首页 > 最新文献

Journal of Systems Architecture最新文献

英文 中文
Coarse-grained reconfigurable architectures for radio baseband processing: A survey 用于无线电基带处理的粗粒度可重构架构:调查
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-23 DOI: 10.1016/j.sysarc.2024.103243
Zohaib Hassan, Aleksandr Ometov, Elena Simona Lohan, Jari Nurmi

Emerging communication technologies, such as 5G and beyond, have introduced diverse requirements that demand high performance and energy efficiency at all levels. Furthermore, the real-time requirements of different services vary significantly — increasing the baseband processor design complexity and demand for flexible hardware platforms. This paper identifies the key characteristics of hardware platforms for baseband processing and describes the existing processing limitations in traditional architectures. In this paper, Coarse-Grained Reconfigurable Architecture (CGRA) is examined as a prospective hardware platform and its characteristic features are highlighted as compared to traditionally employed architectures that make it a suitable candidate for incorporation as a domain-specific accelerator in baseband processing applications. We survey various CGRAs from the last two decades (2004-2023) and analyze their distinct architectural features which can serve as a reference while designing CGRAs for baseband processing applications. Moreover, we investigate the existing challenges toward developing CGRAs for baseband processing and explore their potential solutions. We also provide an overview of the emerging research directions for CGRA and how they can contribute toward the development of advanced baseband processors. Lastly, we highlight a conceptual RISC-V+CGRA framework that can serve as a potential direction toward integrating CGRA in future baseband processing systems.

新兴通信技术(如 5G 及更先进的技术)提出了多样化的要求,需要在各个层面实现高性能和高能效。此外,不同服务的实时性要求也大相径庭--这增加了基带处理器设计的复杂性和对灵活硬件平台的需求。本文指出了基带处理硬件平台的主要特点,并介绍了传统架构中现有的处理限制。本文将粗粒度可重构架构(CGRA)作为一种前瞻性硬件平台进行研究,并强调了其与传统架构相比所具有的特点,这些特点使其成为基带处理应用中特定领域加速器的合适候选者。我们调查了过去二十年(2004-2023 年)中的各种 CGRA,并分析了其独特的架构特征,这些特征可作为设计基带处理应用 CGRA 的参考。此外,我们还调查了开发基带处理 CGRA 所面临的现有挑战,并探讨了潜在的解决方案。我们还概述了 CGRA 的新兴研究方向,以及它们如何促进先进基带处理器的发展。最后,我们强调了 RISC-V+CGRA 概念框架,该框架可作为将 CGRA 集成到未来基带处理系统的潜在方向。
{"title":"Coarse-grained reconfigurable architectures for radio baseband processing: A survey","authors":"Zohaib Hassan,&nbsp;Aleksandr Ometov,&nbsp;Elena Simona Lohan,&nbsp;Jari Nurmi","doi":"10.1016/j.sysarc.2024.103243","DOIUrl":"10.1016/j.sysarc.2024.103243","url":null,"abstract":"<div><p>Emerging communication technologies, such as 5G and beyond, have introduced diverse requirements that demand high performance and energy efficiency at all levels. Furthermore, the real-time requirements of different services vary significantly — increasing the baseband processor design complexity and demand for flexible hardware platforms. This paper identifies the key characteristics of hardware platforms for baseband processing and describes the existing processing limitations in traditional architectures. In this paper, Coarse-Grained Reconfigurable Architecture (CGRA) is examined as a prospective hardware platform and its characteristic features are highlighted as compared to traditionally employed architectures that make it a suitable candidate for incorporation as a domain-specific accelerator in baseband processing applications. We survey various CGRAs from the last two decades (2004-2023) and analyze their distinct architectural features which can serve as a reference while designing CGRAs for baseband processing applications. Moreover, we investigate the existing challenges toward developing CGRAs for baseband processing and explore their potential solutions. We also provide an overview of the emerging research directions for CGRA and how they can contribute toward the development of advanced baseband processors. Lastly, we highlight a conceptual RISC-V+CGRA framework that can serve as a potential direction toward integrating CGRA in future baseband processing systems.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103243"},"PeriodicalIF":3.7,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001802/pdfft?md5=7be2071289f906c1ad056f84de0a2459&pid=1-s2.0-S1383762124001802-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141783452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualized real-time workloads in containers and virtual machines 容器和虚拟机中的虚拟化实时工作负载
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-23 DOI: 10.1016/j.sysarc.2024.103238
Luca Abeni

Real-time virtualization is currently a hot topic, and there is much ongoing research on real-time Virtual Machines and hypervisors. However, most of the previous research focused either on reducing the latencies introduced by the virtualization stack (hypervisor, host Operating System, Virtual Machine scheduling, etc...) or analyzing the virtual CPU scheduling algorithms. Only a few works investigated the impact of the guest Operating System architecture on real-time performance or considered multiple performance metrics (latency, schedulability, startup times, resource consumption) at the same time. This paper compares various features of different virtualization technologies and guest Operating Systems, evaluating their suitability for serving real-time applications. The results indicate that solutions based on KVM (and an appropriate microvm) and the OSv unikernel can be considered viable alternatives to more traditional VMs or containers.

