首页 > 最新文献

ACM Journal on Emerging Technologies in Computing Systems最新文献

英文 中文
A Novel Highly-Efficient Inexact Full Adder Cell for Motion and Edge Detection Systems of Image Processing in CNFET Technology 一种用于CNFET技术中图像处理运动和边缘检测系统的新型高效非精确全加法器单元
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-27 DOI: https://dl.acm.org/doi/10.1145/3524061
Yavar Safaei Mehrabani, Samaneh Goldani Gigasari, Mohammad Mirzaei, Hamidreza Uoosefian

In this paper, a novel and highly efficient inexact Full Adder cell by exploiting two logic styles including conventional CMOS (C-COMS) and pass transistor logic (PTL) are presented. The so-called carbon nanotube field-effect transistor (CNFET) technology is used to implement circuits at the transistor level. To justify the efficiency of our design, extensive simulations are performed at the transistor level as well as application level. Transistor-level simulations which are carried out by the HSPICE 2008 tool, demonstrate at least 12% higher performance in terms of power-delay-area product (PDAP) of the proposed circuit compared to the latest designs. At the application level, by using the MATLAB tool, inexact Full Adders are employed in the structure of the ripple carry adder (RCA) that is applied in motion and edge detection algorithms. Computer simulation results confirm the appropriate quality of the output images in terms of the peak signal-to-noise ratio (PSNR) and structural similarity (SSIM) criteria. At last, to make a compromise between hardware and application level parameters, the power-delay-area-1/PSNR product (PDAPP) and power-delay-area-1/SSIM product (PDASP) are considered as figures of merit. The proposed circuit shows remarkable improvement from the PDAPP and PDASP points of view compared to its counterparts.

本文利用传统CMOS (C-COMS)和通管逻辑(PTL)两种逻辑方式,提出了一种新型、高效的非精确全加法器单元。所谓的碳纳米管场效应晶体管(CNFET)技术被用来实现晶体管级的电路。为了证明我们设计的效率,在晶体管级和应用级进行了广泛的模拟。利用HSPICE 2008工具进行的晶体管级模拟表明,与最新设计相比,所提出电路的功率延迟面积积(PDAP)的性能至少提高了12%。在应用层面,通过使用MATLAB工具,在运动和边缘检测算法中应用的纹波进位加法器(RCA)的结构中采用了不精确的全加法器。计算机仿真结果证实了输出图像在峰值信噪比(PSNR)和结构相似性(SSIM)标准方面的适当质量。最后,为了在硬件和应用层参数之间做出妥协,将功率延迟面积-1/PSNR产品(PDAPP)和功率延迟面积-1/SSIM产品(PDASP)作为优劣指标。从PDAPP和PDASP的角度来看,所提出的电路与同类电路相比有显著的改进。
{"title":"A Novel Highly-Efficient Inexact Full Adder Cell for Motion and Edge Detection Systems of Image Processing in CNFET Technology","authors":"Yavar Safaei Mehrabani, Samaneh Goldani Gigasari, Mohammad Mirzaei, Hamidreza Uoosefian","doi":"https://dl.acm.org/doi/10.1145/3524061","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3524061","url":null,"abstract":"<p>In this paper, a novel and highly efficient inexact Full Adder cell by exploiting two logic styles including <b>conventional CMOS (C-COMS)</b> and <b>pass transistor logic (PTL)</b> are presented. The so-called <b>carbon nanotube field-effect transistor (CNFET)</b> technology is used to implement circuits at the transistor level. To justify the efficiency of our design, extensive simulations are performed at the transistor level as well as application level. Transistor-level simulations which are carried out by the HSPICE 2008 tool, demonstrate at least 12% higher performance in terms of <b>power-delay-area product (PDAP)</b> of the proposed circuit compared to the latest designs. At the application level, by using the MATLAB tool, inexact Full Adders are employed in the structure of the <b>ripple carry adder (RCA)</b> that is applied in motion and edge detection algorithms. Computer simulation results confirm the appropriate quality of the output images in terms of the <b>peak signal-to-noise ratio (PSNR)</b> and <b>structural similarity (SSIM)</b> criteria. At last, to make a compromise between hardware and application level parameters, the <b>power-delay-area-1/PSNR product (PDAPP)</b> and <b>power-delay-area-1/SSIM product (PDASP)</b> are considered as figures of merit. The proposed circuit shows remarkable improvement from the PDAPP and PDASP points of view compared to its counterparts.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"63 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SaARSP: An Architecture for Systolic-Array Acceleration of Recurrent Spiking Neural Networks 循环脉冲神经网络的收缩阵列加速体系结构
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-26 DOI: https://dl.acm.org/doi/10.1145/3510854
Jeong-Jun Lee, Wenrui Zhang, Yuan Xie, Peng Li

