首页 > 最新文献

ACM Journal on Emerging Technologies in Computing Systems最新文献

英文 中文
A Survey on Machine Learning in Hardware Security 硬件安全中的机器学习研究综述
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-05-18 DOI: https://dl.acm.org/doi/10.1145/3589506
Troya Çağıl Köylü, Cezar Rodolfo Wedig Reinbrecht, Anteneh Gebregiorgis, Said Hamdioui, Mottaqiallah Taouil

Hardware security is currently a very influential domain, where each year countless works are published concerning attacks against hardware and countermeasures. A significant number of them use machine learning, which is proven to be very effective in other domains. This survey, as one of the early attempts, presents the usage of machine learning in hardware security in a full and organized manner. Our contributions include classification and introduction to the relevant fields of machine learning, a comprehensive and critical overview of machine learning usage in hardware security, and an investigation of the hardware attacks against machine learning (neural network) implementations.

硬件安全是目前一个非常有影响力的领域,每年都有无数关于针对硬件的攻击和对策的文章发表。他们中的很多人使用机器学习,这在其他领域被证明是非常有效的。本调查作为早期尝试之一,以全面和有组织的方式展示了机器学习在硬件安全中的使用。我们的贡献包括机器学习相关领域的分类和介绍,机器学习在硬件安全中的应用的全面和关键概述,以及针对机器学习(神经网络)实现的硬件攻击的调查。
{"title":"A Survey on Machine Learning in Hardware Security","authors":"Troya Çağıl Köylü, Cezar Rodolfo Wedig Reinbrecht, Anteneh Gebregiorgis, Said Hamdioui, Mottaqiallah Taouil","doi":"https://dl.acm.org/doi/10.1145/3589506","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3589506","url":null,"abstract":"<p>Hardware security is currently a very influential domain, where each year countless works are published concerning attacks against hardware and countermeasures. A significant number of them use machine learning, which is proven to be very effective in other domains. This survey, as one of the early attempts, presents the usage of machine learning in hardware security in a full and organized manner. Our contributions include classification and introduction to the relevant fields of machine learning, a comprehensive and critical overview of machine learning usage in hardware security, and an investigation of the hardware attacks against machine learning (neural network) implementations.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"97 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mapping Method Tolerating SAF and Variation for Memristor Crossbar Array Based Neural Network Inference on Edge Devices 边缘器件上基于神经网络推理的忆阻器横条阵列容SAF和变异映射方法
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-05-03 DOI: https://dl.acm.org/doi/10.1145/3585518
Yu Ma, Linfeng Zheng, Pingqiang Zhou

There is an increasing demand for running neural network inference on edge devices. Memristor crossbar array (MCA) based accelerators can be used to accelerate neural networks on edge devices. However, reliability issues in memristors, such as stuck-at faults (SAF) and variations, lead to weight deviation of neural networks and therefore have a severe influence on inference accuracy. In this work, we focus on the reliability issues in memristors for edge devices. We formulate the reliability problem as a 0–1 programming problem, based on the analysis of sum weight variation (SWV). In order to solve the problem, we simplify the problem with an approximation - different columns have the same weights, based on our observation of the weight distribution. Then we propose an effective mapping method to solve the simplified problem. We evaluate our proposed method with two neural network applications on two datasets. The experimental results on the classification application show that our proposed method can recover 95% accuracy considering SAF defects and can increase by up to 60% accuracy with variation σ =0.4. The results of the neural rendering application show that our proposed method can prevent render quality reduction.

