首页 > 最新文献

Proceedings of the Great Lakes Symposium on VLSI 2022最新文献

英文 中文
An Event Based Gesture Recognition System Using a Liquid State Machine Accelerator 基于事件的液体状态机加速器手势识别系统
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530357
Jing Zhu, Lei Wang, Xun Xiao, Zhijie Yang, Ziyang Kang, Shiming Li, LingHui Peng
In this paper, we design a spiking neural network (SNN) accelerator based on the Liquid State Machine (LSM) which is more lightweight and bionic. In this accelerator, 512 leaky integrate-and-fire (LIF) neurons with configurable biological parameters are integrated. For the sparsity of computation and memory of the LSM, we use zero-skipping and weight compression to maximize the performance. The quantized 4-bit model deployed on the accelerator can achieve a classification accuracy of 97.42% on the DVS128 gesture dataset. We implement the accelerator on FPGA. Results indicate that its end-to-end average inference latency is 3.97 ms, which is 26 times better than the gesture recognition system based on TrueNorth.
本文在液态机(LSM)的基础上设计了一种更轻量化和仿生的脉冲神经网络(SNN)加速器。在该加速器中,集成了512个具有可配置生物参数的泄漏集成-点火(LIF)神经元。考虑到LSM的计算和内存的稀疏性,我们使用了跳零和权值压缩来实现性能的最大化。部署在加速器上的量化4位模型对DVS128手势数据集的分类准确率达到97.42%。我们在FPGA上实现了加速器。结果表明,其端到端平均推理延迟为3.97 ms,比基于TrueNorth的手势识别系统提高了26倍。
{"title":"An Event Based Gesture Recognition System Using a Liquid State Machine Accelerator","authors":"Jing Zhu, Lei Wang, Xun Xiao, Zhijie Yang, Ziyang Kang, Shiming Li, LingHui Peng","doi":"10.1145/3526241.3530357","DOIUrl":"https://doi.org/10.1145/3526241.3530357","url":null,"abstract":"In this paper, we design a spiking neural network (SNN) accelerator based on the Liquid State Machine (LSM) which is more lightweight and bionic. In this accelerator, 512 leaky integrate-and-fire (LIF) neurons with configurable biological parameters are integrated. For the sparsity of computation and memory of the LSM, we use zero-skipping and weight compression to maximize the performance. The quantized 4-bit model deployed on the accelerator can achieve a classification accuracy of 97.42% on the DVS128 gesture dataset. We implement the accelerator on FPGA. Results indicate that its end-to-end average inference latency is 3.97 ms, which is 26 times better than the gesture recognition system based on TrueNorth.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LaBaNI: Layer-based Noise Injection Attack on Convolutional Neural Networks 基于层的卷积神经网络噪声注入攻击
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530385
Tolulope A. Odetola, Faiq Khalid, S. R. Hasan
Hardware accelerator-based CNN inference improves the performance and latency but increases the time-to-market. As a result, CNN deployment on hardware is often outsourced to untrusted third parties (3Ps) with security risks, like hardware Trojans (HTs). Therefore, during the outsourcing, designers conceal the information about initial and final CNN layers from 3Ps. However, this paper shows that this solution is ineffective by proposing a hardware-intrinsic attack (HIA), Layer-based Noise Injection (LaBaNI), which successfully performs misclassification without knowing the initial and final layers. LaBaNi uses the statistical properties of feature maps of the CNN to design the trigger with a very low triggering probability and a payload for misclassification. To show the effectiveness of LaBaNI, we demonstrated it on LeNet and LeNet-3D CNN models deployed on Xilinx's PYNQ board. In the experimental results, the attack is successful, non-periodic, and random, hence difficult to detect. Results show that LaBaNI utilizes up to 4% extra LUTs, 5% extra DSPs, and 2% extra FFs, respectively.
