首页 > 最新文献

2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)最新文献

英文 中文
NoC-sprinting: Interconnect for fine-grained sprinting in the dark silicon era noc -sprint:暗硅时代细粒度冲刺的互连
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593165
J. Zhan, Yuan Xie, Guangyu Sun
The rise of utilization wall limits the number of transistors that can be powered on in a single chip and results in a large region of dark silicon. While such phenomenon has led to disruptive innovation in computation, little work has been done for the Network-on-Chip (NoC) design. NoC not only directly influences the overall multi-core performance, but also consumes a significant portion of the total chip power. In this paper, we first reveal challenges and opportunities of designing power-efficient NoC in the dark silicon era. Then we propose NoC-Sprinting: based on the workload characteristics, it explores fine-grained sprinting that allows a chip to flexibly activate dark cores for instantaneous throughput improvement. In addition, it investigates topological/routing support and thermal-aware floorplanning for the sprinting process. Moreover, it builds an efficient network power-management scheme that can mitigate the dark silicon problems. Experiments on performance, power, and thermal analysis show that NoC-sprinting can provide tremendous speedup, increase sprinting duration, and meanwhile reduce the chip power significantly.
利用率的提高限制了单个芯片上可以通电的晶体管数量,并导致大面积的暗硅。虽然这种现象导致了计算领域的颠覆性创新,但对于片上网络(NoC)设计的研究却很少。NoC不仅直接影响到整体多核性能,而且还消耗了芯片总功耗的很大一部分。在本文中,我们首先揭示了在暗硅时代设计节能NoC的挑战和机遇。然后,我们提出了noc - sprint:基于工作负载特征,它探索了细粒度的sprint,允许芯片灵活地激活暗核,以实现瞬时吞吐量的提高。此外,它还研究了拓扑/路由支持和热敏感的冲刺过程的地板规划。此外,它建立了一个有效的网络电源管理方案,可以减轻暗硅问题。性能、功耗和热分析实验表明,noc -sprint可以提供巨大的加速,增加冲刺时间,同时显著降低芯片功耗。
{"title":"NoC-sprinting: Interconnect for fine-grained sprinting in the dark silicon era","authors":"J. Zhan, Yuan Xie, Guangyu Sun","doi":"10.1145/2593069.2593165","DOIUrl":"https://doi.org/10.1145/2593069.2593165","url":null,"abstract":"The rise of utilization wall limits the number of transistors that can be powered on in a single chip and results in a large region of dark silicon. While such phenomenon has led to disruptive innovation in computation, little work has been done for the Network-on-Chip (NoC) design. NoC not only directly influences the overall multi-core performance, but also consumes a significant portion of the total chip power. In this paper, we first reveal challenges and opportunities of designing power-efficient NoC in the dark silicon era. Then we propose NoC-Sprinting: based on the workload characteristics, it explores fine-grained sprinting that allows a chip to flexibly activate dark cores for instantaneous throughput improvement. In addition, it investigates topological/routing support and thermal-aware floorplanning for the sprinting process. Moreover, it builds an efficient network power-management scheme that can mitigate the dark silicon problems. Experiments on performance, power, and thermal analysis show that NoC-sprinting can provide tremendous speedup, increase sprinting duration, and meanwhile reduce the chip power significantly.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Reduction operator for wide-SIMDs reconsidered 重新考虑了宽simd的缩减算子
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593198
Luc Waeijen, Dongrui She, H. Corporaal, Yifan He
It has been shown that wide Single Instruction Multiple Data architectures (wide-SIMDs) can achieve high energy efficiency, especially in domains such as image and vision processing. In these and various other application domains, reduction is a frequently encountered operation, where multiple input elements need to be combined into a single element by an associative operation, e.g. addition or multiplication. There are many applications that require reduction such as: partial histogram merging, matrix multiplication and min/max-finding. Wide-SIMDs contain a large number of processing elements (PEs), which in general are connected by a minimal form of interconnect for scalability reasons. To efficiently support reduction operations on wide-SIMDs with such a minimal interconnect, we introduce two novel reduction algorithms which do not rely on complex communication networks or any dedicated hardware. The proposed approaches are compared with both dedicated hardware and other software solutions in terms of performance, area, and energy consumption. A practical case study demonstrates that the proposed software approach has much better generality, flexibility and no additional hardware cost. Compared to a dedicated hardware adder tree, the proposed software approach saves 6.8% area with a performance penalty of only 6.5%.
