首页 > 最新文献

2023 24th International Symposium on Quality Electronic Design (ISQED)最新文献

英文 中文
CMP-SiL: Confidential Multi Party Software-in-the-Loop Simulation Frameworks CMP-SiL:保密多方软件在环仿真框架
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129404
Shalabh Jain, Pradeep Pappachan, J. Guajardo, Sven Trieflinger, Indrasen Raghupatruni, T. Huber
Increasing complexity of systems and software in the automotive industry, coupled with distributed development environments has intensified adoption of Software in the Loop (SIL) systems, i.e. setup where traditional hardware components are designed and tested in pure virtual PC/IT environment consisting of virtualized hardware and networks. Cloud-based SiL simulation systems involving multiple contributors and orchestrators create huge risks for organizations due to potential for leakage of confidential model-IP to adversaries within the distributed infrastructure. This can create a bottleneck for wide-scale adoption of SiL-systems. We propose a data-flow architecture using trusted-computing technologies (e.g. Intel-SGX) to protect models and IP in cloud-based SiL environments. We illustrate that these protections can be designed to be compatible with existing SiL tools and workflows with minimal modifications. Further, we highlight the need for future standardization efforts of such security architectures in the SiL domain.
汽车行业系统和软件的复杂性日益增加,再加上分布式开发环境,使得软件在循环(SIL)系统的采用得到了加强,也就是说,传统硬件组件在由虚拟硬件和网络组成的纯虚拟PC/IT环境中进行设计和测试。涉及多个贡献者和编排者的基于云的SiL模拟系统为组织带来了巨大的风险,因为机密模型ip可能会泄露给分布式基础设施中的对手。这可能会对sil系统的大规模采用造成瓶颈。我们提出了一种使用可信计算技术(例如英特尔- sgx)的数据流架构,以保护基于云的SiL环境中的模型和IP。我们说明,这些保护可以被设计成与现有的SiL工具和工作流兼容,修改最少。此外,我们强调了SiL领域中此类安全体系结构未来标准化工作的必要性。
{"title":"CMP-SiL: Confidential Multi Party Software-in-the-Loop Simulation Frameworks","authors":"Shalabh Jain, Pradeep Pappachan, J. Guajardo, Sven Trieflinger, Indrasen Raghupatruni, T. Huber","doi":"10.1109/ISQED57927.2023.10129404","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129404","url":null,"abstract":"Increasing complexity of systems and software in the automotive industry, coupled with distributed development environments has intensified adoption of Software in the Loop (SIL) systems, i.e. setup where traditional hardware components are designed and tested in pure virtual PC/IT environment consisting of virtualized hardware and networks. Cloud-based SiL simulation systems involving multiple contributors and orchestrators create huge risks for organizations due to potential for leakage of confidential model-IP to adversaries within the distributed infrastructure. This can create a bottleneck for wide-scale adoption of SiL-systems. We propose a data-flow architecture using trusted-computing technologies (e.g. Intel-SGX) to protect models and IP in cloud-based SiL environments. We illustrate that these protections can be designed to be compatible with existing SiL tools and workflows with minimal modifications. Further, we highlight the need for future standardization efforts of such security architectures in the SiL domain.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MC-MCF: A Multi-Capacity Model for Ordered Escape Routing MC-MCF:有序逃逸路径的多容量模型
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129354
Zhe Gao, Sheqin Dong, Zhicong Tang, Wenjian Yu
Ordered escape routing (OER) is an important research topic in PCB design, which means the wires need to be routed in a given order at the boundary of pin array. Although OER has been widely investigated, most works assume the routing capacity between two adjacent pins is just 1. In this paper, we focus on multi-capacity OER (MC-OER), which means multiple wires are allowed to pass through between two adjacent pins. We first analyze the limitation of existing model based on min-cost multi-commodity flow graph, i.e. MMCF model, and point out the reason why it cannot support multi-capacity. Based on the MMCF model, a multi-capacity multi-commodity flow (MC-MCF) model is proposed for the MC-OER problem. To accelerate the solution based on MC-MCF model, a wiring resource driven partition strategy is further proposed which results in an accelerated MC-MCF algorithm for the MC-OER problem with objective of minimizing wiring length. Experiments on various grid pin array cases (with up to 308 pins) show that the proposed method achieves 100% routability within reasonable time. And, it performs similarly well or better than existing methods when solving single-capacity OER problem.
