首页 > 最新文献

2023 24th International Symposium on Quality Electronic Design (ISQED)最新文献

英文 中文
An Effective Cost-Skew Tradeoff Heuristic for VLSI Global Routing VLSI全局路由中一种有效的成本倾斜权衡启发式算法
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129350
A. Kahng, Shreyas Thumathy, M. Woo
In global routing of relatively large nets, particularly clock subnets, obtaining a good cost-skew tradeoff has remained beyond the reach of efficient heuristics. This is in contrast to obtaining a good cost-radius tradeoff, which has been well-addressed by a series of methods. We propose a simple heuristic for optimizing the cost-skew tradeoff, based on a "multi-source" variation of the well-known Prim-Dijkstra (PD) construction [1]. Our experiments demonstrate the effectiveness of the multi-source PD heuristic compared to existing alternatives including H-tree [5], bounded-skew DME [10], and original Prim-Dijkstra constructions. We additionally develop characterization data for PD with respect to instance parameters to aid future research.
在相对较大的网络,特别是时钟子网的全局路由中,获得良好的成本倾斜权衡仍然超出了有效的启发式方法的范围。这与获得良好的成本-半径权衡形成对比,这已经通过一系列方法得到了很好的解决。我们提出了一种简单的启发式方法来优化成本倾斜权衡,基于著名的Prim-Dijkstra (PD)构造的“多源”变体[1]。我们的实验证明了与现有的替代方法(包括H-tree[5]、有界偏DME[10]和原始Prim-Dijkstra结构)相比,多源PD启发式方法的有效性。我们还针对实例参数开发PD的表征数据,以帮助未来的研究。
{"title":"An Effective Cost-Skew Tradeoff Heuristic for VLSI Global Routing","authors":"A. Kahng, Shreyas Thumathy, M. Woo","doi":"10.1109/ISQED57927.2023.10129350","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129350","url":null,"abstract":"In global routing of relatively large nets, particularly clock subnets, obtaining a good cost-skew tradeoff has remained beyond the reach of efficient heuristics. This is in contrast to obtaining a good cost-radius tradeoff, which has been well-addressed by a series of methods. We propose a simple heuristic for optimizing the cost-skew tradeoff, based on a \"multi-source\" variation of the well-known Prim-Dijkstra (PD) construction [1]. Our experiments demonstrate the effectiveness of the multi-source PD heuristic compared to existing alternatives including H-tree [5], bounded-skew DME [10], and original Prim-Dijkstra constructions. We additionally develop characterization data for PD with respect to instance parameters to aid future research.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VAST: Validation of VP-based Heterogeneous Systems against Availability Security Properties using Static Information Flow Tracking 使用静态信息流跟踪验证基于虚拟机的异构系统的可用性安全属性
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129337
Ece Nur Demirhan Coskun, Muhammad Hassan, Mehran Goli, R. Drechsler
Ubiquitousness of modern feature-rich heterogeneous systems has significantly increased their security requirements. One weak point of entry might spread catastrophically over large areas, blocking the accessibility of different Intellectual Properties (IPs), and thereby disabling the system’s functionality. Hence, it becomes vital to consider the trust and security implications during the design phase of these heterogeneous systems and identify possible security breaches due to the system design itself. Recently, various security validation methods have been successfully employed very early in the design phase at the system level using Virtual Prototypes (VPs). These methods have facilitated the investigation of digital systems with a focus on data leakage and untrusted access. However, modern systems are heterogeneous with heavy reliance on sensor inputs. Hence, similar security validation methods should also be considered from the analog/mixed-signal (AMS) perspective using SystemC AMS, to ensure availability security properties.In this paper, we propose VAST, a novel validation tool for VP-based heterogeneous systems against availability security properties. VAST employs static Information Flow Tracking (IFT) at the system-level to ensure the availability, i.e. timely accessibility, of IPs. In this regard, VAST analyzes analog-to-digital, digital-to-analog, as well as digital-to-digital behaviors of the underlying heterogeneous system. We demonstrate the applicability and scalability of the proposed tool on two real-world VPs with different sizes of complexity, a car anti-trap window system, and a thermal house system.
