首页 > 最新文献

2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)最新文献

英文 中文
Dependable integrated clinical system architecture with runtime verification 可靠的集成临床系统架构与运行时验证
Pub Date : 2017-11-13 DOI: 10.5555/3199700.3199831
Yu Jiang, Mingzhe Wang, Han Liu, Mohammad Hosseini, Jiaguang Sun
Medical devices are essential for the practice of modern medicine, and the standard open-source integrated clinical environment (OpenICE) has been well designed and widely adopted to improve their interoperability. With OpenICE, it is easy to connect individual devices into the integrated clinical system to provide a coherent patient care. In this paper, we present ICERV, the first online verification approach for the OpenICE, to ensure the dependability (mainly for the safety and security) of the integrated system and the involved patient and clinician. The key idea is to customize runtime verification technique to provide a transparent verifying infrastructure to continually intercept the communication commands and messages of those devices, based on which, we can formalize the safety and security requirements as past time linear temporal logic expressions for verifier generation and online formal verification. If any requirements violate, predefined warnings or exception handling actions will be triggered timely to prevent hazards and threats. We have implemented and seamlessly integrated the approach without any changes to the source code of OpenICE nor the code of the upper-level applications or supervision, and the real device is used for evaluation to demonstrate the effectiveness.
医疗器械在现代医学实践中是必不可少的,标准的开源集成临床环境(OpenICE)已被精心设计和广泛采用,以提高其互操作性。使用OpenICE,可以很容易地将单个设备连接到集成的临床系统中,以提供连贯的患者护理。在本文中,我们提出了ICERV,这是OpenICE的第一个在线验证方法,以确保集成系统以及相关患者和临床医生的可靠性(主要是安全性和安全性)。其核心思想是自定义运行时验证技术,提供透明的验证基础设施,持续拦截这些设备的通信命令和消息,在此基础上,我们可以将安全和保障需求形式化为验证者生成和在线形式化验证的过去时间线性时间逻辑表达式。如果有任何需求违反,将及时触发预定义的警告或异常处理操作,以防止危害和威胁。我们在不改变OpenICE源代码、不改变上层应用程序代码、不改变监管的情况下实现并无缝集成了该方法,并使用真实设备进行评估,以证明其有效性。
{"title":"Dependable integrated clinical system architecture with runtime verification","authors":"Yu Jiang, Mingzhe Wang, Han Liu, Mohammad Hosseini, Jiaguang Sun","doi":"10.5555/3199700.3199831","DOIUrl":"https://doi.org/10.5555/3199700.3199831","url":null,"abstract":"Medical devices are essential for the practice of modern medicine, and the standard open-source integrated clinical environment (OpenICE) has been well designed and widely adopted to improve their interoperability. With OpenICE, it is easy to connect individual devices into the integrated clinical system to provide a coherent patient care. In this paper, we present ICERV, the first online verification approach for the OpenICE, to ensure the dependability (mainly for the safety and security) of the integrated system and the involved patient and clinician. The key idea is to customize runtime verification technique to provide a transparent verifying infrastructure to continually intercept the communication commands and messages of those devices, based on which, we can formalize the safety and security requirements as past time linear temporal logic expressions for verifier generation and online formal verification. If any requirements violate, predefined warnings or exception handling actions will be triggered timely to prevent hazards and threats. We have implemented and seamlessly integrated the approach without any changes to the source code of OpenICE nor the code of the upper-level applications or supervision, and the real device is used for evaluation to demonstrate the effectiveness.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128557043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward safe interoperations in network connected medical cyber-physical systems using open-loop safe protocols 基于开环安全协议的联网医疗信息物理系统安全互操作研究
Pub Date : 2017-11-13 DOI: 10.1109/ICCAD.2017.8203884
Andrew Y.-Z. Ou, M. Rahmaniheris, Yu Jiang, Po-Liang Wu, L. Sha
Using wireless networks in medical Cyber-Physical Systems could be challenging. Because the medical system not only assists the medical personnel to deliver medical services to the patient but also needs to deal with accidental situations such as communication failures without compromising the patient's safety. Previous research work tackled the communication failure problems in medical CPS from architecture perspectives. However, as medical devices configurations become more complex when a medical CPS is composed of many medical devices, we need to know that whether the certain configuration and a combination of the devices will not compromise the patient's safety. We present an algorithm to tackle the problem that whether a given system configuration exists a possible series of system transitions that allows the physicians to perform medical operations; in the mean time, the system transitions ensure the patient's safety while communication failures may happen during the transitions.
