首页 > 最新文献

Proceedings of the Great Lakes Symposium on VLSI 2022最新文献

英文 中文
Loading Effect Free MOS-only Voltage Reference Ladder for ADC in RRAM-crossbar Array 随机存取存储器-横条阵列中ADC的无mos电压参考梯
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530354
Varun Bhatnagar, Gopal R. Raut, S. Vishvakarma
In the analog domain, with the increase in ReRAM m × n crossbar array, the Loading Effect (LE) seems to grow at the input of the comparator stage in analog to digital converter (ADC). The reference voltage generating ladder nodes for ADC are susceptible to design parameters due to small input voltages. We used the PMOS transistor to design this ladder circuitry. Further, sleep mode is applied using the power-gating (PG) technique to lower power dissipation. In this article, a Pareto study has been performed to evaluate robust and stable circuitry with minimum LE in the reference voltage ladder for ADC. An NMOS-based Current mirror is also designed and used with the proposed reference voltage ladder to achieve better stability in terms of power supply and reference voltage variations. Further, we analyzed the Process, Voltage, and Temperature (PVT) variation impact on the proposed circuitry. Finally, the power consumption of the proposed ladder at the 180nm technology node, is 0.7uW. Also, the circuit supports the power-gating technique in sleep mode, saving 43% of total power. Circuit's Monte-Carlo simulation for node voltage variation shows minimum mean and σ deviation. The circuit supports the power-gating technique in sleep mode, saving 43% of total power.
在模拟域,随着rramm × n交叉棒阵列的增加,模数转换器(ADC)中比较器级输入端的加载效应(LE)似乎在增长。由于输入电压小,ADC的参考电压梯节点容易受到设计参数的影响。我们用PMOS晶体管来设计这个阶梯电路。此外,睡眠模式采用功率门控(PG)技术,以降低功耗。在本文中,进行了Pareto研究,以评估ADC参考电压阶梯中最小LE的鲁棒和稳定电路。设计了一种基于nmos的电流反射镜,并将其与所提出的参考电压梯结合使用,从而在电源和参考电压变化方面获得更好的稳定性。此外,我们分析了工艺、电压和温度(PVT)变化对所提出电路的影响。最后,该阶梯在180nm技术节点上的功耗为0.7uW。此外,该电路在睡眠模式下支持电源门控技术,节省总功耗43%。电路对节点电压变化的蒙特卡罗模拟结果显示出最小均值和σ偏差。该电路支持休眠模式下的电源门控技术,节省总功耗43%。
{"title":"Loading Effect Free MOS-only Voltage Reference Ladder for ADC in RRAM-crossbar Array","authors":"Varun Bhatnagar, Gopal R. Raut, S. Vishvakarma","doi":"10.1145/3526241.3530354","DOIUrl":"https://doi.org/10.1145/3526241.3530354","url":null,"abstract":"In the analog domain, with the increase in ReRAM m × n crossbar array, the Loading Effect (LE) seems to grow at the input of the comparator stage in analog to digital converter (ADC). The reference voltage generating ladder nodes for ADC are susceptible to design parameters due to small input voltages. We used the PMOS transistor to design this ladder circuitry. Further, sleep mode is applied using the power-gating (PG) technique to lower power dissipation. In this article, a Pareto study has been performed to evaluate robust and stable circuitry with minimum LE in the reference voltage ladder for ADC. An NMOS-based Current mirror is also designed and used with the proposed reference voltage ladder to achieve better stability in terms of power supply and reference voltage variations. Further, we analyzed the Process, Voltage, and Temperature (PVT) variation impact on the proposed circuitry. Finally, the power consumption of the proposed ladder at the 180nm technology node, is 0.7uW. Also, the circuit supports the power-gating technique in sleep mode, saving 43% of total power. Circuit's Monte-Carlo simulation for node voltage variation shows minimum mean and σ deviation. The circuit supports the power-gating technique in sleep mode, saving 43% of total power.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123750189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration into the Explainability of Neural Network Models for Power Side-Channel Analysis 电力侧信道分析中神经网络模型的可解释性探讨
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530346
Anupam Golder, Ashwin Bhat, A. Raychowdhury
In this work, we present a comprehensive analysis of explainability of Neural Network (NN) models in the context of power Side-Channel Analysis (SCA), to gain insight into which features or Points of Interest (PoI) contribute the most to the classification decision. Although many existing works claim state-of-the-art accuracy in recovering secret key from cryptographic implementations, it remains to be seen whether the models actually learn representations from the leakage points. In this work, we evaluated the reasoning behind the success of a NN model, by validating the relevance scores of features derived from the network to the ones identified by traditional statistical PoI selection methods. Thus, utilizing the explainability techniques as a standard validation technique for NN models is justified.
