorithm 401

brute force password attack 373

BTC.com

reference link 413

buffer overflow 175, 390, 391

business desktop computer 168

bypass 216

byte 15

C

cache coherence problem 208

cache hit 196

cache lines 201

cache memory 196-198

examples 196, 197

cache miss 196

capacitance 93

capacitor 92, 93

carbon nanotube field-effect transistor (CNTFET) 462, 463

advantages 463

barriers 463

Carry flag 21

Central Processing Unit (CPU) 54

used, for bitcoin mining 408

Charles Babbage's Analytical Engine 2, 3

chiplets 454

chipset 100

Chisel 315

classical physics 456

cleared

versus set 17

client node 403

clock multiplier 45

clock signal 44, 45

closed system 10

cloud application, WSC

deploying 359-362

cloud compute server 167

cloud computing

versus virtualization 338

virtualization, using 338

code segment (CS) 332

combinational logic 35

command-line interface 126

command shell 391

Common Weakness Enumeration (CWE)

reference link 393

comparator 153

compiler 22

complementary MOS (CMOS) 91

complex instruction set computer (CISC) 64, 215

computational instructions 298

functions 298, 299

computer architect

considerations 342, 343

computer architecture 14

6502 instruction set 22-24

6502 microprocessor 18-22

binary number 14-18

evolution 450, 451

hexadecimal number 14-18

numbers, representing with voltage levels 14

conditional branching 218, 219

confidential computing 383-385

continuous learning 464, 465

control and status registers (CSRs) 300

control flow instructions 299

control unit 54-57

instruction, executing 57, 58

convolution 157

Convolutional Neural Network (CNN) 431, 432

example implementation 433-435

using, in autonomous driving applications 435-440

cooperative multithreading 137

Coordinated Universal Time (UTC) 410

counter type ADC 154

counting semaphore 150

covert channel attacks 379

critical path 43

critical section 151

cross-site scripting attack 391

cryptocurrency 417-419

cryptographic hash function 130

current-generation motor vehicle operations

accelerator 422

brake 422

gear selection 422

steering 422

current program status register (CPSR) 276

cyberattack techniques

botnet 372

password attacks 372, 373

phishing 372

vulnerability exploitation 373

cybersecurity threat categories

criminal groups 371

hacktivists 371

industrial spies 371

insiders 372

national governments 370

terrorist organizations 371

white-hat hacking 371

cybersecurity threats 370

post-exploitation actions 376, 377

D

data at rest 383

data block

SHA-256 hash, computing 402

data caches 197

data compression 161

data execution prevention (DEP) 176

dataflow processing 218

data in transit 383

data in use 383

data parallelism 163

data processors

GPUs as 164

DDR5 SDRAM 96-98

reference link 97

deadlock 150

Decimal mode flag 21

deep learning 165-167

Denial-of-Service (DoS) attack 372, 375

depletion mode 89

DeskPro 9

Destination Index (DI) 6

device driver 118, 119

parallel port 119, 120

PCIe device drivers 121

structure 122, 123

device memory protection 245

device specialization 454

digital filtering 158, 159

digital hold input signal 153

digital signal processor (DSP) 152, 177

digital-to-analog converters (DACs) 152-155

Digital Visual Interface (DVI) 108

digital wallets 396

direct addressing mode 67

direct-mapped cache 201-205

