首页 > 最新文献

2023 24th International Symposium on Quality Electronic Design (ISQED)最新文献

英文 中文
Decomposable Architecture and Fault Mitigation Methodology for Deep Learning Accelerators
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129283
N. Huang, Min-Syue Yang, Ya-Chu Chang, Kai-Chiang Wu
As the demand for data analysis increases rapidly, artificial intelligence (AI) models have been developed for various applications. Many deep neural networks are presented with millions or billions of parameters and operations for AI computation. Therefore, many AI accelerators apply pipelined architectures with simple but dense computational elements for numerous operations. However, manufacturing-induced faults cause a challenge to computational robustness or yield degradation on those AI accelerators. In this paper, we propose a fault mitigation methodology based on decomposable systolic arrays. By leveraging the inherent error resilience of AI applications, our data arrangement can reduce the difference between accurate results and faulty results. Additionally, utilizing both our proposed data arrangement and sign compensation can further mitigate the influence of faults in AI accelerators. In the experiments, our proposed fault mitigation methodology can maintain the application accuracy at a certain level, which outperforms state-of-the-art methods. When 0.1% of multiplier-accumulators are faulty in a systolic array, the array with our proposed fault mitigation methodology can have less than 0.5% accuracy loss while executing ResNet-18 for ImageNet classification.
随着数据分析需求的快速增长,人工智能(AI)模型已被开发用于各种应用。许多深度神经网络为人工智能计算提供了数百万或数十亿个参数和操作。因此,许多人工智能加速器采用流水线架构,具有简单但密集的计算元素,用于大量操作。然而,制造引起的故障会对这些人工智能加速器的计算鲁棒性或良率下降造成挑战。在本文中,我们提出了一种基于可分解收缩阵列的故障缓解方法。通过利用人工智能应用程序固有的错误恢复能力,我们的数据安排可以减少准确结果和错误结果之间的差异。此外,利用我们提出的数据排列和符号补偿可以进一步减轻人工智能加速器故障的影响。在实验中,我们提出的故障缓解方法可以将应用精度保持在一定水平,优于现有的方法。当收缩阵列中有0.1%的乘法器-累加器出现故障时,采用我们提出的故障缓解方法的阵列在执行ResNet-18进行ImageNet分类时的精度损失小于0.5%。
{"title":"Decomposable Architecture and Fault Mitigation Methodology for Deep Learning Accelerators","authors":"N. Huang, Min-Syue Yang, Ya-Chu Chang, Kai-Chiang Wu","doi":"10.1109/ISQED57927.2023.10129283","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129283","url":null,"abstract":"As the demand for data analysis increases rapidly, artificial intelligence (AI) models have been developed for various applications. Many deep neural networks are presented with millions or billions of parameters and operations for AI computation. Therefore, many AI accelerators apply pipelined architectures with simple but dense computational elements for numerous operations. However, manufacturing-induced faults cause a challenge to computational robustness or yield degradation on those AI accelerators. In this paper, we propose a fault mitigation methodology based on decomposable systolic arrays. By leveraging the inherent error resilience of AI applications, our data arrangement can reduce the difference between accurate results and faulty results. Additionally, utilizing both our proposed data arrangement and sign compensation can further mitigate the influence of faults in AI accelerators. In the experiments, our proposed fault mitigation methodology can maintain the application accuracy at a certain level, which outperforms state-of-the-art methods. When 0.1% of multiplier-accumulators are faulty in a systolic array, the array with our proposed fault mitigation methodology can have less than 0.5% accuracy loss while executing ResNet-18 for ImageNet classification.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automating Hardware Trojan Detection Using Unsupervised Learning: A Case Study of FPGA 基于无监督学习的硬件木马自动检测:以FPGA为例
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129335
Shailesh Rajput, Jaya Dofe, Wafi Danesh
Field programmable gate arrays (FPGAs) are widely used in critical applications such as industrial, medical, automotive, and military systems due to their ability to be dynamically reconfigured at runtime. However, this reconfigurability also presents security concerns, as FPGA designs are encoded in a bitstream that adversaries can target for design cloning, IP theft, or hardware Trojan insertion. This work presents a proof-of-concept for detecting hardware Trojans (HT) in FPGA using an unsupervised machine-learning method that eliminates the need for reference models of HT. The proposed method is based on transforming the configuration bitstream into an encoded vector, bypassing the need for netlist reconstruction and allowing for HT detection based solely on the extracted FPGA layout information. Our method was evaluated against various HT attack scenarios and accurately detected all infected bitstreams.