基于硬件加速器的CNN推理提高了性能和延迟,但增加了上市时间。因此,CNN在硬件上的部署通常外包给不受信任的第三方(3p),这些第三方存在安全风险,比如硬件木马(ht)。因此,在外包过程中,设计师对第三方隐瞒了CNN初始层和最终层的信息。然而,本文通过提出一种硬件固有攻击(HIA),基于层的噪声注入(LaBaNI),表明该解决方案是无效的,该方法在不知道初始层和最终层的情况下成功地执行错误分类。LaBaNi利用CNN的特征图的统计特性,设计了触发概率极低的触发器和误分类有效载荷。为了展示LaBaNI的有效性,我们在部署在赛灵思PYNQ板上的LeNet和LeNet- 3d CNN模型上进行了演示。在实验结果中,攻击是成功的,非周期性和随机性,因此难以检测。结果表明,LaBaNI分别利用高达4%的额外lut, 5%的额外dsp和2%的额外ff。
{"title":"LaBaNI: Layer-based Noise Injection Attack on Convolutional Neural Networks","authors":"Tolulope A. Odetola, Faiq Khalid, S. R. Hasan","doi":"10.1145/3526241.3530385","DOIUrl":"https://doi.org/10.1145/3526241.3530385","url":null,"abstract":"Hardware accelerator-based CNN inference improves the performance and latency but increases the time-to-market. As a result, CNN deployment on hardware is often outsourced to untrusted third parties (3Ps) with security risks, like hardware Trojans (HTs). Therefore, during the outsourcing, designers conceal the information about initial and final CNN layers from 3Ps. However, this paper shows that this solution is ineffective by proposing a hardware-intrinsic attack (HIA), Layer-based Noise Injection (LaBaNI), which successfully performs misclassification without knowing the initial and final layers. LaBaNi uses the statistical properties of feature maps of the CNN to design the trigger with a very low triggering probability and a payload for misclassification. To show the effectiveness of LaBaNI, we demonstrated it on LeNet and LeNet-3D CNN models deployed on Xilinx's PYNQ board. In the experimental results, the attack is successful, non-periodic, and random, hence difficult to detect. Results show that LaBaNI utilizes up to 4% extra LUTs, 5% extra DSPs, and 2% extra FFs, respectively.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125967572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 4A: Testing,Reliability and Fault Tolerance 会议详情:会议4A:测试、可靠性和容错
Pub Date : 2022-06-06 DOI: 10.1145/3542688
Mark Zwolinski
{"title":"Session details: Session 4A: Testing,Reliability and Fault Tolerance","authors":"Mark Zwolinski","doi":"10.1145/3542688","DOIUrl":"https://doi.org/10.1145/3542688","url":null,"abstract":"","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Improved COTD Technique for Hardware Trojan Detection in Gate-level Netlist 门级网表硬件木马检测的改进COTD技术
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530835
H. Salmani
Hardware Trojans (HTs) have introduced serious security concerns into the integrated circuit design flow as they can undermine circuit operations by leaking sensitive information, causing malfunction, or similar attacks. An earlier-introduced HT detection technique in gate-level netlist, the Controllability and Observability for hardware Trojan Detection (COTD) technique detects HTs based on controllability and observability signals in a circuit and presents a static analysis based on an unsupervised machine learning model to identify HT signals in the circuit. While COTD detects the existence of HTs in a circuit, some work has highlighted the shortcoming of COTD in detecting some HT signals that present similar features as genuine signals. To address this shortcoming, this paper presents an improved COTD technique. The improved COTD technique introduces an iterative unsupervised machine-learning technique to isolate HT signals. Furthermore, the improved COTD is equipped with the Gradual-N-Justification (GNJ) technique to reduce false-positive rates in detecting HT signals. The improved COTD technique is applied to several different combinations of full-scan and partial scan circuits tampered with hard-to-detect sequential HTs. To realize valid and hard-to-detect HTs, a configurable HT insertion platform is utilized. The comprehensive results have shown that the improved COTD is highly scalable. Furthermore, the improved COTD technique does not miss a HT circuit if exists and it offers a false-positive rate as low as 3.4%, on average.