现代特性丰富的异构系统的普遍性大大增加了它们的安全需求。一个薄弱的入口点可能会灾难性地蔓延到大片区域,阻塞不同知识产权(ip)的可访问性,从而禁用系统的功能。因此,在这些异构系统的设计阶段考虑信任和安全含义,并识别由于系统设计本身可能造成的安全漏洞,这一点变得至关重要。最近,各种安全性验证方法已经成功地在系统级的设计阶段的早期使用虚拟原型(VPs)。这些方法促进了对数字系统的调查,重点是数据泄漏和不可信访问。然而,现代系统是异构的,严重依赖传感器输入。因此,还应该使用SystemC AMS从模拟/混合信号(AMS)的角度考虑类似的安全验证方法,以确保可用性安全属性。在本文中,我们提出了一种新的基于虚拟机的异构系统可用性安全属性验证工具VAST。VAST在系统级采用静态信息流跟踪(IFT)来确保ip的可用性,即及时访问ip。在这方面,VAST分析了模拟到数字、数字到模拟以及底层异构系统的数字到数字行为。我们在两个具有不同复杂程度的现实世界vp,一个汽车防陷阱窗系统和一个热屋系统上展示了所提出工具的适用性和可扩展性。
{"title":"VAST: Validation of VP-based Heterogeneous Systems against Availability Security Properties using Static Information Flow Tracking","authors":"Ece Nur Demirhan Coskun, Muhammad Hassan, Mehran Goli, R. Drechsler","doi":"10.1109/ISQED57927.2023.10129337","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129337","url":null,"abstract":"Ubiquitousness of modern feature-rich heterogeneous systems has significantly increased their security requirements. One weak point of entry might spread catastrophically over large areas, blocking the accessibility of different Intellectual Properties (IPs), and thereby disabling the system’s functionality. Hence, it becomes vital to consider the trust and security implications during the design phase of these heterogeneous systems and identify possible security breaches due to the system design itself. Recently, various security validation methods have been successfully employed very early in the design phase at the system level using Virtual Prototypes (VPs). These methods have facilitated the investigation of digital systems with a focus on data leakage and untrusted access. However, modern systems are heterogeneous with heavy reliance on sensor inputs. Hence, similar security validation methods should also be considered from the analog/mixed-signal (AMS) perspective using SystemC AMS, to ensure availability security properties.In this paper, we propose VAST, a novel validation tool for VP-based heterogeneous systems against availability security properties. VAST employs static Information Flow Tracking (IFT) at the system-level to ensure the availability, i.e. timely accessibility, of IPs. In this regard, VAST analyzes analog-to-digital, digital-to-analog, as well as digital-to-digital behaviors of the underlying heterogeneous system. We demonstrate the applicability and scalability of the proposed tool on two real-world VPs with different sizes of complexity, a car anti-trap window system, and a thermal house system.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"385 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121780928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DAGGER: Exploiting Language Semantics for Program Security in Embedded Systems 嵌入式系统中程序安全的语言语义开发
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129334
Garret Cunningham, H. Chenji, D. Juedes, Gordon Stewart, Avinash Karanth
Without the isolation abstractions of operating systems, low-level embedded systems are especially vulnerable to attacks that exploit flaws in either software or hardware to gain control of program behavior. Runtime monitors at the hardware level have shown promise towards by identifying malicious instructions and enforcing programmer-defined policy at runtime. However, the efficiency of monitors comes at the cost of ease of implementation, as policies for ensuring the safe execution of software must be defined at the hardware level. To bridge the abstraction gap, high-level security policy languages have been defined with the ability to be synthesized into hardware monitors, but are limited by semantics that only define policies whose behavior remains static throughout a program’s execution, which limits the practical use case.In this paper, we enable dynamically reconfigurable security policies through a high-level language named DAGGER. Alongside static policies, DAGGER’s semantics support policies that dynamically change behavior in response to expert-defined conditions at runtime. Additionally, we introduce a Verilog compiler to support realizing policies as hardware monitors. DAGGERis developed using the Coq proof assistant, enabling the formal verification of policy correctness and other properties. This approach takes advantage of the abstractions and expressiveness of a higher-level language while minimizing the overhead that comes with other general-purpose approaches implemented purely in hardware, as well as offering the groundwork for a formally verified tool chain.
