首页 > 最新文献

ACM Journal on Emerging Technologies in Computing Systems最新文献

英文 中文
Eternal-thing 2.0: Analog-Trojan-resilient Ripple-less Solar Harvesting System for Sustainable IoT Eternal thing 2.0:用于可持续物联网的模拟特洛伊木马弹性无波纹太阳能采集系统
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-12 DOI: 10.1145/3575800
S. K. Ram, S. Sahoo, B. B. Das, K. Mahapatra, S. Mohanty
Recently, harvesting natural energy is gaining more attention than other conventional approaches for sustainable IoT. System on chip power requirement for the internet of things (IoT) and generating higher voltages on chip is a massive challenge for on-chip peripherals and systems. In this article, an on-chip reliable energy-harvesting system (EHS) is designed for IoT with an inductor-free methodology. The control section monitors the computational load and the recharging of the battery/super-capacitor. An efficient maximum power point tracking algorithm is also used to avoid quiescent power consumption. The reliability of the proposed EHS is improved by using an aging tolerant ring oscillator. The effect of Trojan on the performance of energy-harvesting system is analyzed, and proper detection and mitigation mechanism is proposed. Finally, the proposed ripple mitigation techniques further improves the performance of the aging sensor. The proposed EHS is designed and simulated in CMOS 90-nm technology. The output voltage is in the range of 3–3.55 V with an input 1–1.5 V with a power throughput of 0–22 μW. The EHS consumes power under the ultra-low-power requirements of IoT smart nodes.
最近,收集自然能源比其他传统的可持续物联网方法受到更多的关注。物联网(IoT)的片上系统功率要求和在片上产生更高的电压对片上外设和系统来说是一个巨大的挑战。在本文中,采用无电感方法为物联网设计了一种可靠的片上能量收集系统(EHS)。控制部分监控计算负载和电池/超级电容器的充电。采用了高效的最大功率点跟踪算法,避免了静态功耗。采用耐老化环形振荡器,提高了系统的可靠性。分析了木马对能量收集系统性能的影响,提出了适当的检测和缓解机制。最后,提出的纹波减缓技术进一步提高了老化传感器的性能。在CMOS 90纳米工艺下设计并仿真了所提出的EHS。输出电压为3 ~ 3.55 V,输入电压为1 ~ 1.5 V,功率吞吐量为0 ~ 22 μW。EHS在物联网智能节点的超低功耗要求下耗电。
{"title":"Eternal-thing 2.0: Analog-Trojan-resilient Ripple-less Solar Harvesting System for Sustainable IoT","authors":"S. K. Ram, S. Sahoo, B. B. Das, K. Mahapatra, S. Mohanty","doi":"10.1145/3575800","DOIUrl":"https://doi.org/10.1145/3575800","url":null,"abstract":"Recently, harvesting natural energy is gaining more attention than other conventional approaches for sustainable IoT. System on chip power requirement for the internet of things (IoT) and generating higher voltages on chip is a massive challenge for on-chip peripherals and systems. In this article, an on-chip reliable energy-harvesting system (EHS) is designed for IoT with an inductor-free methodology. The control section monitors the computational load and the recharging of the battery/super-capacitor. An efficient maximum power point tracking algorithm is also used to avoid quiescent power consumption. The reliability of the proposed EHS is improved by using an aging tolerant ring oscillator. The effect of Trojan on the performance of energy-harvesting system is analyzed, and proper detection and mitigation mechanism is proposed. Finally, the proposed ripple mitigation techniques further improves the performance of the aging sensor. The proposed EHS is designed and simulated in CMOS 90-nm technology. The output voltage is in the range of 3–3.55 V with an input 1–1.5 V with a power throughput of 0–22 μW. The EHS consumes power under the ultra-low-power requirements of IoT smart nodes.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 25"},"PeriodicalIF":2.2,"publicationDate":"2022-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41490762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA 基于FPGA的码后量子密码系统密钥生成器的可靠构造
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-09 DOI: https://dl.acm.org/doi/10.1145/3544921
Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh

Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solution whose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022–2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.

