首页 > 最新文献

2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)最新文献

英文 中文
An Anomalous Behavior Detection Method for IoT Devices Based on Power Waveform Shapes 基于功率波形形状的物联网设备异常行为检测方法
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897477
Kota Hisafuru, Kazunari Takasaki, N. Togawa
In recent years, with the wide spread of the Internet of Things (IoT) devices, security issues for hardware devices have been increasing, where detecting their anomalous behaviors becomes quite important. One of the effective methods for detecting anomalous behaviors of IoT devices is to utilize operation duration time and consumed energy extracted from their power waveforms. However, the existing methods do not consider the shape of time-series data and cannot distinguish between power waveforms with similar duration time and consumed energy but different shapes. In this paper, we propose a method for detecting anomalous behaviors based on the shape of time-series data by incorporating a shape-based distance (SBD) measure. The proposed method firstly obtains the entire power waveform of the target IoT device and extract several application power waveforms. After that, we give the invariances to them and we can effectively obtain the SBD between every two application power waveforms. Based on the SBD values, the local outlier factor (LOF) method can finally distinguish between normal application behaviors and anomalous application behaviors. Experimental results demonstrate that the proposed method successfully detects the anomalous application behaviors, while the existing method fails to detect them.
近年来,随着物联网设备的广泛普及,硬件设备的安全问题日益突出,检测其异常行为变得非常重要。检测物联网设备异常行为的有效方法之一是利用从其功率波形中提取的运行持续时间和消耗能量。然而,现有的方法没有考虑时间序列数据的形状,无法区分持续时间相似、消耗能量形状不同的功率波形。在本文中,我们提出了一种结合基于形状的距离(SBD)测量的基于时间序列数据形状的异常行为检测方法。该方法首先获取目标物联网设备的整个功率波形,并提取多个应用功率波形。然后给出它们的不变性,可以有效地得到每两个应用功率波形之间的SBD。基于SBD值,局部离群因子(LOF)方法最终可以区分正常应用行为和异常应用行为。实验结果表明,该方法能够成功地检测到应用程序的异常行为,而现有方法无法检测到异常行为。
{"title":"An Anomalous Behavior Detection Method for IoT Devices Based on Power Waveform Shapes","authors":"Kota Hisafuru, Kazunari Takasaki, N. Togawa","doi":"10.1109/IOLTS56730.2022.9897477","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897477","url":null,"abstract":"In recent years, with the wide spread of the Internet of Things (IoT) devices, security issues for hardware devices have been increasing, where detecting their anomalous behaviors becomes quite important. One of the effective methods for detecting anomalous behaviors of IoT devices is to utilize operation duration time and consumed energy extracted from their power waveforms. However, the existing methods do not consider the shape of time-series data and cannot distinguish between power waveforms with similar duration time and consumed energy but different shapes. In this paper, we propose a method for detecting anomalous behaviors based on the shape of time-series data by incorporating a shape-based distance (SBD) measure. The proposed method firstly obtains the entire power waveform of the target IoT device and extract several application power waveforms. After that, we give the invariances to them and we can effectively obtain the SBD between every two application power waveforms. Based on the SBD values, the local outlier factor (LOF) method can finally distinguish between normal application behaviors and anomalous application behaviors. Experimental results demonstrate that the proposed method successfully detects the anomalous application behaviors, while the existing method fails to detect them.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127538121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microcontroller Performance Screening: Optimizing the Characterization in the Presence of Anomalous and Noisy Data 微控制器性能筛选:在异常和噪声数据存在下优化表征
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897769
N. Bellarmino, R. Cantoro, M. Huch, T. Kilian, Ulf Schlichtmann, Giovanni Squillero
In safety-critical applications, microcontrollers must satisfy strict quality constraints and performances in terms of $F_{max}$, that is, the maximum operating frequency. It has been demonstrated that data extracted from on-chip speed monitors can model the $F_{max}$ of integrated circuits by means of machine learning models, and that those models are suitable for the performance screening process. However, while acquiring data from these monitors is quite an accurate process, the labelling is time-consuming, costly, and may be subject to different measurements errors, impairing the final quality. This paper presents a methodology to cope with anomalous and noisy data in the context of the multi-label regression problem of microcontroller performance screening. We used outlier detection based on Inter Quartile Range (IQR) and Z-score and imputation techniques to detect errors in the labels and to avoid to drop incomplete samples, building higher-quality training set for our models, optimizing the devices characterization phase. Experiments showed that the proposed methodology increases the performance of existing models, making them more robust. These techniques permitted us to use a significantly smaller number of samples (about one third of the devices available for characterization), thus making the costly data acquisition process more efficient.
