首页 > 最新文献

2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)最新文献

英文 中文
Valid Window: A New Metric to Measure the Reliability of NAND Flash Memory 有效窗口:衡量NAND快闪记忆体可靠性的新指标
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116337
Min Ye, Qiao Li, Jianqiang Nie, Tei-Wei Kuo, C. Xue
NAND flash memory has been widely adopted in storage systems today. The most important issue in flash memory is its reliability, especially for 3D NAND, which suffers from several types of errors. The raw bit error rate (RBER) when applying default read reference voltages is usually adopted as the reliability metric for NAND flash memory. However, RBER is closely related to the way how data is read, and varies greatly if read retry operations are conducted with tuned read reference voltages. In this work, a new metric, valid window is proposed to measure the reliability, which is stable and accurate. A valid window expresses the size of error regions between two neighboring levels and determines if the data can be correctly read with further read retry. Taking advantage of these features, we design a method to reduce the number of read retry operations. This is achieved by adjusting program operations of 3D NAND flash memories. Experiments on a real 3D NAND flash chip verify the effectiveness of the proposed method.
NAND闪存在当今的存储系统中被广泛采用。闪存中最重要的问题是它的可靠性,特别是3D NAND,它遭受几种类型的错误。通常采用默认读参考电压时的原始误码率(RBER)作为NAND闪存的可靠性指标。但是,RBER与读取数据的方式密切相关,如果在调优的读参考电压下执行读重试操作,RBER会有很大的变化。本文提出了一种新的可靠度度量——有效窗,该度量稳定、准确。有效窗口表示两个相邻级别之间的错误区域的大小,并确定是否可以通过进一步的读重试正确读取数据。利用这些特性,我们设计了一种方法来减少读重试操作的数量。这是通过调整3D NAND闪存的程序操作来实现的。在实际3D NAND闪存芯片上的实验验证了该方法的有效性。
{"title":"Valid Window: A New Metric to Measure the Reliability of NAND Flash Memory","authors":"Min Ye, Qiao Li, Jianqiang Nie, Tei-Wei Kuo, C. Xue","doi":"10.23919/DATE48585.2020.9116337","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116337","url":null,"abstract":"NAND flash memory has been widely adopted in storage systems today. The most important issue in flash memory is its reliability, especially for 3D NAND, which suffers from several types of errors. The raw bit error rate (RBER) when applying default read reference voltages is usually adopted as the reliability metric for NAND flash memory. However, RBER is closely related to the way how data is read, and varies greatly if read retry operations are conducted with tuned read reference voltages. In this work, a new metric, valid window is proposed to measure the reliability, which is stable and accurate. A valid window expresses the size of error regions between two neighboring levels and determines if the data can be correctly read with further read retry. Taking advantage of these features, we design a method to reduce the number of read retry operations. This is achieved by adjusting program operations of 3D NAND flash memories. Experiments on a real 3D NAND flash chip verify the effectiveness of the proposed method.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130383539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Cache-based Execution of On-line Self-Test Routines in Multi-core Automotive System-on-Chips 基于确定性缓存的多核汽车片上系统在线自测例程执行
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116239
A. Floridia, Tzamn Melendez Carmona, D. Piumatti, A. Ruospo, E. Sánchez, S. D. Luca, R. Martorana, Mose Alessandro Pernice
Traditionally, the usage of caches and deterministic execution of on-line self-test procedures have been considered two mutually exclusive concepts. At the same time, software executed in a multi-core context suffers of a limited timing predictability due to the higher system bus contention. When dealing with selftest procedures, this higher contention might lead to a fluctuating fault coverage or even the failure of some test programs. This paper presents a cache-based strategy for achieving both deterministic behaviour and stable fault coverage from the execution of self-test procedures in multi-core systems. The proposed strategy is applied to two representative modules negatively affected by a multi-core execution: synchronous imprecise interrupts logic and pipeline hazard detection unit. The experiments illustrate that it is possible to achieve a stable execution while also improving the state-of-the-art approaches for the on-line testing of embedded microprocessors. The effectiveness of the methodology was assessed on all the three cores of a multi-core industrial System- on-Chip intended for automotive ASIL D applications.
