首页 > 最新文献

Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion最新文献

英文 中文
Retention state-aware energy management for efficient nonvolatile processors: work-in-progress 高效非易失性处理器的保留状态感知能量管理:正在进行的工作
Keni Qiu, Zhiyao Gong, Dongqin Zhou, Weiwen Chen, Yongpan Liu
Harvested energy is intrinsically unstable and program execution will be interrupted frequently. To solve this problem, nonvolatile processor (NVP) is proposed because it can back up volatile state before the system energy is depleted. However, the backup and the recovery processes also consume non-negligible energy and delay program progress. To improve the performance of NVP, retention state has been proposed recently which can enable a system to retain the volatile data to wait for power resumption instead of saving data immediately. The objective of this paper is to forward program execution progress as much as possible by exploiting the retention state. Compared to the instant backup scheme, preliminary evaluation results report that power failures can be reduced by 81.6% and computation efficiency can be increased by 105%.
收集的能量本质上是不稳定的,程序执行将经常中断。为了解决这一问题,提出了非易失性处理器(NVP),因为它可以在系统能量耗尽之前备份易失状态。但是,备份和恢复过程也会消耗不可忽略的能量并延迟程序的进度。为了提高NVP的性能,最近提出了保留状态,它可以使系统保留易失性数据以等待电源恢复,而不是立即保存数据。本文的目标是通过利用保留状态尽可能地推进程序的执行进度。初步评估结果表明,与即时备份方案相比,该方案可减少81.6%的故障,提高105%的计算效率。
{"title":"Retention state-aware energy management for efficient nonvolatile processors: work-in-progress","authors":"Keni Qiu, Zhiyao Gong, Dongqin Zhou, Weiwen Chen, Yongpan Liu","doi":"10.1145/3125502.3129535","DOIUrl":"https://doi.org/10.1145/3125502.3129535","url":null,"abstract":"Harvested energy is intrinsically unstable and program execution will be interrupted frequently. To solve this problem, nonvolatile processor (NVP) is proposed because it can back up volatile state before the system energy is depleted. However, the backup and the recovery processes also consume non-negligible energy and delay program progress. To improve the performance of NVP, retention state has been proposed recently which can enable a system to retain the volatile data to wait for power resumption instead of saving data immediately. The objective of this paper is to forward program execution progress as much as possible by exploiting the retention state. Compared to the instant backup scheme, preliminary evaluation results report that power failures can be reduced by 81.6% and computation efficiency can be increased by 105%.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122745760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting quality-energy tradeoffs with arbitrary quantization: special session paper 利用任意量化的质量-能量权衡:特别会议论文
T. Moreau, Felipe Augusto, Patrick Howe, Armin Alaghi, L. Ceze
Approximate computing aims to expose and exploit quality vs. efficiency tradeoffs to enable ever-more demanding applications on energy-constrained devices such as smartphones, or IoT devices. This paper makes the case for arbitrary quantization as a compelling approximation technique that exposes quality vs. energy tradeoffs and provides practical error guarantees. We present QAPPA (Quality Autotuner for Precision Programmable Accelerators), an autotuning framework for C/C++ programs that automatically minimizes the precision of each arithmetic and memory operation to meet user defined application level quality guarantees. QAPPA integrates energy models of precision scaling mechanisms to produce bandwidth and energy savings estimates for precision scalable accelerator designs. We show that QAPPA can exploit precision scaling mechanisms to meet arbitrary user-provided quality targets on the PERFECT benchmark suite to achieve significant energy savings and memory bandwidth reduction.