Direct Memory Access (DMA) 83, 84, 122

dirty bit 208

discrete cosine transform (DCT) 161

discrete Fourier transform (DFT) 159

disk drive caches 196

DisplayPort 109

Dogecoin 418

doping 30

dot product 155

double data rate (DDR) 96

drain terminal 89

DRAM bit cell 94, 95

DRAM circuits

capacitor 93

constructing, with MOSFET 92

DDR5 SDRAM 96-98

DRAM bit cell 94-96

Graphics DDR (GDDR) 99

prefetching 99

driving task fallback 423

DSP hardware features 155-157

dual inline memory module (DIMM) 97

DVI variants

DVI-A 108

DVI-D 108

DVI-I 108

dynamic RAM (DRAM) 92, 196

dynamic translation 328

dynamic voltage and frequency scaling (DVFS) 241, 242, 301

E

eager execution 219

easy 6502

reference link 24

edge detection 436

edge-sensitive device 38

electrical circuits 28, 29

electrically erasable programmable read-only memory (EEPROM) 178

electrical power consumption 339

electromagnetic emissions 380

Electron Device Engineering Council (JEDEC) 97

Electronic Numerical Integrator and Computer (ENIAC) 4

embedded devices 131

enclaves 384

encryption of data at rest 381

encryption of data in transit 381

Engadget

URL 465

enhancement mode 89

error correcting code (ECC) 97

Ether 418

Ethereum 418

Ethernet 110, 111

exahash 406

exception

abort 325

fault 325

handling 226-229

in programming languages 229

trap 325

exponent 235

extrapolation 426

F

fair scheduling 138

farad 93

Fast Fourier transform (FFT) 159-162

applications in signal processing 160, 161

fault exception 325

Federal Information Processing Standards (FIPS) 400

feedforward network 166

field-programmable gate arrays (FPGAs) 47

RISC-V, implementing 313-317

used, for bitcoin mining 411, 412

filter bank 161

Fin Field-Effect Transistor (FinFET) 445

finite state machines 39

first come, first served (FCFS) 137

fixed-priority preemptive scheduling 137

flag 20

flashing the BIOS 124

flattening 438

Flexible Intermediate Representation for RTL (FIRRTL) 315

flip-flops 38, 39

floating-point arithmetic 234-237

floating-point instructions 213

floating-point unit (FPU) 213, 237

flushing the pipeline 219

frames 111

frequency bin 160

frequency selective filter 158

full adder 42

full-duplex 101

full virtualization 324

fully associative cache 206, 207

future-tolerant skill set

building 464

college education 466, 467

conferences and literature 467, 468

continuous learning 464, 465

G

gate array 46

gated D latch 36

gate terminal 89

general-purpose I/O (GPIO) 314

generation low-power double data rate RAM (LP-DDR4x) 344

Gizmodo

URL 465

globally unique identifier (GUID) 127

global minimum 460

Global Positioning System (GPS) 428

Global System for Mobile communications (GSM) 10

Google Compute Engine

reference link 322

GRand Unified Bootloader (GRUB) 126

graphic equalizer 161

Graphics DDR (GDDR) 99

graphics display 106, 107

Digital Visual Interface (DVI) 108

DisplayPort 109

High-Definition Media Interface (HDMI) 109

Video Graphics Array (VGA) 108

graphics processing unit (GPU) 13, 107

as data processors 164

processing 162, 163

used, for bitcoin mining 409

guests 321

GUID partition table (GPT) 127

H

half adder 42

half-duplex 101

half-precision floating-point 252

hard fault 185

Hardware 3.0 (HW3) 444

hardware debugger 244

hardware description languages 46

hardware emulation 328

hardware, warehouse-scale computer (WSC)