现场可编程门阵列(fpga)广泛应用于工业、医疗、汽车和军事系统等关键应用,因为它们能够在运行时动态重新配置。然而,这种可重构性也带来了安全问题,因为FPGA设计是用比特流编码的,攻击者可以针对比特流进行设计克隆、IP窃取或硬件木马插入。这项工作提出了一种使用无监督机器学习方法检测FPGA中的硬件木马(HT)的概念验证,该方法消除了对HT参考模型的需要。所提出的方法是基于将配置比特流转换为编码矢量,绕过网表重构的需要,并允许仅基于提取的FPGA布局信息进行HT检测。我们的方法针对各种HT攻击场景进行了评估,并准确检测到所有受感染的比特流。
{"title":"Automating Hardware Trojan Detection Using Unsupervised Learning: A Case Study of FPGA","authors":"Shailesh Rajput, Jaya Dofe, Wafi Danesh","doi":"10.1109/ISQED57927.2023.10129335","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129335","url":null,"abstract":"Field programmable gate arrays (FPGAs) are widely used in critical applications such as industrial, medical, automotive, and military systems due to their ability to be dynamically reconfigured at runtime. However, this reconfigurability also presents security concerns, as FPGA designs are encoded in a bitstream that adversaries can target for design cloning, IP theft, or hardware Trojan insertion. This work presents a proof-of-concept for detecting hardware Trojans (HT) in FPGA using an unsupervised machine-learning method that eliminates the need for reference models of HT. The proposed method is based on transforming the configuration bitstream into an encoded vector, bypassing the need for netlist reconstruction and allowing for HT detection based solely on the extracted FPGA layout information. Our method was evaluated against various HT attack scenarios and accurately detected all infected bitstreams.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedded Tutorials 嵌入式教程
Pub Date : 2023-04-05 DOI: 10.1109/soccon.2009.5397997
{"title":"Embedded Tutorials","authors":"","doi":"10.1109/soccon.2009.5397997","DOIUrl":"https://doi.org/10.1109/soccon.2009.5397997","url":null,"abstract":"","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133346812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Decryption Architecture for Classic McEliece 经典mcelece的高效解密体系结构
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129325
Xinyuan Qiao, Suwen Song, Jing Tian, Zhongfeng Wang
As one of the candidates evaluated in the process of the National Institute of Standards and Technology (NIST) post-quantum cryptography standardization, the Classic McEliece, is being widely studied for its strong security. In existing decryption architectures, the Goppa decoder is logic resource intensive, and the fast Fourier transform (FFT) unit limits its achievable frequency. In this paper, a novel folded Goppa decoder based on enhanced parallel inversionless Berlekamp-Massey (ePiBM) algorithm is proposed for complexity reduction, and a two-dimensional optimization is adopted to eliminate the frequency bottleneck caused by the FFT unit. In addition, for the finite field inversion, which is a commonly used operation in decryption, an even power-based computation scheme is presented to reduce the cost of logic resources. Based on these optimizations, a complete decryption architecture is finally developed and implemented on the Altera Stratix V FPGA. Experimental results show that the proposed decryption processor can reduce up to 37.6% of logic resources and save the Time×Logic by up to 56.9% over the prior art.
