首页 > 最新文献

2020 IEEE European Test Symposium (ETS)最新文献

英文 中文
Linking Chip, Board, and System Test via Standards 通过标准连接芯片、板和系统测试
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131595
M. Portolan, J. Rearick, Martin Keim
This paper introduces a standards-based framework which enables two types of test re-use: direct re-use of test patterns written for low-level components of a system, and access by high-level tests of test features embedded within the low-level components. The underlying mechanism for both is the encapsulation, retargeting, and transformation of test procedures through successive layers of hardware interfaces, as codified in two standards being developed by IEEE Working Groups (P1687.1 and P2654). Examples demonstrate the steps in the process and illustrate both the challenges and opportunities of this approach.
本文介绍了一个基于标准的框架,它支持两种类型的测试重用:直接重用为系统的低级组件编写的测试模式,以及通过高级测试访问嵌入在低级组件中的测试特性。两者的底层机制都是封装、重新定位,以及通过硬件接口的连续层对测试过程进行转换,正如IEEE工作组(P1687.1和P2654)正在开发的两个标准所编写的那样。示例演示了流程中的步骤,并说明了这种方法的挑战和机遇。
{"title":"Linking Chip, Board, and System Test via Standards","authors":"M. Portolan, J. Rearick, Martin Keim","doi":"10.1109/ETS48528.2020.9131595","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131595","url":null,"abstract":"This paper introduces a standards-based framework which enables two types of test re-use: direct re-use of test patterns written for low-level components of a system, and access by high-level tests of test features embedded within the low-level components. The underlying mechanism for both is the encapsulation, retargeting, and transformation of test procedures through successive layers of hardware interfaces, as codified in two standards being developed by IEEE Working Groups (P1687.1 and P2654). Examples demonstrate the steps in the process and illustrate both the challenges and opportunities of this approach.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122372973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Avoiding Mixed-Signal Field Returns by Outlier Detection of Hard-to-Detect Defects based on Multivariate Statistics 基于多元统计的难以检测缺陷的离群值检测避免混合信号场返回
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131602
Nektar Xama, Jakob Raymaekers, M. Andraud, Jhon Gomez, Wim Dobbelaere, Ronny Vanhooren, Anthony Coyette, G. Gielen
With tightening automotive IC production test requirements, test escape rates need to decrease down to the 10 PPB level. To achieve this for mixed-signal ICs, advanced multivariate statistical techniques are needed, as the defects in the test escapes become increasingly more difficult to detect. Therefore, this paper proposes applying a cascade of advanced statistical techniques to identify measurements that can be used as predictors to flag future potential failures at test time with minimal misclassification of good devices. The approach uses measurement data from the ATE wafer probe tests and is also able to identify the likely location of the defect using only these measurements. The cascade has four steps: 1) remove bias and spatial patterns within the data, 2) divide the different tests into relevant groups, 3) reduce the dimensionality of each group, and 4) perform multiple regression to find the predictor values and use these values to compute an outlier score for each chip under test. As there is a risk of overfitting the outlier score, the number of predictors used is kept to a minimum. The effectiveness of the proposed methodology is demonstrated using test data from an industrial production chip with eight field-return cases. Predictors have been found that retroactively allowed the identification of these chips, with an average of 5% false classification of good devices, i.e. devices not returned from the field. In addition, the selected predictors corresponded to where the defects are located according to failure analysis of the field returns.
