首页 > 最新文献

2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)最新文献

英文 中文
CUBA: Chained Unanimous Byzantine Agreement for Decentralized Platoon Management 古巴:分散排管理的链式一致拜占庭协议
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8715047
Emanuel Regnath, S. Steinhorst
Autonomous driving, vehicle platoons and smart traffic management will dramatically improve our transportation systems. In contrast to centralized approaches, which do not scale efficiently with the actual traffic load, a decentralized traffic management based on distributed consensus could provide a robust, fair and well-scaling solution for infrastructures of variable density.In this paper, we propose a distributed platoon management scheme, where platoon operations such as join or merge are decided by consensus over a Vehicular ad hoc network (VANET).Since conventional consensus protocols are not suitable for Cyber-Physical Systems (CPS) such as platoons, we introduce CUBA, a new validated and verifiable consensus protocol especially tailored to platoons, which considers their special communication topology.We demonstrate that CUBA only introduces a small communication overhead compared to the centralized, Leader-based approach and significantly outperforms related distributed approaches.
自动驾驶、车辆排和智能交通管理将极大地改善我们的交通系统。与集中式方法不能有效地随实际流量负载进行扩展相比,基于分布式共识的分散流量管理可以为可变密度的基础设施提供健壮、公平和良好的扩展解决方案。在本文中,我们提出了一种分布式队列管理方案,其中队列操作(如加入或合并)在车辆自组织网络(VANET)上由共识决定。由于传统的共识协议不适合排等网络物理系统(CPS),我们引入了CUBA,这是一种专门为排量身定制的新的经过验证和可验证的共识协议,它考虑了排的特殊通信拓扑结构。我们证明,与集中式的、基于leader的方法相比,CUBA只引入了很小的通信开销,并且显著优于相关的分布式方法。
{"title":"CUBA: Chained Unanimous Byzantine Agreement for Decentralized Platoon Management","authors":"Emanuel Regnath, S. Steinhorst","doi":"10.23919/DATE.2019.8715047","DOIUrl":"https://doi.org/10.23919/DATE.2019.8715047","url":null,"abstract":"Autonomous driving, vehicle platoons and smart traffic management will dramatically improve our transportation systems. In contrast to centralized approaches, which do not scale efficiently with the actual traffic load, a decentralized traffic management based on distributed consensus could provide a robust, fair and well-scaling solution for infrastructures of variable density.In this paper, we propose a distributed platoon management scheme, where platoon operations such as join or merge are decided by consensus over a Vehicular ad hoc network (VANET).Since conventional consensus protocols are not suitable for Cyber-Physical Systems (CPS) such as platoons, we introduce CUBA, a new validated and verifiable consensus protocol especially tailored to platoons, which considers their special communication topology.We demonstrate that CUBA only introduces a small communication overhead compared to the centralized, Leader-based approach and significantly outperforms related distributed approaches.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design Obfuscation through Selective Post-Fabrication Transistor-Level Programming 通过选择性制造后晶体管级编程设计混淆
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8714856
M. Shihab, Jingxiang Tian, Gaurav Rajavendra Reddy, Bo Hu, W. Swartz, Benjamin Carrión Schäfer, C. Sechen, Y. Makris
Widespread adoption of the fabless business model and utilization of third-party foundries have increased the exposure of sensitive designs to security threats such as intellectual property (IP) theft and integrated circuit (IC) counterfeiting. As a result, concerted interest in various design obfuscation schemes for deterring reverse engineering and/or unauthorized reproduction and usage of ICs has surfaced. To this end, in this paper we present a novel mechanism for structurally obfuscating sensitive parts of a design through post-fabrication TRAnsistor-level Programming (TRAP). We introduce a transistor-level programmable fabric and we discuss its unique advantages towards design obfuscation, as well as a customized CAD framework for seamlessly integrating this fabric in an ASIC design flow. We theoretically analyze the complexity of attacking TRAP-obfuscated designs through both brute-force and intelligent SAT-based attacks and we present a silicon implementation of a platform for experimenting with TRAP. Effectiveness of the proposed method is evaluated through selective obfuscation of various modules of a modern microprocessor design. Results corroborate that, as compared to an FPGA implementation, TRAP-based obfuscation offers superior resistance against both brute-force and oracle-guided SAT attacks, while incurring an order of magnitude less area, power and delay overhead.