没有操作系统的隔离抽象,低级嵌入式系统特别容易受到攻击,这些攻击利用软件或硬件中的缺陷来获得对程序行为的控制。硬件级别的运行时监视器已经显示出在运行时识别恶意指令和执行程序员定义的策略方面的前景。但是,监控器的效率是以牺牲易于实现为代价的,因为必须在硬件级别定义确保软件安全执行的策略。为了弥合抽象上的差距,已经定义了高级安全策略语言,使其能够合成到硬件监视器中,但受限于仅定义其行为在整个程序执行过程中保持静态的策略的语义,这限制了实际用例。在本文中,我们通过一种名为DAGGER的高级语言启用动态可重构的安全策略。除了静态策略,DAGGER的语义还支持在运行时根据专家定义的条件动态更改行为的策略。此外,我们还引入了Verilog编译器来支持将策略实现为硬件监视器。DAGGERis是使用Coq证明助手开发的,支持对策略正确性和其他属性进行正式验证。这种方法利用了高级语言的抽象和表达性,同时最大限度地减少了纯粹在硬件上实现的其他通用方法带来的开销,并为正式验证的工具链提供了基础。
{"title":"DAGGER: Exploiting Language Semantics for Program Security in Embedded Systems","authors":"Garret Cunningham, H. Chenji, D. Juedes, Gordon Stewart, Avinash Karanth","doi":"10.1109/ISQED57927.2023.10129334","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129334","url":null,"abstract":"Without the isolation abstractions of operating systems, low-level embedded systems are especially vulnerable to attacks that exploit flaws in either software or hardware to gain control of program behavior. Runtime monitors at the hardware level have shown promise towards by identifying malicious instructions and enforcing programmer-defined policy at runtime. However, the efficiency of monitors comes at the cost of ease of implementation, as policies for ensuring the safe execution of software must be defined at the hardware level. To bridge the abstraction gap, high-level security policy languages have been defined with the ability to be synthesized into hardware monitors, but are limited by semantics that only define policies whose behavior remains static throughout a program’s execution, which limits the practical use case.In this paper, we enable dynamically reconfigurable security policies through a high-level language named DAGGER. Alongside static policies, DAGGER’s semantics support policies that dynamically change behavior in response to expert-defined conditions at runtime. Additionally, we introduce a Verilog compiler to support realizing policies as hardware monitors. DAGGERis developed using the Coq proof assistant, enabling the formal verification of policy correctness and other properties. This approach takes advantage of the abstractions and expressiveness of a higher-level language while minimizing the overhead that comes with other general-purpose approaches implemented purely in hardware, as well as offering the groundwork for a formally verified tool chain.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116339121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DC-Model: A New Method for Assisting the Analog Circuit Optimization 直流模型:一种辅助模拟电路优化的新方法
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129366
Yuan Wang, Jian Xin, Haixu Liu, Qian Qin, Chenkai Chai, Yukai Lu, Jinglei Hao, Jianhao Xiao, Zuochang Ye, Yan Wang
Both in academia and industry, a series of design methodologies based on evolutionary algorithms or machine learning techniques have been proposed to solve the problem of analog device sizing. However, these methods typically need a large number of circuit simulations during the optimization process and these simulations significantly increase the learning and computational costs. To tackle this problem, in this work, we propose DC-Model, a DC simulation-based neural network model that can greatly reduce the whole simulation time while being applied in the field of analog circuit optimization. DC-Model is inspired by the relationship between MOSFET dc operating point output parameters and circuit performances.