随着汽车集成电路生产测试要求的日益严格,测试逃逸率需要降低到10 PPB的水平。为了在混合信号ic中实现这一点,需要先进的多元统计技术,因为测试逃逸中的缺陷变得越来越难以检测。因此,本文建议应用一系列先进的统计技术来识别测量,这些测量可以用作预测因子,在测试时标记未来潜在的故障,同时最小化好设备的错误分类。该方法使用来自ATE晶圆探头测试的测量数据,并且还能够仅使用这些测量来识别缺陷的可能位置。级联有四个步骤:1)消除数据中的偏差和空间模式,2)将不同的测试分为相关组,3)降低每组的维数,4)执行多元回归以找到预测值,并使用这些值计算每个被测芯片的异常值。由于存在过拟合异常值得分的风险,因此使用的预测因子的数量保持在最低限度。采用工业生产芯片的8个现场返回案例的测试数据证明了所提出方法的有效性。已经发现,预测器追溯性地允许识别这些芯片,平均有5%的良好设备错误分类,即设备未从现场返回。此外,根据现场返回的失效分析,所选择的预测因子对应于缺陷所在的位置。
{"title":"Avoiding Mixed-Signal Field Returns by Outlier Detection of Hard-to-Detect Defects based on Multivariate Statistics","authors":"Nektar Xama, Jakob Raymaekers, M. Andraud, Jhon Gomez, Wim Dobbelaere, Ronny Vanhooren, Anthony Coyette, G. Gielen","doi":"10.1109/ETS48528.2020.9131602","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131602","url":null,"abstract":"With tightening automotive IC production test requirements, test escape rates need to decrease down to the 10 PPB level. To achieve this for mixed-signal ICs, advanced multivariate statistical techniques are needed, as the defects in the test escapes become increasingly more difficult to detect. Therefore, this paper proposes applying a cascade of advanced statistical techniques to identify measurements that can be used as predictors to flag future potential failures at test time with minimal misclassification of good devices. The approach uses measurement data from the ATE wafer probe tests and is also able to identify the likely location of the defect using only these measurements. The cascade has four steps: 1) remove bias and spatial patterns within the data, 2) divide the different tests into relevant groups, 3) reduce the dimensionality of each group, and 4) perform multiple regression to find the predictor values and use these values to compute an outlier score for each chip under test. As there is a risk of overfitting the outlier score, the number of predictors used is kept to a minimum. The effectiveness of the proposed methodology is demonstrated using test data from an industrial production chip with eight field-return cases. Predictors have been found that retroactively allowed the identification of these chips, with an average of 5% false classification of good devices, i.e. devices not returned from the field. In addition, the selected predictors corresponded to where the defects are located according to failure analysis of the field returns.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126092653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs 外包的风险:第三方ip核中隐藏的SCA木马威胁加密ic
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131594
David Knichel, Thorben Moos, A. Moradi
Side-channel analysis (SCA) attacks - especially power analysis - are powerful ways to extract the secrets stored in and processed by cryptographic devices. In recent years, researchers have shown interest in utilizing on-chip measurement facilities to perform such SCA attacks remotely. It was shown that simple voltage-monitoring sensors can be constructed from digital elements and put on multi-tenant FPGAs to perform remote attacks on neighbouring cryptographic co-processors. A similar threat is the unsuspecting integration of third-party IP-Cores into an IC design. Even if the function of an acquired IP-Core is not security critical by itself, it may contain an on-chip sensor as a Trojan that can eavesdrop on cryptographic operations across the whole device. In contrast to all FPGA-based investigations reported in the literature so far, we examine the efficiency of such on-chip sensors as a source of information leakage in an ASIC-based case study for the first time. To this end, in addition to a cryptographic core (lightweight block cipher PRESENT) we designed and implemented a voltage-monitoring sensor on an ASIC fabricated by a 40 nm commercial standard cell library. Despite the physical distance between the sensor and the PRESENT core, we show the possibility of fully recovering the secret key of the PRESENT core by processing the sensor's output. Our results imply that the hidden insertion of such a sensor - for example by a malicious third party IP-Core vendor - can endanger the security of embedded systems which deal with sensitive information, even if the device cannot be physically accessed by the adversary.