作为美国国家标准与技术研究院(NIST)后量子加密标准化过程中评估的候选方案之一,经典McEliece因其强大的安全性而受到广泛研究。在现有的解密体系结构中,Goppa解码器是逻辑资源密集型的,并且快速傅里叶变换(FFT)单元限制了其可实现的频率。本文提出了一种基于增强并行无反转Berlekamp-Massey (ePiBM)算法的新型折叠Goppa解码器来降低复杂度,并采用二维优化来消除FFT单元带来的频率瓶颈。此外,针对解密中常用的有限域反演操作,提出了一种基于偶幂的计算方案,以减少逻辑资源的消耗。基于这些优化,最后开发了一个完整的解密架构,并在Altera Stratix V FPGA上实现。实验结果表明,与现有技术相比,所提出的解密处理器可减少高达37.6%的逻辑资源,节省高达56.9%的Time×Logic。
{"title":"Efficient Decryption Architecture for Classic McEliece","authors":"Xinyuan Qiao, Suwen Song, Jing Tian, Zhongfeng Wang","doi":"10.1109/ISQED57927.2023.10129325","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129325","url":null,"abstract":"As one of the candidates evaluated in the process of the National Institute of Standards and Technology (NIST) post-quantum cryptography standardization, the Classic McEliece, is being widely studied for its strong security. In existing decryption architectures, the Goppa decoder is logic resource intensive, and the fast Fourier transform (FFT) unit limits its achievable frequency. In this paper, a novel folded Goppa decoder based on enhanced parallel inversionless Berlekamp-Massey (ePiBM) algorithm is proposed for complexity reduction, and a two-dimensional optimization is adopted to eliminate the frequency bottleneck caused by the FFT unit. In addition, for the finite field inversion, which is a commonly used operation in decryption, an even power-based computation scheme is presented to reduce the cost of logic resources. Based on these optimizations, a complete decryption architecture is finally developed and implemented on the Altera Stratix V FPGA. Experimental results show that the proposed decryption processor can reduce up to 37.6% of logic resources and save the Time×Logic by up to 56.9% over the prior art.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132538577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accounting for Floorplan Irregularity and Configuration Dependence in FPGA Routing Delay Models FPGA路由延迟模型中的平面图不规则性和组态依赖性
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129290
Gabriel Barajas, J. Greene, Fei Li, James Tandon
Accurate delay estimates for a user application implemented in a Field-Programmable Gate Array (FPGA) are essential for a quality FPGA timing flow and to avoid leaving performance on the table. FPGA inter-cluster routing consists of wire segments of a limited number of types which repeat in a somewhat regular pattern, interconnected by configurable muxes. The delay at any fanout of a segment can be significantly impacted by configuration-dependent capacitive loading related to other fanouts. Also, the insertion of RAM and math blocks into the FPGA floorplan introduces irregular stretching of the wire segments, altering their delays. We explain why and how commercial FPGA software typically employs a parameterized model for the delay at each fanout of a segment, based on the configuration and the irregularities present, with the parameters determined by fitting SPICE simulation data for a representative sample of cases. We propose incorporating readily-computed common path resistance values into the model. This enables high accuracy with fewer parameters and without the large amounts of SPICE data that would otherwise be required to explore interactions between floorplan irregularities and the set of active fanouts. In combination with other features of our models, errors in segment delay are reduced by almost half.
在现场可编程门阵列(FPGA)中实现的用户应用程序的准确延迟估计对于高质量的FPGA时序流和避免将性能留在表中至关重要。FPGA集群间路由由有限类型的线段组成,这些线段以某种规则的模式重复,通过可配置的互斥器相互连接。一个扇形段的任何扇出的延迟都可能受到与其他扇出相关的配置相关的容性负载的显著影响。此外,将RAM和数学块插入FPGA平面图会引入线段的不规则拉伸,从而改变其延迟。我们解释了商业FPGA软件通常基于配置和存在的不规则性,为什么以及如何使用参数化模型来计算段的每个扇出的延迟,并通过拟合具有代表性的案例样本的SPICE模拟数据确定参数。我们建议在模型中加入易于计算的共路电阻值。这可以用更少的参数实现高精度,并且不需要大量的SPICE数据,否则需要探索平面图不规则性和活动扇出集之间的相互作用。结合我们的模型的其他特征,段延迟的误差几乎减少了一半。
{"title":"Accounting for Floorplan Irregularity and Configuration Dependence in FPGA Routing Delay Models","authors":"Gabriel Barajas, J. Greene, Fei Li, James Tandon","doi":"10.1109/ISQED57927.2023.10129290","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129290","url":null,"abstract":"Accurate delay estimates for a user application implemented in a Field-Programmable Gate Array (FPGA) are essential for a quality FPGA timing flow and to avoid leaving performance on the table. FPGA inter-cluster routing consists of wire segments of a limited number of types which repeat in a somewhat regular pattern, interconnected by configurable muxes. The delay at any fanout of a segment can be significantly impacted by