研究表明,宽单指令多数据架构(wide- simd)可以实现高能效,特别是在图像和视觉处理等领域。在这些和各种其他应用领域中,简化是一个经常遇到的操作,其中需要通过关联操作(例如加法或乘法)将多个输入元素组合为单个元素。有许多应用需要约简,例如:部分直方图合并,矩阵乘法和最小/最大查找。wide - simd包含大量的处理元件(pe),出于可伸缩性的原因,这些处理元件通常通过最小形式的互连连接。为了以最小的互连有效地支持宽simd上的约简操作,我们引入了两种新的约简算法,它们不依赖于复杂的通信网络或任何专用硬件。在性能、面积和能耗方面,将所提出的方法与专用硬件和其他软件解决方案进行了比较。实例研究表明,该方法具有较好的通用性和灵活性,且不增加硬件成本。与专用硬件加法器树相比,所提出的软件方法节省了6.8%的面积,而性能损失仅为6.5%。
{"title":"Reduction operator for wide-SIMDs reconsidered","authors":"Luc Waeijen, Dongrui She, H. Corporaal, Yifan He","doi":"10.1145/2593069.2593198","DOIUrl":"https://doi.org/10.1145/2593069.2593198","url":null,"abstract":"It has been shown that wide Single Instruction Multiple Data architectures (wide-SIMDs) can achieve high energy efficiency, especially in domains such as image and vision processing. In these and various other application domains, reduction is a frequently encountered operation, where multiple input elements need to be combined into a single element by an associative operation, e.g. addition or multiplication. There are many applications that require reduction such as: partial histogram merging, matrix multiplication and min/max-finding. Wide-SIMDs contain a large number of processing elements (PEs), which in general are connected by a minimal form of interconnect for scalability reasons. To efficiently support reduction operations on wide-SIMDs with such a minimal interconnect, we introduce two novel reduction algorithms which do not rely on complex communication networks or any dedicated hardware. The proposed approaches are compared with both dedicated hardware and other software solutions in terms of performance, area, and energy consumption. A practical case study demonstrates that the proposed software approach has much better generality, flexibility and no additional hardware cost. Compared to a dedicated hardware adder tree, the proposed software approach saves 6.8% area with a performance penalty of only 6.5%.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128547974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Retention trimming for wear reduction of flash memory storage systems 用于减少快闪记忆体储存系统磨损的保留修整
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593203
Liang Shi, Kaijie Wu, Mengying Zhao, C. Xue, E. Sha
NAND flash memory has been widely applied in embedded systems, personal computer systems, and data centers. However, with the development of flash memory, including its technology scaling and density improvement, the endurance of flash memory becomes a bottleneck. In this work, with the understanding of the relationship between data retention time and flash wearing, a retention trimming approach, which trims data retention time based on the time intervals between data updating, is proposed to reduce the wearing of flash memory. Reduced wearing of flash memory will improve the endurance of the flash memory. Extensive experimental results show that the proposed technique achieves significant wearing reduction for flash memory through retention trimming.