侧信道分析(SCA)攻击——尤其是功率分析——是提取存储在加密设备中并由其处理的秘密的强大方法。近年来,研究人员对利用片上测量设备远程执行此类SCA攻击表现出了兴趣。结果表明,简单的电压监测传感器可以由数字元件构成,并置于多租户fpga上,对邻近的加密协处理器进行远程攻击。类似的威胁是将第三方ip核毫无防备地集成到IC设计中。即使获得的ip核的功能本身不是安全关键,它也可能包含片上传感器作为特洛伊木马,可以窃听整个设备的加密操作。与迄今为止文献中报道的所有基于fpga的调查相反,我们首次在基于asic的案例研究中研究了这种片上传感器作为信息泄漏源的效率。为此,除了加密核心(轻量级分组密码PRESENT)外,我们还在40 nm商用标准单元库制造的ASIC上设计并实现了电压监测传感器。尽管传感器和PRESENT核心之间存在物理距离,但我们展示了通过处理传感器的输出完全恢复PRESENT核心密钥的可能性。我们的研究结果表明,这种传感器的隐藏插入-例如由恶意的第三方IP-Core供应商-可能危及处理敏感信息的嵌入式系统的安全,即使设备不能被对手物理访问。
{"title":"The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs","authors":"David Knichel, Thorben Moos, A. Moradi","doi":"10.1109/ETS48528.2020.9131594","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131594","url":null,"abstract":"Side-channel analysis (SCA) attacks - especially power analysis - are powerful ways to extract the secrets stored in and processed by cryptographic devices. In recent years, researchers have shown interest in utilizing on-chip measurement facilities to perform such SCA attacks remotely. It was shown that simple voltage-monitoring sensors can be constructed from digital elements and put on multi-tenant FPGAs to perform remote attacks on neighbouring cryptographic co-processors. A similar threat is the unsuspecting integration of third-party IP-Cores into an IC design. Even if the function of an acquired IP-Core is not security critical by itself, it may contain an on-chip sensor as a Trojan that can eavesdrop on cryptographic operations across the whole device. In contrast to all FPGA-based investigations reported in the literature so far, we examine the efficiency of such on-chip sensors as a source of information leakage in an ASIC-based case study for the first time. To this end, in addition to a cryptographic core (lightweight block cipher PRESENT) we designed and implemented a voltage-monitoring sensor on an ASIC fabricated by a 40 nm commercial standard cell library. Despite the physical distance between the sensor and the PRESENT core, we show the possibility of fully recovering the secret key of the PRESENT core by processing the sensor's output. Our results imply that the hidden insertion of such a sensor - for example by a malicious third party IP-Core vendor - can endanger the security of embedded systems which deal with sensitive information, even if the device cannot be physically accessed by the adversary.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114893796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defect Characterization and Test Generation for Spintronic-based Compute-In-Memory 基于自旋电子学的内存计算缺陷表征与测试生成
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131582
S. Nair, Christopher Münch, M. Tahoori
Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM), as one of the most promising emerging memory technology for on-chip memory, offers many advantageous features such as high density, non-volatility, scalability, high endurance and CMOS compatibility. Additionally, its resistive storage concept can be utilized for Compute-in-Memory (CiM), where bit-wise logical operations can be performed within the memory without the need for transferring the data from the memory to the processor and back. However, these new CiM operations are impacted by defects, resulting in faults which are different from the conventional memory faults. Hence, these CiM specific faults need to be modeled and appropriate test strategies need to be derived to ensure correct functionality of the CiM enabled memories. In this paper, we first perform extensive defect injection in the CiM bit-cell and build fault models based on the impact of the defects. We also compare CiM specific faults to normal memory faults based on this technology. From this model, we derive an efficient test algorithm to fully cover CiM related faults, which cannot be found with conventional memory test algorithms.