量子计算的进步推动了对低功耗、低能耗、安全的加密算法的需求,这些算法可以抵御潜在的攻击。在后量子时代,人们研究了不同的解决方案。基于代码的加密技术是一种可行的解决方案,其硬件架构已成为NIST标准化过程中的研究重点,并已进入最后一轮(将于2022-2024年完成)。然而,尽管这些结构(如McEliece和Niederreiter公钥加密)具有很强的纠错特性,但先前的研究已经证明,它们的硬件实现在面对环境故障产物和故意故障(即微分故障分析)时存在脆弱性。以前表明,根据所使用的代码,即,经典或简化(使用准二进Goppa码或准循环交替码),可以观察到错误检测中的缺陷。在这项工作中,首次提出了有效的故障检测结构来解决这些缺点。这些方案基于规则奇偶校验、交错奇偶校验和两种不同的循环冗余校验(CRC),即CRC-2和CRC-8。在不失去通用性的情况下,我们对McEliece变体进行了实验,注意到所提出的方案可以用于其他基于代码的密码系统。我们在现场可编程门阵列Kintex-7器件xc7k70tfbv676-1上进行了错误检测能力评估和实现,以验证所提出方法的实用性。为了证明约束嵌入式系统的适用性,评估了所提出方案的性能退化和开销。
{"title":"Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA","authors":"Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh","doi":"https://dl.acm.org/doi/10.1145/3544921","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3544921","url":null,"abstract":"<p>Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solution whose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022–2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"28 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138543453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Neoteric Approach for Logic with Embedded Memory Leveraging Crosstalk Computing 利用串扰计算的嵌入式内存逻辑新方法
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-09 DOI: https://dl.acm.org/doi/10.1145/3569917
Prerana Samant, Naveen Kumar Macha, Mostafizur Rahman

One of the essential elements of computing is the memory element. Flip-flops form an integral part of a System-on-Chip (SoC) and consume most of the area on the die. To meet the high-speed performance demands by the data-intensive applications such as artificial intelligence, cloud computing, and machine learning, we propose to integrate memory with the logic to get built-in memory Logic circuits that operate based on the crosstalk computing logic. These circuits are called Crosstalk Built-in Memory Logic (CBML) circuits, which exploit the detrimental interconnect crosstalk and astutely turn this unwanted effect into a computing principle with embedded memory. By virtue of our novel CBML circuit technique, the logic is computed, and the result is stored intrinsically within these complex circuits. The stored values will be retained irrespective of the change in input until the next logic evaluation cycle. This neoteric embedding of memory in logic provides high-speed operation with a reduced number of transistors. In this article, we have manifested the built-in memory feature of the complex CBML circuits using 16 nanometer (nm) PTM models in HSPICE. Benchmarking is performed by comparing with the equivalent static CMOS circuits to compare the number of transistors, power, and performance. It is observed that the number of transistors consumed by CBML 4-bit Full-Adder (the key element prevalent in Arithmetic circuits, e.g., ALU, Counters) is up to 46% less, and performance is improved by 27% over the equivalent CMOS circuits. This circuit serves as an example of a large-scale CBML circuit. Also, the performance improvement achieved by other circuits such as 3-input AND and the CARRY logic is up to 60% along with a 40% reduction in the number of transistors. CBML circuits have the potential to pave the way for special high-speed macros with specifically engineered structures.

计算的基本元素之一是存储元素。触发器构成了片上系统(SoC)的一个组成部分,并消耗了芯片上的大部分面积。为了满足人工智能、云计算和机器学习等数据密集型应用对高速性能的需求,我们提出将内存与逻辑集成在一起,得到基于串扰计算逻辑运行的内置内存逻辑电路。这些电路被称为串扰内置存储器逻辑(CBML)电路,它利用有害的互连串扰,并巧妙地将这种有害的影响转化为具有嵌入式存储器的计算原理。利用我们新颖的CBML电路技术,计算逻辑,并将结果内在地存储在这些复杂的电路中。无论输入的变化如何,存储的值将被保留,直到下一个逻辑计算周期。这种在逻辑中嵌入存储器的新方法,减少了晶体管数量,提供了高速运算。在本文中,我们利用HSPICE中的16纳米(nm) PTM模型展示了复杂CBML电路的内置存储器特性。基准测试是通过与等效的静态CMOS电路进行比较,以比较晶体管的数量、功率和性能。可以观察到,CBML 4位全加法器(算术电路中普遍存在的关键元件,例如ALU,计数器)消耗的晶体管数量最多减少46%,性能比等效CMOS电路提高27%。该电路是大规模CBML电路的一个示例。此外,其他电路(如3输入AND和CARRY逻辑)的性能提高了60%,晶体管数量减少了40%。CBML电路有可能为特殊设计结构的特殊高速宏铺平道路。
{"title":"A Neoteric Approach for Logic with Embedded Memory Leveraging Crosstalk Computing","authors":"Prerana Samant, Naveen Kumar Macha, Mostafizur Rahman","doi":"https://dl.acm.org/doi/10.1145/3569917","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3569917","url":null,"abstract":"<p>One of the essential elements of computing is the memory element. Flip-flops form an integral part of a System-on-Chip (SoC) and consume most of the area on the die. To meet the high-speed performance demands by the data-intensive applications such as artificial intelligence, cloud computing, and machine learning, we propose to integrate memory with the logic to get built-in memory Logic circuits that operate based on the crosstalk computing logic. These circuits are called <b>Crosstalk Built-in Memory Logic (CBML)</b> circuits, which exploit the detrimental interconnect crosstalk and astutely turn this unwanted effect into a computing principle with embedded memory. By virtue of our novel CBML