实时虚拟化是当前的热门话题,有关实时虚拟机和管理程序的研究也在不断深入。然而,以前的研究大多集中于减少虚拟化堆栈(管理程序、主机操作系统、虚拟机调度等)带来的延迟,或分析虚拟 CPU 调度算法。只有少数著作研究了客户操作系统架构对实时性能的影响,或同时考虑了多个性能指标(延迟、可调度性、启动时间、资源消耗)。本文比较了不同虚拟化技术和客户操作系统的各种特性,评估了它们对服务实时应用的适用性。结果表明,基于 KVM(和适当的 microvm)和 OSv unikernel 的解决方案可被视为更传统的虚拟机或容器的可行替代方案。
{"title":"Virtualized real-time workloads in containers and virtual machines","authors":"Luca Abeni","doi":"10.1016/j.sysarc.2024.103238","DOIUrl":"10.1016/j.sysarc.2024.103238","url":null,"abstract":"<div><p>Real-time virtualization is currently a hot topic, and there is much ongoing research on real-time Virtual Machines and hypervisors. However, most of the previous research focused either on reducing the latencies introduced by the virtualization stack (hypervisor, host Operating System, Virtual Machine scheduling, etc...) or analyzing the virtual CPU scheduling algorithms. Only a few works investigated the impact of the guest Operating System architecture on real-time performance or considered multiple performance metrics (latency, schedulability, startup times, resource consumption) at the same time. This paper compares various features of different virtualization technologies and guest Operating Systems, evaluating their suitability for serving real-time applications. The results indicate that solutions based on KVM (and an appropriate microvm) and the OSv unikernel can be considered viable alternatives to more traditional VMs or containers.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103238"},"PeriodicalIF":3.7,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001759/pdfft?md5=47eb3b51125a16edd19d29b9dd7294a7&pid=1-s2.0-S1383762124001759-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141783431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective 评估用于语义分割的深度神经网络中的单个事件中断:嵌入式系统视角
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-20 DOI: 10.1016/j.sysarc.2024.103242
Jon Gutiérrez-Zaballa , Koldo Basterretxea , Javier Echanobe

As the deployment of artificial intelligence (AI) algorithms at edge devices becomes increasingly prevalent, enhancing the robustness and reliability of autonomous AI-based perception and decision systems is becoming as relevant as precision and performance, especially in applications areas considered safety-critical such as autonomous driving and aerospace. This paper delves into the robustness assessment in embedded Deep Neural Networks (DNNs), particularly focusing on the impact of parameter perturbations produced by single event upsets (SEUs) on convolutional neural networks (CNN) for image semantic segmentation. By scrutinizing the layer-by-layer and bit-by-bit sensitivity of various encoder–decoder models to soft errors, this study thoroughly investigates the vulnerability of segmentation DNNs to SEUs and evaluates the consequences of techniques like model pruning and parameter quantization on the robustness of compressed models aimed at embedded implementations. The findings offer valuable insights into the mechanisms underlying SEU-induced failures that allow for evaluating the robustness of DNNs once trained in advance. Moreover, based on the collected data, we propose a set of practical lightweight error mitigation techniques with no memory or computational cost suitable for resource-constrained deployments. The code used to perform the fault injection (FI) campaign is available at https://github.com/jonGuti13/TensorFI2, while the code to implement proposed techniques is available at https://github.com/jonGuti13/parameterProtection.

随着人工智能(AI)算法在边缘设备上的部署日益普及,提高基于人工智能的自主感知和决策系统的鲁棒性和可靠性正变得与精度和性能同等重要,尤其是在自动驾驶和航空航天等被视为安全关键的应用领域。本文深入探讨了嵌入式深度神经网络(DNN)的鲁棒性评估,尤其关注了单次事件中断(SEU)产生的参数扰动对用于图像语义分割的卷积神经网络(CNN)的影响。通过仔细研究各种编码器-解码器模型对软误差的逐层和逐位敏感性,本研究深入探讨了分割 DNN 对 SEU 的脆弱性,并评估了模型剪枝和参数量化等技术对以嵌入式实现为目标的压缩模型的鲁棒性的影响。研究结果为了解 SEU 引发故障的机制提供了宝贵的见解,从而可以评估 DNN 预先训练后的鲁棒性。此外,基于收集到的数据,我们提出了一套实用的轻量级错误缓解技术,无需内存或计算成本,适用于资源受限的部署。用于执行故障注入(FI)活动的代码见 ,而用于实现建议技术的代码见 。
{"title":"Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective","authors":"Jon Gutiérrez-Zaballa ,&nbsp;Koldo Basterretxea ,&nbsp;Javier Echanobe","doi":"10.1016/j.sysarc.2024.103242","DOIUrl":"10.1016/j.sysarc.2024.103242","url":null,"abstract":"<div><p>As the deployment of artificial intelligence (AI) algorithms at edge devices becomes increasingly prevalent, enhancing the robustness and reliability of autonomous AI-based perception and decision systems is becoming as relevant as precision and performance, especially in applications areas considered safety-critical such as autonomous driving and aerospace. This paper delves into the robustness assessment in embedded Deep Neural Networks (DNNs), particularly focusing on the impact of parameter perturbations produced by single event upsets (SEUs) on convolutional neural networks (CNN) for image semantic segmentation. By scrutinizing the layer-by-layer and bit-by-bit sensitivity of various encoder–decoder models to soft errors, this study thoroughly investigates the vulnerability of segmentation DNNs to SEUs and evaluates the consequences of techniques like model pruning and parameter quantization on the robustness of compressed models aimed at embedded implementations. The findings offer valuable insights into the mechanisms underlying SEU-induced failures that allow for evaluating the robustness of DNNs once trained in advance. Moreover, based on the collected data, we propose a set of practical lightweight error mitigation techniques with no memory or computational cost suitable for resource-constrained deployments. The code used to perform the fault injection (FI) campaign is available at <span><span>https://github.com/jonGuti13/TensorFI2</span><svg><path></path></svg></span>, while the code to implement proposed techniques is available at <span><span>https://github.com/jonGuti13/parameterProtection</span><svg><path></path></svg></span>.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103242"},"PeriodicalIF":3.7,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001796/pdfft?md5=7c38696062f91b81f83a171baa075ab6&pid=1-s2.0-S1383762124001796-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141783432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time intelligent on-device monitoring of heart rate variability with PPG sensors 利用 PPG 传感器对心率变异性进行实时智能设备监测
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-18 DOI: 10.1016/j.sysarc.2024.103240
Jingye Xu, Yuntong Zhang, Mimi Xie, Wei Wang, Dakai Zhu

