首页 > 最新文献

2023 IEEE European Test Symposium (ETS)最新文献

英文 中文
High-coverage analog IP block test generation methodology using low-cost signal generation and output response analysis 使用低成本信号生成和输出响应分析的高覆盖模拟IP块测试生成方法
Pub Date : 2023-05-22 DOI: 10.1109/ETS56758.2023.10173963
Jhon Gomez, Nektar Xama, Anthony Coyette, Ronny Vanhooren, Wim Dobbelaere, G. Gielen
Today, testing of AMS circuits needs to improve quality towards ppb test escape levels as well as decrease the test development time to reduce the IC lead time. A defect-oriented solution can improve quality by focusing on structural tests that can detect defects more efficiently than traditional functional tests, while test reuse can decrease test development time on ICs built with reusable IP blocks. A defect-oriented built-in self-test (BIST) approach integrates both solutions. This paper proposes a test development methodology for analog IP blocks based on such defect-oriented BIST framework. The methodology allows for achieving the target defect coverage at the lowest possible cost. Co-designing the IP with the DfT structures allows accounting for any non-idealities that the DfT may add to the IP. Test structures cost is limited by using low-cost signal generation and a new output response analyzer (ORA). The proposed methodology is demonstrated on two case studies. The results show that coverages higher than 90% are possible using a simple digital pulse signal and an ORA with only 4 bits of accuracy, while coverages higher than 95% are possible with 6 bits, offering a good trade-off between coverage and cost.
今天,AMS电路的测试需要提高质量,达到ppb测试逃逸水平,并减少测试开发时间,以减少IC的交货时间。面向缺陷的解决方案可以通过关注比传统功能测试更有效地检测缺陷的结构测试来提高质量,而测试重用可以减少使用可重用IP块构建的ic的测试开发时间。面向缺陷的内置自检(BIST)方法集成了这两种解决方案。本文提出了一种基于这种缺陷导向的BIST框架的模拟IP模块测试开发方法。该方法允许以尽可能低的成本实现目标缺陷覆盖。与DfT结构共同设计IP允许考虑DfT可能添加到IP中的任何非理想性。使用低成本的信号产生和新的输出响应分析仪(ORA)限制了测试结构的成本。提出的方法在两个案例研究中得到证明。结果表明,使用简单的数字脉冲信号和只有4位精度的ORA,覆盖率可能高于90%,而6位的覆盖率可能高于95%,在覆盖率和成本之间提供了很好的权衡。
{"title":"High-coverage analog IP block test generation methodology using low-cost signal generation and output response analysis","authors":"Jhon Gomez, Nektar Xama, Anthony Coyette, Ronny Vanhooren, Wim Dobbelaere, G. Gielen","doi":"10.1109/ETS56758.2023.10173963","DOIUrl":"https://doi.org/10.1109/ETS56758.2023.10173963","url":null,"abstract":"Today, testing of AMS circuits needs to improve quality towards ppb test escape levels as well as decrease the test development time to reduce the IC lead time. A defect-oriented solution can improve quality by focusing on structural tests that can detect defects more efficiently than traditional functional tests, while test reuse can decrease test development time on ICs built with reusable IP blocks. A defect-oriented built-in self-test (BIST) approach integrates both solutions. This paper proposes a test development methodology for analog IP blocks based on such defect-oriented BIST framework. The methodology allows for achieving the target defect coverage at the lowest possible cost. Co-designing the IP with the DfT structures allows accounting for any non-idealities that the DfT may add to the IP. Test structures cost is limited by using low-cost signal generation and a new output response analyzer (ORA). The proposed methodology is demonstrated on two case studies. The results show that coverages higher than 90% are possible using a simple digital pulse signal and an ORA with only 4 bits of accuracy, while coverages higher than 95% are possible with 6 bits, offering a good trade-off between coverage and cost.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128393572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-Line Testing of Neuromorphic Hardware 神经形态硬件的在线测试
Pub Date : 2023-05-22 DOI: 10.1109/ETS56758.2023.10174077
Theofilos Spyrou, H. Stratigopoulos
We propose an on-line testing methodology for neuromorphic hardware supporting spiking neural networks. Testing aims at detecting in real-time abnormal operation due to hardware-level faults, as well as screening of outlier or corner inputs that are prone to misprediction. Testing is enabled by two on-chip classifiers that prognosticate, based on a low-dimensional set of features extracted with spike counting, whether the network will make a correct prediction. The system of classifiers is capable of evaluating the confidence of the decision, and when the confidence is judged low a replay operation helps to resolve the ambiguity. The testing methodology is demonstrated by fully embedding it in a custom FPGA-based neuromorphic hardware platform. It operates in the background being totally non-intrusive to the network operation, while offering a zero-latency test decision for the vast majority of inferences.