在医疗信息物理系统中使用无线网络可能具有挑战性。因为医疗系统不仅要协助医务人员向患者提供医疗服务,还需要在不影响患者安全的情况下处理诸如通信故障之类的意外情况。以往的研究工作是从体系结构的角度来解决医疗CPS的通信失败问题。然而,当医疗CPS由许多医疗设备组成时,随着医疗设备配置变得更加复杂,我们需要知道设备的特定配置和组合是否不会危及患者的安全。我们提出了一种算法来解决给定系统配置是否存在允许医生执行医疗操作的一系列可能的系统转换的问题;同时,系统的过渡保证了患者的安全,但在过渡过程中可能会出现通信故障。
{"title":"Toward safe interoperations in network connected medical cyber-physical systems using open-loop safe protocols","authors":"Andrew Y.-Z. Ou, M. Rahmaniheris, Yu Jiang, Po-Liang Wu, L. Sha","doi":"10.1109/ICCAD.2017.8203884","DOIUrl":"https://doi.org/10.1109/ICCAD.2017.8203884","url":null,"abstract":"Using wireless networks in medical Cyber-Physical Systems could be challenging. Because the medical system not only assists the medical personnel to deliver medical services to the patient but also needs to deal with accidental situations such as communication failures without compromising the patient's safety. Previous research work tackled the communication failure problems in medical CPS from architecture perspectives. However, as medical devices configurations become more complex when a medical CPS is composed of many medical devices, we need to know that whether the certain configuration and a combination of the devices will not compromise the patient's safety. We present an algorithm to tackle the problem that whether a given system configuration exists a possible series of system transitions that allows the physicians to perform medical operations; in the mean time, the system transitions ensure the patient's safety while communication failures may happen during the transitions.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131419623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge segmentation: Empowering mobile telemedicine with compressed cellular neural networks 边缘分割:利用压缩细胞神经网络增强移动远程医疗的能力
Pub Date : 2017-11-13 DOI: 10.1109/ICCAD.2017.8203873
Xiaowei Xu, Q. Lu, Tianchen Wang, Jinglan Liu, Cheng Zhuo, X. Hu, Yiyu Shi
With the need for increased care and welfare of the rapidly aging population, mobile telemedicine is becoming popular for providing remote health care to increase the quality of life. Recently, image analysis is being actively applied for medical diagnosis and treatment, in which image segmentation is of the fundamental importance for other image processing such as visualization and detection. However, given the tasks challenges in transmitting large volume of high-resolution images and the real-time constraints that are commonly present for mobile telemedicine, image segmentation is best done at the “edge”, i.e., locally so that only segmentation results are communicated. A powerful approach to medical image segmentation is cellular neural network (CeNN), which can achieve very high accuracy through proper training. However, CeNNs typically involve extensive computations in a recursive manner. As an example, to simply process an image of 1920×1080 pixels requires 4–8 Giga floating point multiplications (for 3×3 templates and 50–100 iterations), which needs to be done in a timely manner for real-time medical image segmentation. Such a demand is too high for most low power mobile computing platforms in IoTs, This paper presents a compressed CeNN framework for computation reduction in CeNNs, which is the first in the literature. It involves various techniques such as early exit and parameter quantization, which significantly reduces computation demands while maintaining an acceptable performance.