近似计算旨在暴露和利用质量与效率之间的权衡,以在智能手机或物联网设备等能源受限设备上实现要求越来越高的应用。本文将任意量化作为一种引人注目的近似技术,它暴露了质量与能量的权衡,并提供了实际的误差保证。我们提出了QAPPA (Quality Autotuner for Precision Programmable Accelerators),这是一个C/ c++程序的自动调谐框架,可以自动最小化每个算术和内存操作的精度,以满足用户定义的应用程序级质量保证。QAPPA集成了精确缩放机制的能量模型,为精确缩放加速器设计提供带宽和节能估算。我们证明QAPPA可以利用精确缩放机制来满足PERFECT基准套件上任意用户提供的质量目标,从而实现显著的节能和内存带宽减少。
{"title":"Exploiting quality-energy tradeoffs with arbitrary quantization: special session paper","authors":"T. Moreau, Felipe Augusto, Patrick Howe, Armin Alaghi, L. Ceze","doi":"10.1145/3125502.3125544","DOIUrl":"https://doi.org/10.1145/3125502.3125544","url":null,"abstract":"Approximate computing aims to expose and exploit quality vs. efficiency tradeoffs to enable ever-more demanding applications on energy-constrained devices such as smartphones, or IoT devices. This paper makes the case for arbitrary quantization as a compelling approximation technique that exposes quality vs. energy tradeoffs and provides practical error guarantees. We present QAPPA (Quality Autotuner for Precision Programmable Accelerators), an autotuning framework for C/C++ programs that automatically minimizes the precision of each arithmetic and memory operation to meet user defined application level quality guarantees. QAPPA integrates energy models of precision scaling mechanisms to produce bandwidth and energy savings estimates for precision scalable accelerator designs. We show that QAPPA can exploit precision scaling mechanisms to meet arbitrary user-provided quality targets on the PERFECT benchmark suite to achieve significant energy savings and memory bandwidth reduction.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A unified framework for throughput analysis of synchronous data flow graphs under memory constraints: work-in-progress 用于在内存约束下同步数据流图的吞吐量分析的统一框架:正在进行的工作
Xue-Yang Zhu
Streaming applications are often modeled with Synchronous data flow graphs (SDFGs). A proper analysis of the models is helpful to predict the performance of a system. In this paper, we focus on the throughput analysis of memory-constrained SDFGs (MC SDFGs), which needs to choose a memory abstraction that decides when the space of consumed data is released and when the required space is claimed. Different memory abstractions may lead to different achievable throughputs. The existing techniques, however, consider only a certain abstraction. If a model is implemented according to other abstractions, the analysis result may not truly evaluate the performance of the system. In this paper, we present a unified framework for throughput analysis of MC SDFGs for difference abstractions, aiming to provide evaluations matching up to the corresponding implementations.
流应用程序通常使用同步数据流图(sdfg)建模。对这些模型进行适当的分析有助于预测系统的性能。在本文中,我们关注内存约束sdfg (MC sdfg)的吞吐量分析,它需要选择一个内存抽象来决定何时释放消耗数据的空间以及何时要求所需的空间。不同的内存抽象可能导致不同的可实现吞吐量。然而,现有的技术只考虑某种抽象。如果模型是根据其他抽象实现的,那么分析结果可能无法真正评估系统的性能。在本文中,我们提出了一个统一的框架来分析不同抽象的MC sdfg的吞吐量,旨在提供与相应实现相匹配的评估。
{"title":"A unified framework for throughput analysis of synchronous data flow graphs under memory constraints: work-in-progress","authors":"Xue-Yang Zhu","doi":"10.1145/3125502.3125535","DOIUrl":"https://doi.org/10.1145/3125502.3125535","url":null,"abstract":"Streaming applications are often modeled with Synchronous data flow graphs (SDFGs). A proper analysis of the models is helpful to predict the performance of a system. In this paper, we focus on the throughput analysis of memory-constrained SDFGs (MC SDFGs), which needs to choose a memory abstraction that decides when the space of consumed data is released and when the required space is claimed. Different memory abstractions may lead to different achievable throughputs. The existing techniques, however, consider only a certain abstraction. If a model is implemented according to other abstractions, the analysis result may not truly evaluate the performance of the system. In this paper, we present a unified framework for throughput analysis of MC SDFGs for difference abstractions, aiming to provide evaluations matching up to the corresponding implementations.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125226834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Significance-driven adaptive approximate computing for energy-efficient image processing applications: special session paper 节能图像处理应用的意义驱动自适应近似计算:特别会议论文
Dave Burke, Dainius Jenkus, Issa Qiqieh, R. Shafik, Shidhartha Das, Alexandre Yakovlev
With increasing resolutions the volume of data generated by image processing applications is escalating dramatically. When coupled with real-time performance requirements, reducing energy consumption for such a large volume of data is proving challenging.