自旋转移转矩磁随机存取存储器(STT-MRAM)作为片上存储器中最有前途的新兴存储技术之一,具有高密度、非易失性、可扩展性、高耐用性和CMOS兼容性等优点。此外,它的电阻式存储概念可以用于内存计算(CiM),在内存中可以执行按位逻辑操作,而不需要将数据从内存传输到处理器并返回。但是,这些新的CiM操作会受到缺陷的影响,导致与传统内存故障不同的故障。因此,需要对这些CiM特定的错误进行建模,并且需要派生适当的测试策略,以确保启用CiM的内存具有正确的功能。本文首先在CiM位单元中进行了广泛的缺陷注入,并基于缺陷的影响建立了故障模型。并将CiM特定故障与普通内存故障进行比较。基于该模型,我们推导出一种有效的测试算法,可以完全覆盖CiM相关的故障,而传统的内存测试算法无法发现这些故障。
{"title":"Defect Characterization and Test Generation for Spintronic-based Compute-In-Memory","authors":"S. Nair, Christopher Münch, M. Tahoori","doi":"10.1109/ETS48528.2020.9131582","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131582","url":null,"abstract":"Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM), as one of the most promising emerging memory technology for on-chip memory, offers many advantageous features such as high density, non-volatility, scalability, high endurance and CMOS compatibility. Additionally, its resistive storage concept can be utilized for Compute-in-Memory (CiM), where bit-wise logical operations can be performed within the memory without the need for transferring the data from the memory to the processor and back. However, these new CiM operations are impacted by defects, resulting in faults which are different from the conventional memory faults. Hence, these CiM specific faults need to be modeled and appropriate test strategies need to be derived to ensure correct functionality of the CiM enabled memories. In this paper, we first perform extensive defect injection in the CiM bit-cell and build fault models based on the impact of the defects. We also compare CiM specific faults to normal memory faults based on this technology. From this model, we derive an efficient test algorithm to fully cover CiM related faults, which cannot be found with conventional memory test algorithms.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130514476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Blank Page 空白页
Pub Date : 2020-05-01 DOI: 10.1109/ets48528.2020.9131589
{"title":"Blank Page","authors":"","doi":"10.1109/ets48528.2020.9131589","DOIUrl":"https://doi.org/10.1109/ets48528.2020.9131589","url":null,"abstract":"","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131219025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Half Title 半标题
Pub Date : 2020-05-01 DOI: 10.1109/ets48528.2020.9131561
Anonymous
{"title":"Half Title","authors":"Anonymous","doi":"10.1109/ets48528.2020.9131561","DOIUrl":"https://doi.org/10.1109/ets48528.2020.9131561","url":null,"abstract":"","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"30 25","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141207530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determined-Safe Faults Identification: A step towards ISO26262 hardware compliant designs 确定安全故障识别:迈向ISO26262硬件兼容设计的一步
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131568
F. A. D. Silva, A. Bagbaba, Sandro Sartoni, R. Cantoro, M. Reorda, S. Hamdioui, C. Sauer
The development of Integrated Circuits for the Automotive sector imposes on major challenges. ISO26262 compliance, as part of this process, entails complex analysis for the evaluation of potential random hardware faults. This paper proposes a systematic approach to identify faults that do not disrupt safety-critical functionalities and consequently can be considered Safe. By deploying code coverage and Formal verification techniques, our methodology enables the classification of faults that are unclassified by other technologies, improving ISO26262 compliance. Our results, in combination with Fault Simulation, achieved a Diagnostic Coverage of 93% in a CAN Controller. These figures allow an initial assessment for an ASIL B configuration of the IP.
汽车行业集成电路的发展面临着重大挑战。ISO26262合规性,作为这个过程的一部分,需要复杂的分析来评估潜在的随机硬件故障。本文提出了一种系统的方法来识别不破坏安全关键功能的故障,因此可以认为是安全的。通过部署代码覆盖和正式验证技术,我们的方法可以对其他技术无法分类的错误进行分类,从而提高了ISO26262的遵从性。我们的结果与故障仿真相结合,在CAN控制器中实现了93%的诊断覆盖率。这些数字允许对IP的ASIL - B配置进行初步评估。
{"title":"Determined-Safe Faults Identification: A step towards ISO26262 hardware compliant designs","authors":"F. A. D. Silva, A. Bagbaba, Sandro Sartoni, R. Cantoro, M. Reorda, S. Hamdioui, C. Sauer","doi":"10.1109/ETS48528.2020.9131568","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131568","url":null,"abstract":"The development of Integrated Circuits for the Automotive sector imposes on major challenges. ISO26262 compliance, as part of this process, entails complex analysis for the evaluation of potential random hardware faults. This paper proposes a systematic approach to identify faults that do not disrupt safety-critical functionalities and consequently can be considered Safe. By deploying code coverage and Formal verification techniques, our methodology enables the classification of faults that are unclassified by other technologies, improving ISO26262 compliance. Our results, in combination with Fault Simulation, achieved a Diagnostic Coverage of 93% in a CAN Controller. These figures allow an initial assessment for an ASIL B configuration of the IP.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114146646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automated Graph-Based Fault Injection Into Virtual Prototypes for Robustness Evaluation 基于图的故障自动注入虚拟原型鲁棒性评估
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131573
J. Laufenberg, T. Kropf, O. Bringmann
Modeling and validation of complex and highly connected systems involved in safety-critical tasks are great challenges today with little support in automation. A graph structure models the system and the faults component-by-component in the proposed approach and specifies valid systems. Automated generation and execution of test cases for every valid combination of components is done as well as monitoring and assessment of the system behavior. The integrated fault description provides faults from single bit-flip to comprehensive scenarios. The simulation is supervised and executed by the graph, which adapts the faults automatically during simulation with respect to the simulation state.
