首页 > 最新文献

2014 IEEE Computer Society Annual Symposium on VLSI最新文献

英文 中文
Layout-Aware Selection of Trace Signals for Post-Silicon Debug 基于布局感知的后硅调试跟踪信号选择
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.19
Prateek Thakyal, P. Mishra
Post-silicon debug is widely acknowledged as a bottleneck in SoC design methodology. A major challenge during post-silicon debug is the limited observability of internal signals. Existing approaches try to select a small set of beneficial trace signals that can maximize observability. Unfortunately, these techniques do not consider design constraints such as routability of the selected signals or routing congestion. Therefore, in reality, it may not be possible to route the selected signals. We propose a layout-aware signal selection algorithm that takes into account both observability and routing congestion. Our experimental results demonstrate that our proposed approach can select routing friendly trace signals with negligible impact on observability.
硅后调试被广泛认为是SoC设计方法中的瓶颈。后硅调试期间的一个主要挑战是内部信号的有限可观测性。现有的方法试图选择一小组有益的跟踪信号,以最大限度地提高可观测性。不幸的是,这些技术没有考虑设计约束,如所选信号的可路由性或路由拥塞。因此,在现实中,可能无法路由选定的信号。我们提出了一种考虑可观察性和路由拥塞的布局感知信号选择算法。实验结果表明,该方法可以在不影响可观测性的情况下选择路由友好的跟踪信号。
{"title":"Layout-Aware Selection of Trace Signals for Post-Silicon Debug","authors":"Prateek Thakyal, P. Mishra","doi":"10.1109/ISVLSI.2014.19","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.19","url":null,"abstract":"Post-silicon debug is widely acknowledged as a bottleneck in SoC design methodology. A major challenge during post-silicon debug is the limited observability of internal signals. Existing approaches try to select a small set of beneficial trace signals that can maximize observability. Unfortunately, these techniques do not consider design constraints such as routability of the selected signals or routing congestion. Therefore, in reality, it may not be possible to route the selected signals. We propose a layout-aware signal selection algorithm that takes into account both observability and routing congestion. Our experimental results demonstrate that our proposed approach can select routing friendly trace signals with negligible impact on observability.","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":"592 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121981451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Diagnosis of Gate Delay Faults in the Presence of Clock Delay Faults 存在时钟延迟故障的门延迟故障诊断
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.60
Y. Higami, Hiroshi Takahashi, Shin-ya Kobayashi, K. Saluja
This paper presents a diagnosis method for gate delay faults in the presence of clock delay faults. The method deduces candidate faults using a single gate delay fault dictionary and a single clock delay fault dictionary, which contain the information of latest transition time of signals as well as output logic values. To reduce the diagnostic ambiguity we remove those faults from the candidate fault list which provide a contradiction between the circuit responses and responses stored in the dictionary. Since the dictionary is not generated by considering the simultaneous existence of a gate delay fault and a clock delay fault, some heuristic parameters are introduced in order to compensate the difference between the dictionaries and the responses in a circuit under diagnosis.