Heart rate variability (HRV) is a vital sign with the potential to predict stress and various diseases, including heart attack and arrhythmia. Typically, hospitals utilize electrocardiogram (ECG) devices to capture the heart’s bioelectrical signals, which are then used to calculate HRV values. However, this method is costly and inconvenient due to the requirement for stable connections to the body. In recent years, photoplethysmography (PPG) sensors, which collect reflective light signals, have gained attention as a cost-effective alternative for measuring heart health. However, accurately estimating HRV using PPG signals remains a challenging task due to the inherent sensitivity of PPG sensors. To address the challenges, this paper presents an on-device, low-cost machine learning-based system that aims to achieve high-accuracy HRV estimation in real-time. Firstly, we propose a novel unified performance and resource-aware neural network (UP-RaNN) search method that leverages grid search techniques to identify a neural network model that can deliver both high HRV accuracy and smooth operation on resource-limited devices. Secondly, we design a real-time HRV monitoring system using a resource-limited, ultra-low-power microcontroller unit (MCU). This system utilizes the neural network model obtained through the UP-RaNN to provide HRV readings from PPG data in real-time. Thirdly, we evaluate the proposed UP-RaNN method and the real-time HRV monitoring system by comparing its performance to state-of-the-art studies. Moreover, the system is enhanced with adaptive reconfiguration capability, enabling it to improve energy efficiency and adapt to varying demands during runtime. The results demonstrate that when deployed on an MSP430FR5994 development board running at 8 MHz, the trained deep neural network model obtained through our proposed UP-RaNN achieves HRV estimation in just 0.3 s per inference. Additionally, the model exhibits a better mean absolute percentage error ( 5.8%) than the state-of-the-art HRV estimation methods using PPG, while significantly reducing model complexity and computational time.

心率变异性(HRV)是一种重要的体征,可以预测压力和各种疾病,包括心脏病和心律失常。通常,医院利用心电图(ECG)设备捕捉心脏的生物电信号,然后用来计算心率变异值。然而,这种方法成本高昂且不方便,因为需要与人体保持稳定的连接。近年来,收集反射光信号的光心动图(PPG)传感器作为测量心脏健康状况的一种经济有效的替代方法受到了关注。然而,由于 PPG 传感器固有的敏感性,使用 PPG 信号准确估计心率变异仍然是一项具有挑战性的任务。为了应对这些挑战,本文提出了一种基于机器学习的设备上低成本系统,旨在实现高精度的实时心率变异估计。首先,我们提出了一种新颖的统一性能和资源感知神经网络(UP-RaNN)搜索方法,该方法利用网格搜索技术来识别神经网络模型,该模型既能提供高心率变异准确度,又能在资源有限的设备上流畅运行。其次,我们利用资源有限的超低功耗微控制器(MCU)设计了一个实时心率变异监测系统。该系统利用通过 UP-RaNN 获得的神经网络模型,实时提供来自 PPG 数据的心率变异读数。第三,我们通过与最先进的研究进行比较,评估了所提出的 UP-RaNN 方法和实时心率变异监测系统的性能。此外,该系统还增强了自适应重新配置能力,使其能够提高能效并适应运行期间的不同需求。结果表明,当部署在运行频率为 8 MHz 的 MSP430FR5994 开发板上时,通过我们提出的 UP-RaNN 获得的训练有素的深度神经网络模型可在每次推理仅需 0.3 秒的时间内实现心率变异估计。此外,与使用 PPG 的最先进心率变异估计方法相比,该模型表现出更好的平均绝对百分比误差(5.8%),同时显著降低了模型复杂度和计算时间。
{"title":"Real-time intelligent on-device monitoring of heart rate variability with PPG sensors","authors":"Jingye Xu,&nbsp;Yuntong Zhang,&nbsp;Mimi Xie,&nbsp;Wei Wang,&nbsp;Dakai Zhu","doi":"10.1016/j.sysarc.2024.103240","DOIUrl":"10.1016/j.sysarc.2024.103240","url":null,"abstract":"<div><p>Heart rate variability (HRV) is a vital sign with the potential to predict stress and various diseases, including heart attack and arrhythmia. Typically, hospitals utilize electrocardiogram (ECG) devices to capture the heart’s bioelectrical signals, which are then used to calculate HRV values. However, this method is costly and inconvenient due to the requirement for stable connections to the body. In recent years, photoplethysmography (PPG) sensors, which collect reflective light signals, have gained attention as a cost-effective alternative for measuring heart health. However, accurately estimating HRV using PPG signals remains a challenging task due to the inherent sensitivity of PPG sensors. To address the challenges, this paper presents an on-device, low-cost machine learning-based system that aims to achieve high-accuracy HRV estimation in real-time. Firstly, we propose a novel unified performance and resource-aware neural network (UP-RaNN) search method that leverages grid search techniques to identify a neural network model that can deliver both high HRV accuracy and smooth operation on resource-limited devices. Secondly, we design a real-time HRV monitoring system using a resource-limited, ultra-low-power microcontroller unit (MCU). This system utilizes the neural network model obtained through the UP-RaNN to provide HRV readings from PPG data in real-time. Thirdly, we evaluate the proposed UP-RaNN method and the real-time HRV monitoring system by comparing its performance to state-of-the-art studies. Moreover, the system is enhanced with adaptive reconfiguration capability, enabling it to improve energy efficiency and adapt to varying demands during runtime. The results demonstrate that when deployed on an MSP430FR5994 development board running at 8 MHz, the trained deep neural network model obtained through our proposed UP-RaNN achieves HRV estimation in just 0.3 s per inference. Additionally, the model exhibits a better mean absolute percentage error (<span><math><mo>∼</mo></math></span> 5.8%) than the state-of-the-art HRV estimation methods using PPG, while significantly reducing model complexity and computational time.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103240"},"PeriodicalIF":3.7,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141783373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPU implementation of the Frenet Path Planner for embedded autonomous systems: A case study in the F1tenth scenario 嵌入式自主系统 Frenet 路径规划器的 GPU 实施:F1tenth 场景案例研究
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-16 DOI: 10.1016/j.sysarc.2024.103239
Filippo Muzzini , Nicola Capodieci , Federico Ramanzin , Paolo Burgio