传统上,缓存的使用和在线自测程序的确定性执行被认为是两个相互排斥的概念。同时,由于更高的系统总线争用,在多核环境中执行的软件受到时间可预测性的限制。在处理自测过程时,这种较高的争用可能导致故障覆盖率的波动,甚至导致某些测试程序的失败。本文提出了一种基于缓存的策略,用于在多核系统中实现自测试过程的确定性行为和稳定的故障覆盖。将该策略应用于受多核执行负面影响的两个代表性模块:同步不精确中断逻辑和管道危险检测单元。实验表明,它可以实现稳定的执行,同时也改进了嵌入式微处理器在线测试的最先进方法。该方法的有效性在用于汽车ASIL - D应用的多核工业片上系统的所有三个核心上进行了评估。
{"title":"Deterministic Cache-based Execution of On-line Self-Test Routines in Multi-core Automotive System-on-Chips","authors":"A. Floridia, Tzamn Melendez Carmona, D. Piumatti, A. Ruospo, E. Sánchez, S. D. Luca, R. Martorana, Mose Alessandro Pernice","doi":"10.23919/DATE48585.2020.9116239","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116239","url":null,"abstract":"Traditionally, the usage of caches and deterministic execution of on-line self-test procedures have been considered two mutually exclusive concepts. At the same time, software executed in a multi-core context suffers of a limited timing predictability due to the higher system bus contention. When dealing with selftest procedures, this higher contention might lead to a fluctuating fault coverage or even the failure of some test programs. This paper presents a cache-based strategy for achieving both deterministic behaviour and stable fault coverage from the execution of self-test procedures in multi-core systems. The proposed strategy is applied to two representative modules negatively affected by a multi-core execution: synchronous imprecise interrupts logic and pipeline hazard detection unit. The experiments illustrate that it is possible to achieve a stable execution while also improving the state-of-the-art approaches for the on-line testing of embedded microprocessors. The effectiveness of the methodology was assessed on all the three cores of a multi-core industrial System- on-Chip intended for automotive ASIL D applications.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Verification Runtime Analysis: Get the Most Out of Partial Verification 验证运行时分析:充分利用部分验证
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116543
Martin Ring, Fritjof Bornebusch, Christoph Lüth, R. Wille, R. Drechsler
The design of modern systems has reached a complexity which makes it inevitable to apply verification methods in order to guarantee its correct and safe execution. The verification methods frequently produce proof obligations that can not be solved any more due to the huge search space. However, by setting enough variables to fixed values, the search space is obviously reduced and solving engines eventually may be able to complete the verification task. Although this results in a partial verification, the results may still be valuable — in particular as opposed to the alternative of no verification at all. However, so far no systematic investigation has been conducted on which variables to fix in order to reduce verification runtime as much as possible while, at the same time, still getting most coverage. This paper addresses this question by proposing a corresponding verification runtime analysis. Experimental evaluations confirm the potential of this approach.