我们提出了一种支持脉冲神经网络的神经形态硬件在线测试方法。测试的目的是实时检测由于硬件级故障导致的异常运行,以及筛选容易出现误预测的异常输入或角输入。测试是由两个片上分类器实现的,它们基于用尖峰计数提取的低维特征集来预测网络是否会做出正确的预测。分类器系统能够评估决策的置信度,当置信度被判断为低时,重播操作有助于消除歧义。通过将测试方法完全嵌入到基于fpga的定制神经形态硬件平台中,验证了测试方法。它在后台运行,完全不干扰网络操作,同时为绝大多数推理提供零延迟测试决策。
{"title":"On-Line Testing of Neuromorphic Hardware","authors":"Theofilos Spyrou, H. Stratigopoulos","doi":"10.1109/ETS56758.2023.10174077","DOIUrl":"https://doi.org/10.1109/ETS56758.2023.10174077","url":null,"abstract":"We propose an on-line testing methodology for neuromorphic hardware supporting spiking neural networks. Testing aims at detecting in real-time abnormal operation due to hardware-level faults, as well as screening of outlier or corner inputs that are prone to misprediction. Testing is enabled by two on-chip classifiers that prognosticate, based on a low-dimensional set of features extracted with spike counting, whether the network will make a correct prediction. The system of classifiers is capable of evaluating the confidence of the decision, and when the confidence is judged low a replay operation helps to resolve the ambiguity. The testing methodology is demonstrated by fully embedding it in a custom FPGA-based neuromorphic hardware platform. It operates in the background being totally non-intrusive to the network operation, while offering a zero-latency test decision for the vast majority of inferences.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Side-Channel Attacks and Countermeasures on Computation-in-Memory Architectures and Technologies 内存中计算架构与技术的功率侧信道攻击与对策
Pub Date : 2023-05-22 DOI: 10.1109/ETS56758.2023.10173981
B. Sapui, Jonas Krautter, M. Mayahinia, A. Jafari, Dennis R. E. Gnad, Sergej Meschkov, M. Tahoori
To overcome the bottleneck of the classical processor-centric architectures, Computation-in-Memory (CiM) is a promising paradigm where operations are performed directly in memory. Recent works propose the use of CiM to accelerate neural networks or hyperdimensional computing, but also for memory encryption solutions. As CiM facilitates the computation in the analog domain and the output is driven through current sensing, CiM could potentially be highly vulnerable to power side-channel attacks. In this work, we analyze the vulnerability for power side-channel attacks in various CiM implementations based on Static Random Access Memory (SRAM) and emerging nonvolatile memristive technologies. Our results show that a side-channel attacker can recover secret data used in an XOR operation with only a few hundred measurements, where CiM architectures based on emerging memristive technologies are more vulnerable than SRAM-based CiM. Therefore, we propose two different types of countermeasures based on hiding and masking, which are tailored to CiM architectures. The efficiency of our proposed countermeasures is shown by both attacks and leakage assessment methodologies using one million measurement traces.