有序逃逸布线(OER)是PCB设计中的一个重要研究课题,它是指在引脚阵列的边界处,需要按照给定的顺序布线导线。尽管OER已被广泛研究,但大多数工作都假设两个相邻引脚之间的路由容量仅为1。在本文中,我们的重点是多容量OER (MC-OER),这意味着多个电线可以通过两个相邻引脚之间。首先分析了现有基于最小成本多商品流图的模型即MMCF模型的局限性,指出了其不能支持多容量的原因;在MMCF模型的基础上,针对MC-OER问题,提出了一个多容量多商品流模型。为了加速MC-MCF模型的求解,进一步提出了一种布线资源驱动的分区策略,以最小化布线长度为目标,对MC-OER问题进行了加速的MC-MCF算法。在各种引脚阵列情况下(最多308个引脚)的实验表明,该方法在合理的时间内实现了100%的可达性。并且,在解决单容量OER问题时,它的性能与现有方法相似或更好。
{"title":"MC-MCF: A Multi-Capacity Model for Ordered Escape Routing","authors":"Zhe Gao, Sheqin Dong, Zhicong Tang, Wenjian Yu","doi":"10.1109/ISQED57927.2023.10129354","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129354","url":null,"abstract":"Ordered escape routing (OER) is an important research topic in PCB design, which means the wires need to be routed in a given order at the boundary of pin array. Although OER has been widely investigated, most works assume the routing capacity between two adjacent pins is just 1. In this paper, we focus on multi-capacity OER (MC-OER), which means multiple wires are allowed to pass through between two adjacent pins. We first analyze the limitation of existing model based on min-cost multi-commodity flow graph, i.e. MMCF model, and point out the reason why it cannot support multi-capacity. Based on the MMCF model, a multi-capacity multi-commodity flow (MC-MCF) model is proposed for the MC-OER problem. To accelerate the solution based on MC-MCF model, a wiring resource driven partition strategy is further proposed which results in an accelerated MC-MCF algorithm for the MC-OER problem with objective of minimizing wiring length. Experiments on various grid pin array cases (with up to 308 pins) show that the proposed method achieves 100% routability within reasonable time. And, it performs similarly well or better than existing methods when solving single-capacity OER problem.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error Diluted Approximate Multipliers Using Positive And Negative Compressors 使用正负压缩器的误差稀释近似乘法器
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129376
Bindu G. Gowda, C. PrashanthH., M. Rao
Introducing approximation has shown significant benefits in the performance and throughput, besides lowering on-chip power consumption and silicon footprint requirement. Approximation in digital computing was designed and targeted towards error-resilient applications primarily involving image or signal processing modules. Previous works focus on approximating various arithmetic operator designs, including dividers, multipliers, adders, subtractors and multiply-and-accumulate units. Approximating compressor designs for multipliers was found to improve performance, power and area effectively. In addition, they offer regularity in cascading the partial product bits. Conventional multiplier designs employ compressors of the same kind throughout the partial product reduction stages, leading to the accumulation of errors. This paper proposes to utilize two different types of compressors: positive and negative compressors, subsequently in partial product reduction stages, with the intention to reduce the accumulated error. The proposed multiplier designs with appropriately placed positive and negative compressors along the stages and columns of the Partial Product Matrix (PPM) are investigated and characterized for hardware and error metrics. These designs were further evaluated for Image smoothing and Convolutional Neural Network (CNN) applications. The CNN built for four datasets using proposed approximate multipliers demonstrated comparable accuracy to that of exact multiplier-based CNN in the Lenet-5 architecture.