现代系统的设计已经达到了一定的复杂性,为了保证其正确和安全的执行,必须采用验证方法。验证方法由于搜索空间巨大,常常产生无法解决的证明义务。然而,通过将足够多的变量设置为固定值,可以明显减少搜索空间,求解引擎最终可能能够完成验证任务。尽管这会导致部分验证,但结果可能仍然是有价值的——特别是与完全不验证的替代方案相反。然而,到目前为止,还没有进行系统的调查,以确定哪些变量可以尽可能地减少验证运行时,同时仍然获得大多数覆盖率。本文通过提出相应的验证运行时分析来解决这个问题。实验评估证实了这种方法的潜力。
{"title":"Verification Runtime Analysis: Get the Most Out of Partial Verification","authors":"Martin Ring, Fritjof Bornebusch, Christoph Lüth, R. Wille, R. Drechsler","doi":"10.23919/DATE48585.2020.9116543","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116543","url":null,"abstract":"The design of modern systems has reached a complexity which makes it inevitable to apply verification methods in order to guarantee its correct and safe execution. The verification methods frequently produce proof obligations that can not be solved any more due to the huge search space. However, by setting enough variables to fixed values, the search space is obviously reduced and solving engines eventually may be able to complete the verification task. Although this results in a partial verification, the results may still be valuable — in particular as opposed to the alternative of no verification at all. However, so far no systematic investigation has been conducted on which variables to fix in order to reduce verification runtime as much as possible while, at the same time, still getting most coverage. This paper addresses this question by proposing a corresponding verification runtime analysis. Experimental evaluations confirm the potential of this approach.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126503995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Particle Swarm Optimization Guided Approximate Key Search Attack on Logic Locking in The Absence of Scan Access 无扫描访问情况下粒子群优化引导的逻辑锁定近似键搜索攻击
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116259
R. Karmakar, S. Chattopadhyay
Logic locking is a well known Design-for-Security(DfS) technique for Intellectual Property (IP) protection of digital Integrated Circuits(IC). However, various attacks on logic locking can extract the secret obfuscation key successfully. Although Boolean Satisfiability (SAT) attacks can break most of the logic locked circuits, inability to deobfuscate sequential circuits is the main limitation of this type of attacks. Several existing defense strategies exploit this fact to thwart SAT attack by obfuscating the scan-based Design-for-Testability (DfT) infrastructure. In the absence of scan access, Model Checking based circuit unrolling attacks also suffer from scalability issues. In this paper, we propose a particle swarm optimization (PSO) guided attack framework, which is capable of finding an approximate key that produces correct output in most of the cases. Unlike the SAT attacks, the proposed attack framework can work even in the absence of scan access. Unlike Model Checking attacks, it does not suffer from scalability issues, thus can be applied on significantly large sequential circuits. Experimental results show that the derived key can produce correct outputs in more than 99% cases, for the majority of the benchmark circuits, while for the rest of the circuits, a minimal error is observed. The proposed attack framework enables partial activation of large sequential circuits in the absence of scan access, which is not feasible using the existing attack frameworks.
逻辑锁定是一种众所周知的数字集成电路(IC)知识产权保护的安全设计技术。然而,对逻辑锁定的各种攻击都可以成功地提取出秘密混淆密钥。尽管布尔可满足性(SAT)攻击可以破坏大多数逻辑锁定电路,但无法解除顺序电路的混淆是这类攻击的主要限制。一些现有的防御策略利用这一事实,通过混淆基于扫描的可测试性设计(DfT)基础设施来阻止SAT攻击。在没有扫描访问的情况下,基于模型检查的电路展开攻击也存在可扩展性问题。在本文中,我们提出了一个粒子群优化(PSO)制导攻击框架,该框架能够找到在大多数情况下产生正确输出的近似密钥。与SAT攻击不同,所提出的攻击框架即使在没有扫描访问的情况下也可以工作。与模型检查攻击不同,它没有可伸缩性问题,因此可以应用于非常大的顺序电路。实验结果表明,对于大多数基准电路,导出的密钥在99%以上的情况下可以产生正确的输出,而对于其余电路,可以观察到最小的误差。提出的攻击框架能够在没有扫描访问的情况下部分激活大型顺序电路,这在现有的攻击框架中是不可行的。
{"title":"A Particle Swarm Optimization Guided Approximate Key Search Attack on Logic Locking in The Absence of Scan Access","authors":"R. Karmakar, S. Chattopadhyay","doi":"10.23919/DATE48585.2020.9116259","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116259","url":null,"abstract":"Logic locking is a well known Design-for-Security(DfS) technique for Intellectual Property (IP) protection of digital Integrated Circuits(IC). However, various attacks on logic locking can extract the secret obfuscation key successfully. Although Boolean Satisfiability (SAT) attacks can break most of the logic locked circuits, inability to deobfuscate sequential circuits is the main limitation of this type of attacks. Several existing defense strategies exploit this fact to thwart SAT attack by obfuscating the scan-based Design-for-Testability (DfT) infrastructure. In the absence of scan access, Model Checking based circuit unrolling attacks also