硬件木马(ht)已经给集成电路设计流程带来了严重的安全问题,因为它们可以通过泄露敏感信息、引起故障或类似攻击来破坏电路运行。硬件木马检测(COTD)技术是门级网表中较早介绍的高温检测技术,它基于电路中的可控性和可观察性信号来检测高温,并提出了一种基于无监督机器学习模型的静态分析方法来识别电路中的高温信号。虽然COTD可以检测电路中是否存在高温信号,但一些工作强调了COTD在检测某些与真实信号具有相似特征的高温信号方面的缺点。针对这一缺点,本文提出了一种改进的COTD技术。改进的COTD技术引入了一种迭代的无监督机器学习技术来隔离高温信号。此外,改进的COTD还配备了逐渐n -校正(GNJ)技术,以降低检测高温信号的假阳性率。改进的COTD技术应用于几种不同的全扫描和部分扫描电路的组合,这些电路被难以检测的顺序高温干扰。为了实现有效且难以检测的高温感应,采用了可配置的高温感应插入平台。综合结果表明,改进后的COTD具有很高的可扩展性。此外,改进的COTD技术不会遗漏高温电路,其假阳性率平均低至3.4%。
{"title":"The Improved COTD Technique for Hardware Trojan Detection in Gate-level Netlist","authors":"H. Salmani","doi":"10.1145/3526241.3530835","DOIUrl":"https://doi.org/10.1145/3526241.3530835","url":null,"abstract":"Hardware Trojans (HTs) have introduced serious security concerns into the integrated circuit design flow as they can undermine circuit operations by leaking sensitive information, causing malfunction, or similar attacks. An earlier-introduced HT detection technique in gate-level netlist, the Controllability and Observability for hardware Trojan Detection (COTD) technique detects HTs based on controllability and observability signals in a circuit and presents a static analysis based on an unsupervised machine learning model to identify HT signals in the circuit. While COTD detects the existence of HTs in a circuit, some work has highlighted the shortcoming of COTD in detecting some HT signals that present similar features as genuine signals. To address this shortcoming, this paper presents an improved COTD technique. The improved COTD technique introduces an iterative unsupervised machine-learning technique to isolate HT signals. Furthermore, the improved COTD is equipped with the Gradual-N-Justification (GNJ) technique to reduce false-positive rates in detecting HT signals. The improved COTD technique is applied to several different combinations of full-scan and partial scan circuits tampered with hard-to-detect sequential HTs. To realize valid and hard-to-detect HTs, a configurable HT insertion platform is utilized. The comprehensive results have shown that the improved COTD is highly scalable. Furthermore, the improved COTD technique does not miss a HT circuit if exists and it offers a false-positive rate as low as 3.4%, on average.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127352395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Session 1A: Hardware Security 会话详细信息:会话1A:硬件安全
Pub Date : 2022-06-06 DOI: 10.1145/3542682
K. Gaj
{"title":"Session details: Session 1A: Hardware Security","authors":"K. Gaj","doi":"10.1145/3542682","DOIUrl":"https://doi.org/10.1145/3542682","url":null,"abstract":"","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133544461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Deep Neural Network Intellectual Property with Architecture-Agnostic Input Obfuscation 基于结构不可知输入混淆的深度神经网络知识产权保护
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530386
Brooks Olney, Robert Karam
Deep Convolutional Neural Networks (DCNNs) have revolutionized and improved many aspects of modern life. However, these models are increasingly more complex, and training them to perform at desirable levels is difficult undertaking; hence, the trained parameters represent a valuable intellectual property (IP) asset which a motivated attacker may wish to steal. To better protect the IP, we propose a method of lightweight input obfuscation that is undone prior to inference, where input data is obfuscated in order to use the model to specification. Without using the correct key and unlocking sequence, the accuracy of the classifier is reduced to a random guess, thus protecting the input/output interface and mitigating model extraction attacks which rely on such access. We evaluate the system using a VGG-16 network trained on CIFAR-10, and demonstrate that with an incorrect deobfuscation key or sequence, the classification accuracy drops to a random guess, with an inference timing overhead of 4.4% on an Nvidia-based evaluation platform. The system avoids the costs associated with retraining and has no impact on model accuracy for authorized users.