随着对快速老龄化人口的护理和福利需求的增加,移动远程医疗正在成为提供远程保健以提高生活质量的流行方式。近年来,图像分析在医学诊断和治疗中得到了积极的应用,其中图像分割是图像可视化和检测等其他图像处理的基础。然而,考虑到传输大量高分辨率图像的任务挑战以及移动远程医疗通常存在的实时性限制,图像分割最好在“边缘”进行,即在本地进行,以便仅传达分割结果。细胞神经网络是医学图像分割的一种有效方法,通过适当的训练可以达到很高的分割精度。然而,cenn通常以递归的方式涉及大量的计算。例如,简单地处理1920×1080像素的图像需要4-8千兆浮点乘法(对于3×3模板和50-100次迭代),这需要及时完成实时医学图像分割。对于物联网中大多数低功耗移动计算平台来说,这样的需求太高了。本文提出了一种压缩的CeNN框架,用于减少CeNN中的计算量,这在文献中是第一次。它涉及各种技术,如早期退出和参数量化,这大大减少了计算需求,同时保持可接受的性能。
{"title":"Edge segmentation: Empowering mobile telemedicine with compressed cellular neural networks","authors":"Xiaowei Xu, Q. Lu, Tianchen Wang, Jinglan Liu, Cheng Zhuo, X. Hu, Yiyu Shi","doi":"10.1109/ICCAD.2017.8203873","DOIUrl":"https://doi.org/10.1109/ICCAD.2017.8203873","url":null,"abstract":"With the need for increased care and welfare of the rapidly aging population, mobile telemedicine is becoming popular for providing remote health care to increase the quality of life. Recently, image analysis is being actively applied for medical diagnosis and treatment, in which image segmentation is of the fundamental importance for other image processing such as visualization and detection. However, given the tasks challenges in transmitting large volume of high-resolution images and the real-time constraints that are commonly present for mobile telemedicine, image segmentation is best done at the “edge”, i.e., locally so that only segmentation results are communicated. A powerful approach to medical image segmentation is cellular neural network (CeNN), which can achieve very high accuracy through proper training. However, CeNNs typically involve extensive computations in a recursive manner. As an example, to simply process an image of 1920×1080 pixels requires 4–8 Giga floating point multiplications (for 3×3 templates and 50–100 iterations), which needs to be done in a timely manner for real-time medical image segmentation. Such a demand is too high for most low power mobile computing platforms in IoTs, This paper presents a compressed CeNN framework for computation reduction in CeNNs, which is the first in the literature. It involves various techniques such as early exit and parameter quantization, which significantly reduces computation demands while maintaining an acceptable performance.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"690 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132057489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
SAMG: Sparsified graph-theoretic algebraic multigrid for solving large symmetric diagonally dominant (SDD) matrices 求解大型对称对角占优(SDD)矩阵的稀疏化图论代数多重网格
Pub Date : 2017-11-13 DOI: 10.1109/ICCAD.2017.8203832
Zhiqiang Zhao, Yongyu Wang, Zhuo Feng
Algebraic multigrid (AMG) is a class of high-performance linear solvers based on multigrid principles. Compared to geometric multigrid (GMG) solvers that rely on the geometric information of underlying problems, AMG solvers build hierarchical coarse level problems according to the input matrices. Graph-theoretic Algebraic Multigrid (AMG) algorithms have emerged for solving large Symmetric Diagonally Dominant (SDD) matrices by taking advantages of spectral properties of graph Laplacians. This paper proposes a Sparsified graph-theoretic Algebraic Multigrid (SAMG) framework that allows efficiently constructing nearly-linear sized graph Laplacians for coarse level problems while maintaining good spectral approximation during the AMG setup phase by leveraging a scalable spectral graph sparsification engine. Our experimental results show that the proposed method can offer more scalable performance than existing graph-theoretic AMG solvers for solving large SDD matrices in integrated circuit (IC) simulations, 3D-IC thermal analysis, image processing, finite element analysis as well as data mining and machine learning applications.