Autonomous vehicles are increasingly utilized in safety-critical and time-sensitive settings like urban environments and competitive racing. Planning maneuvers ahead is pivotal in these scenarios, where the onboard compute platform determines the vehicle’s future actions. This paper introduces an optimized implementation of the Frenet Path Planner, a renowned path planning algorithm, accelerated through GPU processing. Unlike existing methods, our approach expedites the entire algorithm, encompassing path generation and collision avoidance. We gauge the execution time of our implementation, showcasing significant enhancements over the CPU baseline (up to 22x of speedup). Furthermore, we assess the influence of different precision types (double, float, half) on trajectory accuracy, probing the balance between completion speed and computational precision. Moreover, we analyzed the impact on the execution time caused by the use of Nvidia Unified Memory and by the interference caused by other processes running on the same system. We also evaluate our implementation using the F1tenth simulator and in a real race scenario. The results position our implementation as a strong candidate for the new state-of-the-art implementation for the Frenet Path Planner algorithm.

自动驾驶汽车越来越多地应用于对安全和时间要求极高的场合,如城市环境和竞技比赛。在这些场景中,车载计算平台决定车辆的未来行动,因此提前规划机动至关重要。本文介绍了著名路径规划算法 Frenet Path Planner 的优化实现,并通过 GPU 处理进行了加速。与现有方法不同,我们的方法加速了整个算法,包括路径生成和避免碰撞。我们测量了我们实现的算法的执行时间,结果表明,与 CPU 基准相比,我们的算法有了显著提升(速度提高了 22 倍)。此外,我们还评估了不同精度类型(双倍、浮点、半倍)对轨迹精度的影响,探究了完成速度和计算精度之间的平衡。此外,我们还分析了使用 Nvidia 统一内存以及同一系统上运行的其他进程对执行时间的影响。我们还使用 F1tenth 模拟器和真实竞赛场景对我们的实现进行了评估。结果表明,我们的实施方案是 Frenet 路径规划算法新的最先进实施方案的有力候选者。
{"title":"GPU implementation of the Frenet Path Planner for embedded autonomous systems: A case study in the F1tenth scenario","authors":"Filippo Muzzini ,&nbsp;Nicola Capodieci ,&nbsp;Federico Ramanzin ,&nbsp;Paolo Burgio","doi":"10.1016/j.sysarc.2024.103239","DOIUrl":"10.1016/j.sysarc.2024.103239","url":null,"abstract":"<div><p>Autonomous vehicles are increasingly utilized in safety-critical and time-sensitive settings like urban environments and competitive racing. Planning maneuvers ahead is pivotal in these scenarios, where the onboard compute platform determines the vehicle’s future actions. This paper introduces an optimized implementation of the Frenet Path Planner, a renowned path planning algorithm, accelerated through GPU processing. Unlike existing methods, our approach expedites the entire algorithm, encompassing path generation and collision avoidance. We gauge the execution time of our implementation, showcasing significant enhancements over the CPU baseline (up to 22x of speedup). Furthermore, we assess the influence of different precision types (double, float, half) on trajectory accuracy, probing the balance between completion speed and computational precision. Moreover, we analyzed the impact on the execution time caused by the use of Nvidia Unified Memory and by the interference caused by other processes running on the same system. We also evaluate our implementation using the F1tenth simulator and in a real race scenario. The results position our implementation as a strong candidate for the new state-of-the-art implementation for the Frenet Path Planner algorithm.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103239"},"PeriodicalIF":3.7,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001760/pdfft?md5=766650cf5ed2c70a29ce4dfeae8db630&pid=1-s2.0-S1383762124001760-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141783433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEmu: Interrupt modeling from the logic hidden in the firmware IEmu: 从隐藏在固件中的逻辑进行中断建模
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-16 DOI: 10.1016/j.sysarc.2024.103237
Yuan Wei, Yongjun Wang, Lei Zhou, Xu Zhou, Zhiyuan Jiang