circuit technique, the logic is computed, and the result is stored intrinsically within these complex circuits. The stored values will be retained irrespective of the change in input until the next logic evaluation cycle. This neoteric embedding of memory in logic provides high-speed operation with a reduced number of transistors. In this article, we have manifested the built-in memory feature of the complex CBML circuits using 16 nanometer (nm) PTM models in HSPICE. Benchmarking is performed by comparing with the equivalent static CMOS circuits to compare the number of transistors, power, and performance. It is observed that the number of transistors consumed by CBML 4-bit Full-Adder (the key element prevalent in Arithmetic circuits, e.g., ALU, Counters) is up to 46% less, and performance is improved by 27% over the equivalent CMOS circuits. This circuit serves as an example of a large-scale CBML circuit. Also, the performance improvement achieved by other circuits such as 3-input AND and the CARRY logic is up to 60% along with a 40% reduction in the number of transistors. CBML circuits have the potential to pave the way for special high-speed macros with specifically engineered structures.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"100 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks 用于检测嵌入式神经网络故障注入攻击的加速哈希算法
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-09 DOI: https://dl.acm.org/doi/10.1145/3555808
Mojan Javaheripi, Jung-Woo Chang, Farinaz Koushanfar

We propose AccHashtag, the first framework for high-accuracy detection of fault-injection attacks on Deep Neural Networks (DNNs) with provable bounds on detection performance. Recent literature in fault-injection attacks shows the severe DNN accuracy degradation caused by bit flips. In this scenario, the attacker changes a few DNN weight bits during execution by injecting faults to the dynamic random-access memory (DRAM). To detect bit flips, AccHashtag extracts a unique signature from the benign DNN prior to deployment. The signature is used to validate the model’s integrity and verify the inference output on the fly. We propose a novel sensitivity analysis that identifies the most vulnerable DNN layers to the fault-injection attack. The DNN signature is constructed by encoding the weights in vulnerable layers using a low-collision hash function. During DNN inference, new hashes are extracted from the target layers and compared against the ground-truth signatures. AccHashtag incorporates a lightweight methodology that allows for real-time fault detection on embedded platforms. We devise a specialized compute core for AccHashtag on field-programmable gate arrays (FPGAs) to facilitate online hash generation in parallel to DNN execution. Extensive evaluations with the state-of-the-art bit-flip attack on various DNNs demonstrate the competitive advantage of AccHashtag in terms of both attack detection and execution overhead.

我们提出了AccHashtag,这是第一个高精度检测深度神经网络(dnn)故障注入攻击的框架,具有可证明的检测性能界限。最近关于故障注入攻击的文献表明,比特翻转导致深度神经网络精度严重下降。在这种情况下,攻击者在执行过程中通过向动态随机存取存储器(DRAM)注入错误来改变一些DNN权重位。为了检测位翻转,AccHashtag在部署前从良性DNN中提取唯一签名。签名用于验证模型的完整性,并实时验证推理输出。我们提出了一种新的灵敏度分析方法来识别最容易受到故障注入攻击的DNN层。DNN签名通过使用低碰撞哈希函数对脆弱层的权重进行编码来构建。在DNN推理过程中,从目标层提取新的哈希值,并与基真签名进行比较。AccHashtag采用了一种轻量级方法,可以在嵌入式平台上进行实时故障检测。我们为现场可编程门阵列(fpga)上的AccHashtag设计了一个专门的计算核心,以促进与DNN执行并行的在线哈希生成。对各种dnn的最先进的位翻转攻击进行了广泛的评估,证明了AccHashtag在攻击检测和执行开销方面的竞争优势。
{"title":"AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks","authors":"Mojan Javaheripi, Jung-Woo Chang, Farinaz Koushanfar","doi":"https://dl.acm.org/doi/10.1145/3555808","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3555808","url":null,"abstract":"<p>We propose <span>AccHashtag</span>, the first framework for high-accuracy detection of fault-injection attacks on Deep Neural Networks (DNNs) with provable bounds on detection performance. Recent literature in fault-injection attacks shows the severe DNN accuracy degradation caused by bit flips. In this scenario, the attacker changes a few DNN weight bits during execution by injecting faults to the dynamic random-access memory (DRAM). To detect bit flips, <span>AccHashtag</span> extracts a unique signature from the benign DNN prior to deployment. The signature is used to validate the model’s integrity and verify the inference output on the fly. We propose a novel sensitivity analysis that identifies the most vulnerable DNN layers to the fault-injection attack. The DNN signature is constructed by encoding the weights in vulnerable layers using a low-collision hash function. During DNN inference, new hashes are extracted from the target layers and compared against the ground-truth signatures. <span>AccHashtag</span> incorporates a lightweight methodology that allows for real-time fault detection on embedded platforms. We devise a specialized compute core for <span>AccHashtag</span> on field-programmable gate arrays (FPGAs) to facilitate online hash generation in parallel to DNN execution. Extensive evaluations with the state-of-the-art bit-flip attack on various DNNs demonstrate the competitive advantage of <span>AccHashtag</span> in terms of both attack detection and execution overhead.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"94 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
