首页 > 最新文献

2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)最新文献

英文 中文
Memory Encryption Support for an FPGA-based RISC-V Implementation 基于fpga的RISC-V实现的内存加密支持
A. Cilardo
Security is an important driver for the evolution of the RISC-V architecture. Several initiatives aim at exploiting the privileged architecture and the Physical Memory Protection mechanisms foreseen by the RISC-V specification as a foundation for robust trusted execution environments. This short paper introduces a memory encryption unit fitting the organization of the RISC-V privileged architecture. The unit is suitable for very resource-constrained systems and is mainly targeted at FPGA devices. The design relies on a flexible and efficient stream cipher, the ChaCha algorithm. The work presents an overview of the system architecture and the detail of the FPGA-based implementation of the memory encryption unit, along with some experimental evaluation and comparisons with state-of-the-art contributions.
安全性是RISC-V架构发展的重要驱动力。一些计划旨在利用RISC-V规范所预见的特权架构和物理内存保护机制,作为可靠的可信执行环境的基础。本文介绍了一种适合RISC-V特权体系结构的内存加密单元。该单元适用于资源非常有限的系统,主要针对FPGA设备。该设计依赖于一种灵活高效的流密码——ChaCha算法。该工作概述了系统架构和基于fpga的内存加密单元实现的细节,以及一些实验评估和与最先进的贡献的比较。
{"title":"Memory Encryption Support for an FPGA-based RISC-V Implementation","authors":"A. Cilardo","doi":"10.1109/DTIS53253.2021.9505064","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505064","url":null,"abstract":"Security is an important driver for the evolution of the RISC-V architecture. Several initiatives aim at exploiting the privileged architecture and the Physical Memory Protection mechanisms foreseen by the RISC-V specification as a foundation for robust trusted execution environments. This short paper introduces a memory encryption unit fitting the organization of the RISC-V privileged architecture. The unit is suitable for very resource-constrained systems and is mainly targeted at FPGA devices. The design relies on a flexible and efficient stream cipher, the ChaCha algorithm. The work presents an overview of the system architecture and the detail of the FPGA-based implementation of the memory encryption unit, along with some experimental evaluation and comparisons with state-of-the-art contributions.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128986971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Limitations of Concatenating Boolean Operations in Memristive-Based Logic-In-Memory Solutions 基于记忆的内存逻辑解决方案中连接布尔运算的局限性
P. Inglese, E. Vatajelu, G. D. Natale
Emerging non-volatile memories are widely studied today as means to maximize energy efficiency and because they enable the so-called Computation-In-Memory. The Logic-inMemory (LIM) paradigm is a subset of the Computation-inMemory and it focuses on the execution of Boolean operations inside the memory. Among the most popular solutions, MAGIC and FELIX promise non-input destructive operations, as classical computation paradigms, allowing therefore to re-use the set of input data for several operations. In this paper we have analyzed the electrical behavior of some significant LIM implementations (MAGIC NOR and FELIX NAND) under various operation conditions. Our results show that it is not trivial to guarantee noninput destructive operations (in the case of FELIX NAND) and there is a real difficulty in concatenating several operations due to non-ideal intermediate results.