fault management 358

implementing 352, 353

Harvard architecture 156, 176, 177

hash algorithm 247

hash collision 401

hashrate 406

headless mode 354

hexadecimal number 14-18

hidden layers 166

high-bandwidth memory (HBM) 366

High-Definition Media Interface (HDMI) 109

high-end smartphone 168

highpass filter 158

High-Performance Computing (HPC) 310

high-performance gaming computer 168

High-Speed Input Output (HSIO) lanes 102

holes 89

host 321

hosted hypervisor 321

Hot plugging 121

hyperparameter 439

hypervisor 321

type-1 hypervisor 321

type-2 hypervisor 321

versus virtual machine monitor 321

hypervisor-extended supervisor mode (HS) 335

I

IBM PC 5

Intel 8088 microprocessor 6, 7

Intel 80286 microprocessor 8, 9

Intel 80386 microprocessor 8, 9

IBM Quantum

reference link 462

IEEE 754 floating-point standard 239

imaginary number 160

immediate addressing mode 22, 66

implied addressing mode 72

impulse response 158

indirect indexed addressing mode 70, 71

inertial sensors 428

infrastructure attacks 375

input layer 166

input/output operations

Direct Memory Access (DMA) 83, 84

fundamentals 80, 81

interrupt-driven I/O 82, 83

programmed I/O 82

Institute of Electrical and Electronic Engineers (IEEE) 110, 239

instruction-level parallelism (ILP) 214

instruction pipelining 211-214

Instruction Pointer (IP) 6

instruction set architecture (ISA) 294

instructions per clock (IPC) 212, 347

integer instructions 213

integrated circuit

design approach 453

integrated graphics 107

Intel 64 268

Intel Nervana neural network processor 363

Intel virtualization technology (VT-x) 327

internal encryption engine with key storage 244

internet of things (IoT) 310

interpolation 426

interrupt descriptor table register (IDTR) 332

Interrupt disable flag 21

interrupt-driven I/O 82, 83

interrupt-related instructions 75

Interrupt Request (IRQ) 73, 82

interrupts

handling 226-229

interrupt service routine (ISR) 227

interrupt vector table (IVT) 227

inverse Fourier transform 159

I/O subsystem 100

M.2 105

parallel data bus 100-102

PCI Express (PCIe) 103, 104

Serial AT Attachment (SATA) 104

serial data bus 100-102

Thunderbolt 106

Universal Serial Bus (USB) 105, 106

iPhone 9, 10

iPhone 13 Pro Max 343

components 345

subsystems 345-347

IRQ processing 76-78

J

J extension 309

junk conferences 467

K

Kalman filter 429

kernel 118, 231

kernel-based virtual machine (KVM) 337

kernel-mode drivers 118

keyboard 112

key logger 375

key page frame states

active page 188

bad page 188

free page 188

modified page 188

standby page 188

zeroed page 188

L

L1 cache 200, 201

L1 D-cache 201

L1 I-cache 201

Lane-Keeping Assistance (LKA) 423

Last-In, First-Out (LIFO) data structure 21

latch 35-37

least-recently used (LRU) 206

level 2 processor caches 209, 210

level 3 processor caches 209, 210

level-sensitive device 37

L extension 309

lidar-based driving systems

advantages 440, 441

disadvantages 441

light detection and ranging (lidar) 430

localization 440, 441

sensors 440

Litecoin 418

little-endian processor 67

load/store architecture 274

load value injection (LVI) 385

local area network (LAN) 110

locality of reference 197

local minimum 460

lockings 4

logical instructions 74

logic gates 30-35

long mode 268

lookup tables (LUTs) 313

lossless compression 161

lossy compression 161

lowpass filter 158

Low-Power DDR4 (LPDDR4) 445

Lunar Atmosphere Dust and Environment Explorer (LADEE) 459

M

M.2 105

malware (malicious software) 373

denial of service (DoS) attack 375

infrastructure attacks 375

key logger 375

man in the middle (MITM) attack 375

ransomware 374

spyware 374

SQL injection 375

viruses 374

worms 374

man in the middle (MITM) attack 375

mantissa 235

maskable interrupt 77

master boot record (MBR) 127

max pooling 437

memory access instructions 299

memory load and store instructions 72

memory management unit (MMU) 189, 190

functions 190, 191

memory pools 187, 188

memory protection extensions (MPX) 263