suffer from scalability issues. In this paper, we propose a particle swarm optimization (PSO) guided attack framework, which is capable of finding an approximate key that produces correct output in most of the cases. Unlike the SAT attacks, the proposed attack framework can work even in the absence of scan access. Unlike Model Checking attacks, it does not suffer from scalability issues, thus can be applied on significantly large sequential circuits. Experimental results show that the derived key can produce correct outputs in more than 99% cases, for the majority of the benchmark circuits, while for the rest of the circuits, a minimal error is observed. The proposed attack framework enables partial activation of large sequential circuits in the absence of scan access, which is not feasible using the existing attack frameworks.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132213023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Microfluidic Trojan Design in Flow-based Biochips 流基生物芯片中的微流控木马设计
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116225
Mohammed Shayan, Sukanta Bhattacharjee, Yong-Ak Song, K. Chakrabarty, R. Karri
Microfluidic technologies find application in various safety-critical fields such as medical diagnostics, drug research, and cell analysis. Recent work has focused on security threats to microfluidic-based cyberphysical systems and defenses. So far the threat analysis has been limited to the cases of tampering with control software/hardware, which is common to most cyberphysical control systems in general; in a sense, such an approach is not exclusive to microfluidics. In this paper, we present a stealthy attack paradigm that uses characteristics exclusive to the microfluidic devices - a microfluidic trojan. The proposed trojan payload is a valve whose height has been perturbed to vary its pressure response. This trojan can be triggered in multiple ways based on time or specific operations. These triggers can occur naturally in a bioassay or added into the controlling software. We showcase the trojan application in carrying out practical attacks -contamination, parameter-tampering and denial-of-service - on a real-life bioassay implementation. Further, we present guidelines to launch stealthy attacks and to counter them.
微流控技术应用于各种安全关键领域,如医学诊断、药物研究和细胞分析。最近的工作集中在对基于微流体的网络物理系统和防御的安全威胁上。到目前为止,威胁分析仅限于篡改控制软件/硬件的情况,这在大多数网络物理控制系统中是常见的;从某种意义上说,这种方法并不是微流体所独有的。在本文中,我们提出了一种利用微流控装置特有特征的隐形攻击范式-微流控木马。所提出的特洛伊有效载荷是一个阀门,其高度被扰动以改变其压力响应。该木马可以根据时间或特定操作以多种方式触发。这些触发因素可以在生物测定中自然发生,也可以添加到控制软件中。我们展示了特洛伊木马在执行实际攻击中的应用-污染,参数篡改和拒绝服务-在现实生活中的生物测定实施。此外,我们提出了发动隐形攻击和反击的指导方针。
{"title":"Microfluidic Trojan Design in Flow-based Biochips","authors":"Mohammed Shayan, Sukanta Bhattacharjee, Yong-Ak Song, K. Chakrabarty, R. Karri","doi":"10.23919/DATE48585.2020.9116225","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116225","url":null,"abstract":"Microfluidic technologies find application in various safety-critical fields such as medical diagnostics, drug research, and cell analysis. Recent work has focused on security threats to microfluidic-based cyberphysical systems and defenses. So far the threat analysis has been limited to the cases of tampering with control software/hardware, which is common to most cyberphysical control systems in general; in a sense, such an approach is not exclusive to microfluidics. In this paper, we present a stealthy attack paradigm that uses characteristics exclusive to the microfluidic devices - a microfluidic trojan. The proposed trojan payload is a valve whose height has been perturbed to vary its pressure response. This trojan can be triggered in multiple ways based on time or specific operations. These triggers can occur naturally in a bioassay or added into the controlling software. We showcase the trojan application in carrying out practical attacks -contamination, parameter-tampering and denial-of-service - on a real-life bioassay implementation. Further, we present guidelines to launch stealthy attacks and to counter them.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130282499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Reinforcement Learning Approach to Directed Test Generation for Shared Memory Verification 面向共享内存验证的定向测试生成的强化学习方法
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116198
Nícolas Pfeifer, Bruno V. Zimpel, Gabriel A. G. Andrade, L. Santos