在边缘设备上运行神经网络推理的需求越来越大。基于忆阻交叉棒阵列(MCA)的加速器可用于加速边缘设备上的神经网络。然而,记忆电阻器的可靠性问题,如卡在故障(SAF)和变异,会导致神经网络的权重偏差,从而严重影响推理精度。在这项工作中,我们专注于边缘器件忆阻器的可靠性问题。在权重变化和分析的基础上,将可靠性问题表述为一个0-1规划问题。为了解决这个问题,我们用一个近似来简化这个问题——根据我们对权重分布的观察,不同的列具有相同的权重。然后,我们提出了一种有效的映射方法来解决简化问题。我们用两个神经网络在两个数据集上的应用来评估我们提出的方法。分类应用的实验结果表明,在考虑SAF缺陷的情况下,该方法可以恢复95%的准确率,当σ =0.4时,准确率可提高60%。神经网络渲染应用结果表明,该方法可以有效防止渲染质量下降。
{"title":"A Mapping Method Tolerating SAF and Variation for Memristor Crossbar Array Based Neural Network Inference on Edge Devices","authors":"Yu Ma, Linfeng Zheng, Pingqiang Zhou","doi":"https://dl.acm.org/doi/10.1145/3585518","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3585518","url":null,"abstract":"<p>There is an increasing demand for running neural network inference on edge devices. <b>Memristor crossbar array (MCA)</b> based accelerators can be used to accelerate neural networks on edge devices. However, reliability issues in memristors, such as <b>stuck-at faults (SAF)</b> and variations, lead to weight deviation of neural networks and therefore have a severe influence on inference accuracy. In this work, we focus on the reliability issues in memristors for edge devices. We formulate the reliability problem as a 0–1 programming problem, based on the analysis of <b>sum weight variation (SWV)</b>. In order to solve the problem, we simplify the problem with an approximation - different columns have the same weights, based on our observation of the weight distribution. Then we propose an effective mapping method to solve the simplified problem. We evaluate our proposed method with two neural network applications on two datasets. The experimental results on the classification application show that our proposed method can recover 95% accuracy considering SAF defects and can increase by up to 60% accuracy with variation σ =0.4. The results of the neural rendering application show that our proposed method can prevent render quality reduction.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"38 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138543452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Optical-Electrical Analog Deep Learning Accelerator Using Incoherent Optical Signals
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-05-03 DOI: https://dl.acm.org/doi/10.1145/3584183
Mingdai Yang, Qiuwen Lou, Ramin Rajaei, Mohammad Reza Jokar, Junyi Qiu, Yuming Liu, Aditi Udupa, Frederic T. Chong, John M. Dallesasse, Milton Feng, Lynford L. Goddard, X. Sharon Hu, Yanjing Li

Optical deep learning (DL) accelerators have attracted significant interests due to their latency and power advantages. In this article, we focus on incoherent optical designs. A significant challenge is that there is no known solution to perform single-wavelength accumulation (a key operation required for DL workloads) using incoherent optical signals efficiently. Therefore, we devise a hybrid approach, where accumulation is done in the electrical domain, and multiplication is performed in the optical domain. The key technology enabler of our design is the transistor laser, which performs electrical-to-optical and optical-to-electrical conversions efficiently. Through detailed design and evaluation of our design, along with a comprehensive benchmarking study against state-of-the-art RRAM-based designs, we derive the following key results:

(1) For a four-layer multilayer perceptron network, our design achieves 115× and 17.11× improvements in latency and energy, respectively, compared to the RRAM-based design. We can take full advantage of the speed and energy benefits of the optical technology because the inference task can be entirely mapped onto our design.

(2) For a complex workload (Resnet50), weight reprogramming is needed, and intermediate results need to be stored/re-fetched to/from memories. In this case, for the same area, our design still outperforms the RRAM-based design by 15.92× in inference latency, and 8.99× in energy.