memory protection unit (MPU) 245

memory subsystem 88, 89

message 402

message queue 151

metal-oxide-semiconductor field-effect transistor (MOSFET) 89-92

used, for constructing DRAM circuits 92

mezzanine card 363

micro-operations 217, 218

mill 4

modern computer motherboard

specification 114-116

modern processors

virtualizing 331

modified Harvard architecture 156, 177

monitor 79

Moore's law 11-14, 46, 452

mouse 112-114

multi-booting

versus boot priority order 128

multi-core processors 141

multilevel feedback queue 138

multilevel processor caches 198, 199

multipath 111

multiple-input-multiple-output (MIMO) 111

multiple instruction, multiple data (MIMD) 141, 222

multiple-issue processing 214

multiplexer 34

multiply-accumulate (MAC) 155, 178, 222, 366

multiprocessing computer 141, 142

multiprogramming 179

multitasking 148

mutual exclusion (mutex) 149

mutual exclusion (mutex) issues

deadlock 150

priority inversion 149

thread preemption 149

N

natural boundary, of data type 252

natural language processing (NLP) 364

near-field communication (NFC) 169

Negative sign flag 20

Nervana neural network processor for inference (NNP-I) 366

form factors 367

Nervana neural network processor for training (NNP-T) 363, 366

NNP-T1000 363

NNP-T1300 363, 364

NNP-T1300, versus NNP-T1400 366

NNP-T1400 363

nested interrupt 77

nested virtualization 322

network interface 110

Ethernet 110

Wi-Fi 111, 112

network virtualization 323

neural networks and machine learning architectures 363

Intel Nervana neural network processor 363

neuron 165

N extension 309

nibble 16, 282

NMI processing 78

nonce 398

Non-Maskable Interrupt (NMI) 73

non-paged pool 187

non-preemptive scheduling 135

non-real-time operating systems 132

versus real-time operating system (RTOS) 132

nonvolatile memory (NVM) 125

NOP instruction 76

NOT gate 32

NPM transistor 30

null pointer exception 191

numbers

representing, with voltage levels 14

Nvidia GeForce RTX 3090 GPU 348

features 349

O

object tracking 441

Ohm's law 28

OnlineU, online college reviews

reference link 467

opcode 55

Open Compute Project (OCP) accelerator module (OAM) 363

operands 58

operating system 131, 132

operating system virtualization 321

operation code/opcode 22

OR gate 33

out-of-order instruction execution (OoO) 216

output layer 166

overclocking 114

Overflow flag 20

P

page 180

Page Directory Base Register (PDBR) 183

paged pool 188

paged virtual memory 182-186

page fault 184

page frame 182

page frame number (PFN) 188

page status bits 186, 187

page swapping 180

page table 182

page table directory 182

parallel data bus 100-102

limitations 100

parallel port 119, 120

paravirtualization 327

passband 159

password attacks 372, 373

password-protected hardware debugger interface 244

path traversal vulnerability 392, 393

PC AT (Advanced Technology) 8

PCIe device drivers 121

PCI Express (PCIe) 103, 104

perceptron 348

Peripheral Component Interconnect (PCI) 102, 119

personal computer architecture 347

Alienware Aurora Ryzen Edition R10 desktop PC 347

petabytes (PB) 164

P extension 309

Phase-locked loop (PLL) 45

phishing 372

physical memory 178, 179

piezoelectric effect 45

pipeline bubble 216

pipeline hazards 215-217

point cloud 431

pointer 191

polyvinyl chloride (PVC) 28

pooling 437

Portable Operating System Interface (POSIX) 322

positive edge-triggered D flip-flop 38

post-exploitation actions 376, 377

post-quantum cryptography 460

power consumption fluctuations 380

power management 240

techniques 240

Power-On Self-Test (POST) 124

predication 281

preemptive scheduling 135

prefetching 99

principle of least privilege 388

priority inheritance 150

priority inversion 149

private key 246

privileged processor modes 226

privilege escalation 376

privilege levels 304, 305

process control block (PCB) 135

processes 133-136

process identifier (PID) 135

processor cache write policies 207, 208

write-back 208

write-through 208

processor context 135

processor flag instructions 75