在这项工作中,我们在功率侧信道分析(SCA)的背景下对神经网络(NN)模型的可解释性进行了全面分析,以深入了解哪些特征或兴趣点(PoI)对分类决策贡献最大。尽管许多现有的工作都声称在从加密实现中恢复密钥方面具有最先进的准确性,但这些模型是否真的从泄漏点中学习到表示还有待观察。在这项工作中,我们通过验证从网络中获得的特征与传统统计PoI选择方法识别的特征的相关性得分,评估了神经网络模型成功背后的原因。因此,利用可解释性技术作为神经网络模型的标准验证技术是合理的。
{"title":"Exploration into the Explainability of Neural Network Models for Power Side-Channel Analysis","authors":"Anupam Golder, Ashwin Bhat, A. Raychowdhury","doi":"10.1145/3526241.3530346","DOIUrl":"https://doi.org/10.1145/3526241.3530346","url":null,"abstract":"In this work, we present a comprehensive analysis of explainability of Neural Network (NN) models in the context of power Side-Channel Analysis (SCA), to gain insight into which features or Points of Interest (PoI) contribute the most to the classification decision. Although many existing works claim state-of-the-art accuracy in recovering secret key from cryptographic implementations, it remains to be seen whether the models actually learn representations from the leakage points. In this work, we evaluated the reasoning behind the success of a NN model, by validating the relevance scores of features derived from the network to the ones identified by traditional statistical PoI selection methods. Thus, utilizing the explainability techniques as a standard validation technique for NN models is justified.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122677335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Attack-Resistant Circuit Technologies for sub-5nm Secure Computing Platforms 亚5nm安全计算平台的抗攻击电路技术
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530053
S. Mathew
Cryptographic hardware accelerators and root-of-trust circuits like True-Random-Number-Generators (TRNG) and Physically-Unclonable-Functions (PUF) have become essential components of present-day secure platforms. These circuits provide an on-die boundary within which users are given assurances that data privacy and integrity is preserved during computations and transport between storage and compute elements. The focus of hardware security engineers over the past many years has been in improving performance while reducing area and power consumption of cryptographic circuits. This tidy scenario was disrupted by a spate of attacks on computing platforms reported in the past few years. These attacks employed techniques such as speculative side-channels, physical (power/electromagnetic) side-channels, voltage/clock glitching and fault-injection to extract embedded secrets such as encryption keys or access privileged sections of system memory. The security community has responded to these attacks by launching research in resilient architectures and security circuits that are resistant to physical/machine-learning attacks. This talk will discuss attack-resistant encryption circuits for popular encryption workloads such as AES and RSA as well as describe PUF circuits that are resilient to powerful machine-learning attacks. While these circuits are shown to be secure against known attacks today, attackers are getting increasingly sophisticated with high resolution probes and employing advanced machine-learning techniques to subvert protection mechanisms. Security hardware designers are therefore engaged in an arms race of constantly outwitting malicious attackers while relying on continued research in energy-efficient attack-resistant security circuits.