Spiking neural networks (SNNs) are brain-inspired event-driven models of computation with promising ultra-low energy dissipation. Rich network dynamics emergent in recurrent spiking neural networks (R-SNNs) can form temporally based memory, offering great potential in processing complex spatiotemporal data. However, recurrence in network connectivity produces tightly coupled data dependency in both space and time, rendering hardware acceleration of R-SNNs challenging. We present the first work to exploit spatiotemporal parallelisms to accelerate the R-SNN-based inference on systolic arrays using an architecture called SaARSP. We decouple the processing of feedforward synaptic connections from that of recurrent connections to allow for the exploitation of parallelisms across multiple time points. We propose a novel time window size optimization (TWSO) technique, to further explore the temporal granularity of the proposed decoupling in terms of optimal time window size and reconfiguration of the systolic array considering layer-dependent connectivity to boost performance. Stationary dataflow and time window size are jointly optimized to trade off between weight data reuse and movements of partial sums, the two bottlenecks in latency and energy dissipation of the accelerator. The proposed systolic-array architecture offers a unifying solution to an acceleration of both feedforward and recurrent SNNs, and delivers 4,000X EDP improvement on average for different R-SNN benchmarks over a conventional baseline.

脉冲神经网络(SNNs)是一种受大脑启发的事件驱动计算模型,具有超低能量耗散的前景。循环尖峰神经网络(r - snn)中产生的丰富的网络动态可以形成基于时间的记忆,在处理复杂的时空数据方面具有很大的潜力。然而,网络连通性的递归会在空间和时间上产生紧密耦合的数据依赖,这使得r - snn的硬件加速具有挑战性。我们提出了第一项利用时空并行性来加速基于r - snn的收缩阵列推理的工作,该推理使用了一种称为SaARSP的架构。我们将前馈突触连接的处理与循环连接的处理解耦,以允许利用跨多个时间点的并行性。我们提出了一种新的时间窗口大小优化(TWSO)技术,以进一步探索所提出的解耦的时间粒度,根据最佳时间窗口大小和考虑层相关连接的收缩阵列的重新配置来提高性能。同时对固定数据流和时间窗大小进行了优化,以平衡权重数据重用和部分和移动这两个加速器延迟和能量消耗的瓶颈。所提出的收缩阵列架构为前馈和循环snn的加速提供了统一的解决方案,并且在不同的R-SNN基准测试中,与传统基线相比,平均可提供4,000倍的EDP改进。
{"title":"SaARSP: An Architecture for Systolic-Array Acceleration of Recurrent Spiking Neural Networks","authors":"Jeong-Jun Lee, Wenrui Zhang, Yuan Xie, Peng Li","doi":"https://dl.acm.org/doi/10.1145/3510854","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3510854","url":null,"abstract":"<p>Spiking neural networks (SNNs) are brain-inspired event-driven models of computation with promising ultra-low energy dissipation. Rich network dynamics emergent in recurrent spiking neural networks (R-SNNs) can form temporally based memory, offering great potential in processing complex spatiotemporal data. However, recurrence in network connectivity produces tightly coupled data dependency in both space and time, rendering hardware acceleration of R-SNNs challenging. We present the first work to exploit spatiotemporal parallelisms to accelerate the R-SNN-based inference on systolic arrays using an architecture called SaARSP. We decouple the processing of feedforward synaptic connections from that of recurrent connections to allow for the exploitation of parallelisms across multiple time points. We propose a novel time window size optimization (TWSO) technique, to further explore the temporal granularity of the proposed decoupling in terms of optimal time window size and reconfiguration of the systolic array considering layer-dependent connectivity to boost performance. Stationary dataflow and time window size are jointly optimized to trade off between weight data reuse and movements of partial sums, the two bottlenecks in latency and energy dissipation of the accelerator. The proposed systolic-array architecture offers a unifying solution to an acceleration of both feedforward and recurrent SNNs, and delivers 4,000X EDP improvement on average for different R-SNN benchmarks over a conventional baseline.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: Secure Radio-Frequency (RF)-Analog Electronics and Electromagnetics 嘉宾评论:安全射频(RF)-模拟电子学和电磁学
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-25 DOI: https://dl.acm.org/doi/10.1145/3564261
Vanessa Chen, Mohammad AL Faruque, Fadi Kurdahi