在安全关键应用中,微控制器必须满足严格的质量约束和性能,即最大工作频率。研究表明,从片上速度监视器中提取的数据可以通过机器学习模型对集成电路的F_{max}$进行建模,并且这些模型适用于性能筛选过程。然而,虽然从这些监测器获取数据是一个相当准确的过程,但标记是耗时的,昂贵的,并且可能受到不同测量误差的影响,从而损害最终质量。本文提出了一种在微控制器性能筛选的多标签回归问题背景下处理异常和噪声数据的方法。我们使用基于四分位间距(IQR)和Z-score的离群值检测和imputation技术来检测标签中的错误,避免丢弃不完整的样本,为我们的模型构建更高质量的训练集,优化设备表征阶段。实验表明,该方法提高了现有模型的性能,使其具有更强的鲁棒性。这些技术使我们能够使用数量显著减少的样品(约三分之一的设备可用于表征),从而使昂贵的数据采集过程更有效。
{"title":"Microcontroller Performance Screening: Optimizing the Characterization in the Presence of Anomalous and Noisy Data","authors":"N. Bellarmino, R. Cantoro, M. Huch, T. Kilian, Ulf Schlichtmann, Giovanni Squillero","doi":"10.1109/IOLTS56730.2022.9897769","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897769","url":null,"abstract":"In safety-critical applications, microcontrollers must satisfy strict quality constraints and performances in terms of $F_{max}$, that is, the maximum operating frequency. It has been demonstrated that data extracted from on-chip speed monitors can model the $F_{max}$ of integrated circuits by means of machine learning models, and that those models are suitable for the performance screening process. However, while acquiring data from these monitors is quite an accurate process, the labelling is time-consuming, costly, and may be subject to different measurements errors, impairing the final quality. This paper presents a methodology to cope with anomalous and noisy data in the context of the multi-label regression problem of microcontroller performance screening. We used outlier detection based on Inter Quartile Range (IQR) and Z-score and imputation techniques to detect errors in the labels and to avoid to drop incomplete samples, building higher-quality training set for our models, optimizing the devices characterization phase. Experiments showed that the proposed methodology increases the performance of existing models, making them more robust. These techniques permitted us to use a significantly smaller number of samples (about one third of the devices available for characterization), thus making the costly data acquisition process more efficient.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122947750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Functional and Timing Implications of Transient Faults in Critical Systems 关键系统暂态故障的功能和时序含义
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897537
A. Kritikakou, Panagiota Nikolaou, Ivan Rodriguez-Ferrandez, Joseph Paturel, Leonidas Kosmidis, M. Michael, O. Sentieys, D. Steenari
Embedded systems in critical domains, such as auto-motive, aviation, space domains, are often required to guarantee both functional and temporal correctness. Considering transient faults, fault analysis and mitigation approaches are implemented at various levels of the system design, in order to maintain the functional correctness. However, transient faults and their mitigation methods have a timing impact, which can affect the temporal correctness of the system. In this work, we expose the functional and the timing implications of transient faults for critical systems. More precisely, we initially highlight the timing effect of transient faults occurring in the combinational and sequential logic of a processor. Furthermore, we propose a full stack vulnerability analysis that drives the design of selective hardware-based mitigation for real-time applications. Last, we study the timing impact of software-based reliability mitigation methods applied in a COTS GPU, using a fault tolerant middleware.