processor instruction caches 197

processor instruction set 65

processor virtualization methods

binary translation 327

hardware emulation 328

paravirtualization 327

trap-and-emulate virtualization 324-327

process priority 136-141

process states

blocked 134

initializing 134

running 134

waiting 134

Program Counter (PC) 55

programmed I/O 82

proof of stake 418

proof of work 404

propagation delay 43, 44

protection rings 230-232

pseudo-instructions 302, 303

public key 246

public-key cryptography 246

pulse's time of flight 430, 440

Q

Q extension 309

Qisket 462

URL 462

quantum bits/qubits 13, 458

quantum code-breaking 459, 460

quantum computing 458-462

quantum conferences

reference link 467

quantum decoherence 461

quantum entanglement 459

quantum error correction 461

quantum physics 455, 456

quantum superposition 458

quantum supremacy 461

queue 151

quick emulator (QEMU) 337

URL 329

R

R-2R ladder 152

rack-based servers, WSC 354-357

radio detection and ranging (radar) 430

radio frequency (RF) transmissions 152

random-access memory (RAM) 6, 55, 92, 178

ransomware 374

rate-monotonic scheduling (RMS) 137

raytracing 348

read-only memory (ROM) 6, 124, 178

real mode 251

real-time computing 146-148

real-time operating system (RTOS) 131, 148-151

versus non-real-time operating systems 132

Rectified Linear Unit (RELU) 437

recurrent network 166

reduced instruction set computer (RISC) 64, 215

register load and store instructions

offset 277

register 277

scaled register 277

register renaming 217, 218

registers 19, 40, 41, 64, 65

register set 54

register-to-register data transfer instructions 72

register-transfer level (RTL) 315

relative addressing mode 75

remote computing 384

Resource Monitor tool 135

reverse engineering 386

RGB 432

ring counter 39

ripple carry adder 42

RISC-V

implementing, in FPGA 313-317

RISC-V 32-bit integer instruction set (RV321) 305

RISC-V A extension 306, 307

RISC-V applications 294-298

RISC-V architecture 294-298

extensions 308

variants 309, 310

RISC-V assembly language 312

RISC-V base instruction set 298

computational instructions 298, 299

control flow instructions 299

memory access instructions 299

privilege levels 304, 305

pseudo-instructions 302, 303

system instructions 300, 301

RISC-V C extension 307, 308

RISC-V configurations 311

RISC-V D extension 308

RISC-V extensions 305, 306

RISC-V F extension 308

RISC-V M extension 306

RISC-V processor virtualization 334, 335

round-robin scheduling 137

routers 110

row hammering 379, 380

RV32E architecture 308

Ryzen 9 5950X processor

branch prediction 348

features 347

S

safer mode extensions (SMX) 263

sample-and-hold circuit 153

sandbox 320

Scala 315

Scalable Link Interface (SLI) 115

scheduling algorithms 136, 138-141

sector 105

Secure Guard Extensions (SGX) 384

secure hardware, features

attacks, anticipating 378, 379

data, identifying to be protected against unauthorized disclosure 378

secure system design

comprehensive secure design 387

principle of least privilege 388

zero trust architecture 388-390

secure system design, features

cryptographically secure key generation 382

encryption, of data at rest 381

encryption, of data in transit 381

secure boot procedure 382

secure key storage 381

tamper-resistant hardware design 383

security

avoiding, through obscurity 386, 387

designing, at architectural level 386

ensuring in application software 390

ensuring in system software 390

security technologies

device memory protection 245

internal encryption engine with key storage 244

password-protected hardware debugger interface 244

self-driving vehicles

autonomy levels 422-424

hardware and software requirements 426

overview 422

safety concerns 424-426

self-driving vehicles, autonomy levels

conditional driving automation 423

driver assistance 423

full driving automation 424

high driving automation 423

no driving automation 422

partial driving automation 423

self-modifying code 175

semaphore 150