无晶圆厂商业模式的广泛采用和第三方代工厂的使用增加了敏感设计面临安全威胁的风险,例如知识产权(IP)盗窃和集成电路(IC)假冒。因此,为了阻止逆向工程和/或未经授权的复制和使用ic,各种设计混淆方案的一致兴趣已经浮出水面。为此,在本文中,我们提出了一种通过制造后晶体管级编程(TRAP)在结构上混淆设计敏感部分的新机制。我们介绍了一个晶体管级可编程结构,并讨论了它在设计混淆方面的独特优势,以及一个定制的CAD框架,用于将该结构无缝集成到ASIC设计流程中。我们从理论上分析了通过暴力攻击和基于sat的智能攻击攻击TRAP混淆设计的复杂性,并提出了一个用于实验TRAP的硅实现平台。通过对现代微处理器设计中各个模块的选择性混淆来评估所提出方法的有效性。结果证实,与FPGA实现相比,基于trap的混淆提供了更好的抵抗暴力攻击和oracle引导的SAT攻击的能力,同时减少了一个数量级的面积、功率和延迟开销。
{"title":"Design Obfuscation through Selective Post-Fabrication Transistor-Level Programming","authors":"M. Shihab, Jingxiang Tian, Gaurav Rajavendra Reddy, Bo Hu, W. Swartz, Benjamin Carrión Schäfer, C. Sechen, Y. Makris","doi":"10.23919/DATE.2019.8714856","DOIUrl":"https://doi.org/10.23919/DATE.2019.8714856","url":null,"abstract":"Widespread adoption of the fabless business model and utilization of third-party foundries have increased the exposure of sensitive designs to security threats such as intellectual property (IP) theft and integrated circuit (IC) counterfeiting. As a result, concerted interest in various design obfuscation schemes for deterring reverse engineering and/or unauthorized reproduction and usage of ICs has surfaced. To this end, in this paper we present a novel mechanism for structurally obfuscating sensitive parts of a design through post-fabrication TRAnsistor-level Programming (TRAP). We introduce a transistor-level programmable fabric and we discuss its unique advantages towards design obfuscation, as well as a customized CAD framework for seamlessly integrating this fabric in an ASIC design flow. We theoretically analyze the complexity of attacking TRAP-obfuscated designs through both brute-force and intelligent SAT-based attacks and we present a silicon implementation of a platform for experimenting with TRAP. Effectiveness of the proposed method is evaluated through selective obfuscation of various modules of a modern microprocessor design. Results corroborate that, as compared to an FPGA implementation, TRAP-based obfuscation offers superior resistance against both brute-force and oracle-guided SAT attacks, while incurring an order of magnitude less area, power and delay overhead.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132640703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Desieve the Attacker: Thwarting IP Theft in Sieve-Valve-based Biochips 设计攻击者:在基于筛网阀的生物芯片中挫败IP盗窃
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8715094
Mohammed Shayan, Sukanta Bhattacharjee, Yong-Ak Song, K. Chakrabarty, R. Karri
Researchers develop bioassays following rigorous experimentation in the lab that involves considerable fiscal and highly-skilled-person-hour investment. Previous work shows that a bioassay implementation can be reverse engineered by using images or video and control signals of the biochip. Hence, techniques must be devised to protect the intellectual property (IP) rights of the bioassay developer. This study is the first step in this direction and it makes the following contributions: (1) it introduces use of a sieve-valve as a security primitive to obfuscate bioassay implementations; (2) it shows how sieve-valves can be used to obscure biochip building blocks such as multiplexers and mixers; (3) it presents design rules and security metrics to design and measure obfuscated biochips. We assess the cost-security trade-offs associated with this solution and demonstrate practical sieve-valve based obfuscation on real-life biochips.