除了降低片上功耗和硅足迹需求外,引入近似法在性能和吞吐量方面显示出显著的好处。数字计算中的近似是针对主要涉及图像或信号处理模块的容错应用而设计的。以前的工作重点是近似各种算术运算符设计,包括除法,乘数,加法器,减法器和乘累加单元。发现乘法器的近似压缩机设计可以有效地提高性能、功率和面积。此外,它们还提供了部分积位级联的规律性。传统的乘法器设计在整个部分乘积缩减阶段使用同类的压缩机,导致误差的积累。本文提出使用两种不同类型的压缩机:正压机和负压机,随后在部分产品缩减阶段,旨在减少累积误差。提出的乘法器设计与适当放置的正、负压缩机沿级和列的部分积矩阵(PPM)进行了调查和表征的硬件和误差指标。这些设计进一步评估了图像平滑和卷积神经网络(CNN)的应用。使用提出的近似乘法器为四个数据集构建的CNN显示出与Lenet-5架构中基于精确乘法器的CNN相当的准确性。
{"title":"Error Diluted Approximate Multipliers Using Positive And Negative Compressors","authors":"Bindu G. Gowda, C. PrashanthH., M. Rao","doi":"10.1109/ISQED57927.2023.10129376","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129376","url":null,"abstract":"Introducing approximation has shown significant benefits in the performance and throughput, besides lowering on-chip power consumption and silicon footprint requirement. Approximation in digital computing was designed and targeted towards error-resilient applications primarily involving image or signal processing modules. Previous works focus on approximating various arithmetic operator designs, including dividers, multipliers, adders, subtractors and multiply-and-accumulate units. Approximating compressor designs for multipliers was found to improve performance, power and area effectively. In addition, they offer regularity in cascading the partial product bits. Conventional multiplier designs employ compressors of the same kind throughout the partial product reduction stages, leading to the accumulation of errors. This paper proposes to utilize two different types of compressors: positive and negative compressors, subsequently in partial product reduction stages, with the intention to reduce the accumulated error. The proposed multiplier designs with appropriately placed positive and negative compressors along the stages and columns of the Partial Product Matrix (PPM) are investigated and characterized for hardware and error metrics. These designs were further evaluated for Image smoothing and Convolutional Neural Network (CNN) applications. The CNN built for four datasets using proposed approximate multipliers demonstrated comparable accuracy to that of exact multiplier-based CNN in the Lenet-5 architecture.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"107 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130508089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Polymorphic Sensor to Detect Laser Logic State Imaging Attack 探测激光逻辑状态成像攻击的多态传感器
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129304
Sourav Roy, Shahin Tajik, Domenic Forte
Laser Logic State Imaging (LLSI) is a failure analysis (FA) technique which is conducted from the chip backside. LLSI provides an unlimited number of contactless probes to observe static signals, such as security critical assets, which in the hand of an attacker poses a significant threat. Countermeasures that have been proposed so far to prevent backside optical attacks have limitations, such as additional fabrication steps, large area overhead, incompatibility with digital circuits, which makes their implementation challenging. In this paper, we propose all-digital polymorphic gate sensors for the first time in hardware security to detect LLSI attacks. Polymorphic gates change their behavior depending on environmental conditions, e.g., variations in supply voltage and temperature. Freezing the system clock and modulation of supply voltage are the main requirements of mounting an LLSI attack. With these two attack requirements in mind, we design and simulate a polymorphic gate-based sensor that behaves as a NOR gate when there is no supply voltage modulation and switches behavior between NAND gate and NOR gate in the presence of modulation. The sensor is able to detect LLSI attacks 100% of the time at room temperature even considering manufacturing variation and with a detection rate of more than98% for a temperature range of 0°C to 85°C.
激光逻辑状态成像(LLSI)是一种从芯片背面进行失效分析的技术。LLSI提供无限数量的非接触式探针来观察静态信号,例如安全关键资产,这些资产在攻击者手中构成重大威胁。迄今为止提出的防止背面光学攻击的对策都有局限性,例如额外的制造步骤,大面积开销,与数字电路不兼容,这使得它们的实施具有挑战性。在本文中,我们首次在硬件安全领域提出了全数字多态门传感器来检测LLSI攻击。多态门根据环境条件改变其行为,例如,电源电压和温度的变化。冻结系统时钟和调制电源电压是安装LLSI攻击的主要要求。考虑到这两种攻击要求,我们设计并模拟了一种基于多态门的传感器,该传感器在没有电源电压调制时表现为NOR门,并且在存在调制的情况下在NAND门和NOR门之间切换行为。即使考虑到制造变化,该传感器也能够在室温下100%检测到LLSI攻击,并且在0°C至85°C的温度范围内检测率超过98%。
{"title":"Polymorphic Sensor to Detect Laser Logic State Imaging Attack","authors":"Sourav Roy, Shahin Tajik, Domenic Forte","doi":"10.1109/ISQED57927.2023.10129304","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129304","url":null,"abstract":"Laser Logic State Imaging (LLSI) is a failure analysis (FA) technique which is conducted from the chip backside. LLSI provides an unlimited number of contactless probes to observe static signals, such as security critical assets, which in the hand of an attacker poses a significant threat. Countermeasures that have been proposed so far to prevent backside optical attacks have limitations, such as additional fabrication steps, large area overhead, incompatibility with digital circuits, which makes their implementation challenging. In this paper, we