semiconductor 29

sensor data

converting, into driving decisions 431

sensor data processing 442

lane-keeping task 442

objects, avoiding 443

road rules, complying with 442

vehicle path, planning 443

sensor types, used in autonomous vehicle designs

Global Positioning System (GPS) 428

inertial sensors 428

light detection and ranging (lidar) sensor 430

radio detection and ranging (radar) 430

sound navigation and ranging (sonar) 431

speedometer 428

video cameras 429

sequential logic 45

Serial AT Attachment (SATA) 104

serial data bus 100-102

Serial Peripheral Interface (SPI) 310

set

versus cleared 17

set associative cache 205, 206

Set-Reset (SR) 35

SHA-256 hash algorithm 400, 401

computing, of data block 402

shadow page tables 330

shellcode 391

shift register 39

Shor's algorithm 460

signal processing algorithm 157

convolution 157

digital filtering 158, 159

Fast Fourier transform (FFT) 159-162

signal-to-noise ratio (SNR) 157

silicon n-channel transistors 453

simultaneous multithreading 220, 221

single data rate (SDR) 96

single instruction, multiple data (SIMD) 10, 141, 309

processing 221-223

single processor instruction

execution, steps 211

small outline DIMM (SODIMM) 97

Smart contracts 418

smartphone architecture 343

iPhone 13 Pro Max 343

Society of Automotive Engineers (SAE) 422

SoC integration 454

soft fault 185

soft real-time system 146

software attestation procedure 384

software weaknesses 390

buffer overflow 390, 391

cross-site scripting 391

path traversal vulnerability 392, 393

SQL injection 391, 392

solid-state drive (SSD) controller 345

solid-state drives (SSDs) 105

solo mining 408

sound navigation and ranging (sonar) 431

source code security scans 393

Source Index (SI) 6

source terminal 89

spatial locality 197

spectral analysis 160

spectrum analyzers 160

speedometer 428

spin quantum number 457

spintronics 456-458

spin valve 457

split cache 201

spyware 374

SQL injection 375, 391, 392

square wave signal 44

stack instructions 72, 73

Stack Pointer (SP) 6, 21

Static RAM (SRAM) 199, 200

static translation 328

Status Flags (FLAGS) 6

stopband 159

stopband suppression 158

storage virtualization 323

centralized management 323

data migration 324

replication 324

Streaming SIMD Extensions (SSE) 222

subroutine call and return instructions 75

successive approximation 154

superpipelining 214, 215

superscalar processors 221

supervisor mode 232, 233

swap file 180

symmetric multiprocessing systems 141

synapses 165

synchronous circuit 40

synchronous DRAM (SDRAM) 96

synchronous logic 46

system calls 233, 234

system instructions 300, 301

system-on-chip (SoC) 273, 309

system security management 243, 244

system software

security, ensuring 390

T

T32 instruction set 273

tamper-resistant hardware design 383

TechCrunch

URL 465

temporal locality 197

tensor 365

TensorFlow 349

tensor processor clusters (TPCs) 366

terahash 406

terminate and stay resident (TSR) 179

Tesla HW3 Autopilot 444, 445

features 445, 446

test-and-set instruction 149

T extension 309

thermal fluctuations 380

thread control block (TCB) 135

thread identifier (TID) 135

thread preemption 149

threads 133-136

Thunderbolt 106

thwarting cyberattackers 246, 247

tile-based deferred rendering (TBDR) 344

time-slicing 133

TNW

URL 465

Tom's Hardware

URL 465

Top 25 Most Dangerous Software Weaknesses

reference link 393

training set 364

transactional synchronization extensions (TSX) 263

transistor 29, 30

Transistor-Transistor Logic (TTL) 119

translation lookaside buffer (TLB) 189, 196

trap-and-emulate virtualization 324-327

trap exception 325

trillion operations per second (TOPS) 366

Trusted Platform Module (TPM) 130, 245

authentication services 246

cryptographic key generation 245

cryptographic key storage 246

random number generation 245

system health monitoring 246

system integrity verification 246

truth table 32

two-input multiplexer 34

two's complement 17, 18

U

Unified Extensible Firmware Interface (UEFI)