提出了在存在时钟延迟故障的情况下,门延迟故障的诊断方法。该方法利用包含信号最新过渡时间信息和输出逻辑值的单门延迟故障字典和单时钟延迟故障字典推断候选故障。为了减少诊断歧义,我们从候选故障列表中去除那些在电路响应和字典中存储的响应之间提供矛盾的故障。由于字典不是在考虑门延迟故障和时钟延迟故障同时存在的情况下生成的,因此引入了一些启发式参数来补偿字典与诊断电路响应之间的差异。
{"title":"Diagnosis of Gate Delay Faults in the Presence of Clock Delay Faults","authors":"Y. Higami, Hiroshi Takahashi, Shin-ya Kobayashi, K. Saluja","doi":"10.1109/ISVLSI.2014.60","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.60","url":null,"abstract":"This paper presents a diagnosis method for gate delay faults in the presence of clock delay faults. The method deduces candidate faults using a single gate delay fault dictionary and a single clock delay fault dictionary, which contain the information of latest transition time of signals as well as output logic values. To reduce the diagnostic ambiguity we remove those faults from the candidate fault list which provide a contradiction between the circuit responses and responses stored in the dictionary. Since the dictionary is not generated by considering the simultaneous existence of a gate delay fault and a clock delay fault, some heuristic parameters are introduced in order to compensate the difference between the dictionaries and the responses in a circuit under diagnosis.","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126419316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Feedback, Runtime Technique for Scaling the Frequency in GPU Architectures 一种用于GPU架构中缩放频率的反馈运行时技术
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.34
Yue Wang, N. Ranganathan
This paper presents a dynamic frequency scaling (DFS) technique, PIDDFS, targeting on real-time applications running on GPU platforms. PIDDFS technique applies a feedback controlling algorithm, Proportional-Integral-Derivative (PID), to scale the frequencies of core domain and DRAM domains based on memory access statistics. The major goal of PIDDFS is minimizing the energy consumption while the memory traffic is intensive or even causes the pipeline to stall. Performance can also be improved via increasing the frequency while the memory traffic is in a starving status. Based on the feedback, closed-loop controlling model with proper leading and lagging phases, PIDDFS can respond timely towards the variations during runtime and ignore the insignificant noise that causes unnecessary frequency adjustments. The proposed technique has been simulated on GPGPU-Sim, a cycle-level simulator of GPU architecture and power savings have been modeled by GPUWattch. According to the benchmark simulation result, a power saving of more than 23% with a performance improvement of 4% is achieved at the same time. Stalled cycles caused by saturation of memory request queues are reduced over 40%.
本文针对运行在GPU平台上的实时应用,提出了一种动态频率缩放技术PIDDFS。PIDDFS技术采用一种反馈控制算法,比例-积分-导数(PID),根据内存访问统计来缩放核心域和DRAM域的频率。PIDDFS的主要目标是在内存流量很大甚至导致管道停止的情况下最大限度地减少能耗。当内存流量处于饥饿状态时,还可以通过增加频率来提高性能。PIDDFS基于合适的超前和滞后相位的反馈闭环控制模型,可以及时响应运行过程中的变化,忽略引起不必要频率调整的无关紧要的噪声。该技术在GPU架构的周期级模拟器GPGPU-Sim上进行了仿真,并通过gpuwatch进行了节能建模。根据基准测试仿真结果,该方案在节能23%以上的同时,实现了4%的性能提升。由内存请求队列饱和引起的停滞周期减少了40%以上。
{"title":"A Feedback, Runtime Technique for Scaling the Frequency in GPU Architectures","authors":"Yue Wang, N. Ranganathan","doi":"10.1109/ISVLSI.2014.34","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.34","url":null,"abstract":"This paper presents a dynamic frequency scaling (DFS) technique, PIDDFS, targeting on real-time applications running on GPU platforms. PIDDFS technique applies a feedback controlling algorithm, Proportional-Integral-Derivative (PID), to scale the frequencies of core domain and DRAM domains based on memory access statistics. The major goal of PIDDFS is minimizing the energy consumption while the memory traffic is intensive or even causes the pipeline to stall. Performance can also be improved via increasing the frequency while the memory traffic is in a starving status. Based on the feedback, closed-loop controlling model with proper leading and lagging phases, PIDDFS can respond timely towards the variations during runtime and ignore the insignificant noise that causes unnecessary frequency adjustments. The proposed technique has been simulated on GPGPU-Sim, a cycle-level simulator of GPU architecture and power savings have been modeled by GPUWattch. According to the benchmark simulation result, a power saving of more than 23% with a performance improvement of 4% is achieved at the same time. Stalled cycles caused by saturation of memory request queues are reduced over 40%.","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":" June","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120826396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analytical Model for Inverter Design Using Floating Gate Graphene Field Effect Transistors 用浮栅石墨烯场效应晶体管设计逆变器的解析模型
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.85
A. Nishad, Aditya Dalakoti, Ashish Jindal, Rahul Kumar, Somesh Kumar, Rohit Sharma
With device dimensions reaching their physical limits, there has been a tremendous focus on development of post CMOS technologies. Carbon based transistors, including graphene and carbon nanotubes, are seen as potential candidates to replace traditional CMOS devices. In that, floating gate graphene field effect transistors (F-GFETs) are preferred over dual gate graphene field effect transistors (D-GFETs) due to their ability to provide variable threshold voltage using a single power supply. In this paper, we present a novel analytical model for the design of a complementary inverter using floating gate bilayer graphene field-effect transistors (F-GFETs). Our proposed model describes the i-v characteristics of the F-GFET for all the regions of operation considering both hole and electron conduction. The i-v characteristics obtained using our model are compared with that of D-GFETs. Based on our proposed model, we obtain the transfer characteristics of a complementary inverter using F-GFETs. Our proposed inverter gives better transfer characteristics when compared with previously reported inverters using either F-GFET or chemically doped D-GFETs.