propose all-digital polymorphic gate sensors for the first time in hardware security to detect LLSI attacks. Polymorphic gates change their behavior depending on environmental conditions, e.g., variations in supply voltage and temperature. Freezing the system clock and modulation of supply voltage are the main requirements of mounting an LLSI attack. With these two attack requirements in mind, we design and simulate a polymorphic gate-based sensor that behaves as a NOR gate when there is no supply voltage modulation and switches behavior between NAND gate and NOR gate in the presence of modulation. The sensor is able to detect LLSI attacks 100% of the time at room temperature even considering manufacturing variation and with a detection rate of more than98% for a temperature range of 0°C to 85°C.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128977145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HIE-DRAM: High Performance Efficient In-DRAM Computing Architecture for SIMD hi - dram: SIMD的高效内dram计算架构
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129370
Mayank Kabra, C. PrashanthH., Kedar Deshpande, M. Rao
In-memory and near-memory computing allows for placing the processing elements around the periphery or inside the memory blocks. Performing the computation as soon as the data is made available in the memory sub-blocks avoids the need to wait for the processor to manage the data movement. The paper focuses on a new 11 transistor (11T) computing design and a novel operation with energy savings and performance improvement when compared to the current state-of-the-art (SOTA) available single-instruction- multiple-data in-DRAM (SIMDRAM) computing. The novel 11T pass transistor design is structured to offer logical AND, OR, XNOR and its complement operations. These are sequenced to generate desired operational output with a minuscule change of 4 row circuitry that corresponds to footprint expense of 0.05% when compared to the existing DRAM architecture. Based on these logical operations, 13 scalar instructions covering arithmetic, predication, reduction, and relational function types are characterized. These scalar operations is a mix of logarithmic, quadratic, and linear functions applied on either a single or multiple operand. With respect to single-instruction- multiple-data (SIMD) topology, vector operations comprising addition, multiplication, sparse multiplication, selection, unique, reduction, and prefix summation are also realized. All these operations were compared with the current SOTA SIMDRAM architectural design to showcase profound computing time benefits and energy savings. The proposed 11T in-DRAM-compute design offers 5.18% to 50.57% improvement in computing latency and energy across 10 scalar operations, over SIMDRAM architecture. The novel high performance and efficient in-DRAM computing (HIE-DRAM) implementation is a step towards utilizing real-time in-memory vector data processing for autonomous applications.
内存和近内存计算允许将处理元素放置在外围或内存块内部。一旦数据在内存子块中可用,就立即执行计算,从而避免了等待处理器管理数据移动的需要。本文重点介绍了一种新的11晶体管(11T)计算设计和一种与当前最先进(SOTA)可用的单指令多数据dram (SIMDRAM)计算相比节能和性能改进的新操作。新颖的11T通管设计结构提供逻辑与,或,异或及其补充操作。与现有的DRAM体系结构相比,只需对4行电路进行微小的改变,即可产生所需的操作输出,这相当于占用空间费用的0.05%。基于这些逻辑操作,描述了13个标量指令,包括算术、预测、约简和关系函数类型。这些标量运算是应用于单个或多个操作数的对数、二次和线性函数的混合。对于单指令多数据(SIMD)拓扑,还实现了加法、乘法、稀疏乘法、选择、唯一、约简和前缀求和等向量运算。所有这些操作都与当前SOTA SIMDRAM架构设计进行了比较,以展示深刻的计算时间优势和节能效果。与SIMDRAM架构相比,所提出的11T in- dram计算设计在跨10个标量操作的计算延迟和能量方面提高了5.18%至50.57%。这种新型的高性能和高效的dram内计算(HIE-DRAM)实现是朝着利用实时内存矢量数据处理自主应用迈出的一步。
{"title":"HIE-DRAM: High Performance Efficient In-DRAM Computing Architecture for SIMD","authors":"Mayank Kabra, C. PrashanthH., Kedar Deshpande, M. Rao","doi":"10.1109/ISQED57927.2023.10129370","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129370","url":null,"abstract":"In-memory and near-memory computing allows for placing the processing elements around the periphery or inside the memory blocks. Performing the computation as soon as the data is made available in the memory sub-blocks avoids the need to wait for the processor to manage the data movement. The paper focuses on a new 11 transistor (11T) computing design and a novel operation with energy savings and performance improvement when compared to the current state-of-the-art (SOTA) available single-instruction- multiple-data in-DRAM (SIMDRAM) computing. The novel 11T pass transistor design is structured to offer logical AND, OR, XNOR and its complement operations. These are sequenced to generate desired operational output with a minuscule change of 4 row circuitry that corresponds to footprint expense of 0.05% when compared to the existing DRAM architecture. Based on these logical operations, 13 scalar instructions covering arithmetic, predication, reduction, and relational function types are characterized. These scalar operations is a mix of logarithmic, quadratic, and linear functions applied on either a single or multiple operand. With respect to single-instruction- multiple-data (SIMD) topology, vector operations comprising addition, multiplication, sparse multiplication, selection, unique, reduction, and prefix summation are also realized. All these operations were compared with the current SOTA SIMDRAM architectural design to showcase profound computing time benefits and energy savings. The proposed 11T in-DRAM-compute design offers 5.18% to 50.57% improvement in computing latency and energy across 10 scalar operations, over SIMDRAM architecture. The novel high performance and efficient in-DRAM computing (HIE-DRAM) implementation is a step towards utilizing real-time in-memory vector data processing for autonomous applications.