研究人员在实验室进行严格的实验后开发生物分析,这涉及大量的财政和高技能人员小时投入。先前的工作表明,生物测定的实施可以通过使用生物芯片的图像或视频和控制信号进行逆向工程。因此,必须设计技术来保护生物测定开发商的知识产权(IP)。这项研究是朝这个方向迈出的第一步,它做出了以下贡献:(1)它引入了使用筛阀作为安全原语来混淆生物测定的实施;(2)它显示了如何使用筛阀来模糊生物芯片构建块,如多路复用器和混合器;(3)提出了设计和测量模糊生物芯片的设计规则和安全指标。我们评估了与该解决方案相关的成本安全权衡,并在现实生活中的生物芯片上展示了实用的基于筛阀的混淆。
{"title":"Desieve the Attacker: Thwarting IP Theft in Sieve-Valve-based Biochips","authors":"Mohammed Shayan, Sukanta Bhattacharjee, Yong-Ak Song, K. Chakrabarty, R. Karri","doi":"10.23919/DATE.2019.8715094","DOIUrl":"https://doi.org/10.23919/DATE.2019.8715094","url":null,"abstract":"Researchers develop bioassays following rigorous experimentation in the lab that involves considerable fiscal and highly-skilled-person-hour investment. Previous work shows that a bioassay implementation can be reverse engineered by using images or video and control signals of the biochip. Hence, techniques must be devised to protect the intellectual property (IP) rights of the bioassay developer. This study is the first step in this direction and it makes the following contributions: (1) it introduces use of a sieve-valve as a security primitive to obfuscate bioassay implementations; (2) it shows how sieve-valves can be used to obscure biochip building blocks such as multiplexers and mixers; (3) it presents design rules and security metrics to design and measure obfuscated biochips. We assess the cost-security trade-offs associated with this solution and demonstrate practical sieve-valve based obfuscation on real-life biochips.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
IR-aware Power Net Routing for Multi-Voltage Mixed-Signal Design 基于红外感知的多电压混合信号电网路由设计
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8715166
Shuo-Hui Wang, Guan-Hong Liou, Yen-Yu Su, Mark Po-Hung Lin
Modern mixed-signal design usually contains multiple power signals with different supply voltages driving different sets of mixed-signal circuit blocks. As the process technology advances to nanometer era, IR drop becomes very significant, which may have great impact on circuit performance and reliability. Insufficient power supply to a circuit block will lead to performance degradation or even functional failure. Although such IR-drop problem can be minimized by widening metal wires or applying mesh routing structures of the power network, excessive metal usage of those power nets with different supply voltages will significantly increase both chip area and cost. This paper presents a new IR-aware routing method to simultaneously route multiple power nets in a mixed-signal design with the considerations of routing congestion, routing tree splitting, wire tapering, and metal layer optimization. Experimental results show that the presented method can effectively reduce total metal usage and satisfy IR-drop constraints.
现代混合信号设计通常包含多个不同电源电压的电源信号,驱动不同组的混合信号电路模块。随着工艺技术进入纳米时代,红外下降变得非常明显,对电路的性能和可靠性有很大的影响。电路块的供电不足将导致性能下降甚至功能失效。虽然可以通过加宽金属导线或采用电网的网状布线结构来最小化这种ir下降问题,但在不同供电电压的电网中,金属的过度使用将大大增加芯片面积和成本。在混合信号设计中,考虑路由拥塞、路由树分裂、导线变细和金属层优化等问题,提出了一种可感知红外的多电网同时路由的新方法。实验结果表明,该方法能有效降低金属总用量,满足红外降约束。
{"title":"IR-aware Power Net Routing for Multi-Voltage Mixed-Signal Design","authors":"Shuo-Hui Wang, Guan-Hong Liou, Yen-Yu Su, Mark Po-Hung Lin","doi":"10.23919/DATE.2019.8715166","DOIUrl":"https://doi.org/10.23919/DATE.2019.8715166","url":null,"abstract":"Modern mixed-signal design usually contains multiple power signals with different supply voltages driving different sets of mixed-signal circuit blocks. As the process technology advances to nanometer era, IR drop becomes very significant, which may have great impact on circuit performance and reliability. Insufficient power supply to a circuit block will lead to performance degradation or even functional failure. Although such IR-drop problem can be minimized by widening metal wires or applying mesh routing structures of the power network, excessive metal usage of those power nets with different supply voltages will significantly increase both chip area and cost. This paper presents a new IR-aware routing method to simultaneously route multiple power nets in a mixed-signal design with the considerations of routing congestion, routing tree splitting, wire tapering, and metal layer optimization. Experimental results show that the presented method can effectively reduce total metal usage and satisfy IR-drop constraints.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133547436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Binary Learning Framework for Hyperdimensional Computing 一种用于超维计算的二进制学习框架