No abstract available.

没有摘要。
{"title":"Guest Editorial: Secure Radio-Frequency (RF)-Analog Electronics and Electromagnetics","authors":"Vanessa Chen, Mohammad AL Faruque, Fadi Kurdahi","doi":"https://dl.acm.org/doi/10.1145/3564261","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3564261","url":null,"abstract":"<p>No abstract available.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"176 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Memory-centric Computer Architectures 以内存为中心的计算机体系结构综述
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-25 DOI: https://dl.acm.org/doi/10.1145/3544974
Anteneh Gebregiorgis, Hoang Anh Du Nguyen, Jintao Yu, Rajendra Bishnoi, Mottaqiallah Taouil, Francky Catthoor, Said Hamdioui

Faster and cheaper computers have been constantly demanding technological and architectural improvements. However, current technology is suffering from three technology walls: leakage wall, reliability wall, and cost wall. Meanwhile, existing architecture performance is also saturating due to three well-known architecture walls: memory wall, power wall, and instruction-level parallelism (ILP) wall. Hence, a lot of novel technologies and architectures have been introduced and developed intensively. Our previous work has presented a comprehensive classification and broad overview of memory-centric computer architectures. In this article, we aim to discuss the most important classes of memory-centric architectures thoroughly and evaluate their advantages and disadvantages. Moreover, for each class, the article provides a comprehensive survey on memory-centric architectures available in the literature.