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115502419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Control Loop Execution of Cyber-Physical Devices Using Predictive State Space Checks 使用预测状态空间检查的网络物理设备的安全控制环路执行
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129293
Kwondo Ma, C. Amarnath, A. Chatterjee, Jacob A. Abraham
There has been increased interest in detection of adversarial security attacks on control functions of autonomous systems. In this research, we propose the use of low-cost state space checks for detection of security attacks on sensors, actuators and control software of autonomous systems. These attacks are assumed to be initiated by intrusions, malware, or embedded hardware Trojans. Checks consist of predicting sensor (actuator) values from prior values of actuators (sensors) and external control inputs. The associated nonlinear predictors are learned in real time using Gaussian Process regressors (GPs). Recovery from sensor and actuator attacks is performed by sensor-actuator data restoration. Recovery from control software attacks is performed by reverting to a lightweight linearized controller that prevents short-term catastrophic system malfunction. Experimental results on a brake-by-wire, steer-by-wire system, and a traveling robot (hardware) prove the viability of the proposed approach.
人们对检测对自主系统控制功能的对抗性安全攻击越来越感兴趣。在这项研究中,我们提出使用低成本的状态空间检查来检测对自主系统的传感器、执行器和控制软件的安全攻击。这些攻击被认为是由入侵、恶意软件或嵌入式硬件木马发起的。检查包括从执行器(传感器)的先验值和外部控制输入预测传感器(执行器)的值。使用高斯过程回归器(GPs)实时学习相关的非线性预测量。从传感器和执行器攻击中恢复是通过传感器-执行器数据恢复来实现的。从控制软件攻击中恢复是通过恢复到轻量级线性化控制器来执行的,以防止短期灾难性系统故障。在线控制动、线控转向系统和移动机器人(硬件)上的实验结果证明了该方法的可行性。
{"title":"Secure Control Loop Execution of Cyber-Physical Devices Using Predictive State Space Checks","authors":"Kwondo Ma, C. Amarnath, A. Chatterjee, Jacob A. Abraham","doi":"10.1109/ISQED57927.2023.10129293","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129293","url":null,"abstract":"There has been increased interest in detection of adversarial security attacks on control functions of autonomous systems. In this research, we propose the use of low-cost state space checks for detection of security attacks on sensors, actuators and control software of autonomous systems. These attacks are assumed to be initiated by intrusions, malware, or embedded hardware Trojans. Checks consist of predicting sensor (actuator) values from prior values of actuators (sensors) and external control inputs. The associated nonlinear predictors are learned in real time using Gaussian Process regressors (GPs). Recovery from sensor and actuator attacks is performed by sensor-actuator data restoration. Recovery from control software attacks is performed by reverting to a lightweight linearized controller that prevents short-term catastrophic system malfunction. Experimental results on a brake-by-wire, steer-by-wire system, and a traveling robot (hardware) prove the viability of the proposed approach.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125331203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DK Lock: Dual Key Logic Locking Against Oracle-Guided Attacks DK锁:针对神谕引导攻击的双密钥逻辑锁
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129368
Jordan Maynard, Amin Rezaei
The semiconductor industry must deal with different hardware threats like piracy and overproduction as a result of outsourcing manufacturing. While there are many proposals to lock the circuit using a global protected key only known to the designer, there exist numerous oracle-guided attacks that can examine the locked netlist with the assistance of an activated IC and extract the correct key. In this paper, by adopting a low-overhead structural method, we propose DK Lock, a novel Dual Key locking method that securely protects sequential circuits with two different keys that are applied to one set of key inputs at different times. DK Lock structurally adds an activation phase to the sequential circuit, and a correct key must be applied for several cycles to exit this phase. Once the circuit has been successfully activated, a new functional key must be applied to the same set of inputs to resume normal operation. DK Lock opens up new avenues for hardware IP protection by simultaneously refuting the single static key assumption of the existing attacks and overcoming the state explosion problem of state-of-the-art sequential logic locking methods. Our experiments confirm that DK Lock maintains a high degree of security with reasonable power and area overheads.