The security of embedded firmware has become a critical issue in light of the rapid development of the Internet of Things. Current security analysis approaches, such as dynamic analysis, still face bottlenecks and difficulties due to the wide variety of devices and systems. Recent dynamic analysis approaches for embedded firmware have attempted to provide a general solution but heavily rely on detailed device manuals. Meanwhile, approaches that do not rely on manuals have randomness in interrupt triggering, which weakens emulation fidelity and dynamic analysis efficiency. In this paper, we propose a redundant-check-based embedded firmware interrupt modeling and security analysis method that does not rely on commercial manuals. This method involves reverse engineering the control flow of firmware binary and accurately extracting the correct interrupt triggering rules to emulate embedded firmware. We have implemented functional prototypes on QEMU, called IEmu, and evaluated it with 26 firmware in different MCUs. Our results demonstrate significant advantages compared to the recent state-of-the-art approach. On average, IEmu has improved interrupt path exploration efficiency by 2.4 times and fuzz testing coverage by 19%. IEmu restored the interrupt triggering logic in the manual, and emulated three firmware where the state-of-the-art emulator have limitations and found vulnerabilities.

随着物联网的快速发展,嵌入式固件的安全性已成为一个关键问题。由于设备和系统种类繁多,目前的安全分析方法(如动态分析)仍面临瓶颈和困难。最近针对嵌入式固件的动态分析方法试图提供通用解决方案,但严重依赖于详细的设备手册。同时,不依赖手册的方法在中断触发方面存在随机性,从而削弱了仿真保真度和动态分析效率。在本文中,我们提出了一种不依赖商业手册的基于冗余校验的嵌入式固件中断建模和安全分析方法。该方法涉及对固件二进制的控制流进行逆向工程,并准确提取正确的中断触发规则来仿真嵌入式固件。我们在 QEMU 上实现了功能原型,称为 ,并用不同 MCU 中的 26 个固件对其进行了评估。我们的结果表明,与最近最先进的方法相比,它具有明显的优势。平均而言,中断路径探索效率提高了 2.4 倍,模糊测试覆盖率提高了 19%。我们还原了手册中的中断触发逻辑,并仿真了三个固件,发现了最先进仿真器的局限性和漏洞。
{"title":"IEmu: Interrupt modeling from the logic hidden in the firmware","authors":"Yuan Wei,&nbsp;Yongjun Wang,&nbsp;Lei Zhou,&nbsp;Xu Zhou,&nbsp;Zhiyuan Jiang","doi":"10.1016/j.sysarc.2024.103237","DOIUrl":"10.1016/j.sysarc.2024.103237","url":null,"abstract":"<div><p>The security of embedded firmware has become a critical issue in light of the rapid development of the Internet of Things. Current security analysis approaches, such as dynamic analysis, still face bottlenecks and difficulties due to the wide variety of devices and systems. Recent dynamic analysis approaches for embedded firmware have attempted to provide a general solution but heavily rely on detailed device manuals. Meanwhile, approaches that do not rely on manuals have randomness in interrupt triggering, which weakens emulation fidelity and dynamic analysis efficiency. In this paper, we propose a redundant-check-based embedded firmware interrupt modeling and security analysis method that does not rely on commercial manuals. This method involves reverse engineering the control flow of firmware binary and accurately extracting the correct interrupt triggering rules to emulate embedded firmware. We have implemented functional prototypes on QEMU, called <span>IEmu</span>, and evaluated it with 26 firmware in different MCUs. Our results demonstrate significant advantages compared to the recent state-of-the-art approach. On average, <span>IEmu</span> has improved interrupt path exploration efficiency by 2.4 times and fuzz testing coverage by 19%. <span>IEmu</span> restored the interrupt triggering logic in the manual, and emulated three firmware where the state-of-the-art emulator have limitations and found vulnerabilities.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103237"},"PeriodicalIF":3.7,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141783434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing 云计算中基于 iNTRU 的高效公钥认证关键词可搜索加密
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-11 DOI: 10.1016/j.sysarc.2024.103231
Yunfei Yao , Huiyan Chen , Ke Wang , Haoyang Yu , Yu Wang , Qingnan Wang

With the popularity of cloud computing, a large number of personal and corporate data are outsourced to the cloud. This centralized storage and processing mode not only improves the efficiency of data processing, but also brings challenges to data security and privacy. In view of the development of quantum computing, the traditional public key encryption may no longer be secure in the future. Therefore, it is particularly important to study the public key authenticated keyword searchable encryption (PEAKS) scheme which can resist quantum. This scheme can provide double guarantee for the data in cloud storage: one is to ensure the confidentiality of the data, so that the original content cannot be decrypted even within the cloud service provider; the other is to allow users to perform keyword searches on encrypted data without decrypting the data. This provides a balance of security and efficiency for data search and analysis in cloud computing environment. Recently, Genise et al. designed a Gadget-based iNTRU trapdoor, which has the advantages of small size and high efficiency. Therefore, we design an efficient and secure public key authentication keyword searchable encryption scheme based on iNTRU lattice. The overall running time of this scheme is only more than 300ms.