代数多重网格(AMG)是一类基于多重网格原理的高性能线性求解器。与依赖底层问题几何信息的几何多重网格(GMG)求解器相比,AMG求解器根据输入矩阵构建分层的粗级问题。图论代数多网格(AMG)算法是利用图拉普拉斯算子的谱特性来求解大型对称对角占优(SDD)矩阵的。本文提出了一个稀疏的图论代数多网格(SAMG)框架,该框架允许有效地为粗级问题构造近线性大小的图拉普拉斯,同时在AMG设置阶段通过利用可扩展的谱图稀疏化引擎保持良好的谱近似。实验结果表明,在集成电路(IC)仿真、3D-IC热分析、图像处理、有限元分析以及数据挖掘和机器学习应用中,所提出的方法可以提供比现有图论AMG求解器更高的可扩展性。
{"title":"SAMG: Sparsified graph-theoretic algebraic multigrid for solving large symmetric diagonally dominant (SDD) matrices","authors":"Zhiqiang Zhao, Yongyu Wang, Zhuo Feng","doi":"10.1109/ICCAD.2017.8203832","DOIUrl":"https://doi.org/10.1109/ICCAD.2017.8203832","url":null,"abstract":"Algebraic multigrid (AMG) is a class of high-performance linear solvers based on multigrid principles. Compared to geometric multigrid (GMG) solvers that rely on the geometric information of underlying problems, AMG solvers build hierarchical coarse level problems according to the input matrices. Graph-theoretic Algebraic Multigrid (AMG) algorithms have emerged for solving large Symmetric Diagonally Dominant (SDD) matrices by taking advantages of spectral properties of graph Laplacians. This paper proposes a Sparsified graph-theoretic Algebraic Multigrid (SAMG) framework that allows efficiently constructing nearly-linear sized graph Laplacians for coarse level problems while maintaining good spectral approximation during the AMG setup phase by leveraging a scalable spectral graph sparsification engine. Our experimental results show that the proposed method can offer more scalable performance than existing graph-theoretic AMG solvers for solving large SDD matrices in integrated circuit (IC) simulations, 3D-IC thermal analysis, image processing, finite element analysis as well as data mining and machine learning applications.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132121650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Power grid verification under transient constraints 暂态约束下的电网验证
Pub Date : 2017-11-13 DOI: 10.1109/ICCAD.2017.8203831
M. Fawaz, F. Najm
Checking the power grid must begin early in the design. One way of doing this is using vectorless verification which, unlike standard simulation, only requires limited information about the currents drawn from the grid, in the form of DC local and global upper-bounds, or current constraints. We extend the standard vectorless verification to allow transient constraints, where circuit currents may be bounded by different values at different times. This is useful to check the validity of candidate sequences of chip operations, each having different current requirements. We show that this framework leads to a less pessimistic estimation of voltage drops.
对电网的检查必须在设计初期就开始。这样做的一种方法是使用无矢量验证,与标准模拟不同,它只需要从网格中提取的电流的有限信息,以直流局部和全局上界或电流约束的形式。我们扩展了标准的无矢量验证,以允许瞬态约束,其中电路电流可能在不同时间被不同的值所限制。这对于检查候选芯片操作序列的有效性很有用,每个候选序列都有不同的电流要求。我们表明,这种框架导致对电压降的不那么悲观的估计。
{"title":"Power grid verification under transient constraints","authors":"M. Fawaz, F. Najm","doi":"10.1109/ICCAD.2017.8203831","DOIUrl":"https://doi.org/10.1109/ICCAD.2017.8203831","url":null,"abstract":"Checking the power grid must begin early in the design. One way of doing this is using vectorless verification which, unlike standard simulation, only requires limited information about the currents drawn from the grid, in the form of DC local and global upper-bounds, or current constraints. We extend the standard vectorless verification to allow transient constraints, where circuit currents may be bounded by different values at different times. This is useful to check the validity of candidate sequences of chip operations, each having different current requirements. We show that this framework leads to a less pessimistic estimation of voltage drops.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128815580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Leveraging value locality for efficient design of a hybrid cache in multicore processors 利用值局部性来有效地设计多核处理器中的混合缓存
Pub Date : 2017-11-13 DOI: 10.1109/ICCAD.2017.8203753
M. Arjomand, A. Jadidi, M. Kandemir, C. Das
Owing to negligible leakage current, high density and superior scalability, Spin-Transfer Torque RAM (STT-RAM) technology becomes one of the promising candidates for low power and high capacity on-chip caches in multicore systems. While STT-RAM read access latency is comparable to that of SRAM, write operations in STT-RAM are more challenging: writes are slow, consume a large energy, and the lifetime of STT-RAM is limited by the number of write operations to each cell. To overcome these challenges in STT-RAM caches, this paper explores the potential of eliminating redundant writes using the phenomenon of frequent value locality (FVL). According to FLV, few distinct values appear in a large fraction of memory transactions, with emphasis on cache memories in this work. By leveraging frequent value locality, we propose a novel value-based hybrid (STT-RAM +, SRAM) cache that has benefits of both SRAM and STT-RAM technologies — i.e., it is high-performance, power-efficient, and scalable. Our evaluation results for a 8-core chip-multiprocessor with 6MB last-level cache show that our proposed design is able to reduce power consumption of a STT-RAM cache by up to 90% (an average of 82%), enhances its lifetime by up to 52% (29% on average), and improves the system performance by up 30% (11% on average), for a wide range of multi-threaded and multi-program workloads.