光学深度学习(DL)加速器由于其延迟和功率优势而引起了人们的极大兴趣。本文主要讨论非相干光学设计。一个重要的挑战是,没有已知的解决方案可以有效地使用非相干光信号进行单波长积累(DL工作负载所需的关键操作)。因此,我们设计了一种混合方法,在电域中进行积累,在光域中进行乘法。我们设计的关键技术是晶体管激光器,它可以有效地进行光电和光光电转换。通过对我们的设计进行详细的设计和评估,以及对最先进的基于rram的设计进行全面的基准测试研究,我们得出了以下关键结果:(1)对于四层多层感知器网络,与基于rram的设计相比,我们的设计在延迟和能量方面分别提高了115倍和17.11倍。我们可以充分利用光学技术的速度和能量优势,因为推理任务可以完全映射到我们的设计上。(2)对于复杂的工作负载(Resnet50),需要权重重编程,并且需要将中间结果存储/重新提取到存储器中。在这种情况下,对于相同的区域,我们的设计仍然比基于ram的设计在推理延迟上高出15.92倍,在能量上高出8.99倍。
{"title":"A Hybrid Optical-Electrical Analog Deep Learning Accelerator Using Incoherent Optical Signals","authors":"Mingdai Yang, Qiuwen Lou, Ramin Rajaei, Mohammad Reza Jokar, Junyi Qiu, Yuming Liu, Aditi Udupa, Frederic T. Chong, John M. Dallesasse, Milton Feng, Lynford L. Goddard, X. Sharon Hu, Yanjing Li","doi":"https://dl.acm.org/doi/10.1145/3584183","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3584183","url":null,"abstract":"<p>Optical deep learning (DL) accelerators have attracted significant interests due to their latency and power advantages. In this article, we focus on incoherent optical designs. A significant challenge is that there is no known solution to perform single-wavelength accumulation (a key operation required for DL workloads) using incoherent optical signals efficiently. Therefore, we devise a hybrid approach, where accumulation is done in the electrical domain, and multiplication is performed in the optical domain. The key technology enabler of our design is the transistor laser, which performs electrical-to-optical and optical-to-electrical conversions efficiently. Through detailed design and evaluation of our design, along with a comprehensive benchmarking study against state-of-the-art RRAM-based designs, we derive the following key results:</p><p>(1) For a four-layer multilayer perceptron network, our design achieves 115× and 17.11× improvements in latency and energy, respectively, compared to the RRAM-based design. We can take full advantage of the speed and energy benefits of the optical technology because the inference task can be entirely mapped onto our design.</p><p>(2) For a complex workload (Resnet50), weight reprogramming is needed, and intermediate results need to be stored/re-fetched to/from memories. In this case, for the same area, our design still outperforms the RRAM-based design by 15.92× in inference latency, and 8.99× in energy.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"100 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Network-on-chips Against Fault-injection and Crypto-analysis Attacks via Stochastic Anonymous Routing 利用随机匿名路由保护片上网络免受故障注入和密码分析攻击
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-18 DOI: 10.1145/3592798
A. Patooghy, Mahdi M. Hasanzadeh, Amin Sarihi, M. Abdelrehim, Abdel-Hameed A. Badawy
Network-on-chip (NoC) is widely used as an efficient communication architecture in multi-core and many-core System-on-chips (SoCs). However, the shared communication resources in an NoC platform, e.g., channels, buffers, and routers, might be used to conduct attacks compromising the security of NoC-based SoCs. Most of the proposed encryption-based protection methods in the literature require leaving some parts of the packet unencrypted to allow the routers to process/forward packets accordingly. This reveals the source/destination information of the packet to malicious routers, which can be exploited in various attacks. For the first time, we propose the idea of secure, anonymous routing with minimal hardware overhead to encrypt the entire packet while exchanging secure information over the network. We have designed and implemented a new NoC architecture that works with encrypted addresses. The proposed method can manage malicious and benign failures at NoC channels and buffers by bypassing failed components with a situation-driven stochastic path diversification approach. Hardware evaluations show that the proposed security solution combats the security threats at the affordable cost of 1.5% area and 20% power overheads chip-wide.
片上网络(NoC)作为一种高效的通信架构被广泛应用于多核和多核片上系统(soc)中。然而,NoC平台中的共享通信资源,如通道、缓冲区和路由器,可能被用来进行危及基于NoC的soc安全性的攻击。文献中提出的大多数基于加密的保护方法都要求保留数据包的某些部分未加密,以允许路由器相应地处理/转发数据包。这将数据包的源/目的信息暴露给恶意路由器,可以利用这些信息进行各种攻击。我们首次提出了安全、匿名路由的思想,以最小的硬件开销来加密整个数据包,同时在网络上交换安全信息。我们设计并实现了一个新的NoC架构,可以使用加密地址。该方法可以通过情境驱动的随机路径多样化方法绕过失效组件来管理NoC通道和缓冲区的恶意和良性故障。硬件评估表明,提出的安全解决方案以可承受的1.5%的面积和20%的芯片功耗开销来对抗安全威胁。
{"title":"Securing Network-on-chips Against Fault-injection and Crypto-analysis Attacks via Stochastic Anonymous Routing","authors":"A. Patooghy, Mahdi M. Hasanzadeh, Amin Sarihi, M. Abdelrehim, Abdel-Hameed A. Badawy","doi":"10.1145/3592798","DOIUrl":"https://doi.org/10.1145/3592798","url":null,"abstract":"Network-on-chip (NoC) is widely used as an efficient communication architecture in multi-core and many-core System-on-chips (SoCs). However, the shared communication resources in an NoC platform, e.g., channels, buffers, and routers, might be used to conduct attacks compromising the security of NoC-based SoCs. Most of the proposed encryption-based protection methods in the literature require leaving some parts of the packet unencrypted to allow the routers to process/forward packets accordingly. This reveals the source/destination information of the packet to malicious routers, which can be exploited in various attacks. For the first time, we propose the idea of secure, anonymous routing with minimal hardware overhead to encrypt the entire packet while exchanging secure information over the network. We have designed and implemented a new NoC architecture that works with encrypted addresses. The proposed method can manage malicious and benign failures at NoC channels and buffers by bypassing failed components with a situation-driven stochastic path diversification approach. Hardware evaluations show that the proposed security solution combats the security threats at the affordable cost of 1.5% area and 20% power overheads chip-wide.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":" ","pages":"1 - 21"},"PeriodicalIF":2.2,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44427268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing 利用机器学习和后处理实现针对特洛伊木马攻击的硬件IP保障
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-18 DOI: 10.1145/3592795
Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, S. Bhunia, Tamzidul Hoque
System-on-chip (SoC) developers increasingly rely on pre-verified hardware intellectual property (IP) blocks often acquired from untrusted third-party vendors. These IPs might contain hidden malicious functionalities or hardware Trojans that may compromise the security of the fabricated SoCs. Lack of golden or reference models and vast possible Trojan attack space form some of the major barriers in detecting hardware Trojans in these third-party IP (3PIP) blocks. Recently, supervised machine learning (ML) techniques have shown promising capability in identifying nets of potential Trojans in 3PIPs without the need for golden models. However, they bring several major challenges. First, they do not guide us to an optimal choice of features that reliably covers diverse classes of Trojans. Second, they require multiple Trojan-free/trusted designs to insert known Trojans and generate a trained model. Even if a set of trusted designs are available for training, the suspect IP can have an inherently very different structure from the set of trusted designs, which may negatively impact the verification outcome. Third, these techniques only identify a set of suspect Trojan nets that require manual intervention to understand the potential threat. In this article, we present VIPR, a systematic machine learning (ML)-based trust verification solution for 3PIPs that eliminates the need for trusted designs for training. We present a comprehensive framework, associated algorithms, and a tool flow for obtaining an optimal set of features, training a targeted machine learning model, detecting suspect nets, and identifying Trojan circuitry from the suspect nets. We evaluate the framework on several Trust-Hub Trojan benchmarks and provide a comparative analysis of detection performance across different trained models, selection of features, and post-processing techniques. We demonstrate promising Trojan detection accuracy for VIPR with up to 92.85% reduction in false positives by the proposed post-processing algorithm.