NAND闪存已广泛应用于嵌入式系统、个人计算机系统和数据中心。然而,随着闪存的发展,包括其技术的规模化和密度的提高,闪存的耐用性成为瓶颈。本文在了解数据保留时间与闪存磨损之间关系的基础上,提出了一种基于数据更新时间间隔来调整数据保留时间的方法,以减少闪存的磨损。减少闪存的磨损将提高闪存的耐用性。大量的实验结果表明,该技术通过保留修剪可以显著降低闪存的磨损。
{"title":"Retention trimming for wear reduction of flash memory storage systems","authors":"Liang Shi, Kaijie Wu, Mengying Zhao, C. Xue, E. Sha","doi":"10.1145/2593069.2593203","DOIUrl":"https://doi.org/10.1145/2593069.2593203","url":null,"abstract":"NAND flash memory has been widely applied in embedded systems, personal computer systems, and data centers. However, with the development of flash memory, including its technology scaling and density improvement, the endurance of flash memory becomes a bottleneck. In this work, with the understanding of the relationship between data retention time and flash wearing, a retention trimming approach, which trims data retention time based on the time intervals between data updating, is proposed to reduce the wearing of flash memory. Reduced wearing of flash memory will improve the endurance of the flash memory. Extensive experimental results show that the proposed technique achieves significant wearing reduction for flash memory through retention trimming.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128622770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An efficient bi-criteria flow channel routing algorithm for flow-based microfluidic biochips 基于流动的微流控生物芯片的高效双准则流道路由算法
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593084
Chun-Xun Lin, Chih-Hung Liu, I-Che Chen, D. T. Lee, Tsung-Yi Ho
Rapid growth in capacity makes flow-based microfluidic biochips a promising candidate for biochemical analysis because they can integrate more complex functions. However, as the number of components grows, the total length of flow channels between components must increase exponentially. Recent empirical studies show that long flow channels are vulnerable due to blocking and leakage defects. Thus, it is desirable to minimize the total length of flow channels for robustness. Also, for timing-sensitive biochemical assays, increase in the longest length of flow channel will delay the assay completion time and lead to variation of fluid, thereby affecting the correctness of outcome. The increasing number of components, including the pre-placed components, on the chip makes the flow channel routing problem even more complicated. In this paper, we propose an efficient obstacle-avoiding rectilinear Steiner minimum tree algorithm to deal with flow channel routing problem in flow-based microfluidic biochips. Based on the concept of Kruskal algorithm and formulating the considerations as a bi-criteria function, our algorithm is capable of simultaneously minimizing the total length and the longest length of flow channel.
容量的快速增长使基于流动的微流控生物芯片成为生物化学分析的有希望的候选者,因为它们可以集成更复杂的功能。然而,随着组件数量的增加,组件之间的流道总长度必须呈指数增长。近年来的实证研究表明,长流道易受堵塞和泄漏缺陷的影响。因此,为了稳健性,最好尽量减少流道的总长度。此外,对于时间敏感型生化检测,最长流道长度的增加会延迟检测完成时间,导致液体的变化,从而影响结果的正确性。芯片上的组件(包括预先放置的组件)数量的增加使得流道路由问题更加复杂。本文提出了一种高效的避障直线Steiner最小树算法来解决基于流动的微流控生物芯片中的流道路由问题。该算法基于Kruskal算法的概念,并将考虑事项表述为双准则函数,能够同时最小化流道的总长度和最长长度。
{"title":"An efficient bi-criteria flow channel routing algorithm for flow-based microfluidic biochips","authors":"Chun-Xun Lin, Chih-Hung Liu, I-Che Chen, D. T. Lee, Tsung-Yi Ho","doi":"10.1145/2593069.2593084","DOIUrl":"https://doi.org/10.1145/2593069.2593084","url":null,"abstract":"Rapid growth in capacity makes flow-based microfluidic biochips a promising candidate for biochemical analysis because they can integrate more complex functions. However, as the number of components grows, the total length of flow channels between components must increase exponentially. Recent empirical studies show that long flow channels are vulnerable due to blocking and leakage defects. Thus, it is desirable to minimize the total length of flow channels for robustness. Also, for timing-sensitive biochemical assays, increase in the longest length of flow channel will delay the assay completion time and lead to variation of fluid, thereby affecting the correctness of outcome. The increasing number of components, including the pre-placed components, on the chip makes the flow channel routing problem even more complicated. In this paper, we propose an efficient obstacle-avoiding rectilinear Steiner minimum tree algorithm to deal with flow channel routing problem in flow-based microfluidic biochips. Based on the concept of Kruskal algorithm and formulating the considerations as a bi-criteria function, our algorithm is capable of simultaneously minimizing the total length and the longest length of flow channel.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132205858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Selective inversion of inductance matrix for large-scale sparse RLC simulation 大规模稀疏RLC仿真中电感矩阵的选择性反演
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593213
Ifigeneia Apostolopoulou, Konstantis Daloukas, N. Evmorfopoulos, G. Stamoulis
The inverse of the inductance matrix (reluctance matrix) is amenable to sparsification to a much greater extent than the inductance matrix itself. However, the inversion and subsequent truncation of a large dense inductance matrix to obtain the sparse inverse is very time-consuming, and previously proposed window-based techniques cannot provide adequate accuracy. In this paper we propose a method for selective inversion of the inductance matrix to a prescribed sparsity ratio, which is also amenable to parallelization on modern architectures. Experimental results demonstrate its potential to provide efficient and accurate approximation of the reluctance matrix for simulation of large-scale RLC circuits.