为了克服以处理器为中心的经典架构的瓶颈,内存中计算(CiM)是一种很有前途的范例,其中操作直接在内存中执行。最近的工作建议使用CiM来加速神经网络或超维计算,但也用于内存加密解决方案。由于CiM简化了模拟域的计算,并且通过电流传感驱动输出,因此CiM可能非常容易受到功率侧信道攻击。在这项工作中,我们分析了基于静态随机存取存储器(SRAM)和新兴的非易失性记忆技术的各种CiM实现中的电源侧信道攻击漏洞。我们的研究结果表明,侧信道攻击者可以仅通过几百个测量就恢复XOR操作中使用的秘密数据,其中基于新兴记忆技术的CiM架构比基于sram的CiM更容易受到攻击。因此,我们提出了两种不同类型的基于隐藏和屏蔽的对策,这是针对CiM架构量身定制的。我们提出的对策的有效性通过使用一百万条测量迹线的攻击和泄漏评估方法来证明。
{"title":"Power Side-Channel Attacks and Countermeasures on Computation-in-Memory Architectures and Technologies","authors":"B. Sapui, Jonas Krautter, M. Mayahinia, A. Jafari, Dennis R. E. Gnad, Sergej Meschkov, M. Tahoori","doi":"10.1109/ETS56758.2023.10173981","DOIUrl":"https://doi.org/10.1109/ETS56758.2023.10173981","url":null,"abstract":"To overcome the bottleneck of the classical processor-centric architectures, Computation-in-Memory (CiM) is a promising paradigm where operations are performed directly in memory. Recent works propose the use of CiM to accelerate neural networks or hyperdimensional computing, but also for memory encryption solutions. As CiM facilitates the computation in the analog domain and the output is driven through current sensing, CiM could potentially be highly vulnerable to power side-channel attacks. In this work, we analyze the vulnerability for power side-channel attacks in various CiM implementations based on Static Random Access Memory (SRAM) and emerging nonvolatile memristive technologies. Our results show that a side-channel attacker can recover secret data used in an XOR operation with only a few hundred measurements, where CiM architectures based on emerging memristive technologies are more vulnerable than SRAM-based CiM. Therefore, we propose two different types of countermeasures based on hiding and masking, which are tailored to CiM architectures. The efficiency of our proposed countermeasures is shown by both attacks and leakage assessment methodologies using one million measurement traces.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128618543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
harDNNing: a machine-learning-based framework for fault tolerance assessment and protection of DNNs harDNNing:基于机器学习的深度神经网络容错评估和保护框架
Pub Date : 2023-05-22 DOI: 10.1109/ETS56758.2023.10174178
Marcello Traiola, A. Kritikakou, O. Sentieys
Deep Neural Networks (DNNs) show promising performance in several application domains, such as robotics, aerospace, smart healthcare, and autonomous driving. Nevertheless, DNN results may be incorrect, not only because of the network intrinsic inaccuracy, but also due to faults affecting the hardware. Indeed, hardware faults may impact the DNN inference process and lead to prediction failures. Therefore, ensuring the fault tolerance of DNN is crucial. However, common fault tolerance approaches are not cost-effective for DNNs protection, because of the prohibitive overheads due to the large size of DNNs and of the required memory for parameter storage. In this work, we propose a comprehensive framework to assess the fault tolerance of DNNs and cost-effectively protect them. As a first step, the proposed framework performs data-type-and-layer-based fault injection, driven by the DNN characteristics. As a second step, it uses classification-based machine learning methods in order to predict the criticality, not only of network parameters, but also of their bits. Last, dedicated Error Correction Codes (ECCs) are selectively inserted to protect the critical parameters and bits, hence protecting the DNNs with low cost. Thanks to the proposed framework, we explored and protected two Convolutional Neural Networks (CNNs), each with four different data encoding. The results show that it is possible to protect the critical network parameters with selective ECCs while saving up to 83% memory w.r.t. conventional ECC approaches.