Multicore chips are expected to rely on coherent shared memory. Albeit the coherence hardware can scale gracefully, the protocol state space grows exponentially with core count. That is why design verification requires directed test generation (DTG) for dynamic coverage control under the tight time constraints resulting from slow simulation and short verification budgets. Next generation EDA tools are expected to exploit Machine Learning for reaching high coverage in less time. We propose a technique that addresses DTG as a decision process and tries to find a decision-making policy for maximizing the cumulative coverage, as a result of successive actions taken by an agent. Instead of simply relying on learning, our technique builds upon the legacy from constrained random test generation (RTG). It casts DTG as coverage-driven RTG, and it explores distinct RTG engines subject to progressively tighter constraints. We compared three Reinforcement Learning generators with a state-of-the-art generator based on Genetic Programming. The experimental results show that the proper enforcement of constraints is more efficient for guiding learning towards higher coverage than simply letting the generator learn how to select the most promising memory events for increasing coverage. For a 3-level MESI 32-core design, the proposed approach led to the highest observed coverage (95.81%), and it was 2.4 times faster than the baseline generator to reach the latter’s maximal coverage.
多核芯片将依赖于一致的共享内存。尽管相干硬件可以优雅地扩展,但协议状态空间随着核数呈指数级增长。这就是为什么设计验证需要直接测试生成(DTG)来在严格的时间限制下进行动态覆盖控制,这是由缓慢的仿真和较短的验证预算造成的。下一代EDA工具有望利用机器学习在更短的时间内达到高覆盖率。我们提出了一种技术,该技术将DTG作为一个决策过程,并试图找到一个决策策略,以最大化累积覆盖率,作为代理采取的连续行动的结果。我们的技术不是简单地依赖于学习,而是建立在约束随机测试生成(RTG)遗留的基础上。它将DTG转换为覆盖驱动的RTG,并在越来越严格的约束下探索不同的RTG引擎。我们比较了三个强化学习生成器和一个基于遗传规划的最先进的生成器。实验结果表明,与简单地让生成器学习如何选择最有希望的记忆事件来增加覆盖率相比,适当地执行约束对于引导学习获得更高覆盖率更有效。对于3级MESI 32核设计,所提出的方法获得了最高的观测覆盖率(95.81%),并且比基线生成器达到后者的最大覆盖率快2.4倍。
{"title":"A Reinforcement Learning Approach to Directed Test Generation for Shared Memory Verification","authors":"Nícolas Pfeifer, Bruno V. Zimpel, Gabriel A. G. Andrade, L. Santos","doi":"10.23919/DATE48585.2020.9116198","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116198","url":null,"abstract":"Multicore chips are expected to rely on coherent shared memory. Albeit the coherence hardware can scale gracefully, the protocol state space grows exponentially with core count. That is why design verification requires directed test generation (DTG) for dynamic coverage control under the tight time constraints resulting from slow simulation and short verification budgets. Next generation EDA tools are expected to exploit Machine Learning for reaching high coverage in less time. We propose a technique that addresses DTG as a decision process and tries to find a decision-making policy for maximizing the cumulative coverage, as a result of successive actions taken by an agent. Instead of simply relying on learning, our technique builds upon the legacy from constrained random test generation (RTG). It casts DTG as coverage-driven RTG, and it explores distinct RTG engines subject to progressively tighter constraints. We compared three Reinforcement Learning generators with a state-of-the-art generator based on Genetic Programming. The experimental results show that the proper enforcement of constraints is more efficient for guiding learning towards higher coverage than simply letting the generator learn how to select the most promising memory events for increasing coverage. For a 3-level MESI 32-core design, the proposed approach led to the highest observed coverage (95.81%), and it was 2.4 times faster than the baseline generator to reach the latter’s maximal coverage.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133072854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Offline Model Guard: Secure and Private ML on Mobile Devices 离线模型保护:移动设备上的安全和私有ML
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116560
Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, K. Riedhammer, A. Sadeghi, T. Schneider, Emmanuel Stapf, Christian Weinert
Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (e.g., speech data) should remain private while also the intellectual property of service providers (e.g., model parameters) must be protected. Cryptographic techniques offer secure solutions for this, but have an unacceptable overhead and moreover require frequent network interaction.In this work, we design a practically efficient hardware-based solution. Specifically, we build OFFLINE MODEL GUARD (OMG) to enable privacy-preserving machine learning on the predominant mobile computing platform ARM—even in offline scenarios. By leveraging a trusted execution environment for strict hardware-enforced isolation from other system components, OMG guarantees privacy of client data, secrecy of provided models, and integrity of processing algorithms. Our prototype implementation on an ARM HiKey 960 development board performs privacy-preserving keyword recognition using TensorFlow Lite for Microcontrollers in real time.