在自动化的支持很少的情况下,对涉及安全关键任务的复杂和高度连接的系统进行建模和验证是当今的巨大挑战。在提出的方法中,一个图结构对系统和故障逐个组件建模,并指定有效的系统。为每个有效的组件组合自动生成和执行测试用例,以及监控和评估系统行为。综合故障描述提供从单位翻转到综合场景的故障描述。仿真由图来监督和执行,并根据仿真状态自动调整仿真过程中的故障。
{"title":"Automated Graph-Based Fault Injection Into Virtual Prototypes for Robustness Evaluation","authors":"J. Laufenberg, T. Kropf, O. Bringmann","doi":"10.1109/ETS48528.2020.9131573","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131573","url":null,"abstract":"Modeling and validation of complex and highly connected systems involved in safety-critical tasks are great challenges today with little support in automation. A graph structure models the system and the faults component-by-component in the proposed approach and specifies valid systems. Automated generation and execution of test cases for every valid combination of components is done as well as monitoring and assessment of the system behavior. The integrated fault description provides faults from single bit-flip to comprehensive scenarios. The simulation is supervised and executed by the graph, which adapts the faults automatically during simulation with respect to the simulation state.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134391595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Rowhammer Attacks in SoCs with FPGAs 基于fpga的soc中Rowhammer攻击检测
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131554
Rana Elnaggar, Siyuan Chen, P. Song, K. Chakrabarty
Heterogeneous SoCs integrate FPGAs and microprocessor cores on the same fabric to accelerate applications such as cryptography and deep learning. Since FPGAs share resources with the microprocessor cores, they can launch non-cacheable SDRAM transactions through direct FPGA-to-microprocessor SDRAM interface. Therefore, if the FPGA 3rd party IPs (3PIPs) are malicious, they can launch rowhammer attacks on the SDRAM. Today's countermeasures based on performance counters cannot detect these attacks because memory transactions from FPGAs do not pass through the cache. In addition, countermeasures that count the frequency of activation of memory rows require structural changes to the memory controller or DRAM chips. Moreover, today's countermeasures cannot identify the IP that launches the attack. We present a security solution that monitors the SDRAM transactions from IPs on the FPGA to each bank of the microprocessor SDRAM through the FPGA-to-microprocessor SDRAM interface. The proposed monitor is implemented on the FPGA fabric. It can detect attempts to launch a rowhammer attack before it causes bit flips in the SDRAM. It utilizes only 1% of the adaptive logic modules (ALMs) available in an Intel Cyclone V FPGA to monitor the transactions from one IP.