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8714821
M. Imani, John G. Messerly, Fan Wu, Wang Pi, T. Simunic
Brain-inspired Hyperdimensional (HD) computing is a computing paradigm emulating a neuron’s activity in high-dimensional space. In practice, HD first encodes all data points to high-dimensional vectors, called hypervectors, and then performs the classification task in an efficient way using a well-defined set of operations. In order to provide acceptable classification accuracy, the current HD computing algorithms need to map data points to hypervectors with non-binary elements. However, working with non-binary vectors significantly increases the HD computation cost and the amount of memory requirement for both training and inference. In this paper, we propose BinHD, a novel learning framework which enables HD computing to be trained and tested using binary hypervectors. BinHD encodes data points to binary hypervectors and provides a framework which enables HD to perform the training task with significantly low resources and memory footprint. In inference, BinHD binarizes the model and simplifies the costly Cosine similarity used in existing HD computing algorithms to a hardware-friendly Hamming distance metric. In addition, for the first time, BinHD introduces the concept of learning rate in HD computing which gives an extra knob to the HD in order to control the training efficiency and accuracy. We accordingly design a digital hardware to accelerate BinHD computation. Our evaluations on four practical classification applications show that BinHD in training (inference) can achieve 12.4× and 6.3× (13.8× and 9.9×) energy efficiency and speedup as compared to the state-of-the-art HD computing algorithm while providing the similar classification accuracy.
脑启发的超维计算(HD)是一种模拟高维空间中神经元活动的计算范式。在实践中,HD首先将所有数据点编码为高维向量,称为超向量,然后使用一组定义良好的操作以有效的方式执行分类任务。为了提供可接受的分类精度,目前的HD计算算法需要将数据点映射到具有非二进制元素的超向量。然而,使用非二进制向量会显著增加HD计算成本和训练和推理所需的内存量。在本文中,我们提出了一种新的学习框架BinHD,它使HD计算能够使用二进制超向量进行训练和测试。BinHD将数据点编码为二进制超向量,并提供一个框架,使HD能够以显着低的资源和内存占用执行训练任务。在推理中,BinHD将模型二值化,并将现有HD计算算法中使用的昂贵的余弦相似度简化为硬件友好的汉明距离度量。此外,BinHD还首次在HD计算中引入了学习率的概念,为HD提供了一个额外的旋钮,以控制训练的效率和准确性。因此,我们设计了一个数字硬件来加速hd计算。我们对四种实际分类应用的评估表明,与最先进的HD计算算法相比,BinHD在训练(推理)中可以实现12.4倍和6.3倍(13.8倍和9.9倍)的能效和加速,同时提供相似的分类精度。
{"title":"A Binary Learning Framework for Hyperdimensional Computing","authors":"M. Imani, John G. Messerly, Fan Wu, Wang Pi, T. Simunic","doi":"10.23919/DATE.2019.8714821","DOIUrl":"https://doi.org/10.23919/DATE.2019.8714821","url":null,"abstract":"Brain-inspired Hyperdimensional (HD) computing is a computing paradigm emulating a neuron’s activity in high-dimensional space. In practice, HD first encodes all data points to high-dimensional vectors, called hypervectors, and then performs the classification task in an efficient way using a well-defined set of operations. In order to provide acceptable classification accuracy, the current HD computing algorithms need to map data points to hypervectors with non-binary elements. However, working with non-binary vectors significantly increases the HD computation cost and the amount of memory requirement for both training and inference. In this paper, we propose BinHD, a novel learning framework which enables HD computing to be trained and tested using binary hypervectors. BinHD encodes data points to binary hypervectors and provides a framework which enables HD to perform the training task with significantly low resources and memory footprint. In inference, BinHD binarizes the model and simplifies the costly Cosine similarity used in existing HD computing algorithms to a hardware-friendly Hamming distance metric. In addition, for the first time, BinHD introduces the concept of learning rate in HD computing which gives an extra knob to the HD in order to control the training efficiency and accuracy. We accordingly design a digital hardware to accelerate BinHD computation. Our evaluations on four practical classification applications show that BinHD in training (inference) can achieve 12.4× and 6.3× (13.8× and 9.9×) energy efficiency and speedup as compared to the state-of-the-art HD computing algorithm while providing the similar classification accuracy.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Cross-Layer Interactions in CPS for Performance and Certification 性能和认证的CPS跨层交互
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8715153