由于泄漏电流可忽略,高密度和优越的可扩展性,自旋转移扭矩RAM (STT-RAM)技术成为多核系统中低功耗、高容量片上缓存的有希望的候选技术之一。虽然STT-RAM的读访问延迟与SRAM相当,但STT-RAM中的写操作更具挑战性:写操作缓慢,消耗大量能量,并且STT-RAM的生命周期受到每个单元的写操作数量的限制。为了克服STT-RAM缓存中的这些挑战,本文探讨了使用频繁值局部性(FVL)现象消除冗余写的潜力。根据FLV,很少有不同的值出现在大部分内存事务中,在这项工作中强调缓存内存。通过利用频繁的值局域性,我们提出了一种新的基于值的混合(STT-RAM +, SRAM)缓存,它具有SRAM和STT-RAM技术的优点-即,它是高性能,节能和可扩展的。我们对具有6MB最后一级缓存的8核芯片多处理器的评估结果表明,我们提出的设计能够将STT-RAM缓存的功耗降低高达90%(平均82%),将其寿命提高高达52%(平均29%),并将系统性能提高高达30%(平均11%),适用于广泛的多线程和多程序工作负载。
{"title":"Leveraging value locality for efficient design of a hybrid cache in multicore processors","authors":"M. Arjomand, A. Jadidi, M. Kandemir, C. Das","doi":"10.1109/ICCAD.2017.8203753","DOIUrl":"https://doi.org/10.1109/ICCAD.2017.8203753","url":null,"abstract":"Owing to negligible leakage current, high density and superior scalability, Spin-Transfer Torque RAM (STT-RAM) technology becomes one of the promising candidates for low power and high capacity on-chip caches in multicore systems. While STT-RAM read access latency is comparable to that of SRAM, write operations in STT-RAM are more challenging: writes are slow, consume a large energy, and the lifetime of STT-RAM is limited by the number of write operations to each cell. To overcome these challenges in STT-RAM caches, this paper explores the potential of eliminating redundant writes using the phenomenon of frequent value locality (FVL). According to FLV, few distinct values appear in a large fraction of memory transactions, with emphasis on cache memories in this work. By leveraging frequent value locality, we propose a novel value-based hybrid (STT-RAM +, SRAM) cache that has benefits of both SRAM and STT-RAM technologies — i.e., it is high-performance, power-efficient, and scalable. Our evaluation results for a 8-core chip-multiprocessor with 6MB last-level cache show that our proposed design is able to reduce power consumption of a STT-RAM cache by up to 90% (an average of 82%), enhances its lifetime by up to 52% (29% on average), and improves the system performance by up 30% (11% on average), for a wide range of multi-threaded and multi-program workloads.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128086256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Clepsydra: Modeling timing flows in hardware designs 漏壶:在硬件设计中建模时序流
Pub Date : 2017-11-13 DOI: 10.1109/ICCAD.2017.8203772
Armaiti Ardeshiricham, Wei Hu, R. Kastner
Emergence of side channel security attacks has challenged the classic assumptions regarding what data is publicly available. As demonstrated repeatedly, statistical analysis of information collected by measuring completion time of hardware designs can reveal confidential information. Even though timing-based side channel leakage can be easily exploited to breach data privacy, conventional hardware verification tools are not yet suited to assess these vulnerabilities. To acquaint the hardware design process with formal security evaluations, we introduce a model for tracking timing-based information flows through HDL codes. Based on this model, we have developed Clepsydra, a tool for automatically generating circuitry for tracking timing flows and generic logical flows within hardware designs in two distinct channels. The circuit generated by Clepsydra can be analyzed by EDA tools to detect timing leakage or formally prove constant execution time. We present proofs regarding soundness and precision of the proposed model along with results of employing Clepsydra to verify security properties on a variety of hardware units including crypto cores, bus architectures, caches and arithmetic modules.