片上系统(SoC)开发人员越来越依赖于预先验证的硬件知识产权(IP)块,这些块通常是从不受信任的第三方供应商那里获得的。这些ip可能包含隐藏的恶意功能或硬件木马,可能会危及制造的soc的安全性。缺乏黄金模型或参考模型以及巨大的木马攻击空间构成了在这些第三方IP (3PIP)块中检测硬件木马的一些主要障碍。最近,监督机器学习(ML)技术在无需黄金模型的情况下识别3pip中的潜在木马网络方面显示出了很好的能力。然而,它们带来了几个主要挑战。首先,它们不能指导我们选择最优的功能,以可靠地覆盖不同类型的木马。其次,它们需要多个无木马/可信的设计来插入已知的木马并生成训练过的模型。即使一组可信设计可用于训练,可疑IP也可能具有与可信设计集非常不同的固有结构,这可能会对验证结果产生负面影响。第三,这些技术只识别一组可疑的特洛伊网络,需要人工干预才能了解潜在的威胁。在本文中,我们介绍了VIPR,这是一种用于3pip的基于系统机器学习(ML)的信任验证解决方案,它消除了对可信设计的培训需求。我们提出了一个全面的框架,相关的算法,以及一个工具流,用于获得一组最优的特征,训练目标机器学习模型,检测可疑网络,并从可疑网络中识别木马电路。我们在几个Trust-Hub木马基准测试中评估了该框架,并对不同训练模型、特征选择和后处理技术的检测性能进行了比较分析。通过提出的后处理算法,我们证明了VIPR的特洛伊木马检测精度很高,误报率降低了92.85%。
{"title":"Hardware IP Assurance against Trojan Attacks with Machine Learning and Post-processing","authors":"Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, S. Bhunia, Tamzidul Hoque","doi":"10.1145/3592795","DOIUrl":"https://doi.org/10.1145/3592795","url":null,"abstract":"System-on-chip (SoC) developers increasingly rely on pre-verified hardware intellectual property (IP) blocks often acquired from untrusted third-party vendors. These IPs might contain hidden malicious functionalities or hardware Trojans that may compromise the security of the fabricated SoCs. Lack of golden or reference models and vast possible Trojan attack space form some of the major barriers in detecting hardware Trojans in these third-party IP (3PIP) blocks. Recently, supervised machine learning (ML) techniques have shown promising capability in identifying nets of potential Trojans in 3PIPs without the need for golden models. However, they bring several major challenges. First, they do not guide us to an optimal choice of features that reliably covers diverse classes of Trojans. Second, they require multiple Trojan-free/trusted designs to insert known Trojans and generate a trained model. Even if a set of trusted designs are available for training, the suspect IP can have an inherently very different structure from the set of trusted designs, which may negatively impact the verification outcome. Third, these techniques only identify a set of suspect Trojan nets that require manual intervention to understand the potential threat. In this article, we present VIPR, a systematic machine learning (ML)-based trust verification solution for 3PIPs that eliminates the need for trusted designs for training. We present a comprehensive framework, associated algorithms, and a tool flow for obtaining an optimal set of features, training a targeted machine learning model, detecting suspect nets, and identifying Trojan circuitry from the suspect nets. We evaluate the framework on several Trust-Hub Trojan benchmarks and provide a comparative analysis of detection performance across different trained models, selection of features, and post-processing techniques. We demonstrate promising Trojan detection accuracy for VIPR with up to 92.85% reduction in false positives by the proposed post-processing algorithm.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 23"},"PeriodicalIF":2.2,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46451726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Enabled Solutions for Design and Optimization Challenges in Networks-on-Chip based Multi/Many-Core Architectures 基于片上网络的多/多核心架构中的设计和优化挑战的机器学习解决方案
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-17 DOI: 10.1145/3591470
Md Farhadur Reza
Due to the advancement of transistor technology, a single chip processor can now have hundreds of cores. Network-on-Chip (NoC) has been the superior interconnect fabric for multi/many-core on-chip systems because of its scalability and parallelism. Due to the rise of dark silicon with the end of Dennard Scaling, it becomes essential to design energy efficient and high performance heterogeneous NoC-based multi/many-core architectures. Because of the large and complex design space, the solution space becomes difficult to explore within a reasonable time for optimal trade-offs of energy-performance-reliability. Furthermore, reactive resource management is not effective in preventing problems from happening in adaptive systems. Therefore, in this work, we explore machine learning techniques to design and configure the NoC resources based on the learning of the system and applications workloads. Machine learning can automatically learn from past experiences and guide the NoC intelligently to achieve its objective on performance, power, and reliability. We present the challenges of NoC design and resource management and propose a generalized machine learning framework to uncover near-optimal solutions quickly. We propose and implement a NoC design and optimization solution enabled by neural networks, using the generalized machine learning framework. Simulation results demonstrated that the proposed neural networks-based design and optimization solution improves performance by 15% and reduces energy consumption by 6% compared to an existing non-machine learning-based solution while the proposed solution improves NoC latency and throughput compared to two existing machine learning-based NoC optimization solutions. The challenges of machine learning technique adaptation in multi/many-core NoC have been presented to guide future research.
由于晶体管技术的进步,一个单片处理器现在可以有数百个核心。片上网络(NoC)由于其可扩展性和并行性,已成为多核/多核片上系统的卓越互连结构。随着Dennard Scaling的结束,暗硅的兴起,设计节能、高性能的基于异质NoC的多核/多核架构变得至关重要。由于设计空间大而复杂,因此很难在合理的时间内探索解决方案空间,以实现能源性能可靠性的最佳权衡。此外,被动资源管理在防止自适应系统中出现问题方面并不有效。因此,在这项工作中,我们探索了基于系统和应用程序工作负载的学习来设计和配置NoC资源的机器学习技术。机器学习可以自动学习过去的经验,并智能地指导NoC实现其性能、功率和可靠性目标。我们提出了NoC设计和资源管理的挑战,并提出了一个通用的机器学习框架,以快速发现接近最优的解决方案。我们使用广义机器学习框架,提出并实现了一种由神经网络实现的NoC设计和优化解决方案。仿真结果表明,与现有的基于非机器学习的解决方案相比,所提出的基于神经网络的设计和优化解决方案提高了15%的性能,降低了6%的能耗,而与现有的两种基于机器学习的NoC优化解决方案相比,该解决方案改善了NoC延迟和吞吐量。机器学习技术在多核/多核NoC中的适应性挑战已被提出,以指导未来的研究。
{"title":"Machine Learning Enabled Solutions for Design and Optimization Challenges in Networks-on-Chip based Multi/Many-Core Architectures","authors":"Md Farhadur Reza","doi":"10.1145/3591470","DOIUrl":"https://doi.org/10.1145/3591470","url":null,"abstract":"Due to the advancement of transistor technology, a single chip processor can now have hundreds of cores. Network-on-Chip (NoC) has been the superior interconnect fabric for multi/many-core on-chip systems because of its scalability and parallelism. Due to the rise of dark silicon with the end of Dennard Scaling, it becomes essential to design energy efficient and high performance heterogeneous NoC-based multi/many-core architectures. Because of the large and complex design space, the solution space becomes difficult to explore within a reasonable time for optimal trade-offs of energy-performance-reliability. Furthermore, reactive resource management is not effective in preventing problems from happening in adaptive systems. Therefore, in this work, we explore machine learning techniques to design and configure the NoC resources based on the learning of the system and applications workloads. Machine learning can automatically learn from past experiences and guide the NoC intelligently to achieve its objective on performance, power, and reliability. We present the challenges of NoC design and resource management and propose a generalized machine learning framework to uncover near-optimal solutions quickly. We propose and implement a NoC design and optimization solution enabled by neural networks, using the generalized machine learning framework. Simulation results demonstrated that the proposed neural networks-based design and optimization solution improves performance by 15% and reduces energy consumption by 6% compared to an existing non-machine learning-based solution while the proposed solution improves NoC latency and throughput compared to two existing machine learning-based NoC optimization solutions. The challenges of machine learning technique adaptation in multi/many-core NoC have been presented to guide future research.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"30 1","pages":"1 - 26"},"PeriodicalIF":2.2,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41287581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Eternal-thing 2.0: Analog-Trojan-resilient Ripple-less Solar Harvesting System for Sustainable IoT 永恒物2.0:模拟木马弹性无波纹太阳能收集系统,用于可持续物联网
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-28 DOI: https://dl.acm.org/doi/10.1145/3575800
Saswat Kumar Ram, Sauvagya Ranjan Sahoo, Banee Bandana Das, Kamalakanta Mahapatra, Saraju P. Mohanty