随着器件尺寸达到其物理极限,后CMOS技术的发展受到了极大的关注。碳基晶体管,包括石墨烯和碳纳米管,被视为取代传统CMOS器件的潜在候选者。其中,浮栅石墨烯场效应晶体管(f - gfet)比双栅石墨烯场效应晶体管(d - gfet)更受青睐,因为它们能够使用单个电源提供可变阈值电压。在本文中,我们提出了一种新的分析模型,用于设计使用浮栅双层石墨烯场效应晶体管(f - gfet)的互补逆变器。我们提出的模型描述了F-GFET在考虑空穴和电子传导的所有工作区域的i-v特性。利用我们的模型得到的i-v特性与d - gfet的特性进行了比较。基于所提出的模型,我们得到了利用f - gfet的互补逆变器的传输特性。与先前报道的使用F-GFET或化学掺杂d - gfet的逆变器相比,我们提出的逆变器具有更好的传输特性。
{"title":"Analytical Model for Inverter Design Using Floating Gate Graphene Field Effect Transistors","authors":"A. Nishad, Aditya Dalakoti, Ashish Jindal, Rahul Kumar, Somesh Kumar, Rohit Sharma","doi":"10.1109/ISVLSI.2014.85","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.85","url":null,"abstract":"With device dimensions reaching their physical limits, there has been a tremendous focus on development of post CMOS technologies. Carbon based transistors, including graphene and carbon nanotubes, are seen as potential candidates to replace traditional CMOS devices. In that, floating gate graphene field effect transistors (F-GFETs) are preferred over dual gate graphene field effect transistors (D-GFETs) due to their ability to provide variable threshold voltage using a single power supply. In this paper, we present a novel analytical model for the design of a complementary inverter using floating gate bilayer graphene field-effect transistors (F-GFETs). Our proposed model describes the i-v characteristics of the F-GFET for all the regions of operation considering both hole and electron conduction. The i-v characteristics obtained using our model are compared with that of D-GFETs. Based on our proposed model, we obtain the transfer characteristics of a complementary inverter using F-GFETs. Our proposed inverter gives better transfer characteristics when compared with previously reported inverters using either F-GFET or chemically doped D-GFETs.","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":"360 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120939860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of Process Variations on Reliability and Performance of 32-nm 6T SRAM at Near Threshold Voltage 近阈值电压下工艺变化对32nm 6T SRAM可靠性和性能的影响
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.73
L. Kou, W. H. Robinson
Power consumption has become a major concern of integrated circuit (IC) design, especially for SRAM design. Reducing the supply voltage to the near-threshold region is one method to reduce the power consumption. However, operating in this region makes the circuit more sensitive to process variations. In this paper, the impact of process variations on a 32-nm 6T SRAM cell under near-threshold voltage is studied using Monte Carlo simulations to evaluate the potential for soft errors. The double-exponential current source is used to simulate the strike of an ionizing particle onto nodes of interest. The results show that threshold voltage variability is a more significant parameter affecting the critical charge distribution of the circuit under both near-threshold voltage and nominal supply voltage. Also under near-threshold voltage, the leakage power in standby mode is reduced compared to the nominal supply voltage, and the write delay time of the SRAM circuit is much larger than the nominal supply voltage.