关键领域的嵌入式系统,如汽车、航空、航天领域,通常需要保证功能和时间的正确性。考虑暂态故障,在系统设计的各个层面实施故障分析和缓解方法,以保持功能的正确性。然而,暂态故障及其缓解方法具有时序影响,会影响系统的时序正确性。在这项工作中,我们揭示了关键系统瞬态故障的功能和时序含义。更准确地说,我们首先强调了在处理器的组合和顺序逻辑中发生的瞬态故障的时序效应。此外,我们提出了一个全栈漏洞分析,驱动实时应用程序的选择性基于硬件的缓解设计。最后,利用容错中间件研究了基于软件的可靠性缓解方法在COTS GPU中的时序影响。
{"title":"Functional and Timing Implications of Transient Faults in Critical Systems","authors":"A. Kritikakou, Panagiota Nikolaou, Ivan Rodriguez-Ferrandez, Joseph Paturel, Leonidas Kosmidis, M. Michael, O. Sentieys, D. Steenari","doi":"10.1109/IOLTS56730.2022.9897537","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897537","url":null,"abstract":"Embedded systems in critical domains, such as auto-motive, aviation, space domains, are often required to guarantee both functional and temporal correctness. Considering transient faults, fault analysis and mitigation approaches are implemented at various levels of the system design, in order to maintain the functional correctness. However, transient faults and their mitigation methods have a timing impact, which can affect the temporal correctness of the system. In this work, we expose the functional and the timing implications of transient faults for critical systems. More precisely, we initially highlight the timing effect of transient faults occurring in the combinational and sequential logic of a processor. Furthermore, we propose a full stack vulnerability analysis that drives the design of selective hardware-based mitigation for real-time applications. Last, we study the timing impact of software-based reliability mitigation methods applied in a COTS GPU, using a fault tolerant middleware.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114836881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Decoding Method for Double Error Correcting Cross Parity Codes 一种新的双纠错交叉奇偶码译码方法
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897284
G. Duchrau, M. Gössel
In this paper a new and simple method for 2-bit error correction for cross parity codes is proposed. All single and double bit errors, concerning data bits, are corrected. For checkbit errors up to a weight of 2, this method ensures that the data bits are free of errors. In a cross parity code the data bits are conceptually arranged in a rectangular array. The check sums are formed over bits along columns, rows and diagonals. In addition, the parity of all data bits is determined. If a 1-bit error occurs in the data bits, the erroneous bit is located at the intersection of three straight lines: a row, a column and a diagonal. For 2-bit data errors on distinct lines, the erroneous bits are located in the same way. For 2-bit data errors, that share a line, two straight lines per erroneous bit can be identified by the check bits. In a first step the bits at the four intersection points are inverted. Thereby the two errors are corrected and two new errors are generated. In case of odd side length, the two generated errors are located at three different straight lines each and can be easily corrected in a second step.
本文提出了一种新的简单的交叉奇偶码2位纠错方法。所有与数据位有关的单位和双位错误都被纠正。对于权值为2的校验位错误,该方法确保数据位没有错误。在交叉奇偶码中,数据位在概念上排列在矩形数组中。校验和是沿着列、行和对角线在位上形成的。此外,还确定了所有数据位的奇偶校验。如果数据位中出现1位的错误,则错误位位于行、列和对角线三条直线的交叉处。对于不同行上的2位数据错误,错误位以相同的方式定位。对于共享一条线的2位数据错误,每个错误位可以通过校验位识别出两条直线。在第一步中,四个交点处的位被反转。从而修正了这两个错误,并产生了两个新的错误。在边长为奇数的情况下,产生的两个误差分别位于三条不同的直线上,可以很容易地在第二步中进行校正。
{"title":"A New Decoding Method for Double Error Correcting Cross Parity Codes","authors":"G. Duchrau, M. Gössel","doi":"10.1109/IOLTS56730.2022.9897284","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897284","url":null,"abstract":"In this paper a new and simple method for 2-bit error correction for cross parity codes is proposed. All single and double bit errors, concerning data bits, are corrected. For checkbit errors up to a weight of 2, this method ensures that the data bits are free of errors. In a cross parity code the data bits are conceptually arranged in a rectangular array. The check sums are formed over bits along columns, rows and diagonals. In addition, the parity of all data bits is determined. If a 1-bit error occurs in the data bits, the erroneous bit is located at the intersection of three straight lines: a row, a column and a diagonal. For 2-bit data errors on distinct lines, the erroneous bits are located in the same way. For 2-bit data errors, that share a line, two straight lines per erroneous bit can be identified by the check bits. In a first step the bits at the four intersection points are inverted. Thereby the two errors are corrected and two new errors are generated. In case of odd side length, the two generated errors are located at three different straight lines each and can be easily corrected in a second step.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133103331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Yield Evaluation of Faulty Memristive Crossbar Array-based Neural Networks with Repairability 具有可修性的故障记忆交叉棒阵列神经网络成品率评估
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897183
Anu Bala, S. Khandelwal, A. Jabir, M. Ottavi
This paper evaluates the yield of a memristor-based crossbar array of artificial neural networks in the presence of stuck-at-faults (SAFs). A technique based on Markov chains is used to estimate the yield in the presence of stuck-at-faults. This method provides a high degree of accuracy. Another method that is used for analysis and comparison is the Poisson distribution, which uses the sum of all repairable fault patterns. A fault repair mechanism is also considered when evaluating the yield of the memristor crossbar array. The results demonstrate that the yield could be improved with redundancies and a higher repairable stuck-at-fault ratio.