Recently, harvesting natural energy is gaining more attention than other conventional approaches for sustainable IoT. System on chip power requirement for the internet of things (IoT) and generating higher voltages on chip is a massive challenge for on-chip peripherals and systems. In this article, an on-chip reliable energy-harvesting system (EHS) is designed for IoT with an inductor-free methodology. The control section monitors the computational load and the recharging of the battery/super-capacitor. An efficient maximum power point tracking algorithm is also used to avoid quiescent power consumption. The reliability of the proposed EHS is improved by using an aging tolerant ring oscillator. The effect of Trojan on the performance of energy-harvesting system is analyzed, and proper detection and mitigation mechanism is proposed. Finally, the proposed ripple mitigation techniques further improves the performance of the aging sensor. The proposed EHS is designed and simulated in CMOS 90-nm technology. The output voltage is in the range of 3–3.55 V with an input 1–1.5 V with a power throughput of 0–22 μW. The EHS consumes power under the ultra-low-power requirements of IoT smart nodes.

最近,收集自然能源比其他传统的可持续物联网方法受到更多的关注。物联网(IoT)的片上系统功率要求和在片上产生更高的电压对片上外设和系统来说是一个巨大的挑战。在本文中,采用无电感方法为物联网设计了一种可靠的片上能量收集系统(EHS)。控制部分监控计算负载和电池/超级电容器的充电。采用了高效的最大功率点跟踪算法,避免了静态功耗。采用耐老化环形振荡器,提高了系统的可靠性。分析了木马对能量收集系统性能的影响,提出了适当的检测和缓解机制。最后,提出的纹波减缓技术进一步提高了老化传感器的性能。在CMOS 90纳米工艺下设计并仿真了所提出的EHS。输出电压为3 ~ 3.55 V,输入电压为1 ~ 1.5 V,功率吞吐量为0 ~ 22 μW。EHS在物联网智能节点的超低功耗要求下耗电。
{"title":"Eternal-thing 2.0: Analog-Trojan-resilient Ripple-less Solar Harvesting System for Sustainable IoT","authors":"Saswat Kumar Ram, Sauvagya Ranjan Sahoo, Banee Bandana Das, Kamalakanta Mahapatra, Saraju P. Mohanty","doi":"https://dl.acm.org/doi/10.1145/3575800","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3575800","url":null,"abstract":"<p>Recently, harvesting natural energy is gaining more attention than other conventional approaches for sustainable IoT. System on chip power requirement for the internet of things (IoT) and generating higher voltages on chip is a massive challenge for on-chip peripherals and systems. In this article, an on-chip reliable energy-harvesting system (EHS) is designed for IoT with an inductor-free methodology. The control section monitors the computational load and the recharging of the battery/super-capacitor. An efficient maximum power point tracking algorithm is also used to avoid quiescent power consumption. The reliability of the proposed EHS is improved by using an aging tolerant ring oscillator. The effect of Trojan on the performance of energy-harvesting system is analyzed, and proper detection and mitigation mechanism is proposed. Finally, the proposed ripple mitigation techniques further improves the performance of the aging sensor. The proposed EHS is designed and simulated in CMOS 90-nm technology. The output voltage is in the range of 3–3.55 V with an input 1–1.5 V with a power throughput of 0–22 μW. The EHS consumes power under the ultra-low-power requirements of IoT smart nodes.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"94 4","pages":""},"PeriodicalIF":2.2,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Machine Learning in Hardware Security 硬件安全中的机器学习综述
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-28 DOI: 10.1145/3589506
Troya Çagil Köylü, Cezar Rodolfo Wedig Reinbrecht, A. Gebregiorgis, S. Hamdioui, M. Taouil
Hardware security is currently a very influential domain, where each year countless works are published concerning attacks against hardware and countermeasures. A significant number of them use machine learning, which is proven to be very effective in other domains. This survey, as one of the early attempts, presents the usage of machine learning in hardware security in a full and organized manner. Our contributions include classification and introduction to the relevant fields of machine learning, a comprehensive and critical overview of machine learning usage in hardware security, and an investigation of the hardware attacks against machine learning (neural network) implementations.
硬件安全目前是一个非常有影响力的领域,每年都有无数关于硬件攻击和对策的作品发表。他们中有相当一部分人使用机器学习,这在其他领域被证明是非常有效的。这项调查作为早期的尝试之一,以全面和有组织的方式介绍了机器学习在硬件安全中的应用。我们的贡献包括对机器学习相关领域的分类和介绍,对机器学习在硬件安全中的使用进行全面而批判性的概述,以及对针对机器学习(神经网络)实现的硬件攻击的调查。
{"title":"A Survey on Machine Learning in Hardware Security","authors":"Troya Çagil Köylü, Cezar Rodolfo Wedig Reinbrecht, A. Gebregiorgis, S. Hamdioui, M. Taouil","doi":"10.1145/3589506","DOIUrl":"https://doi.org/10.1145/3589506","url":null,"abstract":"Hardware security is currently a very influential domain, where each year countless works are published concerning attacks against hardware and countermeasures. A significant number of them use machine learning, which is proven to be very effective in other domains. This survey, as one of the early attempts, presents the usage of machine learning in hardware security in a full and organized manner. Our contributions include classification and introduction to the relevant fields of machine learning, a comprehensive and critical overview of machine learning usage in hardware security, and an investigation of the hardware attacks against machine learning (neural network) implementations.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 37"},"PeriodicalIF":2.2,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48616269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Securing Cryptographic ICs against Scan-based Attacks: A Hamming Weight Distribution Perspective 保护加密ic免受基于扫描的攻击:一个汉明权重分布的观点
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-25 DOI: https://dl.acm.org/doi/10.1145/3577215
Dipojjwal Ray, Yogendra Sao, Santosh Biswas, Sk Subidh Ali