半导体行业必须应对不同的硬件威胁,比如盗版和外包制造造成的生产过剩。虽然有许多建议使用只有设计者知道的全局保护密钥来锁定电路,但存在许多oracle引导的攻击,可以在激活的IC的帮助下检查锁定的网络列表并提取正确的密钥。本文采用一种低开销的结构方法,提出了一种新的双密钥锁定方法DK Lock,它可以安全地保护具有两个不同密钥的顺序电路,这些密钥在不同的时间应用于一组密钥输入。DK Lock在结构上为顺序电路增加了一个激活阶段,并且必须在几个周期内应用正确的密钥才能退出该阶段。一旦电路被成功激活,一个新的功能键必须应用到同一组输入,以恢复正常的操作。DK Lock通过同时反驳现有攻击的单一静态密钥假设和克服最先进的顺序逻辑锁定方法的状态爆炸问题,为硬件IP保护开辟了新的途径。我们的实验证实,DK锁在合理的功率和面积开销下保持了高度的安全性。
{"title":"DK Lock: Dual Key Logic Locking Against Oracle-Guided Attacks","authors":"Jordan Maynard, Amin Rezaei","doi":"10.1109/ISQED57927.2023.10129368","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129368","url":null,"abstract":"The semiconductor industry must deal with different hardware threats like piracy and overproduction as a result of outsourcing manufacturing. While there are many proposals to lock the circuit using a global protected key only known to the designer, there exist numerous oracle-guided attacks that can examine the locked netlist with the assistance of an activated IC and extract the correct key. In this paper, by adopting a low-overhead structural method, we propose DK Lock, a novel Dual Key locking method that securely protects sequential circuits with two different keys that are applied to one set of key inputs at different times. DK Lock structurally adds an activation phase to the sequential circuit, and a correct key must be applied for several cycles to exit this phase. Once the circuit has been successfully activated, a new functional key must be applied to the same set of inputs to resume normal operation. DK Lock opens up new avenues for hardware IP protection by simultaneously refuting the single static key assumption of the existing attacks and overcoming the state explosion problem of state-of-the-art sequential logic locking methods. Our experiments confirm that DK Lock maintains a high degree of security with reasonable power and area overheads.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125874097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Machine Learning Techniques for Time Domain Waveform Prediction in Analog and Mixed Signal Integrated Circuit Verification 模拟和混合信号集成电路验证中时域波形预测的机器学习技术分析
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129327
Dhanasekar V, Vinodhini Gunasekaran, Anusha Challa, Bama Srinivasan, J. D. Devi, Selvi Ravindran, R. Parthasarathi, P. Ramakrishna, Gopika Geetha Kumar, Venkateswaran Padmanabhan, G. Lakshmanan, Lakshmanan Balasubramanian
Pre-silicon analog and mixed signal (AMS) design verification involves exorbitant computing and manual effort and time to verify the design against the specification of an IC. This paper proposes a Machine Learning (ML) based behavioural model to predict the output response of AMS circuits that can be used in the automated verification process including automation of waveform review sign-off, and fast simulation models. The ML based behaviour model is constructed using the time domain features. To address both linear and non-linear behaviours of the circuit, this paper proposes a framework with statistical processing, waveform segmentation and circuit partitioning approaches as a divide and conquer strategy to identify the appropriate suite of ML algorithms. The best performing ML models in each segment are concatenated to stitch the complete response. We also propose SNR as a metric to evaluate the prediction accuracy. An Operational Amplifier (OpAmp) benchmark circuit has been used as a proof of concept to demonstrate this approach. An average SNR of 32 dB has been obtained in the prediction of the output waveform.