新兴的非易失性存储器如今被广泛研究,作为最大限度地提高能源效率的手段,因为它们使所谓的内存计算成为可能。Logic-inMemory (LIM)范式是compute - inmemory的一个子集,它关注的是在内存中执行布尔运算。在最流行的解决方案中,MAGIC和FELIX承诺非输入破坏性操作,作为经典计算范例,因此允许在多个操作中重用输入数据集。在本文中,我们分析了一些重要的LIM实现(MAGIC NOR和FELIX NAND)在各种操作条件下的电气行为。我们的结果表明,保证非输入破坏性操作(在FELIX NAND的情况下)并不是微不足道的,并且由于非理想的中间结果,在连接几个操作时存在真正的困难。
{"title":"On the Limitations of Concatenating Boolean Operations in Memristive-Based Logic-In-Memory Solutions","authors":"P. Inglese, E. Vatajelu, G. D. Natale","doi":"10.1109/DTIS53253.2021.9505096","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505096","url":null,"abstract":"Emerging non-volatile memories are widely studied today as means to maximize energy efficiency and because they enable the so-called Computation-In-Memory. The Logic-inMemory (LIM) paradigm is a subset of the Computation-inMemory and it focuses on the execution of Boolean operations inside the memory. Among the most popular solutions, MAGIC and FELIX promise non-input destructive operations, as classical computation paradigms, allowing therefore to re-use the set of input data for several operations. In this paper we have analyzed the electrical behavior of some significant LIM implementations (MAGIC NOR and FELIX NAND) under various operation conditions. Our results show that it is not trivial to guarantee noninput destructive operations (in the case of FELIX NAND) and there is a real difficulty in concatenating several operations due to non-ideal intermediate results.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127755278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FeFET based Logic-in-Memory: an overview 基于ffet的内存逻辑:概述
Cédric Marchand, I. O’Connor, Mayeul Cantan, E. Breyer, S. Slesazeck, T. Mikolajick
Emerging non-volatile memories are getting new interest in the system design community. They are used to design logic-in-memory circuits and propose alternatives to von-Neuman architectures. Hafnium oxide-based based ferroelectric memory technology, which is fully compatible with CMOS technologies is particularly interesting for logic-in-memory designs. Indeed, this compatibility leads to various possibilities for fine-grain logic in memory applications where the memory capable element is tightly integrated with the transistors in the system. Nonvolatile and energy efficient computing for Internet of things and embedded artificial intelligence are among the potential applications for this technology.In this article, we focus on ferroelectric field-effect transistors (FeFET) and present an overview of three different fine-grain logic-in-memory possibilities with FeFETs: custom operation designs, reconfigurable circuits and a hybrid memory element accessible by content or by address. All presented circuits have been designed within a test chip using 28nm technology provided by GLOBALFOUNDRIES.
新兴的非易失性存储器在系统设计界引起了新的兴趣。它们被用来设计内存逻辑电路,并提出冯-诺伊曼架构的替代方案。基于氧化铪的铁电存储器技术与CMOS技术完全兼容,对于内存逻辑设计尤其有趣。事实上,这种兼容性为存储器应用中的细粒度逻辑提供了各种可能性,其中存储器功能元件与系统中的晶体管紧密集成。物联网和嵌入式人工智能的非易失性和节能计算是该技术的潜在应用之一。在本文中,我们关注铁电场效应晶体管(FeFET),并概述了使用FeFET的三种不同的细粒度内存逻辑可能性:自定义操作设计,可重构电路和可通过内容或地址访问的混合存储元件。所有展示的电路都是在使用GLOBALFOUNDRIES提供的28nm技术的测试芯片内设计的。
{"title":"FeFET based Logic-in-Memory: an overview","authors":"Cédric Marchand, I. O’Connor, Mayeul Cantan, E. Breyer, S. Slesazeck, T. Mikolajick","doi":"10.1109/DTIS53253.2021.9505078","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505078","url":null,"abstract":"Emerging non-volatile memories are getting new interest in the system design community. They are used to design logic-in-memory circuits and propose alternatives to von-Neuman architectures. Hafnium oxide-based based ferroelectric memory technology, which is fully compatible with CMOS technologies is particularly interesting for logic-in-memory designs. Indeed, this compatibility leads to various possibilities for fine-grain logic in memory applications where the memory capable element is tightly integrated with the transistors in the system. Nonvolatile and energy efficient computing for Internet of things and embedded artificial intelligence are among the potential applications for this technology.In this article, we focus on ferroelectric field-effect transistors (FeFET) and present an overview of three different fine-grain logic-in-memory possibilities with FeFETs: custom operation designs, reconfigurable circuits and a hybrid memory element accessible by content or by address. All presented circuits have been designed within a test chip using 28nm technology provided by GLOBALFOUNDRIES.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117301231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimization-based Test Scheduling for IEEE 1687 Multi-Power Domain Networks Using Boolean Satisfiability 基于布尔可满足性的IEEE 1687多功率域网络测试调度优化
P. Habiby, S. Huhn, R. Drechsler
The IEEE 1687 Std. provides an efficient access methodology for embedded instruments in complex system-on-a-chip designs by introducing reconfigurable scan networks. This flexibility enables the reduction of the overall test access time, which significantly decreases the test costs compared to the conventional daisy-chaining method. However, the new access methodology strictly requires effective test schedulers that consider multi-power domains with individual constraints.This work proposes a novel test scheduler that orchestrates the Boolean Satisfiability problem in conjunction with Pseudo-Boolean optimization techniques. The effectiveness of the proposed scheduler is proven by considering networks with over one thousand of so-called instruments forming industrial representative benchmark candidates.