加密硬件加速器和可信根电路(如真随机数生成器(TRNG)和物理不可克隆函数(PUF))已经成为当今安全平台的重要组成部分。这些电路提供了一个片上边界,在这个边界内,用户可以保证在计算和存储与计算元素之间的传输过程中保持数据的隐私和完整性。在过去的许多年里,硬件安全工程师关注的焦点一直是提高性能,同时减少加密电路的面积和功耗。在过去的几年里,有报道称计算机平台遭受了一连串的攻击,这种整洁的场景被打乱了。这些攻击采用诸如推测侧信道、物理(电源/电磁)侧信道、电压/时钟故障和故障注入等技术来提取嵌入的秘密,如加密密钥或访问系统内存的特权部分。安全社区通过开展弹性架构和安全电路的研究来应对这些攻击,这些研究可以抵抗物理/机器学习攻击。本次演讲将讨论流行的加密工作负载(如AES和RSA)的抗攻击加密电路,并描述能够抵御强大机器学习攻击的PUF电路。虽然这些电路在目前已知的攻击中是安全的,但攻击者越来越熟练地使用高分辨率探针,并采用先进的机器学习技术来破坏保护机制。因此,安全硬件设计人员参与了一场不断智胜恶意攻击者的军备竞赛,同时依赖于对节能抗攻击安全电路的持续研究。
{"title":"Attack-Resistant Circuit Technologies for sub-5nm Secure Computing Platforms","authors":"S. Mathew","doi":"10.1145/3526241.3530053","DOIUrl":"https://doi.org/10.1145/3526241.3530053","url":null,"abstract":"Cryptographic hardware accelerators and root-of-trust circuits like True-Random-Number-Generators (TRNG) and Physically-Unclonable-Functions (PUF) have become essential components of present-day secure platforms. These circuits provide an on-die boundary within which users are given assurances that data privacy and integrity is preserved during computations and transport between storage and compute elements. The focus of hardware security engineers over the past many years has been in improving performance while reducing area and power consumption of cryptographic circuits. This tidy scenario was disrupted by a spate of attacks on computing platforms reported in the past few years. These attacks employed techniques such as speculative side-channels, physical (power/electromagnetic) side-channels, voltage/clock glitching and fault-injection to extract embedded secrets such as encryption keys or access privileged sections of system memory. The security community has responded to these attacks by launching research in resilient architectures and security circuits that are resistant to physical/machine-learning attacks. This talk will discuss attack-resistant encryption circuits for popular encryption workloads such as AES and RSA as well as describe PUF circuits that are resilient to powerful machine-learning attacks. While these circuits are shown to be secure against known attacks today, attackers are getting increasingly sophisticated with high resolution probes and employing advanced machine-learning techniques to subvert protection mechanisms. Security hardware designers are therefore engaged in an arms race of constantly outwitting malicious attackers while relying on continued research in energy-efficient attack-resistant security circuits.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122846687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Stream Oriented Fine-grained Sparse CNN Accelerator with Efficient Unstructured Pruning Strategy 基于高效非结构化修剪策略的面向数据流的细粒度稀疏CNN加速器
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530318
Tianyang Yu, Bi Wu, Ke Chen, C. Yan, Weiqiang Liu
Network pruning can effectively alleviate the excessive parameters and computation issues in CNNs. However, unstructured pruning is not hardware friendly, while structured pruning will result in a significant loss of accuracy. In this paper, an unstructured fine-grained pruning strategy is proposed and achieves a 16X compression ratio with a top-1 accuracy loss of 1.4% for VGG-16. Combined with the proposed hardware-oriented hyperparameter selection method, compression rates of up to 64X can be obtained while fully meeting the edge-side accuracy requirements. Further, a light-weight, high-performance sparse CNN accelerator with modified systolic array is proposed for pruned VGG-16. The experimental results show that compared with the most advanced design, the proposed accelerator can achieve 21 Frames Per Second (FPS) with 3X better power efficiency and 2.19X better calculation density.