深度神经网络(dnn)在机器人、航空航天、智能医疗和自动驾驶等多个应用领域显示出良好的性能。然而,DNN的结果可能是不正确的,这不仅是因为网络本身的不准确,还因为影响硬件的故障。实际上,硬件故障可能会影响DNN推理过程并导致预测失败。因此,保证深度神经网络的容错性至关重要。然而,常见的容错方法对于dnn保护并不具有成本效益,因为dnn的大尺寸和参数存储所需的内存造成了令人望而却步的开销。在这项工作中,我们提出了一个全面的框架来评估深度神经网络的容错性并经济有效地保护它们。作为第一步,提出的框架执行基于数据类型和层的故障注入,由深度神经网络特征驱动。作为第二步,它使用基于分类的机器学习方法来预测临界性,不仅是网络参数,还有它们的比特。最后,选择性地插入专用纠错码(ECCs)来保护关键参数和位,从而以低成本保护dnn。由于提出的框架,我们探索并保护了两个卷积神经网络(cnn),每个卷积神经网络都有四种不同的数据编码。结果表明,与传统的ECC方法相比,选择性ECC可以保护关键的网络参数,同时节省高达83%的内存。
{"title":"harDNNing: a machine-learning-based framework for fault tolerance assessment and protection of DNNs","authors":"Marcello Traiola, A. Kritikakou, O. Sentieys","doi":"10.1109/ETS56758.2023.10174178","DOIUrl":"https://doi.org/10.1109/ETS56758.2023.10174178","url":null,"abstract":"Deep Neural Networks (DNNs) show promising performance in several application domains, such as robotics, aerospace, smart healthcare, and autonomous driving. Nevertheless, DNN results may be incorrect, not only because of the network intrinsic inaccuracy, but also due to faults affecting the hardware. Indeed, hardware faults may impact the DNN inference process and lead to prediction failures. Therefore, ensuring the fault tolerance of DNN is crucial. However, common fault tolerance approaches are not cost-effective for DNNs protection, because of the prohibitive overheads due to the large size of DNNs and of the required memory for parameter storage. In this work, we propose a comprehensive framework to assess the fault tolerance of DNNs and cost-effectively protect them. As a first step, the proposed framework performs data-type-and-layer-based fault injection, driven by the DNN characteristics. As a second step, it uses classification-based machine learning methods in order to predict the criticality, not only of network parameters, but also of their bits. Last, dedicated Error Correction Codes (ECCs) are selectively inserted to protect the critical parameters and bits, hence protecting the DNNs with low cost. Thanks to the proposed framework, we explored and protected two Convolutional Neural Networks (CNNs), each with four different data encoding. The results show that it is possible to protect the critical network parameters with selective ECCs while saving up to 83% memory w.r.t. conventional ECC approaches.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Half Title Page 半页标题
Pub Date : 2023-05-22 DOI: 10.1109/ets56758.2023.10174071
{"title":"Half Title Page","authors":"","doi":"10.1109/ets56758.2023.10174071","DOIUrl":"https://doi.org/10.1109/ets56758.2023.10174071","url":null,"abstract":"","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An unprotected RISC-V Soft-core processor on an SRAM FPGA: Is it as bad as it sounds? SRAM FPGA上无保护的RISC-V软核处理器:真的像听起来那么糟糕吗?
Pub Date : 2023-05-22 DOI: 10.1109/ETS56758.2023.10174076
Bruno E. Forlin, Wouter van Huffelen, C. Cazzaniga, P. Rech, Nikolaos S. Alachiotis, M. Ottavi
Fast development, low cost, and reconfigurability are becoming critical factors for aerospace applications, making SRAM FPGAs attractive. However, SRAM FPGAs are prone to errors in the user and on the configuration bits. For their correct functioning, they must be capable of withstanding failures without sacrificing much performance. When adjusting a soft core for these applications, it is essential to know where redundancies are necessary, to avoid unnecessary overhead. We characterize the reliability of an unprotected RISC-V microcontroller using an accelerated neutron beam. Our investigation shows that, for our chosen benchmark and processor, the user data in the memory banks is the leading cause of the total number of errors in the application. By reversing the benchmark operations, we could root cause the origin of the observed errors and found that most of the data corruption detected during the runs stem from previously corrupt input data or from output data that were corrupted while transmitting.