IEEE 1687标准通过引入可重构扫描网络,为复杂的片上系统设计中的嵌入式仪器提供了一种有效的访问方法。这种灵活性可以减少总体测试访问时间,与传统的菊花链方法相比,显著降低了测试成本。然而,新的访问方法严格要求有效的测试调度程序考虑具有单个约束的多功率域。这项工作提出了一种新的测试调度程序,它将布尔可满足性问题与伪布尔优化技术结合在一起。通过考虑由一千多个所谓的仪器组成的工业代表性基准候选的网络,证明了所提出的调度程序的有效性。
{"title":"Optimization-based Test Scheduling for IEEE 1687 Multi-Power Domain Networks Using Boolean Satisfiability","authors":"P. Habiby, S. Huhn, R. Drechsler","doi":"10.1109/DTIS53253.2021.9505098","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505098","url":null,"abstract":"The IEEE 1687 Std. provides an efficient access methodology for embedded instruments in complex system-on-a-chip designs by introducing reconfigurable scan networks. This flexibility enables the reduction of the overall test access time, which significantly decreases the test costs compared to the conventional daisy-chaining method. However, the new access methodology strictly requires effective test schedulers that consider multi-power domains with individual constraints.This work proposes a novel test scheduler that orchestrates the Boolean Satisfiability problem in conjunction with Pseudo-Boolean optimization techniques. The effectiveness of the proposed scheduler is proven by considering networks with over one thousand of so-called instruments forming industrial representative benchmark candidates.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132031422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Testing a RISCV-Like Architecture With an HDL-Based Virtual Tester 用基于hdl的虚拟测试仪测试类riscv架构
Nooshin Nosrati, Katayoon Basharkhah, Hanieh Totonchi Asl, Zahra Mahdavi, Z. Navabi
This paper is on a RISCV-like processor and developing a virtual tester for it. We define a Virtual Tester as a testbench in an HDL that performs test functions as an automatic test equipment does. The virtual tester is used for developing test sets, examining testability of our processor, or developing test procedures for it. We first choose our CUT as a version of RISCV and explain its ISA and eventually its RTL architecture. Various test techniques for this processor are studied, and then we will choose the IEEE Std.1149.1 for insertion into our processor and developing a virtual tester to interact with the test-ready processor model.
本文以类riscv处理器为研究对象,开发了一个虚拟测试仪。我们将虚拟测试仪定义为HDL中的测试平台,它执行与自动测试设备相同的测试功能。虚拟测试仪用于开发测试集,检查处理器的可测试性,或为其开发测试程序。我们首先选择我们的CUT作为RISCV的一个版本,并解释它的ISA和最终的RTL架构。研究了该处理器的各种测试技术,然后我们将选择IEEE Std.1149.1插入到我们的处理器中,并开发一个虚拟测试仪来与测试就绪的处理器模型进行交互。
{"title":"Testing a RISCV-Like Architecture With an HDL-Based Virtual Tester","authors":"Nooshin Nosrati, Katayoon Basharkhah, Hanieh Totonchi Asl, Zahra Mahdavi, Z. Navabi","doi":"10.1109/DTIS53253.2021.9505110","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505110","url":null,"abstract":"This paper is on a RISCV-like processor and developing a virtual tester for it. We define a Virtual Tester as a testbench in an HDL that performs test functions as an automatic test equipment does. The virtual tester is used for developing test sets, examining testability of our processor, or developing test procedures for it. We first choose our CUT as a version of RISCV and explain its ISA and eventually its RTL architecture. Various test techniques for this processor are studied, and then we will choose the IEEE Std.1149.1 for insertion into our processor and developing a virtual tester to interact with the test-ready processor model.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Benchmarking and optimization of trench-based multi-gate transistors in a 40 nm non-volatile memory technology 40纳米非易失性存储器技术中沟槽型多栅极晶体管的基准测试与优化
Romeric Gay, V. D. Marca, H. Aziza, A. Régnier, S. Niel, A. Marzaki
This paper addresses the design and characterization of different architectures of novels high-density multi-gate transistors manufactured in a 40 nm embedded Non-Volatile Memory technology. The proposed multi-gate architectures are based on vertical transistors integrated in deep trenches built alongside the main transistor. Thanks to the built-in trench, the proposed manufacturing process increases the transistor width without impacting its footprint. The electrical behaviour of the different multi-gate transistor architectures is studied and compared based on I-V characteristics. Relevant physical and electrical parameters such as the device footprint, the ON and OFF currents along with the threshold voltage and subthreshold slopes are extracted in order to determine the best candidate among the three studied architectures.