在移动应用程序中执行机器学习任务会产生一个具有挑战性的利益冲突:高度敏感的客户端信息(例如,语音数据)应该保持隐私,同时服务提供商的知识产权(例如,模型参数)也必须得到保护。加密技术为此提供了安全的解决方案,但有不可接受的开销,而且需要频繁的网络交互。在这项工作中,我们设计了一个实际高效的基于硬件的解决方案。具体来说,我们构建了离线模型保护(OMG),以便在主流移动计算平台arm上实现保护隐私的机器学习,即使在离线场景下也是如此。通过利用可信的执行环境来实现硬件强制的与其他系统组件的严格隔离,OMG保证了客户机数据的隐私性、所提供模型的保密性和处理算法的完整性。我们在ARM HiKey 960开发板上的原型实现使用微控制器的TensorFlow Lite实时执行隐私保护关键字识别。
{"title":"Offline Model Guard: Secure and Private ML on Mobile Devices","authors":"Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, K. Riedhammer, A. Sadeghi, T. Schneider, Emmanuel Stapf, Christian Weinert","doi":"10.23919/DATE48585.2020.9116560","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116560","url":null,"abstract":"Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (e.g., speech data) should remain private while also the intellectual property of service providers (e.g., model parameters) must be protected. Cryptographic techniques offer secure solutions for this, but have an unacceptable overhead and moreover require frequent network interaction.In this work, we design a practically efficient hardware-based solution. Specifically, we build OFFLINE MODEL GUARD (OMG) to enable privacy-preserving machine learning on the predominant mobile computing platform ARM—even in offline scenarios. By leveraging a trusted execution environment for strict hardware-enforced isolation from other system components, OMG guarantees privacy of client data, secrecy of provided models, and integrity of processing algorithms. Our prototype implementation on an ARM HiKey 960 development board performs privacy-preserving keyword recognition using TensorFlow Lite for Microcontrollers in real time.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128809217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Post-Quantum Secure Boot 后量子安全启动
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116252
Vinay B. Y. Kumar, Naina Gupta, A. Chattopadhyay, M. Kasper, C. Krauß, R. Niederhagen
A secure boot protocol is fundamental to ensuring the integrity of the trusted computing base of a secure system. The use of digital signature algorithms (DSAs) based on traditional asymmetric cryptography, particularly for secure boot, leaves such systems vulnerable to the threat of quantum computers. This paper presents the first post-quantum secure boot solution, implemented fully as hardware for reasons of security and performance. In particular, this work uses the eXtended Merkle Signature Scheme (XMSS), a hash-based scheme that has been specified as an IETF RFC. The solution has been integrated into a secure SoC platform around RISC-V cores and evaluated on an FPGA and is shown to be orders of magnitude faster compared to corresponding hardware/software implementations and to compare competitively with a fully hardware elliptic curve DSA based solution.