S. Chakraborty, James H. Anderson, M. Becker, H. Graeb, Samiran Halder, Ravindra Metta, L. Thiele, S. Tripakis, Anand Yeolekar
A central challenge in designing embedded control systems or cyber-physical systems (CPS) is that of translating high-level models of control algorithms into efficient implementations, while ensuring that model-level semantics are preserved. While a large body of techniques for designing provably correct control strategies exist in the control theory literature, when it comes to transforming mathematical descriptions of these strategies to an efficient implementation, the available means are surprisingly ad hoc in nature. Among other reasons, this is because of (i) implementation platform details not sufficiently being accounted for in controller models, (ii) side effects introduced in the code generation process, (iii) various compiler optimizations whose impact on the dynamics of the plant being controlled not being properly understood, (iv) the presence of analog components on the implementation platform whose behavior is difficult to model, (v) computation and communication delays that exist in an implementation but were not accounted for in the model, and (vi) also the effects of image/video processing whose accuracy and timing behavior are difficult to model. As we move towards designing autonomous systems, these issues become biting problems on the path to certification, and striking a balance between performance and certification. In this position paper, we discuss some of these challenges – that we formulate as the need for modeling the interactions between various implementation layers in a CPS – and potential research directions to address them.
设计嵌入式控制系统或网络物理系统(CPS)的核心挑战是将控制算法的高级模型转换为有效的实现,同时确保保留模型级语义。虽然在控制理论文献中存在大量设计可证明正确的控制策略的技术,但当涉及到将这些策略的数学描述转换为有效实现时,可用的方法在本质上是令人惊讶的。除其他原因外,这是因为(i)控制器模型中没有充分考虑实现平台的细节,(ii)代码生成过程中引入的副作用,(iii)各种编译器优化对被控制工厂动态的影响没有得到正确理解,(iv)实现平台上存在难以建模的模拟组件。(v)计算和通信延迟存在于实现中,但未在模型中考虑,以及(vi)图像/视频处理的影响,其准确性和定时行为难以建模。当我们转向设计自治系统时,这些问题成为认证道路上的棘手问题,并在性能和认证之间取得平衡。在这篇意见书中,我们讨论了其中的一些挑战——我们将其表述为对CPS中各个实现层之间的交互进行建模的需求——以及解决这些挑战的潜在研究方向。
{"title":"Cross-Layer Interactions in CPS for Performance and Certification","authors":"S. Chakraborty, James H. Anderson, M. Becker, H. Graeb, Samiran Halder, Ravindra Metta, L. Thiele, S. Tripakis, Anand Yeolekar","doi":"10.23919/DATE.2019.8715153","DOIUrl":"https://doi.org/10.23919/DATE.2019.8715153","url":null,"abstract":"A central challenge in designing embedded control systems or cyber-physical systems (CPS) is that of translating high-level models of control algorithms into efficient implementations, while ensuring that model-level semantics are preserved. While a large body of techniques for designing provably correct control strategies exist in the control theory literature, when it comes to transforming mathematical descriptions of these strategies to an efficient implementation, the available means are surprisingly ad hoc in nature. Among other reasons, this is because of (i) implementation platform details not sufficiently being accounted for in controller models, (ii) side effects introduced in the code generation process, (iii) various compiler optimizations whose impact on the dynamics of the plant being controlled not being properly understood, (iv) the presence of analog components on the implementation platform whose behavior is difficult to model, (v) computation and communication delays that exist in an implementation but were not accounted for in the model, and (vi) also the effects of image/video processing whose accuracy and timing behavior are difficult to model. As we move towards designing autonomous systems, these issues become biting problems on the path to certification, and striking a balance between performance and certification. In this position paper, we discuss some of these challenges – that we formulate as the need for modeling the interactions between various implementation layers in a CPS – and potential research directions to address them.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132501840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks 物联网网络中轻量级节点级恶意软件检测和网络级恶意软件限制
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8715057
Sai Manoj Pudukotai Dinakarrao, H. Sayadi, Hosein Mohammadi Makrani, Cameron Nowzari, S. Rafatirad, H. Homayoun