随着分辨率的提高,图像处理应用程序生成的数据量急剧增加。再加上实时性能要求,为如此大量的数据降低能耗被证明是具有挑战性的。
{"title":"Significance-driven adaptive approximate computing for energy-efficient image processing applications: special session paper","authors":"Dave Burke, Dainius Jenkus, Issa Qiqieh, R. Shafik, Shidhartha Das, Alexandre Yakovlev","doi":"10.1145/3125502.3125554","DOIUrl":"https://doi.org/10.1145/3125502.3125554","url":null,"abstract":"With increasing resolutions the volume of data generated by image processing applications is escalating dramatically. When coupled with real-time performance requirements, reducing energy consumption for such a large volume of data is proving challenging.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"887 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127078455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient arithmetic for lattice-based cryptography: special session paper 基于格的有效密码算法:专题会议论文
E. O'Sullivan, F. Regazzoni
Lattice-based cryptography is a promising family of post quantum algorithms. Contrary to other approaches, lattice-based primitives are extremely versatile and allow the realisation of several essential cryptographic primitives, such as encryption and digital signatures. In addition, they enable more sophisicated schemes to be constructed, such as Identity-based and Attribute-based Encryption, and even Fully Homomorphic Encryption. However, lattice-based cryptography requires novel implementations of several computationally intensive building blocks, for example discrete sampling (often from a Gaussian distribution) and Number Theoretic Transforms. This paper reviews the state-of-the-art in efficient designs for these core components in hardware and software.
基于格的密码学是一种很有前途的后量子算法。与其他方法相反,基于格的原语是非常通用的,并且允许实现几个基本的加密原语,例如加密和数字签名。此外,它们还支持构造更复杂的方案,例如基于身份和基于属性的加密,甚至是完全同态加密。然而,基于格的密码学需要一些计算密集型构建块的新实现,例如离散采样(通常来自高斯分布)和数论变换。本文综述了这些核心部件在硬件和软件方面的高效设计的最新进展。
{"title":"Efficient arithmetic for lattice-based cryptography: special session paper","authors":"E. O'Sullivan, F. Regazzoni","doi":"10.1145/3125502.3125543","DOIUrl":"https://doi.org/10.1145/3125502.3125543","url":null,"abstract":"Lattice-based cryptography is a promising family of post quantum algorithms. Contrary to other approaches, lattice-based primitives are extremely versatile and allow the realisation of several essential cryptographic primitives, such as encryption and digital signatures. In addition, they enable more sophisicated schemes to be constructed, such as Identity-based and Attribute-based Encryption, and even Fully Homomorphic Encryption. However, lattice-based cryptography requires novel implementations of several computationally intensive building blocks, for example discrete sampling (often from a Gaussian distribution) and Number Theoretic Transforms. This paper reviews the state-of-the-art in efficient designs for these core components in hardware and software.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123219272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Communication optimization for thermal reliable many-core systems: work-in-progress 热可靠多核系统的通信优化:正在进行的工作
Weichen Liu, Lei Yang, Weiwen Jiang, Nan Guan
System-level thermal management techniques normally map applications on non-adjacent cores to guarantee the safe temperature in many-core systems, while the communication efficiency will be oppositely affected by long-distance data transmission over conventional Network-on-Chips (NoC). SMART NoC has enabled single-cycle multi-hop bypass channels between distant cores, which can significantly reduce inter-processor communication latency. However, communication efficiency of SMART will be significantly diminished by express bypass break due to communication conflict. In order to achieve communication optimization with guaranteed system thermal reliability, we propose a dynamic reconfiguration method for logical interconnection topology through task mapping on top of SMART NoC. Active cores are physically decentralized on chip for better heat dissipation, while communication overhead can be reduced by minimized communication conflict and maximized bypass routing. Applicability and effectiveness of the proposed technique can be improved with significant achievements in reducing communication overhead and improving application performance, compared with state-of-the-art techniques.