configuration-dependent capacitive loading related to other fanouts. Also, the insertion of RAM and math blocks into the FPGA floorplan introduces irregular stretching of the wire segments, altering their delays. We explain why and how commercial FPGA software typically employs a parameterized model for the delay at each fanout of a segment, based on the configuration and the irregularities present, with the parameters determined by fitting SPICE simulation data for a representative sample of cases. We propose incorporating readily-computed common path resistance values into the model. This enables high accuracy with fewer parameters and without the large amounts of SPICE data that would otherwise be required to explore interactions between floorplan irregularities and the set of active fanouts. In combination with other features of our models, errors in segment delay are reduced by almost half.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114878584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices 对连续混沌通信的攻击与资源有限设备的补救
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129355
Rahul Vishwakarma, Ravi Monani, Amin Rezaei, H. Sayadi, Mehrdad Aliasgari, A. Hedayatipour
The Global Wearable market is anticipated to rise at a considerable rate in the next coming years and communication is a fundamental block in any wearable device. In communication, encryption methods are being used with the aid of microcontrollers or software implementations, which are power-consuming and incorporate complex hardware implementation. Internet of Things (IoT) devices are considered as resource-constrained devices that are expected to operate with low computational power and resource utilization criteria. At the same time, recent research has shown that IoT devices are highly vulnerable to emerging security threats, which elevates the need for low-power and small-size hardware-based security countermeasures. Chaotic encryption is a method of data encryption that utilizes chaotic systems and non-linear dynamics to generate secure encryption keys. It aims to provide high-level security by creating encryption keys that are sensitive to initial conditions and difficult to predict, making it challenging for unauthorized parties to intercept and decode encrypted data. Since the discovery of chaotic equations, there have been various encryption applications associated with them. In this paper, we comprehensively analyze the physical and encryption attacks on continuous chaotic systems in resource-constrained devices and their potential remedies. To this aim, we introduce different categories of attacks of chaotic encryption. Our experiments focus on chaotic equations implemented using Chua’s equation and leverages circuit architectures and provide simulations proof of remedies for different attacks. These remedies are provided to block the attackers from stealing users’ information (e.g., a pulse message) with negligible cost to the power and area of the design.
全球可穿戴市场预计将在未来几年以相当高的速度增长,通信是任何可穿戴设备的基本组成部分。在通信中,加密方法是在微控制器或软件实现的帮助下使用的,这是耗电的,并且包含复杂的硬件实现。物联网(IoT)设备被认为是资源受限的设备,期望以较低的计算能力和资源利用标准运行。与此同时,最近的研究表明,物联网设备极易受到新出现的安全威胁,这就需要基于低功耗和小尺寸硬件的安全对策。混沌加密是一种利用混沌系统和非线性动力学来生成安全加密密钥的数据加密方法。它旨在通过创建对初始条件敏感且难以预测的加密密钥来提供高级安全性,从而使未经授权的各方难以拦截和解码加密数据。自从混沌方程被发现以来,已经有了各种与之相关的加密应用。本文全面分析了资源受限设备中连续混沌系统的物理攻击和加密攻击及其可能的补救措施。为此,我们介绍了不同类型的混沌加密攻击。我们的实验专注于使用蔡氏方程实现的混沌方程,并利用电路架构,并提供针对不同攻击的补救措施的模拟证明。提供这些补救措施是为了阻止攻击者窃取用户信息(例如,脉冲消息),而对设计的功率和面积的成本可以忽略不计。
{"title":"Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices","authors":"Rahul Vishwakarma, Ravi Monani, Amin Rezaei, H. Sayadi, Mehrdad Aliasgari, A. Hedayatipour","doi":"10.1109/ISQED57927.2023.10129355","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129355","url":null,"abstract":"The Global Wearable market is anticipated to rise at a considerable rate in the next coming years and communication is a fundamental block in any wearable device. In communication, encryption methods are being used with the aid of microcontrollers or software implementations, which are power-consuming and incorporate complex hardware implementation. Internet of Things (IoT) devices are considered as resource-constrained devices that are expected to operate with low computational power and resource utilization criteria. At the same time, recent research has shown that IoT devices are highly vulnerable to emerging security threats, which elevates the need for low-power and small-size hardware-based security countermeasures. Chaotic encryption is a method of data encryption that utilizes chaotic