侧信道安全攻击的出现挑战了关于什么数据是公开可用的经典假设。事实一再证明,通过测量硬件设计完成时间收集的信息进行统计分析可以揭示机密信息。尽管基于时间的侧信道泄漏很容易被利用来破坏数据隐私,但传统的硬件验证工具尚不适合评估这些漏洞。为了使硬件设计过程熟悉正式的安全评估,我们引入了一个通过HDL代码跟踪基于时间的信息流的模型。基于该模型,我们开发了Clepsydra,这是一种自动生成电路的工具,用于在两个不同通道的硬件设计中跟踪时序流和通用逻辑流。通过EDA工具可以对Clepsydra产生的电路进行分析,以检测时序泄漏或正式证明恒定的执行时间。我们提出了关于所提出模型的可靠性和精度的证明,以及使用Clepsydra在各种硬件单元(包括加密核心,总线架构,缓存和算术模块)上验证安全属性的结果。
{"title":"Clepsydra: Modeling timing flows in hardware designs","authors":"Armaiti Ardeshiricham, Wei Hu, R. Kastner","doi":"10.1109/ICCAD.2017.8203772","DOIUrl":"https://doi.org/10.1109/ICCAD.2017.8203772","url":null,"abstract":"Emergence of side channel security attacks has challenged the classic assumptions regarding what data is publicly available. As demonstrated repeatedly, statistical analysis of information collected by measuring completion time of hardware designs can reveal confidential information. Even though timing-based side channel leakage can be easily exploited to breach data privacy, conventional hardware verification tools are not yet suited to assess these vulnerabilities. To acquaint the hardware design process with formal security evaluations, we introduce a model for tracking timing-based information flows through HDL codes. Based on this model, we have developed Clepsydra, a tool for automatically generating circuitry for tracking timing flows and generic logical flows within hardware designs in two distinct channels. The circuit generated by Clepsydra can be analyzed by EDA tools to detect timing leakage or formally prove constant execution time. We present proofs regarding soundness and precision of the proposed model along with results of employing Clepsydra to verify security properties on a variety of hardware units including crypto cores, bus architectures, caches and arithmetic modules.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"46 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114024655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Cyclist: Accelerating hardware development 自行车手:加速硬件开发
Pub Date : 2017-11-13 DOI: 10.1109/ICCAD.2017.8203892
J. Bachrach, Albert Magyar, D. Dabbelt, Patrick Li, Richard Lin, K. Asanović
The end of Dennard scaling has led to an increase in demand for energy-efficient custom hardware accelerators, but current hardware design is slow and laborious, partly because each iteration of the compile-run-debug cycle can take hours or even days with existing simulation and emulation platforms. Cyclist is a new emulation platform designed specifically to shorten the total compile-run-debug cycle. The Cyclist toolflow converts a Chisel RTL design to a parallel dataflow graph, which is then mapped to the Cyclist hardware architecture, consisting of a tiled array of custom parallel emulation engines. Cyclist provides cycle-accurate/bit-accurate RTL emulation at speeds approaching FPGA emulation, but with compile time closer to software simulation. Cyclist provides full visibility and debuggability of the hardware design, including moving forwards and backwards in simulation time while searching for trigger events. The snapshot facility used for debugging is also used to provide a “pay-as-you-go” mapping strategy, which allows emulation to begin execution with a low-effort placement, while higher-quality emulation placements are optimized in the background and swapped in to a running emulation. The Cyclist ASIC design requires 0.069mm2 per tile and runs at 2GHz in a 45nm CMOS process. Our evaluation demonstrate that Cyclist outperforms FPGA emulation, VCS, and C+,+, simulation on combined compile and run time for up to a billion cycles for a set of real-world hardware benchmarks.