Scan chain-based Design for Testability is the industry standard in use for testing manufacturing defects in the semiconductor industry to ensure the structural and functional correctness of chips. Fault coverage is significantly enhanced due to the higher observability and controllability of the internal latches. These ensuing benefits to testing, if misused, expose vulnerabilities that can be detrimental to the security aspects, especially in the context of crypto-chips that contain a secret key. Hence, it remains of paramount importance for a chip designer to secure crypto-chips against various scan attacks. A countermeasure is proposed in this article that preserves the secrecy of an embedded key in a cryptographic integrated circuit running an Advanced Encryption Standard (AES) implementation. A novel design involving a hardware unit is illustrated that circumvents differential scan attacks by essentially performing bit flips deterministically, using a pre-computed mask value. This helps secure the chip while retaining full testability. The controller logic directly depends on a mask determination algorithm that can defend against any scan attack with 𝒪 theoretical complexity. Security analysis of our proposed defense procedure is performed in the framework of Discrete Event Systems (DES). The sequential scan circuit of an AES cryptosystem is modeled as a DES using Finite State Automata. A security notion, Opacity, is used to quantify and formally verify the security aspects of our controlled system, which shows that the entropy of the secret key is preserved. A case study is performed that shows to mitigate state-of-the-art differential scan attacks successfully at a nominal extra overhead of 1.78%.