systems and non-linear dynamics to generate secure encryption keys. It aims to provide high-level security by creating encryption keys that are sensitive to initial conditions and difficult to predict, making it challenging for unauthorized parties to intercept and decode encrypted data. Since the discovery of chaotic equations, there have been various encryption applications associated with them. In this paper, we comprehensively analyze the physical and encryption attacks on continuous chaotic systems in resource-constrained devices and their potential remedies. To this aim, we introduce different categories of attacks of chaotic encryption. Our experiments focus on chaotic equations implemented using Chua’s equation and leverages circuit architectures and provide simulations proof of remedies for different attacks. These remedies are provided to block the attackers from stealing users’ information (e.g., a pulse message) with negligible cost to the power and area of the design.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neural Network Partitioning for Fast Distributed Inference 快速分布式推理的神经网络分区
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129343
Robert C. Viramontes, A. Davoodi
The rising availability of heterogeneous networked devices highlights new opportunities for distributed artificial intelligence. This work proposes an Integer Linear Programming (ILP) optimization scheme to assign layers of a neural network in a distributed setting with heterogeneous devices representing edge, hub, and cloud in order to minimize the overall inference latency. The ILP formulation captures the tradeoff between avoiding communication cost when executing consecutive layers on the same device versus the latency benefit due to weight pre-loading when an idle device is waiting to receive the results of an earlier layer across the network. In our experiments we show the layer assignment and inference latency of a neural network can significantly vary depending on the types of devices in the network and their communications bandwidths.
异构网络设备的日益普及凸显了分布式人工智能的新机遇。这项工作提出了一个整数线性规划(ILP)优化方案,用于在分布式设置中分配神经网络的层,其中异构设备代表边缘,集线器和云,以最小化总体推理延迟。ILP公式在避免在同一设备上执行连续层时的通信成本与在空闲设备等待通过网络接收较早层的结果时由于权重预加载而带来的延迟优势之间进行了权衡。在我们的实验中,我们表明神经网络的层分配和推理延迟可以根据网络中设备的类型及其通信带宽而显着变化。
{"title":"Neural Network Partitioning for Fast Distributed Inference","authors":"Robert C. Viramontes, A. Davoodi","doi":"10.1109/ISQED57927.2023.10129343","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129343","url":null,"abstract":"The rising availability of heterogeneous networked devices highlights new opportunities for distributed artificial intelligence. This work proposes an Integer Linear Programming (ILP) optimization scheme to assign layers of a neural network in a distributed setting with heterogeneous devices representing edge, hub, and cloud in order to minimize the overall inference latency. The ILP formulation captures the tradeoff between avoiding communication cost when executing consecutive layers on the same device versus the latency benefit due to weight pre-loading when an idle device is waiting to receive the results of an earlier layer across the network. In our experiments we show the layer assignment and inference latency of a neural network can significantly vary depending on the types of devices in the network and their communications bandwidths.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133872006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A SPICE-based Framework to Emulate Quantum Circuits with classical LC Resonators 基于spice的经典LC谐振器量子电路仿真框架
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129351
Md. Mazharul Islam, M. S. Hossain, A. Aziz
A circuit system consisting of LC-oscillators is mathematically shown to emulate quantum circuits. Here we develop a SPICE-based framework for emulating universal quantum gates (the phase-shift, the Hadamard, and the CNOT gates). To reconstruct each gate behavior, the inductors and capacitors are chosen and tuned precisely. Each quantum state is perfectly described by the phase and amplitude of each oscillator. In principle, our framework can simulate a quantum system with any arbitrary number of qubits since each gate process is perfectly achieved. Finally, we have simulated a quantum circuit with 3 qubits as input that consists of all the universal quantum gates. Our simulation result shows that our framework can classically emulate the result of any quantum circuit with an arbitrary number of qubits and quantum logic components.