快速发展、低成本和可重构性正成为航空航天应用的关键因素,使SRAM fpga具有吸引力。然而,SRAM fpga容易在用户位和配置位上出错。为了使其正常工作,它们必须能够承受故障而不牺牲太多性能。在为这些应用程序调整软核时,必须知道哪里需要冗余,以避免不必要的开销。我们使用加速中子束表征无保护的RISC-V微控制器的可靠性。我们的调查表明,对于我们选择的基准和处理器,内存库中的用户数据是导致应用程序中错误总数的主要原因。通过逆转基准测试操作,我们可以找出观察到的错误的根源,并发现在运行期间检测到的大多数数据损坏源于先前损坏的输入数据或在传输过程中损坏的输出数据。
{"title":"An unprotected RISC-V Soft-core processor on an SRAM FPGA: Is it as bad as it sounds?","authors":"Bruno E. Forlin, Wouter van Huffelen, C. Cazzaniga, P. Rech, Nikolaos S. Alachiotis, M. Ottavi","doi":"10.1109/ETS56758.2023.10174076","DOIUrl":"https://doi.org/10.1109/ETS56758.2023.10174076","url":null,"abstract":"Fast development, low cost, and reconfigurability are becoming critical factors for aerospace applications, making SRAM FPGAs attractive. However, SRAM FPGAs are prone to errors in the user and on the configuration bits. For their correct functioning, they must be capable of withstanding failures without sacrificing much performance. When adjusting a soft core for these applications, it is essential to know where redundancies are necessary, to avoid unnecessary overhead. We characterize the reliability of an unprotected RISC-V microcontroller using an accelerated neutron beam. Our investigation shows that, for our chosen benchmark and processor, the user data in the memory banks is the leading cause of the total number of errors in the application. By reversing the benchmark operations, we could root cause the origin of the observed errors and found that most of the data corruption detected during the runs stem from previously corrupt input data or from output data that were corrupted while transmitting.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131960728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Test-Point Insertion for Power-Safe Testing of Monolithic 3D ICs using Reinforcement Learning* 基于强化学习的单片3D集成电路电源安全测试点插入方法*
Pub Date : 2023-05-22 DOI: 10.1109/ETS56758.2023.10174135
Shao-Chun Hung, Arjun Chaudhuri, K. Chakrabarty
Monolithic 3D (M3D) integration for integrated circuits (ICs) offers the promise of higher performance and lower power consumption over stacked-3D ICs. However, M3D suffers from large power supply noise (PSN) in the power distribution network due to high current demand and long conduction paths from voltage sources to local receivers. Excessive switching activities during the capture cycles in at-speed delay testing exacerbate the PSN-induced voltage droop problem. Therefore, PSN reduction is necessary for M3D ICs during testing to prevent the failure of good chips on the tester (i.e., yield loss). In this paper, we first develop an analysis flow for M3D designs to compute the PSN-induced voltage droop. Based on the analysis results, we extract the test patterns that are likely to cause yield loss. Next, we propose a reinforcement learning (RL)-based framework to insert test points and generate low-switching patterns that help in mitigating PSN without degrading the test coverage. Simulation results for benchmark M3D designs demonstrate the effectiveness of the proposed power-safe testing approach, compared to baseline cases that utilize commercial tools.