深度卷积神经网络(DCNNs)已经彻底改变和改善了现代生活的许多方面。然而,这些模型越来越复杂,训练它们达到理想的水平是一项艰巨的任务;因此,训练参数代表有价值的知识产权(IP)资产,有动机的攻击者可能希望窃取这些资产。为了更好地保护IP,我们提出了一种轻量级输入混淆的方法,该方法在推理之前撤消,其中输入数据被混淆以便使用模型来规范。在不使用正确的密钥和解锁顺序的情况下,分类器的准确性降低到随机猜测,从而保护了输入/输出接口,减轻了依赖于这种访问的模型提取攻击。我们使用在CIFAR-10上训练的VGG-16网络对系统进行了评估,并证明在错误的解混淆密钥或序列下,分类精度下降到随机猜测,在基于nvidia的评估平台上,推理时间开销为4.4%。该系统避免了与再培训相关的成本,并且对授权用户的模型准确性没有影响。
{"title":"Protecting Deep Neural Network Intellectual Property with Architecture-Agnostic Input Obfuscation","authors":"Brooks Olney, Robert Karam","doi":"10.1145/3526241.3530386","DOIUrl":"https://doi.org/10.1145/3526241.3530386","url":null,"abstract":"Deep Convolutional Neural Networks (DCNNs) have revolutionized and improved many aspects of modern life. However, these models are increasingly more complex, and training them to perform at desirable levels is difficult undertaking; hence, the trained parameters represent a valuable intellectual property (IP) asset which a motivated attacker may wish to steal. To better protect the IP, we propose a method of lightweight input obfuscation that is undone prior to inference, where input data is obfuscated in order to use the model to specification. Without using the correct key and unlocking sequence, the accuracy of the classifier is reduced to a random guess, thus protecting the input/output interface and mitigating model extraction attacks which rely on such access. We evaluate the system using a VGG-16 network trained on CIFAR-10, and demonstrate that with an incorrect deobfuscation key or sequence, the classification accuracy drops to a random guess, with an inference timing overhead of 4.4% on an Nvidia-based evaluation platform. The system avoids the costs associated with retraining and has no impact on model accuracy for authorized users.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131423710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection 基于硬件的零日恶意软件精确检测的深度神经网络和迁移学习
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530326
Z. He, Amin Rezaei, H. Homayoun, H. Sayadi
In recent years, security researchers have shifted their attentions to the underlying processors' architecture and proposed Hardware-Based Malware Detection (HMD) countermeasures to address inefficiencies of software-based detection methods. HMD techniques apply standard Machine Learning (ML) algorithms to the processors' low-level events collected from Hardware Performance Counter (HPC) registers. However, despite obtaining promising results for detecting known malware, the challenge of accurate zero-day (unknown) malware detection has remained an unresolved problem in existing HPC-based countermeasures. Our comprehensive analysis shows that standard ML classifiers are not effective in recognizing zero-day malware traces using HPC events. In response, we propose Deep-HMD, a two-stage intelligent and flexible approach based on deep neural network and transfer learning, for accurate zero-day malware detection based on image-based hardware events. The experimental results indicate that our proposed solution outperforms existing ML-based methods by achieving a 97% detection rate (F-Measure and Area Under the Curve) for detecting zero-day malware signatures at run-time using the top 4 hardware events with a minimal false positive rate and no hardware redesign overhead.
近年来,安全研究人员将注意力转移到底层处理器的架构上,并提出了基于硬件的恶意软件检测(HMD)对策,以解决基于软件的检测方法效率低下的问题。HMD技术将标准机器学习(ML)算法应用于处理器从硬件性能计数器(HPC)寄存器收集的低级事件。然而,尽管在检测已知恶意软件方面取得了有希望的结果,但在现有的基于高性能计算的对策中,准确的零日(未知)恶意软件检测仍然是一个未解决的问题。我们的综合分析表明,标准ML分类器在使用HPC事件识别零日恶意软件跟踪方面并不有效。为此,我们提出了一种基于深度神经网络和迁移学习的两阶段智能灵活方法deep - hmd,用于基于图像硬件事件的零日恶意软件准确检测。实验结果表明,我们提出的解决方案优于现有的基于ml的方法,通过使用前四个硬件事件在运行时检测零日恶意软件签名,达到97%的检测率(F-Measure和曲线下面积),具有最小的误报率和无硬件重新设计开销。
{"title":"Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection","authors":"Z. He, Amin Rezaei, H. Homayoun, H. Sayadi","doi":"10.1145/3526241.3530326","DOIUrl":"https://doi.org/10.1145/3526241.3530326","url":null,"abstract":"In recent years, security researchers have shifted their attentions to the underlying processors' architecture and proposed Hardware-Based Malware Detection (HMD) countermeasures to address inefficiencies of software-based detection methods. HMD techniques apply standard Machine Learning (ML) algorithms to the processors' low-level events collected from Hardware Performance Counter (HPC) registers. However, despite obtaining promising results for detecting known malware, the challenge of accurate zero-day (unknown) malware detection has remained an unresolved problem in existing HPC-based countermeasures. Our comprehensive analysis shows that standard ML classifiers are not effective in recognizing zero-day malware traces using HPC events. In response, we propose Deep-HMD, a two-stage intelligent and flexible approach based on deep neural network and transfer learning, for accurate zero-day malware detection based on image-based hardware events. The experimental results indicate that our proposed solution outperforms existing ML-based methods by achieving a 97% detection rate (F-Measure and Area Under the Curve) for detecting zero-day malware signatures at run-time using the top 4 hardware events with a minimal false positive rate and no hardware redesign overhead.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132753435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Error Resilient In-Memory Computing Architecture for CNN Inference on the Edge 基于边缘的CNN推理的内存中容错计算架构
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530351
M. Rios, Flavio Ponzina, G. Ansaloni, A. Levisse, David Atienza Alonso
The growing popularity of edge computing has fostered the development of diverse solutions to support Artificial Intelligence (AI) in energy-constrained devices. Nonetheless, comparatively few efforts have focused on the resiliency exhibited by AI workloads (such as Convolutional Neural Networks, CNNs) as an avenue towards increasing their run-time efficiency, and even fewer have proposed strategies to increase such resiliency. We herein address this challenge in the context of Bit-line Computing architectures, an embodiment of the in-memory computing paradigm tailored towards CNN applications. We show that little additional hardware is required to add highly effective error detection and mitigation in such platforms. In turn, our proposed scheme can cope with high error rates when performing memory accesses with no impact on CNNs accuracy, allowing for very aggressive voltage scaling. Complementary, we also show that CNN resiliency can be increased by algorithmic optimizations in addition to architectural ones, adopting a combined ensembling and pruning strategy that increases robustness while not inflating workload requirements. Experiments on different quantized CNN models reveal that our combined hardware/software approach enables the supply voltage to be reduced to just 650mV, decreasing the energy per inference up to 51.3%, without affecting the baseline CNN classification accuracy.