异构soc将fpga和微处理器内核集成在同一结构上,以加速密码学和深度学习等应用。由于fpga与微处理器内核共享资源,它们可以通过直接fpga到微处理器的SDRAM接口启动不可缓存的SDRAM事务。因此,如果FPGA第三方ip (3pip)是恶意的,他们可以对SDRAM发起rowhammer攻击。目前基于性能计数器的对策无法检测到这些攻击,因为来自fpga的内存事务不通过缓存。此外,计算存储器行激活频率的对策需要对存储器控制器或DRAM芯片进行结构更改。此外,今天的对策无法识别发起攻击的IP。我们提出了一种安全解决方案,通过FPGA到微处理器SDRAM接口监控从FPGA上的ip到微处理器SDRAM的每组SDRAM事务。提出的监视器是在FPGA结构上实现的。它可以在引起SDRAM中的位翻转之前检测到发起打滑锤攻击的企图。它仅利用英特尔Cyclone V FPGA中可用的1%的自适应逻辑模块(alm)来监视来自一个IP的事务。
{"title":"Detection of Rowhammer Attacks in SoCs with FPGAs","authors":"Rana Elnaggar, Siyuan Chen, P. Song, K. Chakrabarty","doi":"10.1109/ETS48528.2020.9131554","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131554","url":null,"abstract":"Heterogeneous SoCs integrate FPGAs and microprocessor cores on the same fabric to accelerate applications such as cryptography and deep learning. Since FPGAs share resources with the microprocessor cores, they can launch non-cacheable SDRAM transactions through direct FPGA-to-microprocessor SDRAM interface. Therefore, if the FPGA 3rd party IPs (3PIPs) are malicious, they can launch rowhammer attacks on the SDRAM. Today's countermeasures based on performance counters cannot detect these attacks because memory transactions from FPGAs do not pass through the cache. In addition, countermeasures that count the frequency of activation of memory rows require structural changes to the memory controller or DRAM chips. Moreover, today's countermeasures cannot identify the IP that launches the attack. We present a security solution that monitors the SDRAM transactions from IPs on the FPGA to each bank of the microprocessor SDRAM through the FPGA-to-microprocessor SDRAM interface. The proposed monitor is implemented on the FPGA fabric. It can detect attempts to launch a rowhammer attack before it causes bit flips in the SDRAM. It utilizes only 1% of the adaptive logic modules (ALMs) available in an Intel Cyclone V FPGA to monitor the transactions from one IP.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133517399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Built-In Predictors for Dynamic Crosstalk Avoidance 动态串扰避免的内置预测器
Pub Date : 2020-05-01 DOI: 10.1109/ETS48528.2020.9131576
Rezgar Sadeghi, Z. Navabi
In very deep sub-micrometer technology nodes, signal integrity of interconnects has been drastically jeopardized by crosstalk noise. To make a communication link reliable against crosstalk faults, different detection, correction, and avoidance methods have been proposed at the cost of redundant spatial and information overheads. In this paper, we propose a crosstalk prediction hardware based on an abstract model deduced from low-level interconnect evaluation for new technologies. This predictor monitors the data pattern to be sent through a communication bus and predicts those likely subjected to the crosstalk fault. Thus, to prevent crosstalk faults, the predictor dynamically engages an avoidance or detection mechanism. Top-level buses are the target of the proposed method. Simulation results reveal that the proposed communication channel is more efficient in terms of crosstalk alleviation as well as area and performance overhead compared to the state of the art reliability methods.
在非常深的亚微米技术节点中,互连的信号完整性受到串扰噪声的严重破坏。为了使通信链路可靠地抵抗串扰故障,提出了不同的检测、校正和避免方法,代价是冗余的空间和信息开销。本文提出了一种基于底层互连评价的抽象模型的串扰预测硬件。这个预测器监视要通过通信总线发送的数据模式,并预测那些可能遭受串扰故障的模式。因此,为了防止串扰故障,预测器动态地采用避免或检测机制。顶级总线是所建议方法的目标。仿真结果表明,与现有的可靠性方法相比,所提出的通信信道在减少串扰、减少面积和性能开销方面具有更高的效率。
{"title":"Built-In Predictors for Dynamic Crosstalk Avoidance","authors":"Rezgar Sadeghi, Z. Navabi","doi":"10.1109/ETS48528.2020.9131576","DOIUrl":"https://doi.org/10.1109/ETS48528.2020.9131576","url":null,"abstract":"In very deep sub-micrometer technology nodes, signal integrity of interconnects has been drastically jeopardized by crosstalk noise. To make a communication link reliable against crosstalk faults, different detection, correction, and avoidance methods have been proposed at the cost of redundant spatial and information overheads. In this paper, we propose a crosstalk prediction hardware based on an abstract model deduced from low-level interconnect evaluation for new technologies. This predictor monitors the data pattern to be sent through a communication bus and predicts those likely subjected to the crosstalk fault. Thus, to prevent crosstalk faults, the predictor dynamically engages an avoidance or detection mechanism. Top-level buses are the target of the proposed method. Simulation results reveal that the proposed communication channel is more efficient in terms of crosstalk alleviation as well as area and performance overhead compared to the state of the art reliability methods.","PeriodicalId":267309,"journal":{"name":"2020 IEEE European Test Symposium (ETS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123658768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 IEEE European Test Symposium (ETS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1