Dennard扩展的终结导致了对高能效定制硬件加速器的需求增加,但是当前的硬件设计缓慢而费力,部分原因是使用现有的仿真和仿真平台,编译-运行-调试周期的每次迭代可能需要数小时甚至数天的时间。自行车是一个新的仿真平台,专为缩短总编译-运行-调试周期而设计。cycling工具流将Chisel RTL设计转换为并行数据流图,然后将其映射到由自定义并行仿真引擎的平排阵列组成的cycling硬件架构。cycling以接近FPGA仿真的速度提供周期精确/位精确的RTL仿真,但编译时间更接近软件仿真。自行车提供了硬件设计的完整可见性和可调试性,包括在搜索触发事件时在模拟时间内向前和向后移动。用于调试的快照功能还用于提供“按需付费”的映射策略,该策略允许模拟以低工作量的放置开始执行,而高质量的模拟放置在后台进行优化并交换到正在运行的模拟中。自行车ASIC设计要求每瓦0.069mm2,在45纳米CMOS工艺中以2GHz运行。我们的评估表明,在一组真实的硬件基准测试中,在组合编译和运行时,骑车者的性能优于FPGA仿真、VCS和c++、+仿真,可达到10亿次循环。
{"title":"Cyclist: Accelerating hardware development","authors":"J. Bachrach, Albert Magyar, D. Dabbelt, Patrick Li, Richard Lin, K. Asanović","doi":"10.1109/ICCAD.2017.8203892","DOIUrl":"https://doi.org/10.1109/ICCAD.2017.8203892","url":null,"abstract":"The end of Dennard scaling has led to an increase in demand for energy-efficient custom hardware accelerators, but current hardware design is slow and laborious, partly because each iteration of the compile-run-debug cycle can take hours or even days with existing simulation and emulation platforms. Cyclist is a new emulation platform designed specifically to shorten the total compile-run-debug cycle. The Cyclist toolflow converts a Chisel RTL design to a parallel dataflow graph, which is then mapped to the Cyclist hardware architecture, consisting of a tiled array of custom parallel emulation engines. Cyclist provides cycle-accurate/bit-accurate RTL emulation at speeds approaching FPGA emulation, but with compile time closer to software simulation. Cyclist provides full visibility and debuggability of the hardware design, including moving forwards and backwards in simulation time while searching for trigger events. The snapshot facility used for debugging is also used to provide a “pay-as-you-go” mapping strategy, which allows emulation to begin execution with a low-effort placement, while higher-quality emulation placements are optimized in the background and swapped in to a running emulation. The Cyclist ASIC design requires 0.069mm2 per tile and runs at 2GHz in a 45nm CMOS process. Our evaluation demonstrate that Cyclist outperforms FPGA emulation, VCS, and C+,+, simulation on combined compile and run time for up to a billion cycles for a set of real-world hardware benchmarks.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114676159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ACQUA: Adaptive and cooperative quality-aware control for automotive cyber-physical systems 汽车信息物理系统的自适应和协作质量意识控制
Pub Date : 2017-11-13 DOI: 10.1109/ICCAD.2017.8203778
K. Vatanparvar, M. A. Faruque
Controllers in cyber-physical systems integrate a design-time behavioral model of the system under design to improve their own quality. In the state-of-the-art control designs, behavioral models of other interacting neighbor systems are also integrated to form a centralized behavioral model and to enable a system-level optimization and control. Although this ideal embedded control design may result in pareto-optimal solutions, it is not scalable to larger number of systems. Moreover, the behavior of the multi-domain physical systems may be too complex for a control designer to model and may dynamically change at run time. In this paper, we propose a novel Adaptive and Cooperative Quality-Aware (ACQUA) control design which addresses these challenges. In this control design, an ACQUA-based controller for the system under design will monitor the quality of the neighbor systems to dynamically learn their behavior. Therefore, it can quickly adapt its control to cooperate with other neighbor controllers for improving the quality of not only itself, but also other neighbor systems. We apply ACQUA to design a cooperative controller for automotive navigation system, motor control unit, and battery management system in an electric vehicle. We use this automotive example to analyze the performance of the design. We show that by using our ACQUA control, we can reach up to 86% improvements achievable by an ideal embedded control design such that energy consumption reduces by 18% and battery capacity loss decreases by 12% compared to the state-of-the-art on average.