预硅模拟和混合信号(AMS)设计验证涉及过高的计算和人工努力和时间,以根据IC规格验证设计。本文提出了一种基于机器学习(ML)的行为模型来预测AMS电路的输出响应,该模型可用于自动化验证过程,包括波形审查签名的自动化和快速仿真模型。利用时域特征构建了基于机器学习的行为模型。为了解决电路的线性和非线性行为,本文提出了一个具有统计处理,波形分割和电路划分方法的框架,作为分而治之的策略,以确定适当的ML算法套装。将每个片段中表现最好的ML模型连接起来,以拼接完整的响应。我们还提出信噪比作为评估预测精度的指标。一个运算放大器(OpAmp)基准电路已被用作概念验证来演示这种方法。在对输出波形的预测中获得了平均32 dB的信噪比。
{"title":"Analysis of Machine Learning Techniques for Time Domain Waveform Prediction in Analog and Mixed Signal Integrated Circuit Verification","authors":"Dhanasekar V, Vinodhini Gunasekaran, Anusha Challa, Bama Srinivasan, J. D. Devi, Selvi Ravindran, R. Parthasarathi, P. Ramakrishna, Gopika Geetha Kumar, Venkateswaran Padmanabhan, G. Lakshmanan, Lakshmanan Balasubramanian","doi":"10.1109/ISQED57927.2023.10129327","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129327","url":null,"abstract":"Pre-silicon analog and mixed signal (AMS) design verification involves exorbitant computing and manual effort and time to verify the design against the specification of an IC. This paper proposes a Machine Learning (ML) based behavioural model to predict the output response of AMS circuits that can be used in the automated verification process including automation of waveform review sign-off, and fast simulation models. The ML based behaviour model is constructed using the time domain features. To address both linear and non-linear behaviours of the circuit, this paper proposes a framework with statistical processing, waveform segmentation and circuit partitioning approaches as a divide and conquer strategy to identify the appropriate suite of ML algorithms. The best performing ML models in each segment are concatenated to stitch the complete response. We also propose SNR as a metric to evaluate the prediction accuracy. An Operational Amplifier (OpAmp) benchmark circuit has been used as a proof of concept to demonstrate this approach. An average SNR of 32 dB has been obtained in the prediction of the output waveform.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121665287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Supervised Topic Modeling Framework for Hardware Weaknesses 针对硬件缺陷的自动监督主题建模框架
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129378
Rakibul Hassan, Charan Bandi, Meng-Tien Tsai, Shahriar Golchin, Sai Manoj P D, S. Rafatirad, Soheil Salehi
The number of publicly known cyber-security vulnerabilities (CVEs) submitted to the National Vulnerability Database (NVD) has increased significantly due to the increasing complexity of modern computing systems. The NVD database is a remarkable source of the latest reported vulnerable information for Cyber-Physical-System. However, it is cumbersome to extract useful information from this large corpus of unstructured data to find meaningful trends over time without the proper tools. Prior works with this purpose have mainly focused on software vulnerabilities and failed to provide a storytelling framework that can extract useful information about the relationship and trends within the CVE and Common Weakness Enumeration (CWE) databases over time. Additionally, hardware attacks on IoT devices are evolving rapidly due to the recent proliferation of computing devices in mobile and IoT domains. In this work, we present a Machine Learning-based framework for vulnerability and its impact vector classification focusing on the hardware vulnerabilities in the IoT domain. Our proposed framework is equipped with an Ontology-driven Storytelling Framework (OSF) and updates the ontology in an automated fashion, aiming to identify similar patterns of vulnerabilities over time. This helps to mitigate the impacts of vulnerabilities or, from another perspective, predicts and prevents future exposures.
由于现代计算系统日益复杂,提交给国家漏洞数据库(NVD)的已知网络安全漏洞(cve)数量显著增加。NVD数据库是网络物理系统最新报告的易受攻击信息的重要来源。然而,如果没有适当的工具,从大量的非结构化数据中提取有用的信息来发现有意义的趋势是很麻烦的。基于此目的的先前工作主要集中在软件漏洞上,并且未能提供一个叙述框架,该框架可以提取有关CVE和Common Weakness Enumeration (CWE)数据库中随时间变化的关系和趋势的有用信息。此外,由于最近移动和物联网领域计算设备的激增,对物联网设备的硬件攻击正在迅速发展。在这项工作中,我们提出了一个基于机器学习的漏洞框架及其影响向量分类,重点关注物联网领域的硬件漏洞。我们提出的框架配备了本体驱动的讲故事框架(OSF),并以自动化的方式更新本体,旨在随着时间的推移识别类似的漏洞模式。这有助于减轻漏洞的影响,或者从另一个角度来看,预测和防止未来的暴露。