本文评估了一种基于记忆电阻的人工神经网络交叉棒阵列在故障卡滞情况下的成品率。提出了一种基于马尔可夫链的方法来估计卡在故障情况下的产量。这种方法的准确度很高。另一种用于分析和比较的方法是泊松分布,它使用所有可修复故障模式的总和。在评估忆阻交叉栅阵列的成品率时,还考虑了故障修复机制。结果表明,冗余度和较高的可修复卡故障率可以提高良率。
{"title":"Yield Evaluation of Faulty Memristive Crossbar Array-based Neural Networks with Repairability","authors":"Anu Bala, S. Khandelwal, A. Jabir, M. Ottavi","doi":"10.1109/IOLTS56730.2022.9897183","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897183","url":null,"abstract":"This paper evaluates the yield of a memristor-based crossbar array of artificial neural networks in the presence of stuck-at-faults (SAFs). A technique based on Markov chains is used to estimate the yield in the presence of stuck-at-faults. This method provides a high degree of accuracy. Another method that is used for analysis and comparison is the Poisson distribution, which uses the sum of all repairable fault patterns. A fault repair mechanism is also considered when evaluating the yield of the memristor crossbar array. The results demonstrate that the yield could be improved with redundancies and a higher repairable stuck-at-fault ratio.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115565242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REVOLVER: A Zero-Step Execution Emulation Framework for Mitigating Power Side-Channel Attacks on ARM64 REVOLVER:一种用于减轻ARM64上功率侧信道攻击的零步执行仿真框架
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897425
Christos Zonios, V. Tenentes
Software and hardware vulnerabilities to power side-channel attacks (SCA) are hard to detect and mitigate in systems already deployed in-the-field, because they require specialized equipment and aligned power traces. In this paper, we present REVOLVER, a software-based framework that performs zero-step execution emulation and generates power traces with instruction-level resolution. REVOLVER is a hybrid emulator, because part of it runs on the system that it emulates, an actual ARM64 platform, and evaluates the power consumption of its emulated instructions using actual measurements from on-chip low-frequency power sensors. Such sensors are already present on many system-on-chips (SoCs). To improve the accuracy of the collected traces, REVOLVER repeats the execution of the instructions in a zero-step fashion. To demonstrate the capabilities of our framework, we show that AES keys can be recovered by Correlation Power Analysis (CPA) on traces acquired using REVOLVER, which proves experimentally that there is a leaking power side-channel in the examined system that could potentially be exploited by power SCAs. Moreover, we show how REVOLVER can be used by a security engineer not only to identify software and hardware vulnerabilities to power SCAs, but also to design and evaluate mitigation strategies.