在学术界和工业界,已经提出了一系列基于进化算法或机器学习技术的设计方法来解决模拟器件尺寸问题。然而,这些方法在优化过程中通常需要进行大量的电路仿真,这些仿真大大增加了学习和计算成本。为了解决这一问题,本文提出了一种基于直流仿真的神经网络模型DC- model,该模型在模拟电路优化领域的应用可以大大减少整个仿真时间。直流模型的灵感来自于MOSFET直流工作点输出参数与电路性能之间的关系。
{"title":"DC-Model: A New Method for Assisting the Analog Circuit Optimization","authors":"Yuan Wang, Jian Xin, Haixu Liu, Qian Qin, Chenkai Chai, Yukai Lu, Jinglei Hao, Jianhao Xiao, Zuochang Ye, Yan Wang","doi":"10.1109/ISQED57927.2023.10129366","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129366","url":null,"abstract":"Both in academia and industry, a series of design methodologies based on evolutionary algorithms or machine learning techniques have been proposed to solve the problem of analog device sizing. However, these methods typically need a large number of circuit simulations during the optimization process and these simulations significantly increase the learning and computational costs. To tackle this problem, in this work, we propose DC-Model, a DC simulation-based neural network model that can greatly reduce the whole simulation time while being applied in the field of analog circuit optimization. DC-Model is inspired by the relationship between MOSFET dc operating point output parameters and circuit performances.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114468989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Low-overhead PUF-based Secure Scan Design 基于puf的低开销安全扫描设计
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129349
Wei Zhou, Aijiao Cui, Cassi Chen, Gang Qu
Scan-based side-channel attacks have become a severe threat to the security of cryptographic chips and locking mechanisms are one of the most effective methods against these attacks. However, securing the test key that locks the scan but must be shared among test engineers arises as a new challenge. In this paper, we solve this challenge by adopting the physical unclonable function (PUF) design to generate test keys that are unique for each chip. A one-time programming structure (OTPS) is used when the PUF response is first generated to improve its reliability. The security of the PUF response is achieved by obfuscation such that it can be retrieved only when a specific validation test vector presents. We implement the proposed secure scan design by reusing the original scan chain to reduce overhead. We demonstrate that the proposed secure scan design can protect the crypto chips against all existing scan-based side-channel attacks while incurring negligibly low overhead.
基于扫描的侧信道攻击已经成为对加密芯片安全的严重威胁,锁定机制是抵御此类攻击的最有效方法之一。然而,保护锁定扫描的测试密钥,但必须在测试工程师之间共享,这是一个新的挑战。在本文中,我们通过采用物理不可克隆功能(PUF)设计来生成每个芯片唯一的测试密钥来解决这一挑战。为了提高PUF响应的可靠性,在首次生成PUF响应时采用了一次性编程结构(OTPS)。PUF响应的安全性是通过混淆实现的,这样只有在出现特定的验证测试向量时才能检索它。我们通过重用原始扫描链来实现所提出的安全扫描设计,以减少开销。我们证明了所提出的安全扫描设计可以保护加密芯片免受所有现有的基于扫描的侧信道攻击,同时产生可忽略不计的低开销。
{"title":"A Low-overhead PUF-based Secure Scan Design","authors":"Wei Zhou, Aijiao Cui, Cassi Chen, Gang Qu","doi":"10.1109/ISQED57927.2023.10129349","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129349","url":null,"abstract":"Scan-based side-channel attacks have become a severe threat to the security of cryptographic chips and locking mechanisms are one of the most effective methods against these attacks. However, securing the test key that locks the scan but must be shared among test engineers arises as a new challenge. In this paper, we solve this challenge by adopting the physical unclonable function (PUF) design to generate test keys that are unique for each chip. A one-time programming structure (OTPS) is used when the PUF response is first generated to improve its reliability. The security of the PUF response is achieved by obfuscation such that it can be retrieved only when a specific validation test vector presents. We implement the proposed secure scan design by reusing the original scan chain to reduce overhead. We demonstrate that the proposed secure scan design can protect the crypto chips against all existing scan-based side-channel attacks while incurring negligibly low overhead.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128837728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ZOCHEN: Compression Using Zero Chain Elimination and Encoding to Improve Endurance of Non-Volatile Memories 利用零链消除和编码来提高非易失性存储器的持久性