安全引导协议是确保安全系统可信计算基础完整性的基础。使用基于传统非对称密码学的数字签名算法(dsa),特别是用于安全启动,使此类系统容易受到量子计算机的威胁。本文提出了第一个后量子安全启动解决方案,出于安全和性能的考虑,该方案完全作为硬件实现。特别地,这项工作使用了扩展默克尔签名方案(XMSS),这是一种基于哈希的方案,已被指定为IETF RFC。该解决方案已集成到围绕RISC-V内核的安全SoC平台中,并在FPGA上进行了评估,结果表明,与相应的硬件/软件实现相比,该解决方案的速度要快几个数量级,并且与基于全硬件椭圆曲线的DSA解决方案相比具有竞争力。
{"title":"Post-Quantum Secure Boot","authors":"Vinay B. Y. Kumar, Naina Gupta, A. Chattopadhyay, M. Kasper, C. Krauß, R. Niederhagen","doi":"10.23919/DATE48585.2020.9116252","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116252","url":null,"abstract":"A secure boot protocol is fundamental to ensuring the integrity of the trusted computing base of a secure system. The use of digital signature algorithms (DSAs) based on traditional asymmetric cryptography, particularly for secure boot, leaves such systems vulnerable to the threat of quantum computers. This paper presents the first post-quantum secure boot solution, implemented fully as hardware for reasons of security and performance. In particular, this work uses the eXtended Merkle Signature Scheme (XMSS), a hash-based scheme that has been specified as an IETF RFC. The solution has been integrated into a secure SoC platform around RISC-V cores and evaluated on an FPGA and is shown to be orders of magnitude faster compared to corresponding hardware/software implementations and to compare competitively with a fully hardware elliptic curve DSA based solution.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An Efficient MILP-Based Aging-Aware Floorplanner for Multi-Context Coarse-Grained Runtime Reconfigurable FPGAs 基于milp的多上下文粗粒度运行时可重构fpga的高效老化感知地板规划器
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116537
Bo Hu, M. Shihab, Y. Makris, Benjamin Carrión Schäfer, C. Sechen
Shrinking transistor sizes are jeopardizing the reliability of runtime reconfigurable Field Programmable Gate Arrays (FPGAs), making them increasingly sensitive to aging effects such as Negative Bias Temperature Instability (NBTI). This paper introduces a reliability-aware floorplanner which is tailored to multi-context, coarse-grained, runtime reconfigurable architectures (CGRRAs) and seeks to extend their Mean Time to Failure (MTTF) by balancing the usage of processing elements (PEs). The proposed method is based on a Mixed Integer Linear Programming (MILP) formulation, the solution to which produces appropriately-balanced mappings of workload to PEs on the reconfigurable fabric, thereby mitigating aging-induced lifetime degradation. Results demonstrate that, as compared to the default reliability-unaware floorplanning solutions, the proposed method achieves an average MTTF increase of 2.5× without introducing any performance degradation.