边缘计算的日益普及促进了各种解决方案的发展,以支持能源受限设备中的人工智能(AI)。尽管如此,相对较少的努力集中在人工智能工作负载(如卷积神经网络,cnn)所表现出的弹性上,作为提高其运行时效率的途径,甚至更少的人提出了增加这种弹性的策略。本文在位线计算架构的背景下解决了这一挑战,位线计算架构是为CNN应用量身定制的内存计算范例的体现。我们表明,在这样的平台中添加高效的错误检测和缓解只需要很少的额外硬件。反过来,我们提出的方案可以在不影响cnn精度的情况下处理内存访问时的高错误率,允许非常积极的电压缩放。此外,我们还表明,除了架构优化之外,CNN的弹性还可以通过算法优化来增加,采用组合的集成和修剪策略可以增加鲁棒性,同时不会增加工作量需求。在不同量化CNN模型上的实验表明,我们的硬件/软件组合方法使供电电压降至仅650mV,每次推理的能量降低高达51.3%,而不影响基线CNN分类精度。
{"title":"Error Resilient In-Memory Computing Architecture for CNN Inference on the Edge","authors":"M. Rios, Flavio Ponzina, G. Ansaloni, A. Levisse, David Atienza Alonso","doi":"10.1145/3526241.3530351","DOIUrl":"https://doi.org/10.1145/3526241.3530351","url":null,"abstract":"The growing popularity of edge computing has fostered the development of diverse solutions to support Artificial Intelligence (AI) in energy-constrained devices. Nonetheless, comparatively few efforts have focused on the resiliency exhibited by AI workloads (such as Convolutional Neural Networks, CNNs) as an avenue towards increasing their run-time efficiency, and even fewer have proposed strategies to increase such resiliency. We herein address this challenge in the context of Bit-line Computing architectures, an embodiment of the in-memory computing paradigm tailored towards CNN applications. We show that little additional hardware is required to add highly effective error detection and mitigation in such platforms. In turn, our proposed scheme can cope with high error rates when performing memory accesses with no impact on CNNs accuracy, allowing for very aggressive voltage scaling. Complementary, we also show that CNN resiliency can be increased by algorithmic optimizations in addition to architectural ones, adopting a combined ensembling and pruning strategy that increases robustness while not inflating workload requirements. Experiments on different quantized CNN models reveal that our combined hardware/software approach enables the supply voltage to be reduced to just 650mV, decreasing the energy per inference up to 51.3%, without affecting the baseline CNN classification accuracy.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128138935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Cross-Level Processor Verification using Coverage-guided Fuzzing 使用覆盖引导模糊测试的高效跨层处理器验证
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530340
Niklas Bruns, V. Herdt, Daniel Große, R. Drechsler
In this paper, we propose a novel simulation-based cross-level approach for processor verification at the Register-Transfer Level (RTL). We leverage state-of-the-art coverage-guided fuzzing techniques from the software domain to generate processor-level input stimuli. An Instruction Set Simulator (ISS) is utilized as a reference model for the RTL processor under test in an efficient co-simulation setting. To further boost the fuzzing effectiveness, we devised custom mutation procedures tailored for the processor verification domain. Our experiments using the popular open-source RISC-V based VexRiscv processor demonstrate the effectiveness of our approach in finding intricate bugs at the processor level.