The sheer size of IoT networks being deployed today presents an "attack surface" and poses significant security risks at a scale never before encountered. In other words, a single device/node in a network that becomes infected with malware has the potential to spread malware across the network, eventually ceasing the network functionality. Simply detecting and quarantining the malware in IoT networks does not guarantee to prevent malware propagation. On the other hand, use of traditional control theory for malware confinement is not effective, as most of the existing works do not consider real-time malware control strategies that can be implemented using uncertain infection information of the nodes in the network or have the containment problem decoupled from network performance. In this work, we propose a two-pronged approach, where a runtime malware detector (HaRM) that employs Hardware Performance Counter (HPC) values to detect the malware and benign applications is devised. This information is fed during runtime to a stochastic model predictive controller to confine the malware propagation without hampering the network performance. With the proposed solution, a runtime malware detection accuracy of 92.21% with a runtime of 10ns is achieved, which is an order of magnitude faster than existing malware detection solutions. Synthesizing this output with the model predictive containment strategy lead to achieving an average network throughput of nearly 200% of that of IoT networks without any embedded defense.
当今部署的物联网网络的庞大规模呈现出“攻击面”,并以前所未有的规模构成重大安全风险。换句话说,网络中的单个设备/节点感染了恶意软件,就有可能在整个网络中传播恶意软件,最终使网络功能停止。简单地检测和隔离物联网网络中的恶意软件并不能保证防止恶意软件的传播。另一方面,利用传统的控制理论对恶意软件进行限制效果不佳,因为现有的研究大多没有考虑实时的恶意软件控制策略,这些策略可以利用网络中节点的不确定感染信息来实现,或者将遏制问题与网络性能解耦。在这项工作中,我们提出了一种双管齐下的方法,其中设计了一个使用硬件性能计数器(HPC)值来检测恶意软件和良性应用程序的运行时恶意软件检测器(HaRM)。在运行时将这些信息馈送给随机模型预测控制器,以限制恶意软件的传播而不影响网络性能。该方案在10ns的运行时间内实现了92.21%的运行时恶意软件检测准确率,比现有的恶意软件检测方案提高了一个数量级。将此输出与模型预测遏制策略相结合,可以实现物联网网络在没有任何嵌入式防御的情况下的平均网络吞吐量的近200%。
{"title":"Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks","authors":"Sai Manoj Pudukotai Dinakarrao, H. Sayadi, Hosein Mohammadi Makrani, Cameron Nowzari, S. Rafatirad, H. Homayoun","doi":"10.23919/DATE.2019.8715057","DOIUrl":"https://doi.org/10.23919/DATE.2019.8715057","url":null,"abstract":"The sheer size of IoT networks being deployed today presents an \"attack surface\" and poses significant security risks at a scale never before encountered. In other words, a single device/node in a network that becomes infected with malware has the potential to spread malware across the network, eventually ceasing the network functionality. Simply detecting and quarantining the malware in IoT networks does not guarantee to prevent malware propagation. On the other hand, use of traditional control theory for malware confinement is not effective, as most of the existing works do not consider real-time malware control strategies that can be implemented using uncertain infection information of the nodes in the network or have the containment problem decoupled from network performance. In this work, we propose a two-pronged approach, where a runtime malware detector (HaRM) that employs Hardware Performance Counter (HPC) values to detect the malware and benign applications is devised. This information is fed during runtime to a stochastic model predictive controller to confine the malware propagation without hampering the network performance. With the proposed solution, a runtime malware detection accuracy of 92.21% with a runtime of 10ns is achieved, which is an order of magnitude faster than existing malware detection solutions. Synthesizing this output with the model predictive containment strategy lead to achieving an average network throughput of nearly 200% of that of IoT networks without any embedded defense.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114375170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Vehicle Sequence Reordering with Cooperative Adaptive Cruise Control 基于协同自适应巡航控制的车辆序列重组
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8714722
Ta-Wei Huang, Yun-Yun Tsai, Chung-Wei Lin, Tsung-Yi Ho
With Cooperative Adaptive Cruise Control (CACC) systems, vehicles are allowed to communicate and cooperate with each other to form platoons and improve the traffic throughput, traffic performance, and energy efficiency. In this paper, we take into account the braking factors of different vehicles so that there is a desired platoon sequence which minimizes the platoon length. We formulate the vehicle sequence reordering problem and propose an algorithm to reorder vehicles to their desired platoon sequence.