本文讨论了采用40纳米嵌入式非易失性存储器技术制造的新型高密度多栅极晶体管的不同架构的设计和特性。所提出的多栅极架构是基于垂直晶体管集成在与主晶体管相邻的深沟槽中。由于内置沟槽,提出的制造工艺增加了晶体管的宽度,而不影响其占地面积。基于I-V特性,研究和比较了不同多栅极晶体管结构的电学特性。提取相关的物理和电气参数,如器件占地面积、ON和OFF电流以及阈值电压和亚阈值斜率,以便在三种研究的架构中确定最佳候选。
{"title":"Benchmarking and optimization of trench-based multi-gate transistors in a 40 nm non-volatile memory technology","authors":"Romeric Gay, V. D. Marca, H. Aziza, A. Régnier, S. Niel, A. Marzaki","doi":"10.1109/DTIS53253.2021.9505093","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505093","url":null,"abstract":"This paper addresses the design and characterization of different architectures of novels high-density multi-gate transistors manufactured in a 40 nm embedded Non-Volatile Memory technology. The proposed multi-gate architectures are based on vertical transistors integrated in deep trenches built alongside the main transistor. Thanks to the built-in trench, the proposed manufacturing process increases the transistor width without impacting its footprint. The electrical behaviour of the different multi-gate transistor architectures is studied and compared based on I-V characteristics. Relevant physical and electrical parameters such as the device footprint, the ON and OFF currents along with the threshold voltage and subthreshold slopes are extracted in order to determine the best candidate among the three studied architectures.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129279322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation of state of the art EEPROM programming window closure during endurance degradation 最先进的EEPROM编程在耐久性退化过程中的窗口关闭仿真
F. Matteo, R. Simola, Franck Melul, K. Coulié, J. Postel-Pellerin, A. Régnier
The Electrically Erasable Programmable Read Only Memory (EEPROM) technology has been widely studied but EEPROM Technology Computer Aided-Design (TCAD) simulations still need to be improved to handle the rises of the quality requirements of the semiconductor market. In this paper, the impact of endurance degradation on EEPROM programming window and the corresponding TCAD simulation are investigated. Advanced calibrated TCAD simulation on 110nm node is used to evaluate the distribution of negative charges trapped in the tunnel (bulk) oxide during EEPROM cycling. The total negative charge evolution found by our simulation is in agreement with the well-known trapping power law found in the literature.
电可擦可编程只读存储器(EEPROM)技术已经得到了广泛的研究,但EEPROM技术的计算机辅助设计(TCAD)仿真仍然需要改进,以应对半导体市场对质量要求的提高。本文研究了寿命退化对EEPROM编程窗口的影响以及相应的TCAD仿真。采用先进的校准TCAD模拟技术在110nm节点上对EEPROM循环过程中隧道(体)氧化物中捕获的负电荷分布进行了评估。我们的模拟得到的总负电荷演化与文献中发现的著名的捕获幂定律是一致的。
{"title":"Simulation of state of the art EEPROM programming window closure during endurance degradation","authors":"F. Matteo, R. Simola, Franck Melul, K. Coulié, J. Postel-Pellerin, A. Régnier","doi":"10.1109/DTIS53253.2021.9505085","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505085","url":null,"abstract":"The Electrically Erasable Programmable Read Only Memory (EEPROM) technology has been widely studied but EEPROM Technology Computer Aided-Design (TCAD) simulations still need to be improved to handle the rises of the quality requirements of the semiconductor market. In this paper, the impact of endurance degradation on EEPROM programming window and the corresponding TCAD simulation are investigated. Advanced calibrated TCAD simulation on 110nm node is used to evaluate the distribution of negative charges trapped in the tunnel (bulk) oxide during EEPROM cycling. The total negative charge evolution found by our simulation is in agreement with the well-known trapping power law found in the literature.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117098855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Microarchitecture-aware Fault Models: Experimental Evidence and Cross-Layer Inference Methodology 微架构感知故障模型:实验证据和跨层推理方法
Ihab Alshaer, Brice Colombier, C. Deleuze, V. Beroulle, P. Maistri
Fault injection attacks are considered one of the major threats to cyber-physical systems. The increasing complexity of embedded microprocessors involves complicated behaviours in presence of such attacks. Realistic fault models are required to study code vulnerabilities and be able to protect digital systems from these attacks. However, inferring fault models using only limited observations of faulty microprocessors is difficult. In this article, we present experiments that show the difficulty of characterizing and modelling the fault injection effects. From there, we propose a complete approach for fault analysis to build proper fault models at different system levels, which will help in designing suitable countermeasures at reasonable cost.