一个由lc振荡器组成的电路系统在数学上被证明可以模拟量子电路。在这里,我们开发了一个基于spice的框架来模拟通用量子门(相移、Hadamard和CNOT门)。为了重建每个栅极的行为,电感和电容被精确地选择和调谐。每个量子态都由每个振荡器的相位和振幅完美地描述。原则上,我们的框架可以模拟具有任意数量量子比特的量子系统,因为每个门过程都是完美实现的。最后,我们模拟了一个由所有通用量子门组成的3个量子比特作为输入的量子电路。我们的仿真结果表明,我们的框架可以经典地模拟具有任意数量量子比特和量子逻辑组件的任何量子电路的结果。
{"title":"A SPICE-based Framework to Emulate Quantum Circuits with classical LC Resonators","authors":"Md. Mazharul Islam, M. S. Hossain, A. Aziz","doi":"10.1109/ISQED57927.2023.10129351","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129351","url":null,"abstract":"A circuit system consisting of LC-oscillators is mathematically shown to emulate quantum circuits. Here we develop a SPICE-based framework for emulating universal quantum gates (the phase-shift, the Hadamard, and the CNOT gates). To reconstruct each gate behavior, the inductors and capacitors are chosen and tuned precisely. Each quantum state is perfectly described by the phase and amplitude of each oscillator. In principle, our framework can simulate a quantum system with any arbitrary number of qubits since each gate process is perfectly achieved. Finally, we have simulated a quantum circuit with 3 qubits as input that consists of all the universal quantum gates. Our simulation result shows that our framework can classically emulate the result of any quantum circuit with an arbitrary number of qubits and quantum logic components.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123780652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unraveling Latch Locking Using Machine Learning, Boolean Analysis, and ILP 使用机器学习,布尔分析和ILP解开闩锁
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129346
Dake Chen, Xuan Zhou, Yinghua Hu, Yuke Zhang, Kaixin Yang, A. Rittenbach, P. Nuzzo, P. Beerel
Logic locking has become a promising approach to provide hardware security in the face of a possibly insecure fabrication supply chain. While many techniques have focused on locking combinational logic (CL), an alternative latch-locking approach in which the sequential elements are locked has also gained significant attention. Latch (LAT) locking duplicates a subset of the flip-flops (FF) of a design, retimes these FFs and replaces them with latches, and adds two types of decoy latches to obfuscate the netlist. It then adds control circuitry (CC) such that all latches must be correctly keyed for the circuit to function correctly. This paper presents a two-phase attack on latch-locked circuits that uses a novel combination of deep learning, Boolean analysis, and integer linear programming (ILP). The attack requires access to the reverse-engineered netlist but, unlike SAT attacks, is oracle-less, not needing access to the unlocked circuit or correct input/output pairs. We trained and evaluated the attack using the ISCAS’89 and ITC’99 benchmark circuits. The attack successfully identifies a key that is, on average, 96.9% accurate and fully discloses the correct functionality in 8 of the tested 19 circuits and leads to low function corruptibility (less than 4%) in 3 additional circuits. The attack run-times are manageable.