随着云计算的普及,大量个人和企业数据被外包给云端。这种集中存储和处理的模式不仅提高了数据处理的效率,也给数据安全和隐私带来了挑战。鉴于量子计算的发展,传统的公钥加密在未来可能不再安全。因此,研究能够抵御量子的公钥认证关键词可搜索加密(PEAKS)方案显得尤为重要。该方案可以为云存储中的数据提供双重保障:一是确保数据的保密性,即使在云服务提供商内部也无法解密原始内容;二是允许用户在不解密数据的情况下对加密数据进行关键词搜索。这为云计算环境中的数据搜索和分析提供了安全与效率的平衡。最近,Genise 等人设计了一种基于 Gadget 的 iNTRU 陷阱门,它具有体积小、效率高等优点。因此,我们设计了一种基于 iNTRU 格的高效、安全的公钥验证关键词可搜索加密方案。该方案的整体运行时间仅为 300ms 以上。
{"title":"Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing","authors":"Yunfei Yao ,&nbsp;Huiyan Chen ,&nbsp;Ke Wang ,&nbsp;Haoyang Yu ,&nbsp;Yu Wang ,&nbsp;Qingnan Wang","doi":"10.1016/j.sysarc.2024.103231","DOIUrl":"10.1016/j.sysarc.2024.103231","url":null,"abstract":"<div><p>With the popularity of cloud computing, a large number of personal and corporate data are outsourced to the cloud. This centralized storage and processing mode not only improves the efficiency of data processing, but also brings challenges to data security and privacy. In view of the development of quantum computing, the traditional public key encryption may no longer be secure in the future. Therefore, it is particularly important to study the public key authenticated keyword searchable encryption (PEAKS) scheme which can resist quantum. This scheme can provide double guarantee for the data in cloud storage: one is to ensure the confidentiality of the data, so that the original content cannot be decrypted even within the cloud service provider; the other is to allow users to perform keyword searches on encrypted data without decrypting the data. This provides a balance of security and efficiency for data search and analysis in cloud computing environment. Recently, Genise et al. designed a Gadget-based iNTRU trapdoor, which has the advantages of small size and high efficiency. Therefore, we design an efficient and secure public key authentication keyword searchable encryption scheme based on iNTRU lattice. The overall running time of this scheme is only more than 300ms.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103231"},"PeriodicalIF":3.7,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001681/pdfft?md5=787f51baa5f439d50792c9b2134f0118&pid=1-s2.0-S1383762124001681-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141694319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system 用于将物联网整合到医疗系统中的异构和明文可校验签名加密技术
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-09 DOI: 10.1016/j.sysarc.2024.103235
Abdalla Hadabi , Zheng Qu , Kuo-Hui Yeh , Chien-Ming Chen , Saru Kumari , Hu Xiong

Preserving the confidentiality and integrity of data transmission is paramount in the Internet of Things (IoT)-based healthcare systems. Current encryption techniques that allow plaintext checks primarily serve a specific cryptosystem, lacking the adaptability to work with a diverse system incorporating various cryptographic methods. To address this, we present a unique online/offline heterogeneous signcryption scheme with plaintext checkable encryption (HOOSC-PCE). This approach enables the transition of signcrypted messages from an identity-based cryptosystem (IBC) to a public key infrastructure (PKI) system, improving information interoperability. A key aspect of our scheme is its capacity to allow cloud servers to perform plaintext queries, facilitating efficient data searches using plaintext keywords over encrypted data. Furthermore, the signcryption process is divided into online and offline phases. The online phase handles tasks that require fewer resources, while the offline phase carries out more resource-intensive preparatory tasks. We rigorously tested the HOOSC-PCE scheme’s security by proving it secure under the Random Oracle Model (ROM). Meanwhile, compared to similar work, it effectively reduces computation costs by 46.39%, 19.45%, 18.73%, and 13.25% across offline encryption, online encryption, decryption, and search algorithms. The results indicate that the HOOSC-PCE is secure and efficient, confirming its feasibility for IoT-based healthcare systems.