网络物理系统中的控制器集成了被设计系统的设计时行为模型,以提高其自身的质量。在最先进的控制设计中,还集成了其他相互作用的邻居系统的行为模型,形成集中的行为模型,从而实现系统级的优化和控制。虽然这种理想的嵌入式控制设计可能导致帕累托最优解决方案,但它不能扩展到更大数量的系统。此外,多域物理系统的行为可能过于复杂,控制设计人员无法建模,并且可能在运行时动态更改。在本文中,我们提出了一种新的自适应和协作质量意识(ACQUA)控制设计来解决这些挑战。在这种控制设计中,设计系统的基于acqua的控制器将监视相邻系统的质量以动态学习它们的行为。因此,它可以快速调整其控制以与其他邻居控制器合作,从而提高自身和其他邻居系统的质量。应用ACQUA技术设计了电动汽车导航系统、电机控制单元和电池管理系统的协同控制器。以汽车为例,分析了该设计的性能。我们表明,通过使用我们的ACQUA控制,我们可以通过理想的嵌入式控制设计实现高达86%的改进,与最先进的平均水平相比,能耗降低18%,电池容量损失降低12%。
{"title":"ACQUA: Adaptive and cooperative quality-aware control for automotive cyber-physical systems","authors":"K. Vatanparvar, M. A. Faruque","doi":"10.1109/ICCAD.2017.8203778","DOIUrl":"https://doi.org/10.1109/ICCAD.2017.8203778","url":null,"abstract":"Controllers in cyber-physical systems integrate a design-time behavioral model of the system under design to improve their own quality. In the state-of-the-art control designs, behavioral models of other interacting neighbor systems are also integrated to form a centralized behavioral model and to enable a system-level optimization and control. Although this ideal embedded control design may result in pareto-optimal solutions, it is not scalable to larger number of systems. Moreover, the behavior of the multi-domain physical systems may be too complex for a control designer to model and may dynamically change at run time. In this paper, we propose a novel Adaptive and Cooperative Quality-Aware (ACQUA) control design which addresses these challenges. In this control design, an ACQUA-based controller for the system under design will monitor the quality of the neighbor systems to dynamically learn their behavior. Therefore, it can quickly adapt its control to cooperate with other neighbor controllers for improving the quality of not only itself, but also other neighbor systems. We apply ACQUA to design a cooperative controller for automotive navigation system, motor control unit, and battery management system in an electric vehicle. We use this automotive example to analyze the performance of the design. We show that by using our ACQUA control, we can reach up to 86% improvements achievable by an ideal embedded control design such that energy consumption reduces by 18% and battery capacity loss decreases by 12% compared to the state-of-the-art on average.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122040395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Hardening extended memory access control schemes with self-verified address spaces 使用自验证地址空间加强扩展内存访问控制方案
Pub Date : 2017-11-13 DOI: 10.1109/ICCAD.2017.8203804
J. Elwell, Dmitry Evtyushkin, D. Ponomarev, N. Abu-Ghazaleh, Ryan D. Riley
In this paper we revisit the security properties of extended access control schemes that are used to protect application secrets from untrusted system software. We demonstrate the vulnerability of several recent proposals to a class of attacks we call mapping attacks. We argue that protection from such attacks requires verification of the address space integrity and propose the concept of self-verified address spaces (SVAS), where the applications themselves are made aware of the requested changes in the page mappings and are placed in charge of verifying them. SVAS equips an application with a customized verification model with several attractive functional and performance properties. We implemented the attacks and a complete prototype of SVAS in Linux and the QEMU emulator. Our results demonstrate that SVAS can prevent mapping attacks on extended access control systems with minimal performance overhead, hardware modifications and software complexity.
在本文中,我们重新讨论了用于保护应用程序秘密不受不可信系统软件攻击的扩展访问控制方案的安全特性。我们展示了最近几个提案对一类攻击的脆弱性,我们称之为映射攻击。我们认为,防止此类攻击需要验证地址空间的完整性,并提出了自验证地址空间(SVAS)的概念,其中应用程序本身知道页面映射中请求的更改,并负责验证它们。SVAS为应用程序配备了具有几个有吸引力的功能和性能属性的自定义验证模型。我们在Linux和QEMU仿真器中实现了攻击和SVAS的完整原型。我们的研究结果表明,SVAS可以以最小的性能开销、硬件修改和软件复杂性来防止对扩展访问控制系统的映射攻击。
{"title":"Hardening extended memory access control schemes with self-verified address spaces","authors":"J. Elwell, Dmitry Evtyushkin, D. Ponomarev, N. Abu-Ghazaleh, Ryan D. Riley","doi":"10.1109/ICCAD.2017.8203804","DOIUrl":"https://doi.org/10.1109/ICCAD.2017.8203804","url":null,"abstract":"In this paper we revisit the security properties of extended access control schemes that are used to protect application secrets from untrusted system software. We demonstrate the vulnerability of several recent proposals to a class of attacks we call mapping attacks. We argue that protection from such attacks requires verification of the address space integrity and propose the concept of self-verified address spaces (SVAS), where the applications themselves are made aware of the requested changes in the page mappings and are placed in charge of verifying them. SVAS equips an application with a customized verification model with several attractive functional and performance properties. We implemented the attacks and a complete prototype of SVAS in Linux and the QEMU emulator. Our results demonstrate that SVAS can prevent mapping attacks on extended access control systems with minimal performance overhead, hardware modifications and software complexity.","PeriodicalId":126686,"journal":{"name":"2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114973686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1