在本文中,我们提出了一种新的基于仿真的跨层方法,用于寄存器-传输层(RTL)的处理器验证。我们利用软件领域最先进的覆盖引导模糊技术来生成处理器级输入刺激。利用指令集模拟器(ISS)作为被测RTL处理器的参考模型,实现了高效的协同仿真。为了进一步提高模糊化的有效性,我们设计了针对处理器验证域的定制突变程序。我们使用流行的基于开源RISC-V的VexRiscv处理器进行的实验证明了我们的方法在处理器级别发现复杂错误的有效性。
{"title":"Efficient Cross-Level Processor Verification using Coverage-guided Fuzzing","authors":"Niklas Bruns, V. Herdt, Daniel Große, R. Drechsler","doi":"10.1145/3526241.3530340","DOIUrl":"https://doi.org/10.1145/3526241.3530340","url":null,"abstract":"In this paper, we propose a novel simulation-based cross-level approach for processor verification at the Register-Transfer Level (RTL). We leverage state-of-the-art coverage-guided fuzzing techniques from the software domain to generate processor-level input stimuli. An Instruction Set Simulator (ISS) is utilized as a reference model for the RTL processor under test in an efficient co-simulation setting. To further boost the fuzzing effectiveness, we devised custom mutation procedures tailored for the processor verification domain. Our experiments using the popular open-source RISC-V based VexRiscv processor demonstrate the effectiveness of our approach in finding intricate bugs at the processor level.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128608270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT-enabled Soft Robotics for Electrical Engineers 面向电气工程师的物联网软机器人
Pub Date : 2022-06-06 DOI: 10.1145/3526241.3530369
P. Sundaravadivel, P. Ghosh, Bikal Suwal
In the field of technology and engineering education, there is a lot of uncertainty as to what the future trends are going to be. The institutions are preparing and training their students for jobs that they haven't even explored yet. To overcome this uncertainty, new domains with overlapping skill sets are constantly integrated to engage students with technological development for the future computing era. Robotics and the Internet of Things have been a popular area of interest amongst Electrical and Computer Engineers with high global value. Soft robots can be described as a form of biomimicry in which traditional hard robotics are replaced by a more sophisticated model that imitates human, animal, and plant life. In this article, we discuss a problem-based learning approach to integrate key concepts of soft robotics into the undergraduate electrical engineering curricula. The proposed module can be easily integrated into any IoT and Robotics curriculum.
在技术和工程教育领域,未来的发展趋势有很多不确定因素。这些机构正在为他们的学生准备和培训他们甚至还没有探索过的工作。为了克服这种不确定性,不断整合具有重叠技能集的新领域,以使学生参与未来计算时代的技术发展。机器人和物联网一直是电气和计算机工程师感兴趣的热门领域,具有很高的全球价值。软机器人可以被描述为一种仿生学形式,其中传统的硬机器人被一种更复杂的模仿人类、动物和植物生命的模型所取代。在本文中,我们讨论了一种基于问题的学习方法,将软机器人的关键概念整合到本科电气工程课程中。提出的模块可以很容易地集成到任何物联网和机器人课程中。
{"title":"IoT-enabled Soft Robotics for Electrical Engineers","authors":"P. Sundaravadivel, P. Ghosh, Bikal Suwal","doi":"10.1145/3526241.3530369","DOIUrl":"https://doi.org/10.1145/3526241.3530369","url":null,"abstract":"In the field of technology and engineering education, there is a lot of uncertainty as to what the future trends are going to be. The institutions are preparing and training their students for jobs that they haven't even explored yet. To overcome this uncertainty, new domains with overlapping skill sets are constantly integrated to engage students with technological development for the future computing era. Robotics and the Internet of Things have been a popular area of interest amongst Electrical and Computer Engineers with high global value. Soft robots can be described as a form of biomimicry in which traditional hard robotics are replaced by a more sophisticated model that imitates human, animal, and plant life. In this article, we discuss a problem-based learning approach to integrate key concepts of soft robotics into the undergraduate electrical engineering curricula. The proposed module can be easily integrated into any IoT and Robotics curriculum.","PeriodicalId":188228,"journal":{"name":"Proceedings of the Great Lakes Symposium on VLSI 2022","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133333590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Proceedings of the Great Lakes Symposium on VLSI 2022
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1