B-open Defect: A Novel Defect Model in FinFET Technology b开缺陷:一种新型的FinFET技术缺陷模型
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-09 DOI: https://dl.acm.org/doi/10.1145/3564244
Freddy Forero, Victor Champac, Michel Renovell

This article proposes an electrical analysis of a new defect mechanism, to be named as b-open defect, which may occur in nanometer technologies due to the use of the Self-Aligned Double Patterning (SADP) technique. In metal lines making use of the SADP technique, a single dust particle may cause the simultaneous occurrence of a bridge defect and an open defect. When the two defects impact the same gates, the electrical effects of the bridge and the open combine and exhibit a new specific electrical behavior; we call this new defect behavior a b-open. As a consequence, existing test generation methodologies may miss defect detection. The electrical behavior of the b-open defect is first analyzed graphically and then validated through extensive SPICE simulations. The test pattern conditions to detect the b-open defect are finally determined, and it is shown that the b-open defect requires specific test generation.

本文提出了一种新的缺陷机制的电学分析,被命名为b-开放缺陷,这可能会出现在纳米技术中,由于使用自对准双模式(SADP)技术。在使用SADP技术的金属线中,单个粉尘颗粒可能同时导致桥缺陷和开放缺陷的发生。当两个缺陷冲击同一栅极时,电桥和开路的电效应结合在一起,呈现出新的比电行为;我们称这种新的缺陷行为为b-open。因此,现有的测试生成方法可能会错过缺陷检测。首先用图形分析了b-开口缺陷的电学行为,然后通过大量的SPICE模拟验证了其电学行为。最后确定了检测b开缺陷的测试模式条件,并表明b开缺陷需要特定的测试生成。
{"title":"B-open Defect: A Novel Defect Model in FinFET Technology","authors":"Freddy Forero, Victor Champac, Michel Renovell","doi":"https://dl.acm.org/doi/10.1145/3564244","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3564244","url":null,"abstract":"<p>This article proposes an electrical analysis of a new defect mechanism, to be named as b-open defect, which may occur in nanometer technologies due to the use of the Self-Aligned Double Patterning (SADP) technique. In metal lines making use of the SADP technique, a single dust particle may cause the simultaneous occurrence of a bridge defect and an open defect. When the two defects impact the same gates, the electrical effects of the bridge and the open combine and exhibit a new specific electrical behavior; we call this new defect behavior a b-open. As a consequence, existing test generation methodologies may miss defect detection. The electrical behavior of the b-open defect is first analyzed graphically and then validated through extensive SPICE simulations. The test pattern conditions to detect the b-open defect are finally determined, and it is shown that the b-open defect requires specific test generation.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"96 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis 电磁侧通道泄漏分析的硅相关仿真方法
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-09 DOI: https://dl.acm.org/doi/10.1145/3568957
Kazuki Monta, Lang Lin, Jimin Wen, Harsh Shrivastav, Calvin Chow, Hua Chen, Joao Geada, Sreeja Chowdhury, Nitin Pundir, Norman Chang, Makoto Nagata

Cryptography hardware is vulnerable to side-channel (SC) attacks on power supply current flow and electromagnetic (EM) emission. This article proposes simulation-based power and EM side-channel leakage analysis (SCLA) techniques on a cryptographic integrated circuit (IC) chip in system level assembly. SCLA measures SC leakage metrics including T-score, SC leakage score, and the number of measurement traces to disclosure, leveraged by a secure system-on-chip design flow toward SC attack resiliency and SC leakage sign off. Power SCLA features the tracking of security sensitive registers within cryptographic logic paths and the automatic assignments of probe points on associated physical power nets. Power supply current traces are efficiently simulated for the large set of input payloads, with direct vector-based and vector-less random switching controls. EM SCLA evaluates magnetic fields created by every piece of metal wiring in metal stacks where power supply current of cryptographic processing flows. The EM emission and EM SCLA from the backside Si surface of an IC chip in flip-chip packaging are experimentally examined with a 0.13 μm test chip. The proposed simulation-based SCLA exhibits the SC leakage metrics of on-chip location and direction dependency as accurately as in the measurements.