系统级热管理技术通常将应用映射到非相邻核上,以保证多核系统的安全温度,而传统的片上网络(NoC)的远程数据传输将影响通信效率。SMART NoC启用了远核之间的单周期多跳旁路通道,可以显着减少处理器间通信延迟。但是,由于通信冲突导致的快速旁路中断会大大降低SMART的通信效率。为了在保证系统热可靠性的前提下实现通信优化,提出了一种基于SMART NoC的任务映射逻辑互连拓扑动态重构方法。主动核心物理上分散在芯片上,以获得更好的散热,而通信开销可以通过最小化通信冲突和最大化旁路路由来降低。与现有技术相比,该技术在降低通信开销和提高应用程序性能方面取得了显著成就,从而提高了其适用性和有效性。
{"title":"Communication optimization for thermal reliable many-core systems: work-in-progress","authors":"Weichen Liu, Lei Yang, Weiwen Jiang, Nan Guan","doi":"10.1145/3125502.3125539","DOIUrl":"https://doi.org/10.1145/3125502.3125539","url":null,"abstract":"System-level thermal management techniques normally map applications on non-adjacent cores to guarantee the safe temperature in many-core systems, while the communication efficiency will be oppositely affected by long-distance data transmission over conventional Network-on-Chips (NoC). SMART NoC has enabled single-cycle multi-hop bypass channels between distant cores, which can significantly reduce inter-processor communication latency. However, communication efficiency of SMART will be significantly diminished by express bypass break due to communication conflict. In order to achieve communication optimization with guaranteed system thermal reliability, we propose a dynamic reconfiguration method for logical interconnection topology through task mapping on top of SMART NoC. Active cores are physically decentralized on chip for better heat dissipation, while communication overhead can be reduced by minimized communication conflict and maximized bypass routing. Applicability and effectiveness of the proposed technique can be improved with significant achievements in reducing communication overhead and improving application performance, compared with state-of-the-art techniques.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126454914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Driving behavior modeling and estimation for battery optimization in electric vehicles: work-in-progress 电动汽车电池优化的驾驶行为建模与估计:正在进行中
K. Vatanparvar, Sina Faezi, Igor Burago, M. Levorato, M. A. Faruque
Battery and energy management methodologies such as automotive climate controls have been proposed to address the design challenges of driving range and battery lifetime in Electric Vehicles (EV). However, driving behavior estimation is a major factor neglected in these methodologies. In this paper, we propose a novel context-aware methodology for estimating the driving behavior in terms of future vehicle speeds that will be integrated into the EV battery optimization. We implement a driving behavior model using a variation of Artificial Neural Networks (ANN) called Nonlinear AutoRegressive model with eXogenous inputs (NARX). We train our novel context-aware NARX model based on historical behavior of real drivers, their recent driving reactions, and the route average speed retrieved from Google Maps in order to enable driver-specific and self-adaptive driving behavior modeling and long-term estimation. Our methodology shows only 12% error for up to 30-second speed prediction which is improved by 27% compared to the state-of-the-art. Hence, it can achieve up to 82% of the maximum energy saving and battery lifetime improvement possible by the ideal methodology where the future vehicle speed is known.