电感矩阵的逆(磁阻矩阵)比电感矩阵本身更容易发生稀疏化。然而,大型密集电感矩阵的反演和随后的截断以获得稀疏逆是非常耗时的,并且先前提出的基于窗口的技术无法提供足够的精度。本文提出了一种将电感矩阵选择性反演到指定稀疏比的方法,该方法也适用于现代结构上的并行化。实验结果表明,该方法可以为大规模RLC电路的仿真提供高效、准确的磁阻矩阵近似。
{"title":"Selective inversion of inductance matrix for large-scale sparse RLC simulation","authors":"Ifigeneia Apostolopoulou, Konstantis Daloukas, N. Evmorfopoulos, G. Stamoulis","doi":"10.1145/2593069.2593213","DOIUrl":"https://doi.org/10.1145/2593069.2593213","url":null,"abstract":"The inverse of the inductance matrix (reluctance matrix) is amenable to sparsification to a much greater extent than the inductance matrix itself. However, the inversion and subsequent truncation of a large dense inductance matrix to obtain the sparse inverse is very time-consuming, and previously proposed window-based techniques cannot provide adequate accuracy. In this paper we propose a method for selective inversion of the inductance matrix to a prescribed sparsity ratio, which is also amenable to parallelization on modern architectures. Experimental results demonstrate its potential to provide efficient and accurate approximation of the reluctance matrix for simulation of large-scale RLC circuits.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128813966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An automobile detection algorithm development for automated emergency braking system 汽车自动紧急制动系统检测算法的开发
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593083
L. Xia, Tran Duc Chung, K. A. A. Kassim
Automated emergency braking (AEB) systems become more and more important than ever in modern vehicles for assisting drivers in emergency driving situations. They mostly require fusion techniques for vehicle detection (camera and radar or stereo-vision system) that require complicated algorithms and additional costs. These have caused AEB systems less attractive to the market. This paper presents an automobile detection algorithm using single camera for the AEB system. The algorithm contains three main steps: background subtraction, thresholding, and inverted U-shape back wheel detection. The simulation under MATLAB environment provides 87.25% and 78% of detection rate and accuracy, respectively for a 1080×1920 pixel input image; 88.25% and 73.5% of detection rate and accuracy for a 480×640 pixel input image. Processing time achieved are 0.156s and 0.0297s accordingly.
在现代车辆中,自动紧急制动系统(AEB)在紧急驾驶情况下的辅助作用越来越重要。它们大多需要融合技术用于车辆检测(摄像头和雷达或立体视觉系统),这需要复杂的算法和额外的成本。这导致AEB系统对市场的吸引力降低。提出了一种用于AEB系统的单摄像头汽车检测算法。该算法包括背景减除、阈值分割和倒u型后轮检测三个主要步骤。MATLAB环境下的仿真对1080×1920像素输入图像的检测率和准确率分别达到87.25%和78%;对480×640像素输入图像的检测率和准确率分别为88.25%和73.5%。实现的处理时间分别为0.156秒和0.0297秒。
{"title":"An automobile detection algorithm development for automated emergency braking system","authors":"L. Xia, Tran Duc Chung, K. A. A. Kassim","doi":"10.1145/2593069.2593083","DOIUrl":"https://doi.org/10.1145/2593069.2593083","url":null,"abstract":"Automated emergency braking (AEB) systems become more and more important than ever in modern vehicles for assisting drivers in emergency driving situations. They mostly require fusion techniques for vehicle detection (camera and radar or stereo-vision system) that require complicated algorithms and additional costs. These have caused AEB systems less attractive to the market. This paper presents an automobile detection algorithm using single camera for the AEB system. The algorithm contains three main steps: background subtraction, thresholding, and inverted U-shape back wheel detection. The simulation under MATLAB environment provides 87.25% and 78% of detection rate and accuracy, respectively for a 1080×1920 pixel input image; 88.25% and 73.5% of detection rate and accuracy for a 480×640 pixel input image. Processing time achieved are 0.156s and 0.0297s accordingly.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126845762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Time-analysable non-partitioned shared caches for real-time multicore systems 用于实时多核系统的可时间分析的非分区共享缓存
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593235
Mladen Slijepcevic, Leonidas Kosmidis, J. Abella, E. Quiñones, F. Cazorla
Shared caches in multicores challenge Worst-Case Execution Time (WCET) estimation due to inter-task interferences. Hardware and software cache partitioning address this issue although they complicate data sharing among tasks and the Operating System (OS) task scheduling and migration. In the context of Probabilistic Timing Analysis (PTA) time-randomised caches are used. We propose a new hardware mechanism to control inter-task interferences in shared time-randomised caches without the need of any hardware or software partitioning. Our proposed mechanism effectively bounds inter-task interferences by limiting the cache eviction frequency of each task, while providing tighter WCET estimates than cache partitioning algorithms. In a 4-core multicore processor setup our proposal improves cache partitioning by 56% in terms of guaranteed performance and 16% in terms of average performance.