在已经部署在现场的系统中,很难检测和缓解电源侧信道攻击(SCA)的软件和硬件漏洞,因为它们需要专门的设备和对齐的电源走线。在本文中,我们提出了REVOLVER,这是一个基于软件的框架,可以执行零步执行仿真并生成具有指令级分辨率的功率跟踪。REVOLVER是一个混合仿真器,因为它的一部分运行在它所仿真的系统上,一个实际的ARM64平台,并使用片上低频功率传感器的实际测量值来评估其仿真指令的功耗。这种传感器已经出现在许多片上系统(soc)上。为了提高收集轨迹的准确性,REVOLVER以零步的方式重复执行指令。为了展示我们的框架的功能,我们展示了AES密钥可以通过相关功率分析(CPA)对使用REVOLVER获得的迹线进行恢复,这从实验上证明了在被检查的系统中存在泄漏的功率侧信道,可能被功率sca利用。此外,我们还展示了安全工程师如何不仅可以使用REVOLVER来识别电源sca的软件和硬件漏洞,还可以设计和评估缓解策略。
{"title":"REVOLVER: A Zero-Step Execution Emulation Framework for Mitigating Power Side-Channel Attacks on ARM64","authors":"Christos Zonios, V. Tenentes","doi":"10.1109/IOLTS56730.2022.9897425","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897425","url":null,"abstract":"Software and hardware vulnerabilities to power side-channel attacks (SCA) are hard to detect and mitigate in systems already deployed in-the-field, because they require specialized equipment and aligned power traces. In this paper, we present REVOLVER, a software-based framework that performs zero-step execution emulation and generates power traces with instruction-level resolution. REVOLVER is a hybrid emulator, because part of it runs on the system that it emulates, an actual ARM64 platform, and evaluates the power consumption of its emulated instructions using actual measurements from on-chip low-frequency power sensors. Such sensors are already present on many system-on-chips (SoCs). To improve the accuracy of the collected traces, REVOLVER repeats the execution of the instructions in a zero-step fashion. To demonstrate the capabilities of our framework, we show that AES keys can be recovered by Correlation Power Analysis (CPA) on traces acquired using REVOLVER, which proves experimentally that there is a leaking power side-channel in the examined system that could potentially be exploited by power SCAs. Moreover, we show how REVOLVER can be used by a security engineer not only to identify software and hardware vulnerabilities to power SCAs, but also to design and evaluate mitigation strategies.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Experimentally Tuned Compact Electrical Model for Laser Fault Injection Simulation 激光故障注入仿真的实验调谐紧凑电模型
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897189
W. Cruz, R. Viera, J. Rigaud, G. Hubert, J. Dutertre
This work reports LFI experiments carried out on custom CMOS 65 nm digital test gates, aiming at tuning the parameters of a compact electrical model. Like in previous works, we observed a difference in behavior in the induced faults when using nanosecond and picosecond range laser pulse duration. However, our experimental results showed that the laser-sensitive areas were restricted to the PMOS transistors for ns laser pulses, contrary to what was previously stated in the literature. For ps pulse duration, these works outline the sensitivity of both the NMOS and PMOS of an SRAM cell following the theoretical model of LFI. These experiments help to calibrate the parameters of a compact electrical model, allowing the simulation of LFI attacks (using SPICE-like CAD tools). This compact model is built upon previous works, with simplifications to facilitate its use. Once tuned, simulations using the proposed compact model exhibit a good correlation with the experimental results.
本工作报告了在定制CMOS 65纳米数字测试门上进行的LFI实验,旨在调整紧凑电气模型的参数。与以前的研究一样,我们观察到在纳秒和皮秒范围内使用激光脉冲时,诱导故障的行为是不同的。然而,我们的实验结果表明,对于ns激光脉冲,激光敏感区域仅限于PMOS晶体管,这与先前文献中所述相反。对于ps脉冲持续时间,这些工作概述了SRAM电池的NMOS和PMOS的灵敏度,遵循LFI的理论模型。这些实验有助于校准紧凑电模型的参数,允许模拟LFI攻击(使用SPICE-like CAD工具)。这个紧凑的模型是建立在以前的工作,简化,以方便其使用。一旦调整,使用所提出的紧凑模型的模拟与实验结果显示出良好的相关性。
{"title":"An Experimentally Tuned Compact Electrical Model for Laser Fault Injection Simulation","authors":"W. Cruz, R. Viera, J. Rigaud, G. Hubert, J. Dutertre","doi":"10.1109/IOLTS56730.2022.9897189","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897189","url":null,"abstract":"This work reports LFI experiments carried out on custom CMOS 65 nm digital test gates, aiming at tuning the parameters of a compact electrical model. Like in previous works, we observed a difference in behavior in the induced faults when using nanosecond and picosecond range laser pulse duration. However, our experimental results showed that the laser-sensitive areas were restricted to the PMOS transistors for ns laser pulses, contrary to what was previously stated in the literature. For ps pulse duration, these works outline the sensitivity of both the NMOS and PMOS of an SRAM cell following the theoretical model of LFI. These experiments help to calibrate the parameters of a compact electrical model, allowing the simulation of LFI attacks (using SPICE-like CAD tools). This compact model is built upon previous works, with simplifications to facilitate its use. Once tuned, simulations using the proposed compact model exhibit a good correlation with the experimental results.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Trends and Perspectives on Defect-Oriented Testing 面向缺陷测试的最新趋势和前景