电池和能源管理方法(如汽车气候控制)已被提出,以解决电动汽车(EV)行驶里程和电池寿命的设计挑战。然而,驾驶行为估计是这些方法中被忽视的一个主要因素。在本文中,我们提出了一种新的上下文感知方法,用于根据未来车辆速度估计驾驶行为,该方法将集成到电动汽车电池优化中。我们使用人工神经网络(ANN)的一种变体实现了一个驾驶行为模型,称为带有外生输入的非线性自回归模型(NARX)。我们基于真实驾驶员的历史行为、他们最近的驾驶反应以及从谷歌地图中检索到的路线平均速度来训练我们的新颖的上下文感知NARX模型,以便实现驾驶员特定的和自适应的驾驶行为建模和长期估计。我们的方法显示,在长达30秒的速度预测中只有12%的误差,与最先进的方法相比,这一误差提高了27%。因此,在已知未来车辆速度的理想方法下,它可以实现高达82%的最大节能和电池寿命改善。
{"title":"Driving behavior modeling and estimation for battery optimization in electric vehicles: work-in-progress","authors":"K. Vatanparvar, Sina Faezi, Igor Burago, M. Levorato, M. A. Faruque","doi":"10.1145/3125502.3125542","DOIUrl":"https://doi.org/10.1145/3125502.3125542","url":null,"abstract":"Battery and energy management methodologies such as automotive climate controls have been proposed to address the design challenges of driving range and battery lifetime in Electric Vehicles (EV). However, driving behavior estimation is a major factor neglected in these methodologies. In this paper, we propose a novel context-aware methodology for estimating the driving behavior in terms of future vehicle speeds that will be integrated into the EV battery optimization. We implement a driving behavior model using a variation of Artificial Neural Networks (ANN) called Nonlinear AutoRegressive model with eXogenous inputs (NARX). We train our novel context-aware NARX model based on historical behavior of real drivers, their recent driving reactions, and the route average speed retrieved from Google Maps in order to enable driver-specific and self-adaptive driving behavior modeling and long-term estimation. Our methodology shows only 12% error for up to 30-second speed prediction which is improved by 27% compared to the state-of-the-art. Hence, it can achieve up to 82% of the maximum energy saving and battery lifetime improvement possible by the ideal methodology where the future vehicle speed is known.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127314126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards the application of flask security architecture to SoC design: work-in-progress flask安全架构在SoC设计中的应用:正在进行中
Festus Hategekimana, C. Bobda
In this work, we explore a security reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and the authenticity of every access to every system object in systems-on-chip (SoCs). Access decisions are administered by a security logic "server" implemented as an extension of the peripheral bus. Initial results show a minimal increase in resource overhead and no significant impact on the performance.
在这项工作中,我们将探索一种借鉴Flask安全架构的安全参考监视器(RM)设计。我们的RM设计目标是通过检查和验证对片上系统(soc)中每个系统对象的每次访问的权限和真实性来实现完整的中介。访问决策由作为外围总线扩展实现的安全逻辑“服务器”管理。初始结果显示,资源开销增加很小,对性能没有显著影响。
{"title":"Towards the application of flask security architecture to SoC design: work-in-progress","authors":"Festus Hategekimana, C. Bobda","doi":"10.1145/3125502.3125558","DOIUrl":"https://doi.org/10.1145/3125502.3125558","url":null,"abstract":"In this work, we explore a security reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and the authenticity of every access to every system object in systems-on-chip (SoCs). Access decisions are administered by a security logic \"server\" implemented as an extension of the peripheral bus. Initial results show a minimal increase in resource overhead and no significant impact on the performance.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129312620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote detection of unauthorized activity via spectral analysis: work-in-progress 通过频谱分析远程检测未经授权的活动:工作正在进行中
F. Karabacak, Ümit Y. Ogras, S. Ozev
Unauthorized hardware or firmware modifications, known as trojans, can steal information, drain the battery, or damage IoT devices. This paper presents a stand-off self-referencing technique for detecting unauthorized activity. The proposed technique processes involuntary electromagnetic emissions on a separate hardware, which is physically decoupled from the device under test. When the device enter the test mode, it runs a predefined application repetitively with a fixed period. The periodicity ensures that the spectral electromagnetic power of the test application concentrates at known frequencies, leaving the remaining frequencies within the operation bandwidth at the noise level. Any deviations from the noise level for these unoccupied frequency locations indicates the presence of unknown (unauthorized) activity. Experiments based on hardware measurements show that the proposed technique achieves close to 100% detection accuracy at up to 120 cm distance.