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129315
Nishant Bharti, Arijit Nath, Swati Upadhyay, H. Kapoor
Emerging Non-Volatile memories (NVM) offer immense possibilities to be considered as an alternative to DRAM in the main memory. However, adoption of NVMs in the memory hierarchy faces challenges due to their costly writes and poor write endurance. In this connection, developing policies to improve the endurance of NVMs has paramount importance. This paper presents a low overhead scheme based on compression and encoding to improve the lifetime of PCM-based main memory. We propose a compression technique by removing chains of zero-valued data bits that are prevalent in the cache blocks coming to PCM. On top of it, we encode the compressed blocks at finer encoding granularity, utilizing only a few tag bits. The overall procedure, called ZOCHEN improves PCM lifetime by reducing bit-flips in the PCM cells. We get a substantial reduction in bit-flips and improvement in lifetime compared to baseline and state-of-the-art policies.
新兴的非易失性存储器(NVM)提供了巨大的可能性,被认为是主存储器中DRAM的替代品。然而,在内存层次结构中采用nvm面临着挑战,因为它们的写入成本高,写入持久性差。在这方面,制定政策以提高nvm的忍耐力至关重要。本文提出了一种基于压缩和编码的低开销方案,以提高pcm主存的寿命。我们提出了一种压缩技术,通过移除在缓存块中普遍存在的零值数据位链来进入PCM。在此基础上,我们以更精细的编码粒度对压缩块进行编码,仅使用少数标记位。整个过程称为ZOCHEN,通过减少PCM细胞中的位翻转来提高PCM寿命。与基线和最先进的政策相比,我们大大减少了比特翻转,延长了寿命。
{"title":"ZOCHEN: Compression Using Zero Chain Elimination and Encoding to Improve Endurance of Non-Volatile Memories","authors":"Nishant Bharti, Arijit Nath, Swati Upadhyay, H. Kapoor","doi":"10.1109/ISQED57927.2023.10129315","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129315","url":null,"abstract":"Emerging Non-Volatile memories (NVM) offer immense possibilities to be considered as an alternative to DRAM in the main memory. However, adoption of NVMs in the memory hierarchy faces challenges due to their costly writes and poor write endurance. In this connection, developing policies to improve the endurance of NVMs has paramount importance. This paper presents a low overhead scheme based on compression and encoding to improve the lifetime of PCM-based main memory. We propose a compression technique by removing chains of zero-valued data bits that are prevalent in the cache blocks coming to PCM. On top of it, we encode the compressed blocks at finer encoding granularity, utilizing only a few tag bits. The overall procedure, called ZOCHEN improves PCM lifetime by reducing bit-flips in the PCM cells. We get a substantial reduction in bit-flips and improvement in lifetime compared to baseline and state-of-the-art policies.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122191663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPRED: Spatially Distributed Laser Fault Injection Resilient Design SPRED:空间分布式激光故障注入弹性设计
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129398
Tasnuva Farheen, Shahin Tajik, Domenic Forte
Computing systems’ hardware implementation is vulnerable to physical attacks. One of the most powerful tools in the arsenal of physical attacks is laser fault injection (LFI), which can successfully compromise an embedded cryptographic implementation even with a single fault. Several countermeasures have been proposed to prevent and detect LFI attacks. However, these schemes cannot protect a multi-spot laser fault injection setup alone. Vulnerabilities can be addressed in such circumstances using a multi-layer or defense-in-depth approach. Defense-in-depth refers to implementing several independent countermeasures within a device to provide aggregated protection against various attack vectors. In this paper, we introduce a multi-layer countermeasure where the proposed approach protects an LFI attack detector against multi-spot LFI attacks. We design and simulate a spatially distributed multi-gate driven design, called SPRED, to prevent single and multi-spot LFI attacks. Simulation results show that the distribution of gates in SPRED forces an attacker to use higher laser power and a thinner wafer to inject a fault.