加密硬件容易受到电源电流和电磁发射的侧信道攻击。本文提出了一种基于仿真的系统级集成电路(IC)芯片的功率和电磁侧信道泄漏分析(SCLA)技术。sca测量SC泄漏指标,包括t分数,SC泄漏分数,以及测量跟踪到披露的数量,通过安全的片上系统设计流程来实现SC攻击弹性和SC泄漏签名。电力sca的特点是在加密逻辑路径内跟踪安全敏感寄存器,并在相关的物理电力网上自动分配探测点。通过直接基于矢量和无矢量的随机开关控制,有效地模拟了大量输入有效负载的电源电流走线。EM scra对加密处理电源电流流过的金属堆中每根金属导线产生的磁场进行评估。采用0.13 μm测试芯片,对倒装芯片中IC芯片背面硅表面的电磁发射和电磁自旋能谱进行了实验研究。所提出的基于仿真的sca显示了芯片上位置和方向依赖的SC泄漏度量,与测量结果一样准确。
{"title":"Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis","authors":"Kazuki Monta, Lang Lin, Jimin Wen, Harsh Shrivastav, Calvin Chow, Hua Chen, Joao Geada, Sreeja Chowdhury, Nitin Pundir, Norman Chang, Makoto Nagata","doi":"https://dl.acm.org/doi/10.1145/3568957","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3568957","url":null,"abstract":"<p>Cryptography hardware is vulnerable to side-channel (SC) attacks on power supply current flow and electromagnetic (EM) emission. This article proposes simulation-based power and EM side-channel leakage analysis (SCLA) techniques on a cryptographic integrated circuit (IC) chip in system level assembly. SCLA measures SC leakage metrics including T-score, SC leakage score, and the number of measurement traces to disclosure, leveraged by a secure system-on-chip design flow toward SC attack resiliency and SC leakage sign off. Power SCLA features the tracking of security sensitive registers within cryptographic logic paths and the automatic assignments of probe points on associated physical power nets. Power supply current traces are efficiently simulated for the large set of input payloads, with direct vector-based and vector-less random switching controls. EM SCLA evaluates magnetic fields created by every piece of metal wiring in metal stacks where power supply current of cryptographic processing flows. The EM emission and EM SCLA from the backside Si surface of an IC chip in flip-chip packaging are experimentally examined with a 0.13 μm test chip. The proposed simulation-based SCLA exhibits the SC leakage metrics of on-chip location and direction dependency as accurately as in the measurements.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"99 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taming Molecular Field-Coupling for Nanocomputing Design 纳米计算设计中的分子场耦合控制
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-12-09 DOI: https://dl.acm.org/doi/10.1145/3552520
Yuri Ardesi, Umberto Garlando, Fabrizio Riente, Giuliana Beretta, Gianluca Piccinini, Mariagrazia Graziano

Molecular Field-Coupling Nanocomputing (FCN) is one of the most promising technologies for overcoming Complementary Metal Oxide Semiconductor (CMOS) scaling issues. It encodes the information in the charge distribution of nanometric molecules and propagates it through local electrostatic intermolecular interaction. This technology promises very high speed at ambient temperatures with minimal power dissipation. The main research focus on molecular FCN is currently either on single-molecule low-level analysis or circuit design based on naïve assumptions. We aim to fill this gap, assessing the potential and feasibility of FCN. We present a bottom-up analysis and design framework that starts from the physical characterization of molecular and technological parameters and enables physical-aware FCN designs. The framework explicitly considers molecular physics, allowing the designer to tame the molecular interaction to ensure the computational capabilities of the final device. The framework permits studying possible physical effects that create cross-implications and correlations among physical and system-level layers considering possible behavior variability. We characterize and verify molecular propagation in increasingly structured layouts to design complex arithmetic circuits. The results highlight molecular FCN advantages, especially in area occupation, and provide valuable quantitative feedback to designers and technologists to support the assessment of molecular FCN and the realization of an eventual prototype.