更快、更便宜的计算机不断要求技术和架构上的改进。然而,目前的技术面临着泄漏墙、可靠性墙和成本墙三大技术壁垒。同时,由于三个众所周知的架构墙:内存墙、功耗墙和指令级并行(ILP)墙,现有架构的性能也趋于饱和。因此,大量新的技术和架构被引入和开发。我们之前的工作已经对以内存为中心的计算机体系结构进行了全面的分类和广泛的概述。在本文中,我们旨在全面讨论最重要的以内存为中心的体系结构类,并评估它们的优缺点。此外,对于每个类,本文对文献中可用的以内存为中心的体系结构进行了全面的调查。
{"title":"A Survey on Memory-centric Computer Architectures","authors":"Anteneh Gebregiorgis, Hoang Anh Du Nguyen, Jintao Yu, Rajendra Bishnoi, Mottaqiallah Taouil, Francky Catthoor, Said Hamdioui","doi":"https://dl.acm.org/doi/10.1145/3544974","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3544974","url":null,"abstract":"<p>Faster and cheaper computers have been constantly demanding technological and architectural improvements. However, current technology is suffering from three technology walls: leakage wall, reliability wall, and cost wall. Meanwhile, existing architecture performance is also saturating due to three well-known architecture walls: memory wall, power wall, and instruction-level parallelism (ILP) wall. Hence, a lot of novel technologies and architectures have been introduced and developed intensively. Our previous work has presented a comprehensive classification and broad overview of memory-centric computer architectures. In this article, we aim to discuss the most important classes of memory-centric architectures thoroughly and evaluate their advantages and disadvantages. Moreover, for each class, the article provides a comprehensive survey on memory-centric architectures available in the literature.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis EM侧沟道泄漏分析的硅相关仿真方法
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-20 DOI: 10.1145/3568957
Kazuki Monta, Lang Lin, Jimin Wen, Harsh Shrivastav, C. Chow, Hua Chen, J. Geada, Sreeja Chowdhury, Nitin Pundir, N. Chang, M. Nagata
Cryptography hardware is vulnerable to side-channel (SC) attacks on power supply current flow and electromagnetic (EM) emission. This article proposes simulation-based power and EM side-channel leakage analysis (SCLA) techniques on a cryptographic integrated circuit (IC) chip in system level assembly. SCLA measures SC leakage metrics including T-score, SC leakage score, and the number of measurement traces to disclosure, leveraged by a secure system-on-chip design flow toward SC attack resiliency and SC leakage sign off. Power SCLA features the tracking of security sensitive registers within cryptographic logic paths and the automatic assignments of probe points on associated physical power nets. Power supply current traces are efficiently simulated for the large set of input payloads, with direct vector-based and vector-less random switching controls. EM SCLA evaluates magnetic fields created by every piece of metal wiring in metal stacks where power supply current of cryptographic processing flows. The EM emission and EM SCLA from the backside Si surface of an IC chip in flip-chip packaging are experimentally examined with a 0.13 μm test chip. The proposed simulation-based SCLA exhibits the SC leakage metrics of on-chip location and direction dependency as accurately as in the measurements.
加密硬件容易受到电源电流和电磁发射的侧信道攻击。本文提出了一种基于仿真的系统级集成电路(IC)芯片的功率和电磁侧信道泄漏分析(SCLA)技术。sca测量SC泄漏指标,包括t分数,SC泄漏分数,以及测量跟踪到披露的数量,通过安全的片上系统设计流程来实现SC攻击弹性和SC泄漏签名。电力sca的特点是在加密逻辑路径内跟踪安全敏感寄存器,并在相关的物理电力网上自动分配探测点。通过直接基于矢量和无矢量的随机开关控制,有效地模拟了大量输入有效负载的电源电流走线。EM scra对加密处理电源电流流过的金属堆中每根金属导线产生的磁场进行评估。采用0.13 μm测试芯片,对倒装芯片中IC芯片背面硅表面的电磁发射和电磁自旋能谱进行了实验研究。所提出的基于仿真的sca显示了芯片上位置和方向依赖的SC泄漏度量,与测量结果一样准确。
{"title":"Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis","authors":"Kazuki Monta, Lang Lin, Jimin Wen, Harsh Shrivastav, C. Chow, Hua Chen, J. Geada, Sreeja Chowdhury, Nitin Pundir, N. Chang, M. Nagata","doi":"10.1145/3568957","DOIUrl":"https://doi.org/10.1145/3568957","url":null,"abstract":"Cryptography hardware is vulnerable to side-channel (SC) attacks on power supply current flow and electromagnetic (EM) emission. This article proposes simulation-based power and EM side-channel leakage analysis (SCLA) techniques on a cryptographic integrated circuit (IC) chip in system level assembly. SCLA measures SC leakage metrics including T-score, SC leakage score, and the number of measurement traces to disclosure, leveraged by a secure system-on-chip design flow toward SC attack resiliency and SC leakage sign off. Power SCLA features the tracking of security sensitive registers within cryptographic logic paths and the automatic assignments of probe points on associated physical power nets. Power supply current traces are efficiently simulated for the large set of input payloads, with direct vector-based and vector-less random switching controls. EM SCLA evaluates magnetic fields created by every piece of metal wiring in metal stacks where power supply current of cryptographic processing flows. The EM emission and EM SCLA from the backside Si surface of an IC chip in flip-chip packaging are experimentally examined with a 0.13 μm test chip. The proposed simulation-based SCLA exhibits the SC leakage metrics of on-chip location and direction dependency as accurately as in the measurements.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 23"},"PeriodicalIF":2.2,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44722353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Cost-Effective Built-In Self-Test Mechanism for Post-Manufacturing TSV Defects in 3D ICs 3D集成电路制造后TSV缺陷的低成本内置自检机制
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3517808
Dilip Kumar Maity, Surajit Kumar Roy, Chandan Giri