功耗已成为集成电路(IC)设计,特别是SRAM设计的主要关注点。将电源电压降低到近阈值区域是降低功耗的一种方法。然而,在这个区域工作使电路对工艺变化更加敏感。本文采用蒙特卡罗模拟方法,研究了在近阈值电压下,工艺变化对32nm 6T SRAM电池的影响,以评估软误差的可能性。双指数电流源用来模拟电离粒子撞击感兴趣的节点。结果表明,在近阈值电压和标称电源电压下,阈值电压变异性是影响电路临界电荷分布的更重要的参数。同样在接近阈值电压的情况下,待机模式下的漏功率也比标称电源电压低,SRAM电路的写入延迟时间也比标称电源电压大得多。
{"title":"Impact of Process Variations on Reliability and Performance of 32-nm 6T SRAM at Near Threshold Voltage","authors":"L. Kou, W. H. Robinson","doi":"10.1109/ISVLSI.2014.73","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.73","url":null,"abstract":"Power consumption has become a major concern of integrated circuit (IC) design, especially for SRAM design. Reducing the supply voltage to the near-threshold region is one method to reduce the power consumption. However, operating in this region makes the circuit more sensitive to process variations. In this paper, the impact of process variations on a 32-nm 6T SRAM cell under near-threshold voltage is studied using Monte Carlo simulations to evaluate the potential for soft errors. The double-exponential current source is used to simulate the strike of an ionizing particle onto nodes of interest. The results show that threshold voltage variability is a more significant parameter affecting the critical charge distribution of the circuit under both near-threshold voltage and nominal supply voltage. Also under near-threshold voltage, the leakage power in standby mode is reduced compared to the nominal supply voltage, and the write delay time of the SRAM circuit is much larger than the nominal supply voltage.","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131575745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Improving GA-Based NoC Mapping Algorithms Using a Formal Model 利用形式化模型改进基于ga的NoC映射算法
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.64
V. Palaniveloo, Jude Angelo Ambrose, A. Sowmya
Network on Chip (NoC) is a sophisticated communication infrastructure that provides quality of service (QoS) guarantees for a complex Systems-on-Chip (SoC) application. Some applications demand guaranteed end-to-end latency. Mapping algorithms are used to map an application on an NoC to satisfy the bandwidth constraints and end-to-end latency requirements. The design of the mapping algorithms determines their capability in reaching a near optimal or optimal solution. Genetic algorithms (GA) based NoC mapping algorithms are increasingly used for mapping. They search the mapping space efficiently using a cost function to estimate a performance parameter that represents the "cost" associated with the solution, in this case latency. Generally analytical models are used to estimate cost, however, analytical models are not able to accurately estimate worst-case end-to-end latency. Motivated by this, we are proposing to use a formal NoC model to accurately estimate end-to-end latency, and incorporate it into GA cost function. The capability of the proposed method to find a near optimal or optimal solution is demonstrated with sample applications.
片上网络(NoC)是一种复杂的通信基础设施,为复杂的片上系统(SoC)应用提供服务质量(QoS)保证。一些应用程序需要保证端到端延迟。映射算法用于将应用程序映射到NoC上,以满足带宽限制和端到端延迟要求。映射算法的设计决定了它们达到接近最优或最优解的能力。基于遗传算法(GA)的NoC映射算法越来越多地用于映射。它们使用成本函数来有效地搜索映射空间,以估计表示与解决方案相关的“成本”的性能参数,在这种情况下是延迟。通常使用分析模型来估计成本,然而,分析模型不能准确地估计最坏情况下的端到端延迟。基于此,我们建议使用正式的NoC模型来准确估计端到端延迟,并将其合并到GA成本函数中。通过实例应用证明了该方法能够找到近似最优解或最优解。
{"title":"Improving GA-Based NoC Mapping Algorithms Using a Formal Model","authors":"V. Palaniveloo, Jude Angelo Ambrose, A. Sowmya","doi":"10.1109/ISVLSI.2014.64","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.64","url":null,"abstract":"Network on Chip (NoC) is a sophisticated communication infrastructure that provides quality of service (QoS) guarantees for a complex Systems-on-Chip (SoC) application. Some applications demand guaranteed end-to-end latency. Mapping algorithms are used to map an application on an NoC to satisfy the bandwidth constraints and end-to-end latency requirements. The design of the mapping algorithms determines their capability in reaching a near optimal or optimal solution. Genetic algorithms (GA) based NoC mapping algorithms are increasingly used for mapping. They search the mapping space efficiently using a cost function to estimate a performance parameter that represents the \"cost\" associated with the solution, in this case latency. Generally analytical models are used to estimate cost, however, analytical models are not able to accurately estimate worst-case end-to-end latency. Motivated by this, we are proposing to use a formal NoC model to accurately estimate end-to-end latency, and incorporate it into GA cost function. The capability of the proposed method to find a near optimal or optimal solution is demonstrated with sample applications.","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131078196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Processor Design with Asymmetric Reliability 非对称可靠性处理器设计
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.63
Z. Wang, G. Paul, A. Chattopadhyay
Continuous shrinking of device size has introduced reliability as a new design challenge for embedded processors. Error mitigation techniques trade off reliability for other design metrics such as performance and power consumption. State-of-the-art fault-tolerant designs involve cross-layer error management, which lead to an over-protected system. To address the overhead issue, asymmetric reliability utilizes unequal protection levels for different system components based on various criticality requirements. In this paper, We propose a versatile asymmetric error detection/correction framework based on instruction-level vulnerability analysis. Inspired from information-theoretic view of processor as a noisy network, asymmetric error correction coding schemes are designed and exploited to efficiently trade off reliability for other performance constraints. Multiple novel asymmetric fault-tolerant design techniques are proposed, which are evaluated through a range of experiments.