由于任务间干扰,多核共享缓存对最坏情况执行时间(WCET)的估计提出了挑战。硬件和软件缓存分区解决了这个问题,尽管它们使任务之间的数据共享和操作系统(OS)任务调度和迁移变得复杂。在概率时序分析(PTA)的背景下,时间随机缓存被使用。我们提出了一种新的硬件机制来控制共享时间随机缓存中的任务间干扰,而不需要任何硬件或软件分区。我们提出的机制通过限制每个任务的缓存取出频率有效地限制任务间干扰,同时提供比缓存分区算法更严格的WCET估计。在4核多核处理器设置中,我们的建议在保证性能方面提高了56%,在平均性能方面提高了16%。
{"title":"Time-analysable non-partitioned shared caches for real-time multicore systems","authors":"Mladen Slijepcevic, Leonidas Kosmidis, J. Abella, E. Quiñones, F. Cazorla","doi":"10.1145/2593069.2593235","DOIUrl":"https://doi.org/10.1145/2593069.2593235","url":null,"abstract":"Shared caches in multicores challenge Worst-Case Execution Time (WCET) estimation due to inter-task interferences. Hardware and software cache partitioning address this issue although they complicate data sharing among tasks and the Operating System (OS) task scheduling and migration. In the context of Probabilistic Timing Analysis (PTA) time-randomised caches are used. We propose a new hardware mechanism to control inter-task interferences in shared time-randomised caches without the need of any hardware or software partitioning. Our proposed mechanism effectively bounds inter-task interferences by limiting the cache eviction frequency of each task, while providing tighter WCET estimates than cache partitioning algorithms. In a 4-core multicore processor setup our proposal improves cache partitioning by 56% in terms of guaranteed performance and 16% in terms of average performance.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
FIGHT-metric: Functional identification of gate-level hardware trustworthiness 战斗度量:门级硬件可信度的功能识别
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2596681
Dean Sullivan, J. Biggers, Guidong Zhu, Shaojie Zhang, Yier Jin
To address the concern that a complete detection scheme for effective hardware Trojan identification is lacking, we have designed an RTL security metric in order to evaluate the quality of IP cores (with the same or similar functionality) and counter Trojan attacks at the pre-fabrication stages of the IP design flow. The proposed security metric is constructed on top of two criteria, from which a quantitative security value can be assigned to the target circuit: 1) Distribution of controllability; 2) Existence of rare events. The proposed metric, called FIGHT, is an automated tool whereby malicious modifications to ICs and/or the vulnerability of the IP core can be identified, by monitoring both internal node controllability and the corresponding control value distribution plotted as a histogram. Experimentation on an RS232 module was performed to demonstrate our dual security criteria and proved security degradation to the IP module upon hardware Trojan insertion.