applications 126

boot 128, 129

UEFI features

architecture-independent device drivers 126

faster booting 127

secure boot 127

Unified Extensible Firmware Interface (UEFI) 126, 127

unipolar transistor 89

Universal Serial Bus (USB) 105, 106

unsafe instructions 330, 332

unshielded twisted-pair (UTP) 110

user mode 232, 233

U.S. News & World Report, online college

reference link 467

V

V bit 335

vector 155

velocity 427

Verilog 47

very high-speed integrated circuit (VHSIC) 47

V extension 309

VHSIC hardware description language (VHDL) 47-51

video cameras

challenges 429

using 429

Video Graphics Array (VGA) 108

Virtual Address Extension (VAX) 181

VirtualBox 335

virtualization 320

using, in cloud computing 338

versus cloud computing 338

virtualization challenges 329

security 331

shadow page tables 330

unsafe instructions 330

virtualization tools 335

kernel-based virtual machine (KVM) 337

QEMU 337

VirtualBox 335

VMware ESXi 336

VMware Workstation 336

Xen 337

virtualization types

application virtualization 322

network virtualization 323

operating system virtualization 321

storage virtualization 323

virtual local area networks (VLANs) 323

virtual machine 321

virtual machine extensions (VMX) 263

virtual machine monitor 321

versus hypervisor 321

virtual memory 182

benefits 180, 181

usage 180

Virtual Memory System (VMS) 181

virtual supervisor (VS) mode 335

virtual user (VU) mode 335

viruses 374

VMware ESXi 336

VMware Workstation 336

voltage levels

used, for representing numbers 14

von Neumann architecture 5, 156, 174

bottleneck 156, 175

security considerations 175

vulnerability exploitation 373

W

warehouse-scale computer (WSC) architecture 351

as multilevel information cache 358

cloud application, deploying 359-362

electrical power consumption 358

hardware 352, 353

hardware fault management 357

rack-based servers 354-357

water hammer arrestors function 93

web browser caches 197

web crawlers 357

white-hat hacking 371

wide area network (WAN) 110

Wi-Fi 111, 112

Wi-Fi Protected Access 2 (WPA2) 112

Windows boot loader 129

Windows Boot Manager 129

Windows x64 application programming interface (API) 270

Wine

URL 322

Wired

URL 465

word length 19

wordline 94

working set 188

workloads 336

worms 374

X

x64 architecture 268

features 268

instruction set 268

x64 assembly language 270-272

x64 instruction categories 270

x64 instruction formats 270

x64 register set 269

x86-64 268

x86 addressing modes 255

based indexed addressing 257

based indexed addressing, with scaling 257, 258

direct memory addressing 256

immediate addressing 256

implied addressing 256

indexed addressing 257

register addressing 256

register indirect addressing 256

x86 architecture 250, 252

addressing modes 255

instruction set 250, 251

x86 assembly language 264-267

x86 instruction categories 258

x86 instruction formats 264

x86 register set 252-255

X86 current privilege level (CPL) 332

x86 hardware virtualization 333

x86 instruction categories 258

AES instructions 263

arithmetic and logic instructions 259, 260

common instruction patterns 263

control flow instructions 261

conversion instructions 261

data movement instructions 258

flag manipulation instructions 262

floating-point instructions 263

input/output instructions 262

miscellaneous instructions 262

MPX instructions 263

other instruction categories 263

protected mode instructions 262

SIMD instructions 263

SMX instructions 263

stack manipulation instructions 259

string manipulation instructions 261

TSX instructions 263

VMX instructions 263

x86 instruction formats

address displacement bytes 264

immediate value bytes 264

ModR/M byte 264

opcode bytes 264

prefix bytes 264

x86 processor virtualization 331-333

Xen 337

XOR gate 34

Z

zero-day vulnerability 373

Zero flag 21

zero-page addressing mode 71

zero trust architecture 388-390

Zicsr extension 309

Zifencei extension 309

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
34.239.150.167