网络修剪可以有效地缓解cnn中参数过多和计算量过大的问题。然而,非结构化修剪是不友好的硬件,而结构化修剪将导致准确性的显著损失。本文提出了一种非结构化的细粒度修剪策略,并对VGG-16实现了16倍的压缩比和1.4%的top-1精度损失。结合所提出的面向硬件的超参数选择方法,可以获得高达64X的压缩率,同时完全满足边缘精度要求。在此基础上,提出了一种基于改良收缩阵列的轻量级高性能稀疏CNN加速器。实验结果表明,与最先进的设计相比,所提出的加速器可以达到21帧每秒(FPS),功率效率提高3倍,计算密度提高2.19倍。
{"title":"Data Stream Oriented Fine-grained Sparse CNN Accelerator with Efficient Unstructured Pruning Strategy","authors":"Tianyang Yu, Bi Wu, Ke Chen, C. Yan, Weiqiang Liu","doi":"10.1145/3526241.3530318","DOIUrl":"https://doi.org/10.1145/3526241.3530318","url":null,"abstract":"Network pruning can effectively alleviate the excessive parameters and computation issues in CNNs. However, unstructured pruning is not hardware friendly, while structured pruning will result in a significant loss of accuracy. In this paper, an unstructured fine-grained pruning strategy is proposed and achieves a 16X compression ratio with a top-1 accuracy loss of 1.4% for VGG-16. Combined with the proposed hardware-oriented hyperparameter selection method, compression rates of up to 64X can be obtained while fully meeting the edge-side accuracy requirements. Further, a light-weight, high-performance sparse CNN accelerator with modified systolic array is proposed for pruned VGG-16. The experimental results show that compared with the most advanced design, the proposed accelerator can achieve 21 Frames Per Second (FPS) with 3X better power efficiency and 2.19X better calculation density.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123818056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GAUR: Genetic Algorithm based Unlocking of Register Transfer Level Locking 基于遗传算法的寄存器传输级锁解锁
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530362
Gagan Gayari, C. Karfa, P. Guha
Logic locking is a technique for the protection of hardware intellectual property (IP) from malicious entities like piracy, overproduction, reverse engineering, etc. The register transfer level (RTL) locking performs the locking on RTL description for protection of the IP even from the early design cycle. TAO [12] is such a locking scheme that employs locking during the high-level synthesis (HLS) process. In this paper, we evaluate the unlocking capability of the genetic algorithm (GA) by performing attacks on the RTLs locked using TAO based technique. We demonstrate the ability of GA to unlock TAO generated RTLs in seconds. Our GA based attack is faster as compared to the Satisfiability Modulo Theories (SMT) based attack [9]. The GA based method also converges well in most of the cases as shown in the experimental results.
逻辑锁定是一种保护硬件知识产权(IP)免受盗版、生产过剩、逆向工程等恶意实体侵害的技术。寄存器传输级别(RTL)锁定执行RTL描述上的锁定,甚至从早期设计周期开始保护IP。TAO[12]就是这样一种锁定方案,它在高级合成(HLS)过程中使用锁定。在本文中,我们通过对基于TAO技术锁定的rtl进行攻击来评估遗传算法(GA)的解锁能力。我们演示了GA在几秒钟内解锁TAO生成的rtl的能力。与基于可满足模理论(SMT)的攻击[9]相比,我们基于GA的攻击速度更快。实验结果表明,基于遗传算法的方法在大多数情况下也具有良好的收敛性。
{"title":"GAUR: Genetic Algorithm based Unlocking of Register Transfer Level Locking","authors":"Gagan Gayari, C. Karfa, P. Guha","doi":"10.1145/3526241.3530362","DOIUrl":"https://doi.org/10.1145/3526241.3530362","url":null,"abstract":"Logic locking is a technique for the protection of hardware intellectual property (IP) from malicious entities like piracy, overproduction, reverse engineering, etc. The register transfer level (RTL) locking performs the locking on RTL description for protection of the IP even from the early design cycle. TAO [12] is such a locking scheme that employs locking during the high-level synthesis (HLS) process. In this paper, we evaluate the unlocking capability of the genetic algorithm (GA) by performing attacks on the RTLs locked using TAO based technique. We demonstrate the ability of GA to unlock TAO generated RTLs in seconds. Our GA based attack is faster as compared to the Satisfiability Modulo Theories (SMT) based attack [9]. The GA based method also converges well in most of the cases as shown in the experimental results.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130878523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Maze Routing Algorithm for Fast Global Routing 一种快速全局路由的高效迷宫路由算法
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530360
Zhaoqi Fu, Wenxin Yu, Jie Ma, Xin Cheng
Maze routing remains the most time-consuming step for modern global routers. Previous works accelerate the maze routing by routing multiple regions or nets simultaneously. This paper presents a novel parallel maze router with bidirectional path search and dynamic routing scheduling, which exhibits higher efficiency than all the previous routers. On the ISPD 2008 benchmark suite, our router outperforms the fastest global routers SPRoute and FastRoute 4.1 by an average speedup of 1.95x and 10.03x, while the difference on the total overflow and wirelength is negligible.