故障注入攻击被认为是网络物理系统的主要威胁之一。嵌入式微处理器的复杂性日益增加,涉及到应对此类攻击的复杂行为。为了研究代码漏洞并保护数字系统免受这些攻击,需要现实的故障模型。然而,仅使用故障微处理器的有限观察来推断故障模型是困难的。在本文中,我们提出的实验表明,断层注入效应的表征和建模的困难。在此基础上,我们提出了一种完整的故障分析方法,在不同的系统级别建立合适的故障模型,这将有助于以合理的成本设计合适的对策。
{"title":"Microarchitecture-aware Fault Models: Experimental Evidence and Cross-Layer Inference Methodology","authors":"Ihab Alshaer, Brice Colombier, C. Deleuze, V. Beroulle, P. Maistri","doi":"10.1109/DTIS53253.2021.9505074","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505074","url":null,"abstract":"Fault injection attacks are considered one of the major threats to cyber-physical systems. The increasing complexity of embedded microprocessors involves complicated behaviours in presence of such attacks. Realistic fault models are required to study code vulnerabilities and be able to protect digital systems from these attacks. However, inferring fault models using only limited observations of faulty microprocessors is difficult. In this article, we present experiments that show the difficulty of characterizing and modelling the fault injection effects. From there, we propose a complete approach for fault analysis to build proper fault models at different system levels, which will help in designing suitable countermeasures at reasonable cost.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116584044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of Data Pre-Processing Techniques on Deep Learning Based Power Attacks 数据预处理技术对基于深度学习的功率攻击的影响
Abdullah Aljuffri, C. Reinbrecht, S. Hamdioui, M. Taouil
Power-based side channel attacks (SCAs) are recognized as a powerful type of hardware attacks. Recently, attacks based on deep learning (DL) neural networks have become popular due to their high efficiency. However, even these attacks face problems when sophisticated countermeasures exist. Pre-processing the input data is an effective way to improve the performance of such neural networks. Currently, only limited research has focused on exploring pre-processing techniques for DL-based attacks. In this paper, we propose to the best of our knowledge for the first time the usage of data transformation, data concatenation and stacked auto-encoder (encoder only) as pre-processing methods. Thereafter, we compare them with the existing techniques, namely data augmentation and stacked auto-encoder techniques. Our results show that the data transformation technique achieves the best results from the evaluated methods; it improves the validation accuracy from 75% to 95% and 23% to 26% for the RSA and AES implementations, respectively.
基于功率的侧信道攻击(sca)被认为是一种强大的硬件攻击。最近,基于深度学习(DL)神经网络的攻击因其高效率而受到欢迎。然而,即使是这些攻击,在存在复杂的对策时也会遇到问题。对输入数据进行预处理是提高神经网络性能的有效途径。目前,只有有限的研究集中在探索基于dl的攻击的预处理技术上。在本文中,我们首次提出使用数据转换、数据串联和堆叠自编码器(仅限编码器)作为预处理方法。然后,我们将它们与现有的数据增强和堆叠自编码器技术进行了比较。结果表明,数据变换技术在评价方法中效果最好;它将RSA和AES实现的验证精度分别从75%提高到95%和23%提高到26%。
{"title":"Impact of Data Pre-Processing Techniques on Deep Learning Based Power Attacks","authors":"Abdullah Aljuffri, C. Reinbrecht, S. Hamdioui, M. Taouil","doi":"10.1109/DTIS53253.2021.9505051","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505051","url":null,"abstract":"Power-based side channel attacks (SCAs) are recognized as a powerful type of hardware attacks. Recently, attacks based on deep learning (DL) neural networks have become popular due to their high efficiency. However, even these attacks face problems when sophisticated countermeasures exist. Pre-processing the input data is an effective way to improve the performance of such neural networks. Currently, only limited research has focused on exploring pre-processing techniques for DL-based attacks. In this paper, we propose to the best of our knowledge for the first time the usage of data transformation, data concatenation and stacked auto-encoder (encoder only) as pre-processing methods. Thereafter, we compare them with the existing techniques, namely data augmentation and stacked auto-encoder techniques. Our results show that the data transformation technique achieves the best results from the evaluated methods; it improves the validation accuracy from 75% to 95% and 23% to 26% for the RSA and AES implementations, respectively.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Innovative methods for Burn-In related Stress Metrics Computation 老化相关应力指标计算的创新方法
W. Ruggeri, P. Bernardi, S. Littardi, M. Reorda, D. Appello, C. Bertani, G. Pollaccia, V. Tancorre, R. Ugioli