{"title":"Automated Supervised Topic Modeling Framework for Hardware Weaknesses","authors":"Rakibul Hassan, Charan Bandi, Meng-Tien Tsai, Shahriar Golchin, Sai Manoj P D, S. Rafatirad, Soheil Salehi","doi":"10.1109/ISQED57927.2023.10129378","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129378","url":null,"abstract":"The number of publicly known cyber-security vulnerabilities (CVEs) submitted to the National Vulnerability Database (NVD) has increased significantly due to the increasing complexity of modern computing systems. The NVD database is a remarkable source of the latest reported vulnerable information for Cyber-Physical-System. However, it is cumbersome to extract useful information from this large corpus of unstructured data to find meaningful trends over time without the proper tools. Prior works with this purpose have mainly focused on software vulnerabilities and failed to provide a storytelling framework that can extract useful information about the relationship and trends within the CVE and Common Weakness Enumeration (CWE) databases over time. Additionally, hardware attacks on IoT devices are evolving rapidly due to the recent proliferation of computing devices in mobile and IoT domains. In this work, we present a Machine Learning-based framework for vulnerability and its impact vector classification focusing on the hardware vulnerabilities in the IoT domain. Our proposed framework is equipped with an Ontology-driven Storytelling Framework (OSF) and updates the ontology in an automated fashion, aiming to identify similar patterns of vulnerabilities over time. This helps to mitigate the impacts of vulnerabilities or, from another perspective, predicts and prevents future exposures.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Scalable Array Design for III-V Compound Semiconductor-based Nonvolatile Memory (UltraRAM) with Separate Read-Write Paths 具有独立读写路径的III-V化合物半导体非易失性存储器(UltraRAM)的新型可扩展阵列设计
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129314
Shamiul Alam, Kazi Asifuzzaman, A. Aziz
The dream of achieving a universal memory that can provide robust non-volatile memory states along with low-energy operation has been the key driving force of memory research. Despite dominating the memory market, conventional charge-based memories cannot satisfy these requirements. However, UltraRAM, an oxide-free charge-based memory cell, aims to achieve both of these requirements. This device achieves non-volatility (with an endurance of over 107 cycles and a retention of over 1000 years) along with switching at low-voltage (±2.3 V) utilizing a triple-barrier resonant tunneling (TBRT) structure made of InAs/AlSb. In this work, we propose an array design for UltraRAM-based memory devices. Our proposed memory array features separate read-write path and eliminates the possibility of accidentally switching the memory states stored in the array. Moreover, our design allows us to read all the cells in a column in one cycle without imposing any limit on the scalability. Besides, since the read operation in our proposed design is independent of the write mechanism, there is flexibility to optimize the read operation for memory and in-memory computing applications.
实现一种通用存储器的梦想,既能提供稳定的非易失性存储器状态,又能实现低能量操作,这一直是存储器研究的关键驱动力。传统的基于电荷的存储器虽然占据着存储器市场的主导地位,但却无法满足这些需求。然而,UltraRAM是一种无氧化物充电存储电池,旨在满足这两个要求。该器件利用InAs/AlSb制成的三势垒谐振隧道(TBRT)结构实现了低电压(±2.3 V)切换的非挥发性(超过107次循环的续航时间和超过1000年的保留时间)。在这项工作中,我们提出了一种基于ultram的存储器件的阵列设计。我们提出的内存数组具有独立的读写路径,并消除了意外切换存储在数组中的内存状态的可能性。此外,我们的设计允许我们在一个周期内读取列中的所有单元格,而不会对可伸缩性施加任何限制。此外,由于我们提出的设计中的读操作独立于写机制,因此可以灵活地优化内存和内存计算应用程序的读操作。
{"title":"A Novel Scalable Array Design for III-V Compound Semiconductor-based Nonvolatile Memory (UltraRAM) with Separate Read-Write Paths","authors":"Shamiul Alam, Kazi Asifuzzaman, A. Aziz","doi":"10.1109/ISQED57927.2023.10129314","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129314","url":null,"abstract":"The dream of achieving a universal memory that can provide robust non-volatile memory states along with low-energy operation has been the key driving force of memory research. Despite dominating the memory market, conventional charge-based memories cannot satisfy these requirements. However, UltraRAM, an oxide-free charge-based memory cell, aims to achieve both of these requirements. This device achieves non-volatility (with an endurance of over 107 cycles and a retention of over 1000 years) along with switching at low-voltage (±2.3 V) utilizing a triple-barrier resonant tunneling (TBRT) structure made of InAs/AlSb. In this work, we propose an array design for UltraRAM-based memory devices. Our proposed memory array features separate read-write path and eliminates the possibility of accidentally switching the memory states stored in the array. Moreover, our design allows us to read all the cells in a column in one cycle without imposing any limit on the scalability. Besides, since the read operation in our proposed design is independent of the write mechanism, there is flexibility to optimize the read operation for memory and in-memory computing applications.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131378887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 24th International Symposium on Quality Electronic Design (ISQED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1