Three-Dimensional Integrated Circuit (3D IC) based on Through-Silicon-Via (TSV) has brought a drastic change in IC technology. Since TSVs connect different layers of 3D stacks, their proper functioning is an essential prerequisite for system operation. Therefore, testing of TSV is essential for 3D IC. In this article, we propose a cost-effective Built-In Self-Test (BIST) method to test the TSVs of a 3D IC. The test method aims at identifying single and multiple defective TSVs using low test time with small hardware overhead. Further, we introduce a BIST partitioning scheme to reduce the test time and hardware overhead for many TSVs. We also present EBIST, an extended-BIST, to enhance BIST reliability with the least hardware cost. The time cycle needed for testing is calculated and compared with previously proposed methods. The simulation result shows that the proposed BIST reduces the test time by 87% compared to prior works. Moreover, the approach yields reduced area as compared to existing test architecture.

基于通硅孔(TSV)的三维集成电路(3D IC)带来了集成电路技术的巨大变革。由于tsv连接不同层的3D堆栈,因此其正常运行是系统运行的必要前提。因此,TSV测试对于3D IC至关重要。在本文中,我们提出了一种具有成本效益的内置自检(BIST)方法来测试3D IC的TSV。该测试方法旨在使用较低的测试时间和较小的硬件开销来识别单个和多个有缺陷的TSV。此外,我们还引入了一个BIST分区方案,以减少许多tsv的测试时间和硬件开销。为了以最小的硬件成本提高BIST的可靠性,我们还提出了一种扩展的BIST。计算了测试所需的时间周期,并与先前提出的方法进行了比较。仿真结果表明,该方法比现有方法减少了87%的测试时间。此外,与现有的测试体系结构相比,该方法产生的面积更小。
{"title":"A Cost-Effective Built-In Self-Test Mechanism for Post-Manufacturing TSV Defects in 3D ICs","authors":"Dilip Kumar Maity, Surajit Kumar Roy, Chandan Giri","doi":"https://dl.acm.org/doi/10.1145/3517808","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3517808","url":null,"abstract":"<p>Three-Dimensional Integrated Circuit (3D IC) based on Through-Silicon-Via (TSV) has brought a drastic change in IC technology. Since TSVs connect different layers of 3D stacks, their proper functioning is an essential prerequisite for system operation. Therefore, testing of TSV is essential for 3D IC. In this article, we propose a cost-effective Built-In Self-Test (BIST) method to test the TSVs of a 3D IC. The test method aims at identifying single and multiple defective TSVs using low test time with small hardware overhead. Further, we introduce a BIST partitioning scheme to reduce the test time and hardware overhead for many TSVs. We also present EBIST, an extended-BIST, to enhance BIST reliability with the least hardware cost. The time cycle needed for testing is calculated and compared with previously proposed methods. The simulation result shows that the proposed BIST reduces the test time by 87% compared to prior works. Moreover, the approach yields reduced area as compared to existing test architecture.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"92 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
All-spin PUF: An Area-efficient and Reliable PUF Design with Signature Improvement for Spin-transfer Torque Magnetic Cell-based All-spin Circuits 全自旋PUF:基于自旋传递转矩磁池的全自旋电路的面积高效可靠PUF设计
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3517811
Kangwei Xu, Dongrong Zhang, Qiang Ren, Yuanqing Cheng, Patrick Girard