面对可能不安全的制造供应链,逻辑锁定已经成为提供硬件安全的一种很有前途的方法。虽然许多技术都专注于锁定组合逻辑(CL),但另一种锁存锁定方法(其中锁定顺序元素)也得到了极大的关注。锁存器(LAT)锁定复制设计触发器(FF)的一个子集,对这些FF进行计时并用锁存器替换它们,并添加两种类型的诱饵锁存器来混淆网表。然后,它增加了控制电路(CC),以便所有锁存器必须正确地键合,以使电路正常工作。本文提出了一种针对锁存锁电路的两阶段攻击,该攻击使用了深度学习、布尔分析和整数线性规划(ILP)的新颖组合。这种攻击需要访问反向工程的网络列表,但与SAT攻击不同的是,它不需要访问未解锁的电路或正确的输入/输出对。我们使用ISCAS ' 89和ITC ' 99基准电路对攻击进行了训练和评估。攻击成功地识别了一个密钥,平均准确率为96.9%,并在测试的19个电路中的8个中完全揭示了正确的功能,并在另外3个电路中导致低功能腐败(低于4%)。攻击运行时是可管理的。
{"title":"Unraveling Latch Locking Using Machine Learning, Boolean Analysis, and ILP","authors":"Dake Chen, Xuan Zhou, Yinghua Hu, Yuke Zhang, Kaixin Yang, A. Rittenbach, P. Nuzzo, P. Beerel","doi":"10.1109/ISQED57927.2023.10129346","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129346","url":null,"abstract":"Logic locking has become a promising approach to provide hardware security in the face of a possibly insecure fabrication supply chain. While many techniques have focused on locking combinational logic (CL), an alternative latch-locking approach in which the sequential elements are locked has also gained significant attention. Latch (LAT) locking duplicates a subset of the flip-flops (FF) of a design, retimes these FFs and replaces them with latches, and adds two types of decoy latches to obfuscate the netlist. It then adds control circuitry (CC) such that all latches must be correctly keyed for the circuit to function correctly. This paper presents a two-phase attack on latch-locked circuits that uses a novel combination of deep learning, Boolean analysis, and integer linear programming (ILP). The attack requires access to the reverse-engineered netlist but, unlike SAT attacks, is oracle-less, not needing access to the unlocked circuit or correct input/output pairs. We trained and evaluated the attack using the ISCAS’89 and ITC’99 benchmark circuits. The attack successfully identifies a key that is, on average, 96.9% accurate and fully discloses the correct functionality in 8 of the tested 19 circuits and leads to low function corruptibility (less than 4%) in 3 additional circuits. The attack run-times are manageable.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123072786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
XOR-CiM: An Efficient Computing-in-SOT-MRAM Design for Binary Neural Network Acceleration XOR-CiM:二进制神经网络加速的高效sot - mram计算设计
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129322
M. Morsali, Ranyang Zhou, Sepehr Tabrizchi, A. Roohi, Shaahin Angizi
In this work, we leverage the uni-polar switching behavior of Spin-Orbit Torque Magnetic Random Access Memory (SOT-MRAM) to develop an efficient digital Computing-in-Memory (CiM) platform named XOR-CiM. XOR-CiM converts typical MRAM sub-arrays to massively parallel computational cores with ultra-high bandwidth, greatly reducing energy consumption dealing with convolutional layers and accelerating X(N)OR-intensive Binary Neural Networks (BNNs) inference. With a similar inference accuracy to digital CiMs, XOR-CiM achieves ∼4.5× and 1.8× higher energy-efficiency and speed-up compared to the recent MRAM-based CiM platforms.
在这项工作中,我们利用自旋轨道扭矩磁随机存取存储器(SOT-MRAM)的单极开关行为来开发一种高效的数字内存中计算(CiM)平台,称为XOR-CiM。XOR-CiM将典型的MRAM子阵列转换为具有超高带宽的大规模并行计算核心,大大降低了处理卷积层的能耗,并加速了X(N) or密集型二进制神经网络(bnn)的推理。XOR-CiM具有与数字CiM相似的推理精度,与最近基于mram的CiM平台相比,XOR-CiM的能效和速度提高了约4.5倍和1.8倍。
{"title":"XOR-CiM: An Efficient Computing-in-SOT-MRAM Design for Binary Neural Network Acceleration","authors":"M. Morsali, Ranyang Zhou, Sepehr Tabrizchi, A. Roohi, Shaahin Angizi","doi":"10.1109/ISQED57927.2023.10129322","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129322","url":null,"abstract":"In this work, we leverage the uni-polar switching behavior of Spin-Orbit Torque Magnetic Random Access Memory (SOT-MRAM) to develop an efficient digital Computing-in-Memory (CiM) platform named XOR-CiM. XOR-CiM converts typical MRAM sub-arrays to massively parallel computational cores with ultra-high bandwidth, greatly reducing energy consumption dealing with convolutional layers and accelerating X(N)OR-intensive Binary Neural Networks (BNNs) inference. With a similar inference accuracy to digital CiMs, XOR-CiM achieves ∼4.5× and 1.8× higher energy-efficiency and speed-up compared to the recent MRAM-based CiM platforms.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 24th International Symposium on Quality Electronic Design (ISQED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1