器件尺寸的不断缩小为嵌入式处理器的可靠性带来了新的设计挑战。错误缓解技术以可靠性为代价换取其他设计指标,如性能和功耗。最先进的容错设计涉及跨层错误管理,这会导致过度保护系统。为了解决开销问题,非对称可靠性根据不同的临界要求对不同的系统组件使用不相等的保护级别。本文提出了一种基于指令级漏洞分析的通用非对称错误检测/纠正框架。受信息论观点的启发,处理器是一个有噪声的网络,设计和利用非对称纠错编码方案来有效地权衡可靠性和其他性能约束。提出了多种新的非对称容错设计技术,并通过一系列实验对其进行了评价。
{"title":"Processor Design with Asymmetric Reliability","authors":"Z. Wang, G. Paul, A. Chattopadhyay","doi":"10.1109/ISVLSI.2014.63","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.63","url":null,"abstract":"Continuous shrinking of device size has introduced reliability as a new design challenge for embedded processors. Error mitigation techniques trade off reliability for other design metrics such as performance and power consumption. State-of-the-art fault-tolerant designs involve cross-layer error management, which lead to an over-protected system. To address the overhead issue, asymmetric reliability utilizes unequal protection levels for different system components based on various criticality requirements. In this paper, We propose a versatile asymmetric error detection/correction framework based on instruction-level vulnerability analysis. Inspired from information-theoretic view of processor as a noisy network, asymmetric error correction coding schemes are designed and exploited to efficiently trade off reliability for other performance constraints. Multiple novel asymmetric fault-tolerant design techniques are proposed, which are evaluated through a range of experiments.","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Low Power Soft Error Tolerant Macro Synchronous Micro Asynchronous (MSMA) Pipeline 低功耗软容错宏同步微异步(MSMA)管道
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.59
F. Lodhi, S. R. Hasan, O. Hasan, F. Awwad
Advancement in deep submicron (DSM) technologies led to miniaturization. However, it also increased the vulnerability against some electrical and device non-idealities, including the soft errors. These errors are significant threat to the reliable functionality of digital circuits. Several techniques for the detection and deterrence of soft errors (to improve the reliability) have been proposed, both in synchronous and asynchronous domain. In this paper we propose a low power and soft error tolerant solution for synchronous systems that leverages the asynchronous pipeline within a synchronous framework. We named our technique as macro synchronous micro asynchronous (MSMA) pipeline. We provided a framework along with timing analysis of the MSMA technique. MSMA is implemented using a macro synchronous system and soft error tolerant and low power version of null convention logic (NCL) asynchronous circuit. It is found out that this solution can easily replace the intermediate stages of synchronous and asynchronous pipelines without changing its interface protocol. Such NCL asynchronous circuits can be used as a standard cell in the synchronous ASIC design flow. Power and performance analysis is done using electrical simulations, which shows that this techniques consumes at least 22% less power and 45% less energy delay product (EDP) compared to state-of-the-art solutions.