协作式自适应巡航控制(Cooperative Adaptive Cruise Control, CACC)系统允许车辆之间相互通信和合作,形成队列,从而提高交通吞吐量、交通性能和能源效率。在本文中,我们考虑了不同车辆的制动因素,以便有一个理想的队列序列,使队列长度最小。提出了车辆序列重新排序问题,并提出了一种将车辆重新排序到所需队列序列的算法。
{"title":"Vehicle Sequence Reordering with Cooperative Adaptive Cruise Control","authors":"Ta-Wei Huang, Yun-Yun Tsai, Chung-Wei Lin, Tsung-Yi Ho","doi":"10.23919/DATE.2019.8714722","DOIUrl":"https://doi.org/10.23919/DATE.2019.8714722","url":null,"abstract":"With Cooperative Adaptive Cruise Control (CACC) systems, vehicles are allowed to communicate and cooperate with each other to form platoons and improve the traffic throughput, traffic performance, and energy efficiency. In this paper, we take into account the braking factors of different vehicles so that there is a desired platoon sequence which minimizes the platoon length. We formulate the vehicle sequence reordering problem and propose an algorithm to reorder vehicles to their desired platoon sequence.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Thermal Sensing Using Micro-ring Resonators in Optical Network-on-Chip 基于微环谐振器的片上光网络热传感
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8714844
Weichen Liu, Mengquan Li, Wanli Chang, Chunhua Xiao, Yiyuan Xie, Nan Guan, Lei Jiang
In this paper, we for the first time utilize the micro-ring resonators (MRs) in optical networks-on-chip (ONoCs) to implement thermal sensing without requiring additional hardware or chip area. The challenges in accuracy and reliability that arise from fabrication-induced process variations (PVs) and device-level wavelength tuning mechanism are resolved. We quantitatively model the intrinsic thermal sensitivity of MRs with finegrained consideration of wavelength tuning mechanism. Based on it, a novel PV-tolerant thermal sensor design is proposed. By exploiting the hidden ‘redundancy’ in wavelength division multiplexing (WDM) technique, our sensor achieves accurate and efficient temperature measurement with the capability of PV tolerance. Evaluation results based on professional photonic component and circuit simulations show an average of 86.49% improvement in measurement accuracy compared to the state-of-the-art on-chip thermal sensing approach using MRs. Our thermal sensor achieves stable performance in the ONoCs employing dense WDM with an inaccuracy of only 0.8650 K.
在本文中,我们首次在光片上网络(ONoCs)中利用微环谐振器(MRs)来实现热传感,而无需额外的硬件或芯片面积。解决了由制造引起的工艺变化(pv)和器件级波长调谐机制引起的精度和可靠性挑战。在精细考虑波长调谐机制的情况下,我们定量地模拟了MRs的固有热敏度。在此基础上,提出了一种新型耐pv热传感器的设计方案。通过利用波分复用(WDM)技术中隐藏的“冗余”,我们的传感器实现了精确高效的温度测量,并具有PV容差能力。基于专业光子元件和电路仿真的评估结果显示,与使用mrs的最先进的片上热感测方法相比,测量精度平均提高了86.49%。我们的热传感器在使用密集WDM的ONoCs中实现了稳定的性能,误差仅为0.8650 K。
{"title":"Thermal Sensing Using Micro-ring Resonators in Optical Network-on-Chip","authors":"Weichen Liu, Mengquan Li, Wanli Chang, Chunhua Xiao, Yiyuan Xie, Nan Guan, Lei Jiang","doi":"10.23919/DATE.2019.8714844","DOIUrl":"https://doi.org/10.23919/DATE.2019.8714844","url":null,"abstract":"In this paper, we for the first time utilize the micro-ring resonators (MRs) in optical networks-on-chip (ONoCs) to implement thermal sensing without requiring additional hardware or chip area. The challenges in accuracy and reliability that arise from fabrication-induced process variations (PVs) and device-level wavelength tuning mechanism are resolved. We quantitatively model the intrinsic thermal sensitivity of MRs with finegrained consideration of wavelength tuning mechanism. Based on it, a novel PV-tolerant thermal sensor design is proposed. By exploiting the hidden ‘redundancy’ in wavelength division multiplexing (WDM) technique, our sensor achieves accurate and efficient temperature measurement with the capability of PV tolerance. Evaluation results based on professional photonic component and circuit simulations show an average of 86.49% improvement in measurement accuracy compared to the state-of-the-art on-chip thermal sensing approach using MRs. Our thermal sensor achieves stable performance in the ONoCs employing dense WDM with an inaccuracy of only 0.8650 K.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130137271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