为了解决缺乏有效硬件木马识别的完整检测方案的问题,我们设计了一个RTL安全度量,以便在IP设计流程的预制阶段评估IP内核(具有相同或类似功能)的质量和反木马攻击。本文提出的安全度量是基于两个准则构建的,从两个准则中可以给目标电路分配一个定量的安全值:1)可控性的分布;2)稀有事件的存在。提出的度量称为FIGHT,是一种自动化工具,通过监控内部节点可控性和相应的直方图控制值分布,可以识别对ic和/或IP核的恶意修改。在RS232模块上进行了实验,以证明我们的双重安全标准,并证明了在硬件木马插入时IP模块的安全性降低。
{"title":"FIGHT-metric: Functional identification of gate-level hardware trustworthiness","authors":"Dean Sullivan, J. Biggers, Guidong Zhu, Shaojie Zhang, Yier Jin","doi":"10.1145/2593069.2596681","DOIUrl":"https://doi.org/10.1145/2593069.2596681","url":null,"abstract":"To address the concern that a complete detection scheme for effective hardware Trojan identification is lacking, we have designed an RTL security metric in order to evaluate the quality of IP cores (with the same or similar functionality) and counter Trojan attacks at the pre-fabrication stages of the IP design flow. The proposed security metric is constructed on top of two criteria, from which a quantitative security value can be assigned to the target circuit: 1) Distribution of controllability; 2) Existence of rare events. The proposed metric, called FIGHT, is an automated tool whereby malicious modifications to ICs and/or the vulnerability of the IP core can be identified, by monitoring both internal node controllability and the corresponding control value distribution plotted as a histogram. Experimentation on an RS232 module was performed to demonstrate our dual security criteria and proved security degradation to the IP module upon hardware Trojan insertion.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
High-level synthesis for run-time hardware Trojan detection and recovery 运行时硬件木马检测和恢复的高级综合
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593150
Xiaotong Cui, K. Ma, Liang Shi, Kaijie Wu
Current Integrated Circuit (IC) development process raises security concerns about hardware Trojan which are maliciously inserted to alter functional behavior or leak sensitive information. Most of the hardware Trojan detection techniques rely on a golden (trusted) IC against which to compare a suspected one. Hence they cannot be applied to designs using third party Intellectual Property (IP) cores where golden IP is unavailable. Moreover, due to the stealthy nature of hardware Trojan, there is no technique that can guarantee Trojan-free after manufacturing test. As a result, Trojan detection and recovery at run time acting as the last line of defense is necessary especially for mission-critical applications. In this paper, we propose design rules to assist run-time Trojan detection and fast recovery by exploring diversity of untrusted third party IP cores. With these design rules, we show the optimization approach to minimize the cost of implementation in terms of the number of different IP cores used by the implementation.
当前集成电路(IC)的发展过程中,对硬件木马的安全性提出了担忧,这些木马被恶意插入以改变功能行为或泄露敏感信息。大多数硬件木马检测技术依赖于黄金(可信)IC来比较可疑的IC。因此,它们不能应用于使用第三方知识产权(IP)核心的设计,因为黄金IP是不可用的。此外,由于硬件木马的隐蔽性,没有技术可以保证在制造测试后不受木马的影响。因此,运行时的木马检测和恢复作为最后一道防线是必要的,特别是对于任务关键型应用程序。在本文中,我们提出了设计规则,以协助运行时特洛伊木马检测和快速恢复通过探索不受信任的第三方IP核的多样性。通过这些设计规则,我们展示了根据实现使用的不同IP核的数量来最小化实现成本的优化方法。
{"title":"High-level synthesis for run-time hardware Trojan detection and recovery","authors":"Xiaotong Cui, K. Ma, Liang Shi, Kaijie Wu","doi":"10.1145/2593069.2593150","DOIUrl":"https://doi.org/10.1145/2593069.2593150","url":null,"abstract":"Current Integrated Circuit (IC) development process raises security concerns about hardware Trojan which are maliciously inserted to alter functional behavior or leak sensitive information. Most of the hardware Trojan detection techniques rely on a golden (trusted) IC against which to compare a suspected one. Hence they cannot be applied to designs using third party Intellectual Property (IP) cores where golden IP is unavailable. Moreover, due to the stealthy nature of hardware Trojan, there is no technique that can guarantee Trojan-free after manufacturing test. As a result, Trojan detection and recovery at run time acting as the last line of defense is necessary especially for mission-critical applications. In this paper, we propose design rules to assist run-time Trojan detection and fast recovery by exploring diversity of untrusted third party IP cores. With these design rules, we show the optimization approach to minimize the cost of implementation in terms of the number of different IP cores used by the implementation.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116123602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Multi-objective local-search optimization using reliability importance measuring 基于可靠性重要性度量的多目标局部搜索优化