深亚微米(DSM)技术的进步导致了小型化。然而,它也增加了对一些电气和设备非理想性的脆弱性,包括软错误。这些误差严重威胁着数字电路的可靠性。在同步和异步领域,提出了几种软错误检测和威慑技术(以提高可靠性)。在本文中,我们提出了一种低功耗和软容错的同步系统解决方案,该方案利用同步框架内的异步管道。我们将这种技术命名为宏同步微异步(MSMA)管道。我们提供了一个框架以及MSMA技术的时序分析。MSMA采用宏同步系统和软容错低功耗零约定逻辑(NCL)异步电路实现。结果表明,该方案在不改变其接口协议的情况下,可以方便地替代同步和异步管道的中间阶段。这种NCL异步电路可以用作同步ASIC设计流程中的标准单元。功率和性能分析使用电气模拟完成,结果表明,与最先进的解决方案相比,该技术消耗的功率至少减少22%,能量延迟积(EDP)减少45%。
{"title":"Low Power Soft Error Tolerant Macro Synchronous Micro Asynchronous (MSMA) Pipeline","authors":"F. Lodhi, S. R. Hasan, O. Hasan, F. Awwad","doi":"10.1109/ISVLSI.2014.59","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.59","url":null,"abstract":"Advancement in deep submicron (DSM) technologies led to miniaturization. However, it also increased the vulnerability against some electrical and device non-idealities, including the soft errors. These errors are significant threat to the reliable functionality of digital circuits. Several techniques for the detection and deterrence of soft errors (to improve the reliability) have been proposed, both in synchronous and asynchronous domain. In this paper we propose a low power and soft error tolerant solution for synchronous systems that leverages the asynchronous pipeline within a synchronous framework. We named our technique as macro synchronous micro asynchronous (MSMA) pipeline. We provided a framework along with timing analysis of the MSMA technique. MSMA is implemented using a macro synchronous system and soft error tolerant and low power version of null convention logic (NCL) asynchronous circuit. It is found out that this solution can easily replace the intermediate stages of synchronous and asynchronous pipelines without changing its interface protocol. Such NCL asynchronous circuits can be used as a standard cell in the synchronous ASIC design flow. Power and performance analysis is done using electrical simulations, which shows that this techniques consumes at least 22% less power and 45% less energy delay product (EDP) compared to state-of-the-art solutions.","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards Making Private Circuits Practical: DPA Resistant Private Circuits 使专用电路实用:抗DPA专用电路
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.24
Jungmin Park, A. Tyagi
The differential power analysis (DPA) attack is a well known major threat to cryptographic devices such as smart cards or other embedded systems. Quantification of resistance or robustness of a cryptographic device against the differential power analysis attack is lacking. We propose a DPA effectiveness (inverse of robustness) metric. We develop a logic graph based computational method for DPA effectiveness. Based on our insights with DPA effectiveness measures of an adder we develop a countermeasure. It enhances the proposed DPA resistance metric in normal 0-private circuits to the level of t-private circuits for t ≥ 1 at a smaller area and delay overhead. It deploys EXOR sum-of-products (ESOP) expressions to make the power consumption independent of input values or intermediate values. The logic synthesis system SIS was modified to incorporate both the proposed DPA effectiveness metric computation and the DPA-resistance transformation. The experiments show that the area and delay overhead of the proposed design method are 59.8% and 19.4%, respectively, compared to the original ESOP circuits averaged over MCNC benchmark suite. This, however, still takes 37.7% less area and 6.4% lower delay compared to 1-private implementation of the MCNC benchmark suite while maintaining the same DPA resistance.