分子场耦合纳米计算(FCN)是克服互补金属氧化物半导体(CMOS)缩放问题的最有前途的技术之一。它对纳米分子电荷分布中的信息进行编码,并通过局部静电分子间相互作用进行传播。这项技术承诺在环境温度下以最小的功耗实现非常高的速度。目前分子FCN的主要研究重点要么是单分子低水平分析,要么是基于naïve假设的电路设计。我们的目标是填补这一空白,评估FCN的潜力和可行性。我们提出了一个自下而上的分析和设计框架,从分子和技术参数的物理特性开始,使物理感知的FCN设计成为可能。该框架明确考虑了分子物理学,允许设计师控制分子相互作用,以确保最终设备的计算能力。考虑到可能的行为可变性,该框架允许研究在物理层和系统级层之间产生交叉含义和相关性的可能的物理效应。我们描述和验证分子传播在日益结构化的布局,以设计复杂的算术电路。结果突出了分子FCN的优势,特别是在面积占用方面,并为设计人员和技术人员提供了有价值的定量反馈,以支持分子FCN的评估和最终原型的实现。
{"title":"Taming Molecular Field-Coupling for Nanocomputing Design","authors":"Yuri Ardesi, Umberto Garlando, Fabrizio Riente, Giuliana Beretta, Gianluca Piccinini, Mariagrazia Graziano","doi":"https://dl.acm.org/doi/10.1145/3552520","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3552520","url":null,"abstract":"<p>Molecular Field-Coupling Nanocomputing (FCN) is one of the most promising technologies for overcoming Complementary Metal Oxide Semiconductor (CMOS) scaling issues. It encodes the information in the charge distribution of nanometric molecules and propagates it through local electrostatic intermolecular interaction. This technology promises very high speed at ambient temperatures with minimal power dissipation. The main research focus on molecular FCN is currently either on single-molecule low-level analysis or circuit design based on naïve assumptions. We aim to fill this gap, assessing the potential and feasibility of FCN. We present a bottom-up analysis and design framework that starts from the physical characterization of molecular and technological parameters and enables physical-aware FCN designs. The framework explicitly considers molecular physics, allowing the designer to tame the molecular interaction to ensure the computational capabilities of the final device. The framework permits studying possible physical effects that create cross-implications and correlations among physical and system-level layers considering possible behavior variability. We characterize and verify molecular propagation in increasingly structured layouts to design complex arithmetic circuits. The results highlight molecular FCN advantages, especially in area occupation, and provide valuable quantitative feedback to designers and technologists to support the assessment of molecular FCN and the realization of an eventual prototype.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"93 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Generation of Security Assertions for RTL Models RTL模型安全断言的自动生成
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-11-22 DOI: 10.1145/3565801
Hasini Witharana, Aruna Jayasena, Andrew Whigham, P. Mishra
System-on-Chip (SoC) security is vital in designing trustworthy systems. Detecting and fixing a vulnerability in the early stages is easier and cost-effective. Assertion-based verification is widely used for functional validation of Register-Transfer Level (RTL) designs. Assertions can improve the controllability and observability that can lead to faster error detection and localization. Although assertions are widely used for functional validation of RTL models, there is limited effort in applying assertions to detect SoC security vulnerabilities. Specifically, a fundamental challenge in SoC security and trust validation is how to develop high-quality security assertions. In this article, we perform automated vulnerability analysis of RTL models to generate security assertions for six classes of vulnerabilities. Experimental results show that the generated security assertions can detect a wide variety of vulnerabilities. Our automated framework can drastically reduce the overall security validation effort compared to the manual development of security assertions. Automated generation of security assertions will enable assertion-based verification to be one of the most promising pre-silicon security sign-off solutions.
片上系统(SoC)的安全性对于设计可靠的系统至关重要。在早期阶段检测和修复漏洞更容易,成本效益也更高。基于断言的验证广泛用于寄存器传输级(RTL)设计的功能验证。断言可以提高可控性和可观察性,从而更快地进行错误检测和定位。尽管断言被广泛用于RTL模型的功能验证,但应用断言来检测SoC安全漏洞的工作有限。具体来说,SoC安全和信任验证的一个根本挑战是如何开发高质量的安全断言。在本文中,我们对RTL模型执行自动漏洞分析,以生成六类漏洞的安全断言。实验结果表明,生成的安全断言可以检测到各种各样的漏洞。与手动开发安全断言相比,我们的自动化框架可以大大减少总体安全验证工作量。安全断言的自动生成将使基于断言的验证成为最有前途的硅前安全注销解决方案之一。
{"title":"Automated Generation of Security Assertions for RTL Models","authors":"Hasini Witharana, Aruna Jayasena, Andrew Whigham, P. Mishra","doi":"10.1145/3565801","DOIUrl":"https://doi.org/10.1145/3565801","url":null,"abstract":"System-on-Chip (SoC) security is vital in designing trustworthy systems. Detecting and fixing a vulnerability in the early stages is easier and cost-effective. Assertion-based verification is widely used for functional validation of Register-Transfer Level (RTL) designs. Assertions can improve the controllability and observability that can lead to faster error detection and localization. Although assertions are widely used for functional validation of RTL models, there is limited effort in applying assertions to detect SoC security vulnerabilities. Specifically, a fundamental challenge in SoC security and trust validation is how to develop high-quality security assertions. In this article, we perform automated vulnerability analysis of RTL models to generate security assertions for six classes of vulnerabilities. Experimental results show that the generated security assertions can detect a wide variety of vulnerabilities. Our automated framework can drastically reduce the overall security validation effort compared to the manual development of security assertions. Automated generation of security assertions will enable assertion-based verification to be one of the most promising pre-silicon security sign-off solutions.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 27"},"PeriodicalIF":2.2,"publicationDate":"2022-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43563836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