基于扫描链的可测试性设计是半导体行业用于测试制造缺陷以确保芯片结构和功能正确性的行业标准。由于内部锁存器具有较高的可观测性和可控性,故障覆盖率显著提高。测试的这些好处,如果被滥用,就会暴露出可能对安全方面有害的漏洞,特别是在包含密钥的加密芯片的上下文中。因此,对于芯片设计者来说,确保加密芯片免受各种扫描攻击仍然是至关重要的。本文提出了一种保护运行高级加密标准(AES)实现的加密集成电路中嵌入密钥的保密性的对策。一种涉及硬件单元的新设计,通过使用预先计算的掩码值,本质上执行位翻转来规避差分扫描攻击。这有助于确保芯片的安全性,同时保持完全的可测试性。控制器逻辑直接依赖于掩码确定算法,该算法可以防御任何具有理论复杂度的扫描攻击。在离散事件系统(DES)框架下对我们提出的防御程序进行了安全性分析。利用有限状态自动机将AES密码系统的顺序扫描电路建模为DES。一个安全概念,不透明度,被用来量化和形式化验证我们的控制系统的安全方面,这表明秘密密钥的熵是保留的。一个案例研究显示,以1.78%的名义额外开销成功减轻了最先进的差分扫描攻击。
{"title":"On Securing Cryptographic ICs against Scan-based Attacks: A Hamming Weight Distribution Perspective","authors":"Dipojjwal Ray, Yogendra Sao, Santosh Biswas, Sk Subidh Ali","doi":"https://dl.acm.org/doi/10.1145/3577215","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3577215","url":null,"abstract":"<p>Scan chain-based Design for Testability is the industry standard in use for testing manufacturing defects in the semiconductor industry to ensure the structural and functional correctness of chips. Fault coverage is significantly enhanced due to the higher observability and controllability of the internal latches. These ensuing benefits to testing, if misused, expose vulnerabilities that can be detrimental to the security aspects, especially in the context of crypto-chips that contain a secret key. Hence, it remains of paramount importance for a chip designer to secure crypto-chips against various scan attacks. A countermeasure is proposed in this article that preserves the secrecy of an embedded key in a cryptographic integrated circuit running an Advanced Encryption Standard (AES) implementation. A novel design involving a hardware unit is illustrated that circumvents differential scan attacks by essentially performing bit flips deterministically, using a pre-computed mask value. This helps secure the chip while retaining full testability. The controller logic directly depends on a mask determination algorithm that can defend against any scan attack with 𝒪 theoretical complexity. Security analysis of our proposed defense procedure is performed in the framework of Discrete Event Systems (DES). The sequential scan circuit of an AES cryptosystem is modeled as a DES using Finite State Automata. A security notion, <i>Opacity</i>, is used to quantify and formally verify the security aspects of our controlled system, which shows that the entropy of the secret key is preserved. A case study is performed that shows to mitigate state-of-the-art differential scan attacks successfully at a nominal extra overhead of 1.78%.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"98 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2023-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AroMa: Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators 评估深度学习系统对多租户加速器的隐身完整性攻击
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-25 DOI: https://dl.acm.org/doi/10.1145/3579033
Xiangru Chen, Maneesh Merugu, Jiaqi Zhang, Sandip Ray