差分功率分析(DPA)攻击是众所周知的对加密设备(如智能卡或其他嵌入式系统)的主要威胁。对加密设备对差分功率分析攻击的抵抗力或稳健性的量化是缺乏的。我们提出了一个DPA有效性(鲁棒性逆)度量。提出了一种基于逻辑图的DPA有效性计算方法。根据我们对加法器DPA有效性测量的见解,我们制定了对策。它在较小的面积和延迟开销下,将普通0-专用电路中的DPA电阻度量提高到t-专用电路的水平。它部署了EXOR产品和(ESOP)表达式,使功耗独立于输入值或中间值。对逻辑综合系统SIS进行了改进,将所提出的DPA有效性度量计算和DPA-电阻变换结合起来。实验表明,与MCNC基准测试套件上的原始ESOP电路相比,该设计方法的面积和延迟开销分别为59.8%和19.4%。然而,与MCNC基准套件的1-private实现相比,这仍然减少了37.7%的面积和6.4%的延迟,同时保持了相同的DPA电阻。
{"title":"Towards Making Private Circuits Practical: DPA Resistant Private Circuits","authors":"Jungmin Park, A. Tyagi","doi":"10.1109/ISVLSI.2014.24","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.24","url":null,"abstract":"The differential power analysis (DPA) attack is a well known major threat to cryptographic devices such as smart cards or other embedded systems. Quantification of resistance or robustness of a cryptographic device against the differential power analysis attack is lacking. We propose a DPA effectiveness (inverse of robustness) metric. We develop a logic graph based computational method for DPA effectiveness. Based on our insights with DPA effectiveness measures of an adder we develop a countermeasure. It enhances the proposed DPA resistance metric in normal 0-private circuits to the level of t-private circuits for t ≥ 1 at a smaller area and delay overhead. It deploys EXOR sum-of-products (ESOP) expressions to make the power consumption independent of input values or intermediate values. The logic synthesis system SIS was modified to incorporate both the proposed DPA effectiveness metric computation and the DPA-resistance transformation. The experiments show that the area and delay overhead of the proposed design method are 59.8% and 19.4%, respectively, compared to the original ESOP circuits averaged over MCNC benchmark suite. This, however, still takes 37.7% less area and 6.4% lower delay compared to 1-private implementation of the MCNC benchmark suite while maintaining the same DPA resistance.","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125512451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
PUF Interfaces and their Security PUF接口及其安全性
Pub Date : 2014-07-09 DOI: 10.1109/ISVLSI.2014.90
Marten van Dijk, U. Rührmair
In practice, any integrated physical unclonable function (PUF) must be accessed through a logical interface. The interface may add additional functionalities such as access control, implement a (measurement) noise reduction layer, etc. In many PUF applications, the interface in fact hides the PUF itself: users only interact with the PUF's interface, and cannot "see" or verify what is behind the interface. This immediately gives rise to a security problem: how does the user know he is interacting with a properly behaving interface wrapped around a proper PUF? This question is not merely theoretical, but has strong relevance for PUF application security: It has been shown recently that a badly behaving interface could, e.g., log a history of PUF queries which an adversary can read out using some trapdoor, or may output "false" PUF responses that the adversary can predict or influence RvD-IEEESP13. This allows attacks on a considerable number of PUF protocols RvD-IEEESP13. Since we currently do not know how to authenticate proper interface behavior in practice, the security of many PUF applications implicitly rests on the mere assumption that an adversary cannot modify or enhance a PUF interface in a "bad" way. This is quite a strong hypothesis, which should be stated more explicitly in the literature. In this paper, we explicitly address this point, following and partly expanding earlier works RvD-IEEESP13. We add to the picture the need for rigorous security which is characterized by some security parameter λ (an adversary has "negl(λ) probability to successfully software clone/model a PUF"). First, this means that we need so-called Strong PUFs with a larger than poly(λ) input/challenge space. In order to have scalable PUF designs (which do not blow up in chip surface or volume for increasing λ), we need PUF designs which constitute of a "algebraic" composition of smaller basic building blocks/devices. In such compositions the security relies on a less well-established computational hardness assumption which states that machine learning and other modeling methods with poly(λ) runtime cannot reliably produce a software clone of the PUF. To provide rigorous security we argue that the PUF interface needs a one-way postprocessing of PUF responses such that the security can be reduced to the infeasibility of breaking the one-way property of the postprocessing. This leads to a set of interesting problems: how do we add noise reduction into this picture and how do we minimize or eliminate side channel leakage of computed intermediate values in the post processing?