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897647
P. Bernardi, R. Cantoro, Anthony Coyette, W. Dobbeleare, M. Fieback, A. Floridia, G. Gielenk, Jhon Gomez, M. Grosso, Andrea Guerriero, I. Guglielminetti, S. Hamdioui, Giorgio Insinga, N. Mautone, Nunzio Mirabella, Sandro Sartoni, M. Reorda, R. Ullmann, Ronny Vanhooren, N. Xamak, Lizhou Wu
Electronics employed in modern safety-critical systems require severe qualification during the manufacturing process and in the field, to prevent fault effects from manifesting themselves as critical failures during mission operations. Traditional fault models are not sufficient anymore to guarantee the required quality levels for chips utilized in mission-critical applications. The research community and industry have been investigating new test approaches such as device-aware test, cell-aware test, path-delay test, and even test methodologies based on the analysis of manufacturing data to move the scope from OPPM to OPPB. This special session presents four contributions, from academic researchers and industry professionals, to enable better chip quality. We present results on various activities towards this objective, including device-aware test, software-based self-test, and memory test.
现代安全关键系统中使用的电子设备在制造过程和现场都需要严格的认证,以防止故障影响在任务操作期间表现为关键故障。传统的故障模型已不足以保证关键任务应用中所用芯片的质量水平。研究团体和行业一直在研究新的测试方法,如设备感知测试、单元感知测试、路径延迟测试,甚至是基于制造数据分析的测试方法,以将范围从OPPM转移到OPPB。本次特别会议将介绍来自学术研究人员和行业专业人士的四项贡献,以实现更好的芯片质量。我们提出了针对这一目标的各种活动的结果,包括设备感知测试,基于软件的自测和记忆测试。
{"title":"Recent Trends and Perspectives on Defect-Oriented Testing","authors":"P. Bernardi, R. Cantoro, Anthony Coyette, W. Dobbeleare, M. Fieback, A. Floridia, G. Gielenk, Jhon Gomez, M. Grosso, Andrea Guerriero, I. Guglielminetti, S. Hamdioui, Giorgio Insinga, N. Mautone, Nunzio Mirabella, Sandro Sartoni, M. Reorda, R. Ullmann, Ronny Vanhooren, N. Xamak, Lizhou Wu","doi":"10.1109/IOLTS56730.2022.9897647","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897647","url":null,"abstract":"Electronics employed in modern safety-critical systems require severe qualification during the manufacturing process and in the field, to prevent fault effects from manifesting themselves as critical failures during mission operations. Traditional fault models are not sufficient anymore to guarantee the required quality levels for chips utilized in mission-critical applications. The research community and industry have been investigating new test approaches such as device-aware test, cell-aware test, path-delay test, and even test methodologies based on the analysis of manufacturing data to move the scope from OPPM to OPPB. This special session presents four contributions, from academic researchers and industry professionals, to enable better chip quality. We present results on various activities towards this objective, including device-aware test, software-based self-test, and memory test.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128458038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Power Cycling Body Diode Current Flow on SiC MOSFET Device 功率循环体二极管在SiC MOSFET器件上的电流流动
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897452
Giovanni Corrente, N. Bentivegna, S. Russo
The aim of this paper is to analyze the planar SiC MOSFETs behavior under power cycle current flow on body diode. In particular, the activity highlights how this type of trials, in addition to stimulate failure mechanisms directly related to metal fatigue, is able to stimulate failure mechanisms that seem not directly related to metal fatigue. The activity was developed by supporting the analysis of data obtained through laboratory measurements from a careful study of Failure Analysis (FA).