对于现代全局路由器来说,迷宫路由仍然是最耗时的一步。以往的工作通过同时路由多个区域或网络来加速迷宫的路由。本文提出了一种具有双向路径搜索和动态路由调度功能的新型并行迷宫路由器,该路由器比以往的所有路由器都具有更高的效率。在ISPD 2008基准测试套件上,我们的路由器比最快的全局路由器SPRoute和FastRoute 4.1的平均速度提高了1.95倍和10.03倍,而总溢出和无线长度的差异可以忽略不计。
{"title":"An Efficient Maze Routing Algorithm for Fast Global Routing","authors":"Zhaoqi Fu, Wenxin Yu, Jie Ma, Xin Cheng","doi":"10.1145/3526241.3530360","DOIUrl":"https://doi.org/10.1145/3526241.3530360","url":null,"abstract":"Maze routing remains the most time-consuming step for modern global routers. Previous works accelerate the maze routing by routing multiple regions or nets simultaneously. This paper presents a novel parallel maze router with bidirectional path search and dynamic routing scheduling, which exhibits higher efficiency than all the previous routers. On the ISPD 2008 benchmark suite, our router outperforms the fastest global routers SPRoute and FastRoute 4.1 by an average speedup of 1.95x and 10.03x, while the difference on the total overflow and wirelength is negligible.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127657503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI/ML, Optimization and EDA in the TILOS AI Research Institute TILOS AI研究所的AI/ML,优化和EDA
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530052
A. Kahng
Optimization means finding the best possible solution to a given problem -- but challenges of scale and complexity keep many real-world optimization needs beyond reach. The Institute for Learning-enabled Optimization at Scale (TILOS) is a new National AI Research Institute led by UC San Diego in partnership with MIT, National University, Penn, UT Austin and Yale. TILOS is sponsored by the U.S. National Science Foundation, with partial support from Intel Corporation. The TILOS mission: make impossible optimizations possible, at scale and in practice. This talk introduces TILOS, its research agenda, and how it aims to establish a "national nexus" of AI and machine learning, optimization, and use domains that include integrated-circuit design and design automation. The talk will point out directions along which the interplay of learning and optimization can boost the scaling and quality of EDA outcomes.
优化意味着找到给定问题的最佳解决方案,但规模和复杂性的挑战使许多现实世界的优化需求无法实现。大规模学习优化研究所(TILOS)是由加州大学圣地亚哥分校与麻省理工学院、国立大学、宾夕法尼亚大学、德克萨斯大学奥斯汀分校和耶鲁大学合作成立的一个新的国家人工智能研究所。TILOS由美国国家科学基金会赞助,英特尔公司提供部分支持。TILOS的使命是:在规模和实践中使不可能的优化成为可能。本讲座介绍了TILOS,其研究议程,以及它如何旨在建立人工智能和机器学习,优化和使用领域的“国家联系”,包括集成电路设计和设计自动化。该演讲将指出学习和优化的相互作用可以提高EDA结果的规模和质量的方向。
{"title":"AI/ML, Optimization and EDA in the TILOS AI Research Institute","authors":"A. Kahng","doi":"10.1145/3526241.3530052","DOIUrl":"https://doi.org/10.1145/3526241.3530052","url":null,"abstract":"Optimization means finding the best possible solution to a given problem -- but challenges of scale and complexity keep many real-world optimization needs beyond reach. The Institute for Learning-enabled Optimization at Scale (TILOS) is a new National AI Research Institute led by UC San Diego in partnership with MIT, National University, Penn, UT Austin and Yale. TILOS is sponsored by the U.S. National Science Foundation, with partial support from Intel Corporation. The TILOS mission: make impossible optimizations possible, at scale and in practice. This talk introduces TILOS, its research agenda, and how it aims to establish a \"national nexus\" of AI and machine learning, optimization, and use domains that include integrated-circuit design and design automation. The talk will point out directions along which the interplay of learning and optimization can boost the scaling and quality of EDA outcomes.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115480278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing On-chip Interconnect against Delay Trojan using Dynamic Adaptive Caging 使用动态自适应封装保护片上互连免受延迟木马攻击
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530333
Ruchika Gupta, Vedika J. Kulkarni, John Jose, Sukumar Nandi
With the progressive innovation of VLSI technology, Tiled Chip Multicore Processors (TCMP) have surfaced up as the backbone of the modern data intensive parallel multi-core systems. Network-on-Chip (NoC) is considered as the most preferred choice for on-chip communication. Manufacturers have begun to investigate the prospects of using third-party IP in sophisticated TCMP designs due to strict time-to-market limitations. The inflated reliance over third party IPs induced security vulnerabilities in inter-tile communication. In this paper, we implement a novel Hardware Trojan (HT) called as Delay Trojan (DT) placed in an NoC router. Proposed DT adds random delay to flits going through it, while other NoC routers merely experience regular congestion, making DT detection difficult. As a result, packets of latency-critical applications stalls impacting system performance and throughput. Further, we propose a dynamic adaptive learning framework embedded in NoC routers that detects DT with reasonable accuracy and alerts neighboring routers. We also propose a caging technique to re-route packets. Our experimental study evaluates the impact of DT and the effectiveness of the proposed solution.