2DMAC: A Sustainable and Efficient Medium Access Control Mechanism for Future Wireless NoCs 2DMAC:一种适用于未来无线节点的可持续高效的介质访问控制机制
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-11-05 DOI: 10.1145/3570727
Sidhartha Sankar Rout, Mitali Sinha, Sujay Deb
Wireless Network-on-Chip (WNoC) requires a Medium Access Control (MAC) mechanism for an interference-free sharing of the wireless channel. In traditional MAC, a token is circulated among the Wireless Interfaces (WIs) in a Round Robin manner. The WI with the token holds the channel for a fixed number of cycles. However, the channel requirement of the individual WIs dynamically changes over time due to the varying traffic density across the WNoC. Moreover, the conventional WNoCs give equal importance to all the traffic taking the wireless path and transmit it in an oldest-first manner. Nevertheless, the critical data can degrade the system performance to a large extent by delaying the application runtime if not served promptly. We propose 2DMAC, which can change the token arbitration pattern and tune the channel hold time of each WI based on its runtime traffic density and criticality status. Moreover, 2DMAC prioritizes the critical traffic over the non-critical traffic during the wireless data transfer. The proposed mechanism improves the wireless channel utilization by 15.67% and the network throughput by 29.83% and reduces the critical data latency by 29.77% over the traditional MAC.
片上无线网络(WNoC)需要介质访问控制(MAC)机制来实现无线信道的无干扰共享。在传统的MAC中,令牌以循环方式在无线接口(WIs)之间循环。带有令牌的WI将通道保持固定数量的循环。然而,由于整个WNoC的流量密度变化,各个WIs的信道需求会随着时间的推移而动态变化。此外,传统的WNoCs对采用无线路径的所有业务给予同等的重视,并以最古老的第一方式进行传输。然而,如果不及时提供服务,关键数据可能会延迟应用程序运行时间,从而在很大程度上降低系统性能。我们提出了2DMAC,它可以根据每个WI的运行时流量密度和关键状态来改变令牌仲裁模式并调整其信道保持时间。此外,在无线数据传输期间,2DMAC将关键业务优先于非关键业务。与传统MAC相比,该机制将无线信道利用率提高了15.67%,网络吞吐量提高了29.83%,并将关键数据延迟降低了29.77%。
{"title":"2DMAC: A Sustainable and Efficient Medium Access Control Mechanism for Future Wireless NoCs","authors":"Sidhartha Sankar Rout, Mitali Sinha, Sujay Deb","doi":"10.1145/3570727","DOIUrl":"https://doi.org/10.1145/3570727","url":null,"abstract":"Wireless Network-on-Chip (WNoC) requires a Medium Access Control (MAC) mechanism for an interference-free sharing of the wireless channel. In traditional MAC, a token is circulated among the Wireless Interfaces (WIs) in a Round Robin manner. The WI with the token holds the channel for a fixed number of cycles. However, the channel requirement of the individual WIs dynamically changes over time due to the varying traffic density across the WNoC. Moreover, the conventional WNoCs give equal importance to all the traffic taking the wireless path and transmit it in an oldest-first manner. Nevertheless, the critical data can degrade the system performance to a large extent by delaying the application runtime if not served promptly. We propose 2DMAC, which can change the token arbitration pattern and tune the channel hold time of each WI based on its runtime traffic density and criticality status. Moreover, 2DMAC prioritizes the critical traffic over the non-critical traffic during the wireless data transfer. The proposed mechanism improves the wireless channel utilization by 15.67% and the network throughput by 29.83% and reduces the critical data latency by 29.77% over the traditional MAC.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":" ","pages":"1 - 25"},"PeriodicalIF":2.2,"publicationDate":"2022-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47686505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Neoteric Approach for Logic with Embedded Memory Leveraging Crosstalk Computing 利用串扰计算的嵌入式内存逻辑新方法
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-11-01 DOI: 10.1145/3569917
Prerana Samant, Naveen Kumar Macha, Mostafizur Rahman
One of the essential elements of computing is the memory element. Flip-flops form an integral part of a System-on-Chip (SoC) and consume most of the area on the die. To meet the high-speed performance demands by the data-intensive applications such as artificial intelligence, cloud computing, and machine learning, we propose to integrate memory with the logic to get built-in memory Logic circuits that operate based on the crosstalk computing logic. These circuits are called Crosstalk Built-in Memory Logic (CBML) circuits, which exploit the detrimental interconnect crosstalk and astutely turn this unwanted effect into a computing principle with embedded memory. By virtue of our novel CBML circuit technique, the logic is computed, and the result is stored intrinsically within these complex circuits. The stored values will be retained irrespective of the change in input until the next logic evaluation cycle. This neoteric embedding of memory in logic provides high-speed operation with a reduced number of transistors. In this article, we have manifested the built-in memory feature of the complex CBML circuits using 16 nanometer (nm) PTM models in HSPICE. Benchmarking is performed by comparing with the equivalent static CMOS circuits to compare the number of transistors, power, and performance. It is observed that the number of transistors consumed by CBML 4-bit Full-Adder (the key element prevalent in Arithmetic circuits, e.g., ALU, Counters) is up to 46% less, and performance is improved by 27% over the equivalent CMOS circuits. This circuit serves as an example of a large-scale CBML circuit. Also, the performance improvement achieved by other circuits such as 3-input AND and the CARRY logic is up to 60% along with a 40% reduction in the number of transistors. CBML circuits have the potential to pave the way for special high-speed macros with specifically engineered structures.