晶体管尺寸的缩小危及了运行时可重构现场可编程门阵列(fpga)的可靠性,使它们对负偏置温度不稳定性(NBTI)等老化效应越来越敏感。本文介绍了一种可靠性感知地板规划器,它是为多上下文、粗粒度、运行时可重构架构(CGRRAs)量身定制的,并试图通过平衡处理元素(pe)的使用来延长其平均故障时间(MTTF)。所提出的方法基于混合整数线性规划(MILP)公式,其解决方案可以在可重构结构上生成适当平衡的工作负载到pe的映射,从而减轻老化引起的寿命退化。结果表明,与默认的无可靠性地板规划方案相比,该方法在不引入任何性能下降的情况下实现了平均MTTF增加2.5倍。
{"title":"An Efficient MILP-Based Aging-Aware Floorplanner for Multi-Context Coarse-Grained Runtime Reconfigurable FPGAs","authors":"Bo Hu, M. Shihab, Y. Makris, Benjamin Carrión Schäfer, C. Sechen","doi":"10.23919/DATE48585.2020.9116537","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116537","url":null,"abstract":"Shrinking transistor sizes are jeopardizing the reliability of runtime reconfigurable Field Programmable Gate Arrays (FPGAs), making them increasingly sensitive to aging effects such as Negative Bias Temperature Instability (NBTI). This paper introduces a reliability-aware floorplanner which is tailored to multi-context, coarse-grained, runtime reconfigurable architectures (CGRRAs) and seeks to extend their Mean Time to Failure (MTTF) by balancing the usage of processing elements (PEs). The proposed method is based on a Mixed Integer Linear Programming (MILP) formulation, the solution to which produces appropriately-balanced mappings of workload to PEs on the reconfigurable fabric, thereby mitigating aging-induced lifetime degradation. Results demonstrate that, as compared to the default reliability-unaware floorplanning solutions, the proposed method achieves an average MTTF increase of 2.5× without introducing any performance degradation.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121919629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
You Only Search Once: A Fast Automation Framework for Single-Stage DNN/Accelerator Co-design 你只搜索一次:单级DNN/加速器协同设计的快速自动化框架
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116474
Weiwei Chen, Ying Wang, Shuang Yang, Chen Liu, Lei Zhang
DNN/Accelerator co-design has shown great potential in improving QoR and performance. Typical approaches separate the design flow into two-stage: (1) designing an application-specific DNN model with high accuracy; (2) building an accelerator considering the DNN specific characteristics. However, it may fails in promising the highest composite score which combines the goals of accuracy and other hardware-related constraints (e.g., latency, energy efficiency) when building a specific neural-network-based system. In this work, we present a single-stage automated framework, YOSO, aiming to generate the optimal solution of software-and-hardware that flexibly balances between the goal of accuracy, power, and QoS. Compared with the two-stage method on the baseline systolic array accelerator and Cifar10 dataset, we achieve 1.42x~2.29x energy or 1.79x~3.07x latency reduction at the same level of precision, for different user-specified energy and latency optimization constraints, respectively.
DNN/Accelerator协同设计在提高QoR和性能方面显示出巨大的潜力。典型的方法将设计流程分为两个阶段:(1)设计高精度的特定应用深度神经网络模型;(2)根据深度神经网络的特点构建加速器。然而,在构建特定的基于神经网络的系统时,它可能无法承诺最高的综合分数,该分数结合了准确性和其他硬件相关限制(例如,延迟,能源效率)的目标。在这项工作中,我们提出了一个单阶段自动化框架YOSO,旨在生成软件和硬件的最佳解决方案,灵活地平衡精度、功率和QoS的目标。与基线收缩阵列加速器和Cifar10数据集上的两阶段方法相比,在相同精度水平下,在不同的用户指定能量和延迟优化约束下,我们分别实现了1.42倍~2.29倍的能量降低和1.79倍~3.07倍的延迟降低。
{"title":"You Only Search Once: A Fast Automation Framework for Single-Stage DNN/Accelerator Co-design","authors":"Weiwei Chen, Ying Wang, Shuang Yang, Chen Liu, Lei Zhang","doi":"10.23919/DATE48585.2020.9116474","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116474","url":null,"abstract":"DNN/Accelerator co-design has shown great potential in improving QoR and performance. Typical approaches separate the design flow into two-stage: (1) designing an application-specific DNN model with high accuracy; (2) building an accelerator considering the DNN specific characteristics. However, it may fails in promising the highest composite score which combines the goals of accuracy and other hardware-related constraints (e.g., latency, energy efficiency) when building a specific neural-network-based system. In this work, we present a single-stage automated framework, YOSO, aiming to generate the optimal solution of software-and-hardware that flexibly balances between the goal of accuracy, power, and QoS. Compared with the two-stage method on the baseline systolic array accelerator and Cifar10 dataset, we achieve 1.42x~2.29x energy or 1.79x~3.07x latency reduction at the same level of precision, for different user-specified energy and latency optimization constraints, respectively.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124823006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1