本文的目的是分析平面SiC mosfet在体二极管功率循环电流下的性能。特别是,该活动强调了这种类型的试验除了刺激与金属疲劳直接相关的失效机制外,如何能够刺激似乎与金属疲劳没有直接关系的失效机制。该活动是通过支持对实验室测量数据的分析而开发的,这些数据是通过对失效分析(FA)的仔细研究而获得的。
{"title":"Power Cycling Body Diode Current Flow on SiC MOSFET Device","authors":"Giovanni Corrente, N. Bentivegna, S. Russo","doi":"10.1109/IOLTS56730.2022.9897452","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897452","url":null,"abstract":"The aim of this paper is to analyze the planar SiC MOSFETs behavior under power cycle current flow on body diode. In particular, the activity highlights how this type of trials, in addition to stimulate failure mechanisms directly related to metal fatigue, is able to stimulate failure mechanisms that seem not directly related to metal fatigue. The activity was developed by supporting the analysis of data obtained through laboratory measurements from a careful study of Failure Analysis (FA).","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133292489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Product Reliability Based on Basic Block Metrics Recomposition 基于基本块度量重组的软件产品可靠性
Pub Date : 2022-09-12 DOI: 10.1109/IOLTS56730.2022.9897289
Tiziano Fiorucci, G. D. Natale, J. Daveau, P. Roche
In the context of functional verification, the focus has always been on hardware and its ability to be both resilient to errors and to recover from them autonomously. In order to evaluate these characteristics, an extensive use of Fault Injection tools is made to achieve clear and granular results. These testing campaigns are carried out on the entire DUT and require a consistent amount of time and computational resources. The possibility of reducing these costs applying modern techniques as the study of the Dysfunctional State Machine or the proof of concept regarding the composability of single block fault injection campaigns to obtain a library of component of which the reliability metrics are well known, as already been extensively discussed and proven on hardware. In this work instead the application of this methodologies to software is presented for the first time. In order to do so, the software has been divided into basic block, atomic chunks of code having precise carachteristics that will ensure the possibility to study them singularly and then recompose them into a software product which reliability metrics are known, without the need for complete Fault injection campaign.
在功能验证的上下文中,重点始终放在硬件及其对错误的弹性和自动恢复的能力上。为了评估这些特征,需要广泛使用故障注入工具,以获得清晰而精细的结果。这些测试活动在整个DUT上进行,需要一致的时间和计算资源。降低这些成本的可能性应用现代技术,如功能失调状态机的研究,或关于单块故障注入活动的可组合性的概念证明,以获得可靠性指标众所周知的组件库,这已经在硬件上得到了广泛的讨论和证明。在这项工作中,第一次提出了将这种方法应用于软件。为了做到这一点,软件被划分为基本块,原子代码块具有精确的特征,这将确保有可能单独研究它们,然后将它们重新组合成一个可靠性指标已知的软件产品,而不需要完整的故障注入活动。
{"title":"Software Product Reliability Based on Basic Block Metrics Recomposition","authors":"Tiziano Fiorucci, G. D. Natale, J. Daveau, P. Roche","doi":"10.1109/IOLTS56730.2022.9897289","DOIUrl":"https://doi.org/10.1109/IOLTS56730.2022.9897289","url":null,"abstract":"In the context of functional verification, the focus has always been on hardware and its ability to be both resilient to errors and to recover from them autonomously. In order to evaluate these characteristics, an extensive use of Fault Injection tools is made to achieve clear and granular results. These testing campaigns are carried out on the entire DUT and require a consistent amount of time and computational resources. The possibility of reducing these costs applying modern techniques as the study of the Dysfunctional State Machine or the proof of concept regarding the composability of single block fault injection campaigns to obtain a library of component of which the reliability metrics are well known, as already been extensively discussed and proven on hardware. In this work instead the application of this methodologies to software is presented for the first time. In order to do so, the software has been divided into basic block, atomic chunks of code having precise carachteristics that will ensure the possibility to study them singularly and then recompose them into a software product which reliability metrics are known, without the need for complete Fault injection campaign.","PeriodicalId":274595,"journal":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1