随着超大规模集成电路(VLSI)技术的不断创新,TCMP作为现代数据密集型并行多核系统的支柱浮出水面。片上网络(NoC)被认为是片上通信的最佳选择。由于严格的上市时间限制,制造商已经开始研究在复杂的tcm设计中使用第三方IP的前景。对第三方ip的过度依赖导致了层间通信中的安全漏洞。在本文中,我们实现了一种新的硬件木马(HT),称为延迟木马(DT),放置在NoC路由器中。提议的DT对通过它的飞行增加随机延迟,而其他NoC路由器仅仅经历常规拥塞,使得DT检测困难。因此,延迟关键型应用程序的数据包会中断,影响系统性能和吞吐量。此外,我们提出了一个嵌入在NoC路由器中的动态自适应学习框架,该框架可以以合理的精度检测DT并警告相邻路由器。我们还提出了一种笼化技术来重新路由数据包。我们的实验研究评估了DT的影响和提出的解决方案的有效性。
{"title":"Securing On-chip Interconnect against Delay Trojan using Dynamic Adaptive Caging","authors":"Ruchika Gupta, Vedika J. Kulkarni, John Jose, Sukumar Nandi","doi":"10.1145/3526241.3530333","DOIUrl":"https://doi.org/10.1145/3526241.3530333","url":null,"abstract":"With the progressive innovation of VLSI technology, Tiled Chip Multicore Processors (TCMP) have surfaced up as the backbone of the modern data intensive parallel multi-core systems. Network-on-Chip (NoC) is considered as the most preferred choice for on-chip communication. Manufacturers have begun to investigate the prospects of using third-party IP in sophisticated TCMP designs due to strict time-to-market limitations. The inflated reliance over third party IPs induced security vulnerabilities in inter-tile communication. In this paper, we implement a novel Hardware Trojan (HT) called as Delay Trojan (DT) placed in an NoC router. Proposed DT adds random delay to flits going through it, while other NoC routers merely experience regular congestion, making DT detection difficult. As a result, packets of latency-critical applications stalls impacting system performance and throughput. Further, we propose a dynamic adaptive learning framework embedded in NoC routers that detects DT with reasonable accuracy and alerts neighboring routers. We also propose a caging technique to re-route packets. Our experimental study evaluates the impact of DT and the effectiveness of the proposed solution.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129759210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Compaction of Compressed Bounded Transparent-Scan Test Sets 压缩有界透明扫描测试集的压缩
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530358
I. Pomeranz
Bounded transparent-scan supports test compaction beyond that achievable with conventional scan-based tests. This article considers the compression of bounded transparent-scan tests. All the components of a test (scan-in state, primary input vector, scan-in and scan-enable sequences) are produced by the on-chip decompression logic from a compressed test. The article describes a test compaction procedure that starts from a conventional compressed and compacted multicycle scan-based test set. Such a test set benefits from test data compression and test compaction applicable to conventional scan-based tests. The procedure modifies as many tests as possible into compressed bounded transparent-scan tests to reduce the number of tests, the storage requirements, and the number of clock cycles required for test application. Experimental results for benchmark circuits demonstrate the ability to compress bounded transparent-scan tests and achieve test compaction.