集成电路(ic)的单片3D (M3D)集成提供了比堆叠3D ic更高的性能和更低的功耗。然而,由于高电流需求和从电压源到本地接收器的长传导路径,M3D在配电网络中受到大电源噪声(PSN)的影响。在高速延迟测试中,捕获周期中过多的开关活动加剧了psn引起的电压下降问题。因此,在测试期间,降低M3D ic的PSN是必要的,以防止测试仪上的好芯片失效(即良率损失)。在本文中,我们首先开发了一个M3D设计的分析流程来计算psn引起的电压下降。根据分析结果,我们提取了可能导致产量损失的测试模式。接下来,我们提出了一个基于强化学习(RL)的框架来插入测试点并生成低切换模式,这有助于在不降低测试覆盖率的情况下减轻PSN。与使用商业工具的基准案例相比,基准M3D设计的仿真结果证明了所提出的电源安全测试方法的有效性。
{"title":"Test-Point Insertion for Power-Safe Testing of Monolithic 3D ICs using Reinforcement Learning*","authors":"Shao-Chun Hung, Arjun Chaudhuri, K. Chakrabarty","doi":"10.1109/ETS56758.2023.10174135","DOIUrl":"https://doi.org/10.1109/ETS56758.2023.10174135","url":null,"abstract":"Monolithic 3D (M3D) integration for integrated circuits (ICs) offers the promise of higher performance and lower power consumption over stacked-3D ICs. However, M3D suffers from large power supply noise (PSN) in the power distribution network due to high current demand and long conduction paths from voltage sources to local receivers. Excessive switching activities during the capture cycles in at-speed delay testing exacerbate the PSN-induced voltage droop problem. Therefore, PSN reduction is necessary for M3D ICs during testing to prevent the failure of good chips on the tester (i.e., yield loss). In this paper, we first develop an analysis flow for M3D designs to compute the PSN-induced voltage droop. Based on the analysis results, we extract the test patterns that are likely to cause yield loss. Next, we propose a reinforcement learning (RL)-based framework to insert test points and generate low-switching patterns that help in mitigating PSN without degrading the test coverage. Simulation results for benchmark M3D designs demonstrate the effectiveness of the proposed power-safe testing approach, compared to baseline cases that utilize commercial tools.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Performance Monitoring of Neuromorphic Computing Systems 神经形态计算系统的在线性能监测
Pub Date : 2023-05-22 DOI: 10.1109/ETS56758.2023.10173860
Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy
Neuromorphic computation is based on spike trains in which the location and frequency of spikes occurring within the network guide the execution. This paper develops a frame-work to monitor the correctness of a neuromorphic program’s execution using model-based redundancy in which a software-based monitor compares discrepancies between the behavior of neurons mapped to hardware and that predicted by a corresponding mathematical model in real time. Our approach reduces the hardware overhead needed to support the monitoring infrastructure and minimizes intrusion on the executing application. Fault-injection experiments utilizing CARLSim, a high-fidelity SNN simulator, show that the framework achieves high fault coverage using parsimonious models which can operate with low computational overhead in real time.
神经形态计算基于尖峰序列,其中在网络中发生的尖峰的位置和频率指导执行。本文开发了一个框架,使用基于模型的冗余来监控神经形态程序执行的正确性,其中基于软件的监视器比较映射到硬件的神经元行为与实时相应数学模型预测的神经元行为之间的差异。我们的方法减少了支持监视基础设施所需的硬件开销,并最大限度地减少了对执行应用程序的入侵。利用高保真SNN模拟器CARLSim进行的故障注入实验表明,该框架使用简洁的模型实现了高故障覆盖率,并且可以以低计算开销实时运行。
{"title":"Online Performance Monitoring of Neuromorphic Computing Systems","authors":"Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy","doi":"10.1109/ETS56758.2023.10173860","DOIUrl":"https://doi.org/10.1109/ETS56758.2023.10173860","url":null,"abstract":"Neuromorphic computation is based on spike trains in which the location and frequency of spikes occurring within the network guide the execution. This paper develops a frame-work to monitor the correctness of a neuromorphic program’s execution using model-based redundancy in which a software-based monitor compares discrepancies between the behavior of neurons mapped to hardware and that predicted by a corresponding mathematical model in real time. Our approach reduces the hardware overhead needed to support the monitoring infrastructure and minimizes intrusion on the executing application. Fault-injection experiments utilizing CARLSim, a high-fidelity SNN simulator, show that the framework achieves high fault coverage using parsimonious models which can operate with low computational overhead in real time.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122505300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constraint-Based Automatic SBST Generation for RISC-V Processor Families 基于约束的RISC-V处理器系列SBST自动生成
Pub Date : 2023-05-22 DOI: 10.1109/ETS56758.2023.10174156
Tobias Faller, N. I. Deligiannis, Markus Schwörer, M. Reorda, B. Becker
Software-Based Self-Tests (SBST) allow at-speed, native online-testing of processors by running software programs on the processor core, requiring no Design for Testability (DfT) infrastructure. The creation of such SBST programs often requires time-consuming manual labour that is expensive and requires in-depth knowledge of the processor’s architecture to target hard-to-test faults. In contrast, encoding the SBST generation task as a Bounded Model Checking (BMC) problem allows using sophisticated, state-of-the-art BMC solvers to automatically generate an SBST. Constraints for the BMC problem are encoded in a circuit called Validity Checker Module (VCM) and applied during SBST generation.In this paper, we focus on presenting a VCM architecture and a constraint set that allows building SBSTs that make minimal assumptions about the firmware, targeting hard-to-test faults in the ALU and register file of multiple scalar, in-order RISC-V processor families. The VCM architecture consists of a processor-specific mapping layer and a generic constraint set connected via a well-defined interface. The generic constraint set enforces the desired SBST behaviour, including controlling the processor’s pipeline state, memory accesses, and with that executed instructions, register state, and fault propagations. Using a generic constraint set allows for rapid SBST generation targeting new RISC-V processor families while keeping the generic constraints untouched. Lastly, we evaluate this approach on two RISC-V processor families, namely the DarkRISCV and a proprietary, industrial core showing the portability and strength of the approach, allowing for rapidly targeting new processors.