计算系统的硬件实现容易受到物理攻击。物理攻击库中最强大的工具之一是激光故障注入(LFI),即使只有一个故障,它也可以成功地破坏嵌入式加密实现。提出了几种防范和检测LFI攻击的对策。然而,这些方案不能单独保护多点激光故障注入装置。在这种情况下,可以使用多层或纵深防御方法来解决漏洞。纵深防御是指在设备内部实施多个独立的防御措施,对各种攻击向量提供聚合防护。在本文中,我们介绍了一种多层对抗方法,该方法可以保护LFI攻击检测器免受多点LFI攻击。我们设计并模拟了一个空间分布的多门驱动设计,称为SPRED,以防止单点和多点LFI攻击。仿真结果表明,SPRED中栅极的分布迫使攻击者使用更高的激光功率和更薄的晶片注入故障。
{"title":"SPRED: Spatially Distributed Laser Fault Injection Resilient Design","authors":"Tasnuva Farheen, Shahin Tajik, Domenic Forte","doi":"10.1109/ISQED57927.2023.10129398","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129398","url":null,"abstract":"Computing systems’ hardware implementation is vulnerable to physical attacks. One of the most powerful tools in the arsenal of physical attacks is laser fault injection (LFI), which can successfully compromise an embedded cryptographic implementation even with a single fault. Several countermeasures have been proposed to prevent and detect LFI attacks. However, these schemes cannot protect a multi-spot laser fault injection setup alone. Vulnerabilities can be addressed in such circumstances using a multi-layer or defense-in-depth approach. Defense-in-depth refers to implementing several independent countermeasures within a device to provide aggregated protection against various attack vectors. In this paper, we introduce a multi-layer countermeasure where the proposed approach protects an LFI attack detector against multi-spot LFI attacks. We design and simulate a spatially distributed multi-gate driven design, called SPRED, to prevent single and multi-spot LFI attacks. Simulation results show that the distribution of gates in SPRED forces an attacker to use higher laser power and a thinner wafer to inject a fault.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115022904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Distillation between DNN and SNN for Intelligent Sensing Systems on Loihi Chip 基于Loihi芯片的智能传感系统中DNN与SNN的知识提炼
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129306
Shiya Liu, Y. Yi
Building accurate and efficient deep neural network (DNN) models for intelligent sensing systems to process data locally is essential. Spiking neural networks (SNNs) have gained significant popularity in recent years because they are more biological-plausible and energy-efficient than DNNs. However, SNNs usually have lower accuracy than DNNs. In this paper, we propose to use SNNs for image sensing applications. Moreover, we introduce the DNN-SNN knowledge distillation algorithm to reduce the accuracy gap between DNNs and SNNs. Our DNNSNN knowledge distillation improves the accuracy of an SNN by transferring knowledge between a DNN and an SNN. To better transfer the knowledge, our algorithm creates two learning paths from a DNN to an SNN. One path is between the output layer and another path is between the intermediate layer. DNNs use real numbers to propagate information between neurons while SNNs use 1-bit spikes. To empower the communication between DNNs and SNNs, we utilize a decoder to decode spikes into real numbers. Also, our algorithm creates a learning path from an SNN to a DNN. This learning path better adapts the DNN to the SNN by allowing the DNN to learn the knowledge from the SNN. Our SNN models are deployed on Loihi, which is a specialized chip for SNN models. On the MNIST dataset, our SNN models trained by the DNN-SNN knowledge distillation achieve better accuracy than the SNN models on GPU trained by other training algorithms with much lower energy consumption per image.