未经授权的硬件或固件修改,即特洛伊木马,可以窃取信息,耗尽电池或损坏物联网设备。提出了一种用于检测未授权活动的隔离自引用技术。所提出的技术在单独的硬件上处理非自愿电磁发射,该硬件与被测设备物理解耦。当设备进入测试模式时,它会在固定的周期内重复运行预定义的应用程序。周期性确保测试应用的频谱电磁功率集中在已知频率上,而在噪声水平的操作带宽内留下剩余的频率。在这些未被占用的频率位置,任何偏离噪音水平的情况都表明存在未知(未经授权)的活动。基于硬件测量的实验表明,该技术在120 cm距离内的检测精度接近100%。
{"title":"Remote detection of unauthorized activity via spectral analysis: work-in-progress","authors":"F. Karabacak, Ümit Y. Ogras, S. Ozev","doi":"10.1145/3125502.3125552","DOIUrl":"https://doi.org/10.1145/3125502.3125552","url":null,"abstract":"Unauthorized hardware or firmware modifications, known as trojans, can steal information, drain the battery, or damage IoT devices. This paper presents a stand-off self-referencing technique for detecting unauthorized activity. The proposed technique processes involuntary electromagnetic emissions on a separate hardware, which is physically decoupled from the device under test. When the device enter the test mode, it runs a predefined application repetitively with a fixed period. The periodicity ensures that the spectral electromagnetic power of the test application concentrates at known frequencies, leaving the remaining frequencies within the operation bandwidth at the noise level. Any deviations from the noise level for these unoccupied frequency locations indicates the presence of unknown (unauthorized) activity. Experiments based on hardware measurements show that the proposed technique achieves close to 100% detection accuracy at up to 120 cm distance.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
3D nanosystems enable embedded abundant-data computing: special session paper 三维纳米系统使嵌入式丰富数据计算:特别会议论文
William Hwang, M. Aly, Yash H. Malviya, Mingyu Gao, Tony F. Wu, C. Kozyrakis, H. Wong, S. Mitra
The world's appetite for abundant-data computing, where a massive amount of structured and unstructured data is analyzed, has increased dramatically. The computational demands of these applications, such as deep learning, far exceed the capabilities of today's systems, especially for energy-constrained embedded systems (e.g., mobile systems with limited battery capacity). These demands are unlikely to be met by isolated improvements in transistor or memory technologies, or integrated circuit (IC) architectures alone. Transformative nanosystems, which leverage the unique properties of emerging nanotechnologies to create new IC architectures, are required to deliver unprecedented functionality, performance, and energy efficiency. We show that the projected energy efficiency benefits of domain-specific 3D nanosystems is in the range of 1,000x (quantified using the product of system-level energy consumption and execution time) over today's domain-specific 2D systems with off-chip DRAM. Such a drastic improvement is key to enabling new capabilities such as deep learning in embedded systems.
世界对海量数据计算(海量结构化和非结构化数据被分析)的需求急剧增长。这些应用的计算需求,如深度学习,远远超过了当今系统的能力,特别是对于能量受限的嵌入式系统(例如,电池容量有限的移动系统)。这些需求不太可能仅通过晶体管或存储技术或集成电路(IC)架构的单独改进来满足。变革性纳米系统,利用新兴纳米技术的独特特性来创建新的集成电路架构,需要提供前所未有的功能,性能和能源效率。我们表明,特定领域的3D纳米系统的预计能源效率效益在1000倍的范围内(使用系统级能耗和执行时间的产品量化),而不是今天的特定领域的2D系统与片外DRAM。如此巨大的改进是在嵌入式系统中实现深度学习等新功能的关键。
{"title":"3D nanosystems enable embedded abundant-data computing: special session paper","authors":"William Hwang, M. Aly, Yash H. Malviya, Mingyu Gao, Tony F. Wu, C. Kozyrakis, H. Wong, S. Mitra","doi":"10.1145/3125502.3125531","DOIUrl":"https://doi.org/10.1145/3125502.3125531","url":null,"abstract":"The world's appetite for abundant-data computing, where a massive amount of structured and unstructured data is analyzed, has increased dramatically. The computational demands of these applications, such as deep learning, far exceed the capabilities of today's systems, especially for energy-constrained embedded systems (e.g., mobile systems with limited battery capacity). These demands are unlikely to be met by isolated improvements in transistor or memory technologies, or integrated circuit (IC) architectures alone. Transformative nanosystems, which leverage the unique properties of emerging nanotechnologies to create new IC architectures, are required to deliver unprecedented functionality, performance, and energy efficiency. We show that the projected energy efficiency benefits of domain-specific 3D nanosystems is in the range of 1,000x (quantified using the product of system-level energy consumption and execution time) over today's domain-specific 2D systems with off-chip DRAM. Such a drastic improvement is key to enabling new capabilities such as deep learning in embedded systems.","PeriodicalId":350509,"journal":{"name":"Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114149775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1