Burn-In equipment provide both external and internal stress to the device under test. External stress, such as thermal stress, is provided by a climatic chamber or by socket-level local temperature forcing tools, and aims at aging the circuit material, while internal stress, such as electrical stress, consists in driving the circuit nodes to produce a high internal activity. To support internal stress, Burn-In test equipment is usually characterized by large memory capabilities required to store precomputed patterns that are then sequenced to the circuit inputs. Because of the increasing complexity and density of the new generations of SoCs, evaluating the effectiveness of the patterns applied to a Device under Test (DUT) through a simulation phase requires long periods of time. Moreover, topology-related considerations are becoming more and more important in modern high-density designs, so a way to include this information into the evaluation has to be devised. In this paper we show a feasible solution to this problem: the idea is to load in the DUT a pattern not by shifting inside of it a bit at a time but loading the entire pattern at once inside of it; this kind of procedure allows for conservative stress measures, thus it fits for stress analysis purposes. Moreover, a method to take the topology of the DUT into account when calculating the activity metrics is proposed, so to obtain stress metrics which can better represent the activity a circuit is subject to. An automotive chip accounting for about 20 million of gates is considered as a case of study. Resorting to it we show both the feasibility and the effectiveness of the proposed methodology.
老化设备为被测设备提供外部和内部应力。外部应力,如热应力,由气候室或插座级局部温度强制工具提供,旨在老化电路材料,而内部应力,如电应力,包括驱动电路节点产生高内部活性。为了支持内部应力,Burn-In测试设备通常具有较大的存储能力,需要存储预先计算的模式,然后将其排序到电路输入。由于新一代soc的复杂性和密度不断增加,通过模拟阶段评估应用于测试设备(DUT)的模式的有效性需要很长时间。此外,拓扑相关的考虑在现代高密度设计中变得越来越重要,因此必须设计一种将这些信息纳入评估的方法。在本文中,我们给出了一个解决这个问题的可行方案:其思想是在DUT中加载一个模式,而不是每次在它内部移动一点,而是在它内部立即加载整个模式;这种程序允许保守的应力测量,因此它适合应力分析的目的。此外,提出了一种在计算被测件活度度量时考虑被测件拓扑结构的方法,从而获得能更好地表示电路所受活度的应力度量。以约2000万个栅极的汽车芯片为例进行研究。通过它,我们证明了所提议的方法的可行性和有效性。
{"title":"Innovative methods for Burn-In related Stress Metrics Computation","authors":"W. Ruggeri, P. Bernardi, S. Littardi, M. Reorda, D. Appello, C. Bertani, G. Pollaccia, V. Tancorre, R. Ugioli","doi":"10.1109/DTIS53253.2021.9505067","DOIUrl":"https://doi.org/10.1109/DTIS53253.2021.9505067","url":null,"abstract":"Burn-In equipment provide both external and internal stress to the device under test. External stress, such as thermal stress, is provided by a climatic chamber or by socket-level local temperature forcing tools, and aims at aging the circuit material, while internal stress, such as electrical stress, consists in driving the circuit nodes to produce a high internal activity. To support internal stress, Burn-In test equipment is usually characterized by large memory capabilities required to store precomputed patterns that are then sequenced to the circuit inputs. Because of the increasing complexity and density of the new generations of SoCs, evaluating the effectiveness of the patterns applied to a Device under Test (DUT) through a simulation phase requires long periods of time. Moreover, topology-related considerations are becoming more and more important in modern high-density designs, so a way to include this information into the evaluation has to be devised. In this paper we show a feasible solution to this problem: the idea is to load in the DUT a pattern not by shifting inside of it a bit at a time but loading the entire pattern at once inside of it; this kind of procedure allows for conservative stress measures, thus it fits for stress analysis purposes. Moreover, a method to take the topology of the DUT into account when calculating the activity metrics is proposed, so to obtain stress metrics which can better represent the activity a circuit is subject to. An automotive chip accounting for about 20 million of gates is considered as a case of study. Resorting to it we show both the feasibility and the effectiveness of the proposed methodology.","PeriodicalId":435982,"journal":{"name":"2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","volume":"117 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133864441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1