为智能传感系统建立准确、高效的深度神经网络(DNN)模型来处理本地数据至关重要。脉冲神经网络(snn)近年来获得了显著的普及,因为它们比深度神经网络更具生物合理性和能效。然而,snn的准确率通常低于dnn。在本文中,我们建议将snn用于图像传感应用。此外,我们还引入了DNN-SNN知识蒸馏算法,以减小dnn和snn之间的精度差距。我们的DNNSNN知识蒸馏通过在DNN和SNN之间传递知识来提高SNN的准确性。为了更好地传递知识,我们的算法创建了从DNN到SNN的两条学习路径。一条路径在输出层之间,另一条路径在中间层之间。dnn使用实数在神经元之间传播信息,而snn使用1位尖峰。为了增强dnn和snn之间的通信能力,我们利用解码器将峰值解码为实数。此外,我们的算法创建了一条从SNN到DNN的学习路径。这种学习路径允许DNN从SNN中学习知识,从而使DNN更好地适应SNN。我们的SNN模型部署在Loihi上,Loihi是SNN模型的专用芯片。在MNIST数据集上,我们的DNN-SNN知识精馏法训练的SNN模型比其他训练算法在GPU上训练的SNN模型具有更好的准确率,且每张图像的能量消耗更低。
{"title":"Knowledge Distillation between DNN and SNN for Intelligent Sensing Systems on Loihi Chip","authors":"Shiya Liu, Y. Yi","doi":"10.1109/ISQED57927.2023.10129306","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129306","url":null,"abstract":"Building accurate and efficient deep neural network (DNN) models for intelligent sensing systems to process data locally is essential. Spiking neural networks (SNNs) have gained significant popularity in recent years because they are more biological-plausible and energy-efficient than DNNs. However, SNNs usually have lower accuracy than DNNs. In this paper, we propose to use SNNs for image sensing applications. Moreover, we introduce the DNN-SNN knowledge distillation algorithm to reduce the accuracy gap between DNNs and SNNs. Our DNNSNN knowledge distillation improves the accuracy of an SNN by transferring knowledge between a DNN and an SNN. To better transfer the knowledge, our algorithm creates two learning paths from a DNN to an SNN. One path is between the output layer and another path is between the intermediate layer. DNNs use real numbers to propagate information between neurons while SNNs use 1-bit spikes. To empower the communication between DNNs and SNNs, we utilize a decoder to decode spikes into real numbers. Also, our algorithm creates a learning path from an SNN to a DNN. This learning path better adapts the DNN to the SNN by allowing the DNN to learn the knowledge from the SNN. Our SNN models are deployed on Loihi, which is a specialized chip for SNN models. On the MNIST dataset, our SNN models trained by the DNN-SNN knowledge distillation achieve better accuracy than the SNN models on GPU trained by other training algorithms with much lower energy consumption per image.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115888481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel, Configurable Approximate Floating-point Multipliers for Error-Resilient Applications 用于容错应用的新颖、可配置近似浮点乘法器
Pub Date : 2023-04-05 DOI: 10.1109/ISQED57927.2023.10129296
Vishesh Mishra, Sparsh Mittal, Rekha Singhal, M. Nambiar
By exploiting the gap between the user’s accuracy requirement and the hardware’s accuracy capability, approximate circuit design offers enormous gains in efficiency for a minor accuracy loss. In this paper, we propose two approximate floating point multipliers (AxFPMs), named DTCL (decomposition, truncation and chunk-level leading-one quantization) and TDIL (truncation, decomposition and ignoring LSBs). Both AxFPMs introduce approximation in mantissa multiplication. DTCL works by rounding and truncating LSBs and quantizing each chunk. TDIL works by truncating LSBs and ignoring the least important terms in the multiplication. Further, both techniques multiply more significant terms by simply exponent addition or shift-and-add operations. These AxFPMs are configurable and allow trading off accuracy with hardware overhead. Compared to exact floating-point multiplier (FPM), DTCL(4,8,8) reduces area, energy and delay by 11.0%, 69% and 61%, respectively, while incurring a mean relative error of only 2.37%. On a range of approximate applications from machine learning, deep learning and image processing domains, our AxFPMs greatly improve efficiency with only minor loss in accuracy. For example, for image sharpening and Gaussian smoothing, all DTCL and TDIL variants achieve a PSNR of more than 30dB. The source-code is available at https://github.com/CandleLabAI/ApproxFloatingPointMultiplier.