基于软件的自我测试(SBST)允许通过在处理器核心上运行软件程序对处理器进行高速、本地在线测试,不需要可测试性设计(DfT)基础设施。创建这样的SBST程序通常需要耗费时间的体力劳动,而且成本高昂,并且需要深入了解处理器的体系结构,以定位难以测试的故障。相反,将SBST生成任务编码为有界模型检查(BMC)问题,允许使用复杂的、最先进的BMC求解器自动生成SBST。BMC问题的约束被编码在一个称为有效性检查模块(Validity Checker Module, VCM)的电路中,并在生成SBST时应用。在本文中,我们重点介绍了一个VCM架构和一个约束集,该约束集允许构建对固件做出最小假设的sbst,针对ALU中难以测试的故障和多个标量有序RISC-V处理器家族的寄存器文件。VCM体系结构由处理器特定的映射层和通过定义良好的接口连接的通用约束集组成。通用约束集强制执行所需的SBST行为,包括控制处理器的管道状态、内存访问以及由此执行的指令、寄存器状态和故障传播。使用通用约束集可以快速生成针对新RISC-V处理器系列的SBST,同时保持通用约束不变。最后,我们在两个RISC-V处理器系列上评估了这种方法,即DarkRISCV和一个专有的工业核心,显示了该方法的可移植性和强度,允许快速瞄准新处理器。
{"title":"Constraint-Based Automatic SBST Generation for RISC-V Processor Families","authors":"Tobias Faller, N. I. Deligiannis, Markus Schwörer, M. Reorda, B. Becker","doi":"10.1109/ETS56758.2023.10174156","DOIUrl":"https://doi.org/10.1109/ETS56758.2023.10174156","url":null,"abstract":"Software-Based Self-Tests (SBST) allow at-speed, native online-testing of processors by running software programs on the processor core, requiring no Design for Testability (DfT) infrastructure. The creation of such SBST programs often requires time-consuming manual labour that is expensive and requires in-depth knowledge of the processor’s architecture to target hard-to-test faults. In contrast, encoding the SBST generation task as a Bounded Model Checking (BMC) problem allows using sophisticated, state-of-the-art BMC solvers to automatically generate an SBST. Constraints for the BMC problem are encoded in a circuit called Validity Checker Module (VCM) and applied during SBST generation.In this paper, we focus on presenting a VCM architecture and a constraint set that allows building SBSTs that make minimal assumptions about the firmware, targeting hard-to-test faults in the ALU and register file of multiple scalar, in-order RISC-V processor families. The VCM architecture consists of a processor-specific mapping layer and a generic constraint set connected via a well-defined interface. The generic constraint set enforces the desired SBST behaviour, including controlling the processor’s pipeline state, memory accesses, and with that executed instructions, register state, and fault propagations. Using a generic constraint set allows for rapid SBST generation targeting new RISC-V processor families while keeping the generic constraints untouched. Lastly, we evaluate this approach on two RISC-V processor families, namely the DarkRISCV and a proprietary, industrial core showing the portability and strength of the approach, allowing for rapidly targeting new processors.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128076624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PSC-Watermark: Power Side Channel Based IP Watermarking Using Clock Gates psc -水印:基于功率侧信道的IP水印使用时钟门
Pub Date : 2023-05-22 DOI: 10.1109/ETS56758.2023.10174052
Upoma Das, Sazadur Rahman, N. Anandakumar, K. Z. Azar, Fahim Rahman, M. Tehranipoor, Farimah Farahmandi