在基于物联网(IoT)的医疗系统中,保护数据传输的机密性和完整性至关重要。目前允许明文检查的加密技术主要服务于特定的密码系统,缺乏与包含各种密码方法的多样化系统协同工作的适应性。为了解决这个问题,我们提出了一种独特的在线/离线异构签名加密方案(HOOSC-PCE)。这种方法可使签名加密信息从基于身份的密码系统(IBC)过渡到公钥基础设施(PKI)系统,从而提高信息的互操作性。我们方案的一个关键方面是允许云服务器执行明文查询,从而促进使用明文关键字对加密数据进行高效的数据搜索。此外,签名加密过程分为在线和离线两个阶段。在线阶段处理需要较少资源的任务,而离线阶段则执行需要较多资源的准备任务。我们严格测试了 HOOSC-PCE 方案的安全性,证明它在随机 Oracle 模型(ROM)下是安全的。同时,与同类研究相比,该方案在离线加密、在线加密、解密和搜索算法中分别有效降低了 46.39%、19.45%、18.73% 和 13.25% 的计算成本。结果表明,HOOSC-PCE 既安全又高效,证实了其在基于物联网的医疗系统中的可行性。
{"title":"Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system","authors":"Abdalla Hadabi ,&nbsp;Zheng Qu ,&nbsp;Kuo-Hui Yeh ,&nbsp;Chien-Ming Chen ,&nbsp;Saru Kumari ,&nbsp;Hu Xiong","doi":"10.1016/j.sysarc.2024.103235","DOIUrl":"10.1016/j.sysarc.2024.103235","url":null,"abstract":"<div><p>Preserving the confidentiality and integrity of data transmission is paramount in the Internet of Things (IoT)-based healthcare systems. Current encryption techniques that allow plaintext checks primarily serve a specific cryptosystem, lacking the adaptability to work with a diverse system incorporating various cryptographic methods. To address this, we present a unique online/offline heterogeneous signcryption scheme with plaintext checkable encryption (HOOSC-PCE). This approach enables the transition of signcrypted messages from an identity-based cryptosystem (IBC) to a public key infrastructure (PKI) system, improving information interoperability. A key aspect of our scheme is its capacity to allow cloud servers to perform plaintext queries, facilitating efficient data searches using plaintext keywords over encrypted data. Furthermore, the signcryption process is divided into online and offline phases. The online phase handles tasks that require fewer resources, while the offline phase carries out more resource-intensive preparatory tasks. We rigorously tested the HOOSC-PCE scheme’s security by proving it secure under the Random Oracle Model (ROM). Meanwhile, compared to similar work, it effectively reduces computation costs by 46.39%, 19.45%, 18.73%, and 13.25% across offline encryption, online encryption, decryption, and search algorithms. The results indicate that the HOOSC-PCE is secure and efficient, confirming its feasibility for IoT-based healthcare systems.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103235"},"PeriodicalIF":3.7,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141694851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of block-scaled integer GeMMs for efficient DNN deployment on scalable in-order vector processors 优化分块整数 GeMM,在可扩展的无序矢量处理器上高效部署 DNN
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-08 DOI: 10.1016/j.sysarc.2024.103236
Nitish Satya Murthy, Francky Catthoor, Marian Verhelst

A continuing rise in DNN usage in distributed and embedded use cases has demanded more efficient hardware execution in the field. Low-precision GeMMs with optimized data formats have played a key role in more memory and computationally-efficient networks. Recently trending formats are block-scaled representations stemming from tight HW-SW co-optimization, that compress network size by sharing exponents per data block. Prior work mostly focuses on deploying such block-scaled GeMM operations on domain-specific accelerators for optimum efficiency at the cost of flexibility and ease of deployment. In this work, we exploit and optimize the deployment of block-scaled GeMMs on fully-programmable in-order vector processors using ARM SVE. We define a systematic methodology for performing design space exploration to optimally match the workload specifications with processor vector-lengths, different microkernels, block sizes and shapes. We introduce efficient intrinsics-based microkernels with effective loop unrollings, and data-transfer efficient fused requantization strategies to maximize kernel performance, while also ensuring several deployment configurations. We enable generalized block-scaled kernel deployments through tunable block sizes and shapes, which helps in accommodating different accuracy-speed trade-off requirements. Utilizing 2D activation blocks instead of conventional 1D blocks, the static and dynamic BS-INT8 configurations yielded on average 3.8x and 2.9x faster speedups over FP32 models respectively, at no accuracy loss for CNN classification tasks on CIFAR10/100 datasets.

在分布式和嵌入式使用案例中,DNN 的使用率持续上升,这就要求在现场使用更高效的硬件执行。具有优化数据格式的低精度 GeMM 在提高网络内存和计算效率方面发挥了关键作用。最近流行的格式是块缩放表示法,它源于严格的硬件-软件协同优化,通过共享每个数据块的指数来压缩网络大小。之前的工作大多侧重于在特定领域的加速器上部署这种分块缩放的 GeMM 操作,以获得最佳效率,但却牺牲了灵活性和部署的便利性。在这项工作中,我们利用 ARM SVE,在完全可编程的无序矢量处理器上利用并优化了分块缩放 GeMM 的部署。我们定义了一种进行设计空间探索的系统方法,以优化工作负载规格与处理器矢量长度、不同微内核、块大小和形状的匹配。我们引入了基于本征(insinsics)的高效微内核,它具有有效的循环展开和数据传输效率高的融合重量化策略,可最大限度地提高内核性能,同时还能确保多种部署配置。我们通过可调整的块大小和形状实现了通用的块缩放内核部署,这有助于满足不同的精度-速度权衡要求。在 CIFAR10/100 数据集的 CNN 分类任务中,利用 2D 激活块而不是传统的 1D 块,静态和动态 BS-INT8 配置的速度分别比 FP32 模型平均快 3.8 倍和 2.9 倍,而且准确率没有降低。
{"title":"Optimization of block-scaled integer GeMMs for efficient DNN deployment on scalable in-order vector processors","authors":"Nitish Satya Murthy,&nbsp;Francky Catthoor,&nbsp;Marian Verhelst","doi":"10.1016/j.sysarc.2024.103236","DOIUrl":"10.1016/j.sysarc.2024.103236","url":null,"abstract":"<div><p>A continuing rise in DNN usage in distributed and embedded use cases has demanded more efficient hardware execution in the field. Low-precision GeMMs with optimized data formats have played a key role in more memory and computationally-efficient networks. Recently trending formats are block-scaled representations stemming from tight HW-SW co-optimization, that compress network size by sharing exponents per data block. Prior work mostly focuses on deploying such block-scaled GeMM operations on domain-specific accelerators for optimum efficiency at the cost of flexibility and ease of deployment. In this work, we exploit and optimize the deployment of block-scaled GeMMs on fully-programmable in-order vector processors using ARM SVE. We define a systematic methodology for performing design space exploration to optimally match the workload specifications with processor vector-lengths, different microkernels, block sizes and shapes. We introduce efficient intrinsics-based microkernels with effective loop unrollings, and data-transfer efficient fused requantization strategies to maximize kernel performance, while also ensuring several deployment configurations. We enable generalized block-scaled kernel deployments through tunable block sizes and shapes, which helps in accommodating different accuracy-speed trade-off requirements. Utilizing 2D activation blocks instead of conventional 1D blocks, the static and dynamic BS-INT8 configurations yielded on average 3.8x and 2.9x faster speedups over FP32 models respectively, at no accuracy loss for CNN classification tasks on CIFAR10/100 datasets.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103236"},"PeriodicalIF":3.7,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141694195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing spatial isolation for Mixed-Criticality Systems 为混合关键性系统提供空间隔离
IF 3.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-07-08 DOI: 10.1016/j.sysarc.2024.103234
E. Tinto, T. Vardanega