在实践中,任何集成的物理不可克隆功能(PUF)都必须通过逻辑接口访问。该接口可以添加额外的功能,如访问控制、实现(测量)降噪层等。在许多PUF应用程序中,接口实际上隐藏了PUF本身:用户只与PUF的接口交互,而不能“看到”或验证接口背后的内容。这立即引起了一个安全问题:用户如何知道他正在与围绕正确PUF的行为正确的接口进行交互?这个问题不仅仅是理论上的,而且与PUF应用程序安全性有很强的相关性:最近有研究表明,行为不良的接口可能记录PUF查询的历史记录,攻击者可以使用一些陷阱门读取这些记录,或者可能输出攻击者可以预测或影响RvD-IEEESP13的“错误”PUF响应。这允许对相当数量的PUF协议rvd - ieee - esp13进行攻击。由于我们目前不知道如何在实践中验证正确的接口行为,因此许多PUF应用程序的安全性隐含地依赖于对手不能以“不良”方式修改或增强PUF接口的假设。这是一个相当有力的假设,应该在文献中更明确地说明。在本文中,我们明确地解决了这一点,遵循并部分扩展了早期的工作RvD-IEEESP13。我们增加了对严格安全性的需求,其特征是某些安全参数λ(攻击者具有“成功软件克隆/建模PUF的概率为零(λ)”)。首先,这意味着我们需要具有大于poly(λ)输入/挑战空间的所谓强puf。为了具有可扩展的PUF设计(不会因增加λ而在芯片表面或体积上爆炸),我们需要PUF设计由较小的基本构建块/设备的“代数”组成。在这样的组合中,安全性依赖于一个不太完善的计算硬度假设,该假设指出,机器学习和其他具有poly(λ)运行时的建模方法不能可靠地产生PUF的软件克隆。为了提供严格的安全性,我们认为PUF接口需要对PUF响应进行单向后处理,以便将安全性降低到不可能破坏后处理的单向属性。这导致了一系列有趣的问题:我们如何在这张图片中加入降噪,以及我们如何在后期处理中最小化或消除计算中间值的侧通道泄漏?
{"title":"PUF Interfaces and their Security","authors":"Marten van Dijk, U. Rührmair","doi":"10.1109/ISVLSI.2014.90","DOIUrl":"https://doi.org/10.1109/ISVLSI.2014.90","url":null,"abstract":"In practice, any integrated physical unclonable function (PUF) must be accessed through a logical interface. The interface may add additional functionalities such as access control, implement a (measurement) noise reduction layer, etc. In many PUF applications, the interface in fact hides the PUF itself: users only interact with the PUF's interface, and cannot \"see\" or verify what is behind the interface. This immediately gives rise to a security problem: how does the user know he is interacting with a properly behaving interface wrapped around a proper PUF? This question is not merely theoretical, but has strong relevance for PUF application security: It has been shown recently that a badly behaving interface could, e.g., log a history of PUF queries which an adversary can read out using some trapdoor, or may output \"false\" PUF responses that the adversary can predict or influence RvD-IEEESP13. This allows attacks on a considerable number of PUF protocols RvD-IEEESP13. Since we currently do not know how to authenticate proper interface behavior in practice, the security of many PUF applications implicitly rests on the mere assumption that an adversary cannot modify or enhance a PUF interface in a \"bad\" way. This is quite a strong hypothesis, which should be stated more explicitly in the literature. In this paper, we explicitly address this point, following and partly expanding earlier works RvD-IEEESP13. We add to the picture the need for rigorous security which is characterized by some security parameter λ (an adversary has \"negl(λ) probability to successfully software clone/model a PUF\"). First, this means that we need so-called Strong PUFs with a larger than poly(λ) input/challenge space. In order to have scalable PUF designs (which do not blow up in chip surface or volume for increasing λ), we need PUF designs which constitute of a \"algebraic\" composition of smaller basic building blocks/devices. In such compositions the security relies on a less well-established computational hardness assumption which states that machine learning and other modeling methods with poly(λ) runtime cannot reliably produce a software clone of the PUF. To provide rigorous security we argue that the PUF interface needs a one-way postprocessing of PUF responses such that the security can be reduced to the infeasibility of breaking the one-way property of the postprocessing. This leads to a set of interesting problems: how do we add noise reduction into this picture and how do we minimize or eliminate side channel leakage of computed intermediate values in the post processing?","PeriodicalId":405755,"journal":{"name":"2014 IEEE Computer Society Annual Symposium on VLSI","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127835088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 IEEE Computer Society Annual Symposium on VLSI
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1