通过利用用户的精度要求和硬件的精度能力之间的差距,近似电路设计为较小的精度损失提供了巨大的效率收益。在本文中,我们提出了两个近似浮点乘法器(AxFPMs),称为DTCL(分解,截断和块级前导1量化)和TDIL(截断,分解和忽略lbs)。两个AxFPMs都在尾数乘法中引入近似。DTCL通过四舍五入和截断lsb以及量化每个块来工作。TDIL的工作原理是截断lsb并忽略乘法中最不重要的项。此外,这两种技术都可以通过简单的指数加法或移位加法运算将更重要的项相乘。这些axfpm是可配置的,允许在精度和硬件开销之间进行权衡。与精确浮点乘法器(FPM)相比,DTCL(4,8,8)分别减少了11.0%,69%和61%的面积,能量和延迟,而平均相对误差仅为2.37%。在机器学习、深度学习和图像处理领域的一系列近似应用中,我们的AxFPMs极大地提高了效率,而精度只有很小的损失。例如,对于图像锐化和高斯平滑,所有DTCL和TDIL变体的PSNR都超过30dB。源代码可从https://github.com/CandleLabAI/ApproxFloatingPointMultiplier获得。
{"title":"Novel, Configurable Approximate Floating-point Multipliers for Error-Resilient Applications","authors":"Vishesh Mishra, Sparsh Mittal, Rekha Singhal, M. Nambiar","doi":"10.1109/ISQED57927.2023.10129296","DOIUrl":"https://doi.org/10.1109/ISQED57927.2023.10129296","url":null,"abstract":"By exploiting the gap between the user’s accuracy requirement and the hardware’s accuracy capability, approximate circuit design offers enormous gains in efficiency for a minor accuracy loss. In this paper, we propose two approximate floating point multipliers (AxFPMs), named DTCL (decomposition, truncation and chunk-level leading-one quantization) and TDIL (truncation, decomposition and ignoring LSBs). Both AxFPMs introduce approximation in mantissa multiplication. DTCL works by rounding and truncating LSBs and quantizing each chunk. TDIL works by truncating LSBs and ignoring the least important terms in the multiplication. Further, both techniques multiply more significant terms by simply exponent addition or shift-and-add operations. These AxFPMs are configurable and allow trading off accuracy with hardware overhead. Compared to exact floating-point multiplier (FPM), DTCL(4,8,8) reduces area, energy and delay by 11.0%, 69% and 61%, respectively, while incurring a mean relative error of only 2.37%. On a range of approximate applications from machine learning, deep learning and image processing domains, our AxFPMs greatly improve efficiency with only minor loss in accuracy. For example, for image sharpening and Gaussian smoothing, all DTCL and TDIL variants achieve a PSNR of more than 30dB. The source-code is available at https://github.com/CandleLabAI/ApproxFloatingPointMultiplier.","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125648148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Welcome to ISQED 2023 欢迎来到ISQED 2023
Pub Date : 2023-04-05 DOI: 10.1109/isqed57927.2023.10129386
{"title":"Welcome to ISQED 2023","authors":"","doi":"10.1109/isqed57927.2023.10129386","DOIUrl":"https://doi.org/10.1109/isqed57927.2023.10129386","url":null,"abstract":"","PeriodicalId":315053,"journal":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129220422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 24th International Symposium on Quality Electronic Design (ISQED)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1