Hard real-time systems, characterized by stringent timeliness requirements, occur in an increasing variety of industrial sectors. Some such domains carry important safety-critical concerns, notably avionics, space, and automotive. One common design trend across those domains seeks to reduce the number of computing devices embedded in them by integrating software applications of different criticality levels into one and the same onboard computer. A safety-savvy design approach however requires isolation among components of different criticality, to prevent unintended reciprocal interference across them. Isolation is traditionally achieved through partitioning. Partitioning, however, incurs low resource utilization as cautionary margins are used to inflate partition budgets over their anticipated needs. This situation has prompted research into alternative ways to integration that can safely afford higher levels of utilization. The Mixed-Criticality (MC) approach, which concentrates on the CPU scheduling problem, has yielded a large body of research results that show considerable gains in sustained utilization, but it has yet to meet all of the isolation requirements of safety-critical systems. This work presents a solution to augment a state-of-the-art MC solution with efficient and effective spatial isolation capabilities. Experimental results show that our solution provides adequate guarantees of temporal and spatial isolation with very small runtime overhead.

以严格的及时性要求为特征的硬实时系统在越来越多的工业领域中出现。其中一些领域具有重要的安全关键问题,特别是航空电子、航天和汽车领域。这些领域的一个共同设计趋势是,通过将不同临界等级的软件应用程序集成到同一台车载计算机中,减少嵌入其中的计算设备数量。然而,安全的设计方法需要隔离不同临界等级的组件,以防止它们之间发生意外的相互干扰。隔离传统上是通过分区来实现的。然而,分区会导致资源利用率较低,因为在分区预算超出预期需求时会采用谨慎的余量。这种情况促使人们研究能够安全地提高利用率的其他集成方式。混合临界(MC)方法专注于 CPU 调度问题,已取得大量研究成果,显示在持续利用率方面取得了可观的收益,但仍无法满足安全临界系统的所有隔离要求。这项工作提出了一种解决方案,利用高效和有效的空间隔离能力来增强最先进的 MC 解决方案。实验结果表明,我们的解决方案能充分保证时间和空间隔离,且运行时开销极小。
{"title":"Providing spatial isolation for Mixed-Criticality Systems","authors":"E. Tinto,&nbsp;T. Vardanega","doi":"10.1016/j.sysarc.2024.103234","DOIUrl":"https://doi.org/10.1016/j.sysarc.2024.103234","url":null,"abstract":"<div><p>Hard real-time systems, characterized by stringent timeliness requirements, occur in an increasing variety of industrial sectors. Some such domains carry important safety-critical concerns, notably avionics, space, and automotive. One common design trend across those domains seeks to reduce the number of computing devices embedded in them by integrating software applications of different criticality levels into one and the same onboard computer. A safety-savvy design approach however requires isolation among components of different criticality, to prevent unintended reciprocal interference across them. Isolation is traditionally achieved through partitioning. Partitioning, however, incurs low resource utilization as cautionary margins are used to inflate partition budgets over their anticipated needs. This situation has prompted research into alternative ways to integration that can safely afford higher levels of utilization. The Mixed-Criticality (MC) approach, which concentrates on the CPU scheduling problem, has yielded a large body of research results that show considerable gains in sustained utilization, but it has yet to meet all of the isolation requirements of safety-critical systems. This work presents a solution to augment a state-of-the-art MC solution with efficient and effective spatial isolation capabilities. Experimental results show that our solution provides adequate guarantees of temporal <em>and</em> spatial isolation with very small runtime overhead.</p></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"154 ","pages":"Article 103234"},"PeriodicalIF":3.7,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1383762124001711/pdfft?md5=03d8377729455f5bea108a124190cff6&pid=1-s2.0-S1383762124001711-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141607689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Systems Architecture
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1