Pub Date : 2014-06-01 DOI: 10.1145/2593069.2593164
Faramarz Khosravi, Felix Reimann, M. Glaß, J. Teich
In recent years, reliability has become a major issue and objective during the design of embedded systems. Here, different techniques to increase reliability like hardware-/software-based redundancy or component hardening are applied systematically during Design Space Exploration (DSE), aiming at achieving highest reliability at lowest possible cost. Existing approaches typically solely provide reliability measures, e. g. failure rate or Mean-Time-To-Failure (MTTF), to the optimization engine, poorly guiding the search which parts of the implementation to change. As a remedy, this work proposes an efficient approach that (a) determines the importance of resources with respect to the system's reliability and (b) employs this knowledge as part of a local search to guide the optimization engine which components/design decisions to investigate. First, we propose a novel approach to derive Importance Measures (IMs) using a structural evaluation of Success Trees (STs). Since ST-based reliability analysis is already used for MTTF calculation, our approach comes at almost no overhead. Second, we enrich the global DSE with a local search. Here, we propose strategies guided by the IMs that directly change and enhance the implemen- tation. In our experimental setup, the available measures to enhance reliability are the selection of hardening levels during resource allocation and software-based redundancy during task binding; exemplarily, the proposed local search considers the selected hardening levels. The results show that the proposed method outperforms a state-of-the-art approach regarding optimization quality, particularly in the search for highly-reliable yet affordable implementations - at negligible runtime overhead.
近年来,可靠性已成为嵌入式系统设计的主要问题和目标。在设计空间探索(DSE)过程中,系统地应用了不同的技术来提高可靠性,如基于硬件/软件的冗余或组件加固,旨在以尽可能低的成本实现最高的可靠性。现有的方法通常只向优化引擎提供可靠性度量,例如故障率或平均故障时间(MTTF),很难指导搜索实现的哪些部分需要更改。作为补救措施,本工作提出了一种有效的方法:(a)确定资源相对于系统可靠性的重要性,(b)将这些知识作为局部搜索的一部分,以指导优化引擎调查哪些组件/设计决策。首先,我们提出了一种利用成功树(STs)的结构评估来推导重要性度量(IMs)的新方法。由于基于st的可靠性分析已经用于MTTF计算,因此我们的方法几乎没有开销。其次,我们用局部搜索来丰富全局DSE。在此,我们提出了直接改变和加强实施的IMs指导策略。在我们的实验设置中,可用的提高可靠性的措施是在资源分配时选择强化级别和在任务绑定时基于软件的冗余;举例来说,所提出的局部搜索考虑了选定的加固级别。结果表明,所提出的方法在优化质量方面优于最先进的方法,特别是在搜索高可靠且负担得起的实现时——运行时开销可以忽略不计。
{"title":"Multi-objective local-search optimization using reliability importance measuring","authors":"Faramarz Khosravi, Felix Reimann, M. Glaß, J. Teich","doi":"10.1145/2593069.2593164","DOIUrl":"https://doi.org/10.1145/2593069.2593164","url":null,"abstract":"In recent years, reliability has become a major issue and objective during the design of embedded systems. Here, different techniques to increase reliability like hardware-/software-based redundancy or component hardening are applied systematically during Design Space Exploration (DSE), aiming at achieving highest reliability at lowest possible cost. Existing approaches typically solely provide reliability measures, e. g. failure rate or Mean-Time-To-Failure (MTTF), to the optimization engine, poorly guiding the search which parts of the implementation to change. As a remedy, this work proposes an efficient approach that (a) determines the importance of resources with respect to the system's reliability and (b) employs this knowledge as part of a local search to guide the optimization engine which components/design decisions to investigate. First, we propose a novel approach to derive Importance Measures (IMs) using a structural evaluation of Success Trees (STs). Since ST-based reliability analysis is already used for MTTF calculation, our approach comes at almost no overhead. Second, we enrich the global DSE with a local search. Here, we propose strategies guided by the IMs that directly change and enhance the implemen- tation. In our experimental setup, the available measures to enhance reliability are the selection of hardening levels during resource allocation and software-based redundancy during task binding; exemplarily, the proposed local search considers the selected hardening levels. The results show that the proposed method outperforms a state-of-the-art approach regarding optimization quality, particularly in the search for highly-reliable yet affordable implementations - at negligible runtime overhead.","PeriodicalId":433816,"journal":{"name":"2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1