RTL-Aware Dataflow-Driven Macro Placement rtl感知数据流驱动的宏放置
Pub Date : 2019-03-25 DOI: 10.23919/DATE.2019.8714812
Alex Vidal-Obiols, J. Cortadella, Jordi Petit, Marc Galceran Oms, F. Martorell
When RTL designers define the hierarchy of a system, they exploit their knowledge about the conceptual abstractions devised during the design and the functional interactions between the logical components. This valuable information is often lost during physical synthesis. This paper proposes a novel multi-level approach for the macro placement problem of complex designs dominated by macro blocks, typically memories. By taking advantage of the hierarchy tree, the netlist is divided into blocks containing macros and standard cells, and their dataflow affinity is inferred considering the latency and flow width of their interaction. The layout is represented using slicing structures and generated with a top-down algorithm capable of handling blocks with both hard and soft components, aimed at wirelength minimization. These techniques have been applied to a set of large industrial circuits and compared against both a commercial floorplanner and handcrafted floorplans by expert back-end engineers. The proposed approach outperforms the commercial tool and produces solutions with similar quality to the best handcrafted floorplans. Therefore, the generated floorplans provide an excellent starting point for the physical design iterations and contribute to reduce turn-around time significantly.
当RTL设计人员定义系统的层次结构时,他们利用他们在设计过程中设计的概念抽象和逻辑组件之间的功能交互方面的知识。这些有价值的信息常常在物理合成过程中丢失。本文提出了一种新的多级方法来解决由宏块(通常是存储器)主导的复杂设计的宏放置问题。利用层次树的优势,将网络表划分为包含宏和标准单元的块,并根据宏和标准单元之间交互的延迟和流宽度推断出它们的数据流亲和力。该布局使用切片结构表示,并通过自上而下的算法生成,该算法能够处理具有硬组件和软组件的块,旨在最小化无线长度。这些技术已应用于一组大型工业电路,并与商业平面图和专业后端工程师手工制作的平面图进行了比较。所提出的方法优于商业工具,并产生与最佳手工制作平面图相似的质量解决方案。因此,生成的平面图为物理设计迭代提供了一个很好的起点,并有助于显著减少周转时间。
{"title":"RTL-Aware Dataflow-Driven Macro Placement","authors":"Alex Vidal-Obiols, J. Cortadella, Jordi Petit, Marc Galceran Oms, F. Martorell","doi":"10.23919/DATE.2019.8714812","DOIUrl":"https://doi.org/10.23919/DATE.2019.8714812","url":null,"abstract":"When RTL designers define the hierarchy of a system, they exploit their knowledge about the conceptual abstractions devised during the design and the functional interactions between the logical components. This valuable information is often lost during physical synthesis. This paper proposes a novel multi-level approach for the macro placement problem of complex designs dominated by macro blocks, typically memories. By taking advantage of the hierarchy tree, the netlist is divided into blocks containing macros and standard cells, and their dataflow affinity is inferred considering the latency and flow width of their interaction. The layout is represented using slicing structures and generated with a top-down algorithm capable of handling blocks with both hard and soft components, aimed at wirelength minimization. These techniques have been applied to a set of large industrial circuits and compared against both a commercial floorplanner and handcrafted floorplans by expert back-end engineers. The proposed approach outperforms the commercial tool and produces solutions with similar quality to the best handcrafted floorplans. Therefore, the generated floorplans provide an excellent starting point for the physical design iterations and contribute to reduce turn-around time significantly.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127355693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1