计算的一个基本元素是内存元素。触发器构成片上系统(SoC)的一个组成部分,并消耗管芯上的大部分面积。为了满足人工智能、云计算和机器学习等数据密集型应用的高速性能需求,我们建议将存储器与逻辑集成,以获得基于串扰计算逻辑操作的内置存储器逻辑电路。这些电路被称为串扰内置存储器逻辑(CBML)电路,它利用有害的互连串扰,巧妙地将这种不必要的影响转化为嵌入式存储器的计算原理。借助我们新颖的CBML电路技术,可以计算逻辑,并将结果存储在这些复杂电路中。存储的值将被保留,而与输入的变化无关,直到下一个逻辑评估周期。这种存储器在逻辑中的新嵌入提供了晶体管数量减少的高速操作。在本文中,我们使用HSPICE中的16纳米(nm)PTM模型展示了复杂CBML电路的内置存储器特性。基准测试是通过与等效静态CMOS电路进行比较来比较晶体管数量、功率和性能。观察到,CBML 4位全加器(算术电路中普遍存在的关键元件,例如ALU、计数器)消耗的晶体管数量减少了46%,并且与等效CMOS电路相比,性能提高了27%。该电路用作大规模CBML电路的示例。此外,通过诸如3输入AND和CARRY逻辑之类的其他电路实现的性能提高高达60%,同时晶体管的数量减少了40%。CBML电路有可能为具有特定工程结构的特殊高速宏铺平道路。
{"title":"A Neoteric Approach for Logic with Embedded Memory Leveraging Crosstalk Computing","authors":"Prerana Samant, Naveen Kumar Macha, Mostafizur Rahman","doi":"10.1145/3569917","DOIUrl":"https://doi.org/10.1145/3569917","url":null,"abstract":"One of the essential elements of computing is the memory element. Flip-flops form an integral part of a System-on-Chip (SoC) and consume most of the area on the die. To meet the high-speed performance demands by the data-intensive applications such as artificial intelligence, cloud computing, and machine learning, we propose to integrate memory with the logic to get built-in memory Logic circuits that operate based on the crosstalk computing logic. These circuits are called Crosstalk Built-in Memory Logic (CBML) circuits, which exploit the detrimental interconnect crosstalk and astutely turn this unwanted effect into a computing principle with embedded memory. By virtue of our novel CBML circuit technique, the logic is computed, and the result is stored intrinsically within these complex circuits. The stored values will be retained irrespective of the change in input until the next logic evaluation cycle. This neoteric embedding of memory in logic provides high-speed operation with a reduced number of transistors. In this article, we have manifested the built-in memory feature of the complex CBML circuits using 16 nanometer (nm) PTM models in HSPICE. Benchmarking is performed by comparing with the equivalent static CMOS circuits to compare the number of transistors, power, and performance. It is observed that the number of transistors consumed by CBML 4-bit Full-Adder (the key element prevalent in Arithmetic circuits, e.g., ALU, Counters) is up to 46% less, and performance is improved by 27% over the equivalent CMOS circuits. This circuit serves as an example of a large-scale CBML circuit. Also, the performance improvement achieved by other circuits such as 3-input AND and the CARRY logic is up to 60% along with a 40% reduction in the number of transistors. CBML circuits have the potential to pave the way for special high-speed macros with specifically engineered structures.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 16"},"PeriodicalIF":2.2,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46776367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Journal on Emerging Technologies in Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1