Multi-tenant applications have been proliferating in recent years, supported by the emergence of computing-as-service paradigms. Unfortunately, multi-tenancy induces new security vulnerabilities due to spatial or temporal co-location of applications with possibly malicious intent. In this article, we consider a special class of stealthy integrity attacks on multi-tenant deep learning accelerators. One interesting conclusion is that it is possible to perform targeted integrity attacks on kernel weights of deep learning systems such that it remains functional but mis-labels specific categories of input data through standard RowHammer attacks by only changing 0.0009% of the total weights. We develop an automated framework, AroMa, to evaluate the impact of multi-tenancy on security of deep learning accelerators against integrity attacks on memory systems. We present extensive evaluations on AroMa to demonstrate its effectiveness.

近年来,在计算即服务范式的支持下,多租户应用程序得到了迅猛发展。不幸的是,由于可能存在恶意意图的应用程序在空间或时间上的共存,多租户会导致新的安全漏洞。一个有趣的结论是,有可能对深度学习系统的内核权重执行有针对性的完整性攻击,这样它就可以保持功能,但通过标准的RowHammer攻击,只需改变总权重的0.0009%,就可以错误地标记输入数据的特定类别。我们对AroMa进行了广泛的评估,以证明其有效性。
{"title":"AroMa: Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators","authors":"Xiangru Chen, Maneesh Merugu, Jiaqi Zhang, Sandip Ray","doi":"https://dl.acm.org/doi/10.1145/3579033","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3579033","url":null,"abstract":"<p>Multi-tenant applications have been proliferating in recent years, supported by the emergence of computing-as-service paradigms. Unfortunately, multi-tenancy induces new security vulnerabilities due to spatial or temporal co-location of applications with possibly malicious intent. In this article, we consider a special class of stealthy integrity attacks on multi-tenant deep learning accelerators. One interesting conclusion is that it is possible to perform targeted integrity attacks on kernel weights of deep learning systems such that it remains functional but mis-labels specific categories of input data through standard RowHammer attacks by only changing 0.0009% of the total weights. We develop an automated framework, <span>AroMa</span>, to evaluate the impact of multi-tenancy on security of deep learning accelerators against integrity attacks on memory systems. We present extensive evaluations on <span>AroMa</span> to demonstrate its effectiveness.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"95 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2023-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Journal on Emerging Technologies in Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1