有界透明扫描支持常规基于扫描的测试无法实现的测试压缩。本文考虑有界透明扫描测试的压缩问题。测试的所有组件(扫描入状态、主输入向量、扫描入和扫描启用序列)都是由压缩测试的片上解压逻辑产生的。本文描述了一个测试压缩过程,从一个传统的压缩和压缩多周期扫描为基础的测试集开始。这种测试集受益于测试数据压缩和测试压缩,适用于传统的基于扫描的测试。此过程将尽可能多的测试修改为压缩的有界透明扫描测试,以减少测试数量、存储需求和测试应用程序所需的时钟周期数量。基准电路的实验结果表明,该方法能够压缩有界透明扫描测试并实现测试压缩。
{"title":"Compaction of Compressed Bounded Transparent-Scan Test Sets","authors":"I. Pomeranz","doi":"10.1145/3526241.3530358","DOIUrl":"https://doi.org/10.1145/3526241.3530358","url":null,"abstract":"Bounded transparent-scan supports test compaction beyond that achievable with conventional scan-based tests. This article considers the compression of bounded transparent-scan tests. All the components of a test (scan-in state, primary input vector, scan-in and scan-enable sequences) are produced by the on-chip decompression logic from a compressed test. The article describes a test compaction procedure that starts from a conventional compressed and compacted multicycle scan-based test set. Such a test set benefits from test data compression and test compaction applicable to conventional scan-based tests. The procedure modifies as many tests as possible into compressed bounded transparent-scan tests to reduce the number of tests, the storage requirements, and the number of clock cycles required for test application. Experimental results for benchmark circuits demonstrate the ability to compress bounded transparent-scan tests and achieve test compaction.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128736624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CoSeP: Compression and Content-based Selection Procedure to Improve Lifetime of Encrypted Non-Volatile Main Memories 提高加密非易失性主存储器寿命的压缩和基于内容的选择程序
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530375
Arijit Nath, H. Kapoor
In this paper, we propose a technique called CoSeP that combines the effect of compression and the content of the compressed blocks to reduce bit-flips in the encrypted PCM-based main memories. The blocks are compressed using the technique (out of FPC, BDI, and COMF) that offers minimum block size when the sizes of the two smallest compressed blocks are non-similar. However, for compressed blocks of similar sizes, the block is compressed using the technique that encounters minimum bit-flips, which reduces bit-flips further. Experimental results show that our technique gives a substantial reduction in bit-flips and improvements in lifetime compared to baseline and state-of-the-art techniques.
在本文中,我们提出了一种称为CoSeP的技术,它结合了压缩的效果和压缩块的内容,以减少基于pcm的加密主存储器中的位翻转。当两个最小的压缩块的大小不相似时,使用技术(出自FPC、BDI和COMF)压缩块,该技术提供最小块大小。然而,对于大小相似的压缩块,使用遇到最小位翻转的技术对块进行压缩,从而进一步减少位翻转。实验结果表明,与基线和最先进的技术相比,我们的技术大大减少了比特翻转,并提高了使用寿命。
{"title":"CoSeP: Compression and Content-based Selection Procedure to Improve Lifetime of Encrypted Non-Volatile Main Memories","authors":"Arijit Nath, H. Kapoor","doi":"10.1145/3526241.3530375","DOIUrl":"https://doi.org/10.1145/3526241.3530375","url":null,"abstract":"In this paper, we propose a technique called CoSeP that combines the effect of compression and the content of the compressed blocks to reduce bit-flips in the encrypted PCM-based main memories. The blocks are compressed using the technique (out of FPC, BDI, and COMF) that offers minimum block size when the sizes of the two smallest compressed blocks are non-similar. However, for compressed blocks of similar sizes, the block is compressed using the technique that encounters minimum bit-flips, which reduces bit-flips further. Experimental results show that our technique gives a substantial reduction in bit-flips and improvements in lifetime compared to baseline and state-of-the-art techniques.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129127185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the Great Lakes Symposium on VLSI 2022
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1