With the ever-increasing re-use of intellectual property (IP) cores in modern system-on-chips (SoCs), it is crucial to prevent security risks such as IP piracy and overuse. Considering that IP watermarking is a potential solution to the copyright protection of IP cores, this paper proposes PSC-Watermark as a power side-channel-based IP authentication methodology using clock gates. PSC-Watermark embeds a power signature with very minimal modification to the IP core. It is done by reusing the existing clock gates to modify the dynamic power consumption inside the IP (in an SoC) based on an applied challenge, and it generates a unique power trace that works as a signature of the IP. Our experimental results show that this power signature can be robustly/effectively verified, even with the interferences emanating from the rest of the functional cores in complex SoCs. We evaluate our technique on several benchmarks of varying size (i.e., MIPS, openMSP430, or1200) in the presence of multiple non-watermarked cores operating in parallel and obtain > 90% confidence rate in proving the ownership of each watermarked IP core. Furthermore, the IP cores are watermarked in a subtle and obfuscated way with < 4% overhead, which makes the proposed technique hard to detect, remove or modify.
随着现代片上系统(soc)中知识产权(IP)内核的重复使用不断增加,防止IP盗版和过度使用等安全风险至关重要。考虑到IP水印是IP核版权保护的一种潜在解决方案,本文提出了一种基于功率侧信道的基于时钟门的IP认证方法。psc -水印嵌入了一个功率签名,对IP核的修改非常小。它是通过重用现有的时钟门来修改IP内部(在SoC中)基于应用挑战的动态功耗来完成的,并且它生成一个独特的功率跟踪,作为IP的签名。我们的实验结果表明,即使在复杂soc中其他功能内核发出干扰的情况下,这种功率特征也可以得到稳健/有效的验证。我们在多个并行运行的非水印核的情况下,在不同大小的几个基准(即MIPS, openMSP430或1200)上评估了我们的技术,并在证明每个水印IP核的所有权方面获得了> 90%的置信度。此外,IP核以微妙和模糊的方式进行水印,开销< 4%,这使得所提出的技术难以检测,删除或修改。
{"title":"PSC-Watermark: Power Side Channel Based IP Watermarking Using Clock Gates","authors":"Upoma Das, Sazadur Rahman, N. Anandakumar, K. Z. Azar, Fahim Rahman, M. Tehranipoor, Farimah Farahmandi","doi":"10.1109/ETS56758.2023.10174052","DOIUrl":"https://doi.org/10.1109/ETS56758.2023.10174052","url":null,"abstract":"With the ever-increasing re-use of intellectual property (IP) cores in modern system-on-chips (SoCs), it is crucial to prevent security risks such as IP piracy and overuse. Considering that IP watermarking is a potential solution to the copyright protection of IP cores, this paper proposes PSC-Watermark as a power side-channel-based IP authentication methodology using clock gates. PSC-Watermark embeds a power signature with very minimal modification to the IP core. It is done by reusing the existing clock gates to modify the dynamic power consumption inside the IP (in an SoC) based on an applied challenge, and it generates a unique power trace that works as a signature of the IP. Our experimental results show that this power signature can be robustly/effectively verified, even with the interferences emanating from the rest of the functional cores in complex SoCs. We evaluate our technique on several benchmarks of varying size (i.e., MIPS, openMSP430, or1200) in the presence of multiple non-watermarked cores operating in parallel and obtain > 90% confidence rate in proving the ownership of each watermarked IP core. Furthermore, the IP cores are watermarked in a subtle and obfuscated way with < 4% overhead, which makes the proposed technique hard to detect, remove or modify.","PeriodicalId":211522,"journal":{"name":"2023 IEEE European Test Symposium (ETS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE European Test Symposium (ETS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1