Recently, spin-transfer torque magnetic cell (STT-mCell) has emerged as a promising spintronic device to be used in Computing-in-Memory (CIM) systems. However, it is challenging to guarantee the hardware security of STT-mCell-based all-spin circuits. In this work, we propose a novel Physical Unclonable Function (PUF) design for the STT-mCell-based all-spin circuit (All-Spin PUF) exploiting the unique manufacturing process variation (PV) on STT-mCell write latency. A methodology is used to select appropriate logic gates in the all-spin chip to generate a unique identification key. A linear feedback shift register (LFSR) initiates the All-Spin PUF and simultaneously generates a 64-bit signature at each clock cycle. Signature generation is stabilized using an automatic write-back technique. In addition, a masking scheme is applied for signature improvement. The uniqueness of the improved signature is 49.61%. With ± 20% supply voltage and 5°C to 105°C temperature variations, the All-Spin PUF shows a strong resiliency. In comparison with state-of-the-art PUFs, our approach can reduce hardware overhead effectively. Finally, the robustness of the All-Spin PUF against emerging modeling attacks is verified as well.

近年来,自旋转移转矩磁电池(STT-mCell)作为一种很有前途的自旋电子器件应用于内存计算(CIM)系统。然而,如何保证基于stt - mccell的全自旋电路的硬件安全性是一个挑战。在这项工作中,我们提出了一种新的基于STT-mCell的全自旋电路(all-spin PUF)的物理不可克隆功能(PUF)设计,利用了STT-mCell写入延迟的独特制造工艺变化(PV)。采用一种方法在全自旋芯片中选择合适的逻辑门来生成唯一的识别密钥。线性反馈移位寄存器(LFSR)启动All-Spin PUF,并在每个时钟周期同时生成64位签名。使用自动回写技术来稳定签名的生成。此外,还采用屏蔽方案进行签名改进。改进后签名的唯一性为49.61%。在±20%的电源电压和5°C到105°C的温度变化下,全自旋PUF显示出很强的弹性。与最先进的puf相比,我们的方法可以有效地减少硬件开销。最后,验证了全自旋PUF对新出现的建模攻击的鲁棒性。
{"title":"All-spin PUF: An Area-efficient and Reliable PUF Design with Signature Improvement for Spin-transfer Torque Magnetic Cell-based All-spin Circuits","authors":"Kangwei Xu, Dongrong Zhang, Qiang Ren, Yuanqing Cheng, Patrick Girard","doi":"https://dl.acm.org/doi/10.1145/3517811","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3517811","url":null,"abstract":"<p>Recently, spin-transfer torque magnetic cell (STT-mCell) has emerged as a promising spintronic device to be used in Computing-in-Memory (CIM) systems. However, it is challenging to guarantee the hardware security of STT-mCell-based all-spin circuits. In this work, we propose a novel Physical Unclonable Function (PUF) design for the STT-mCell-based all-spin circuit (All-Spin PUF) exploiting the unique manufacturing process variation (PV) on STT-mCell write latency. A methodology is used to select appropriate logic gates in the all-spin chip to generate a unique identification key. A linear feedback shift register (LFSR) initiates the All-Spin PUF and simultaneously generates a 64-bit signature at each clock cycle. Signature generation is stabilized using an automatic write-back technique. In addition, a masking scheme is applied for signature improvement. The uniqueness of the improved signature is 49.61%. With ± 20% supply voltage and 5°C to 105°C temperature variations, the All-Spin PUF shows a strong resiliency. In comparison with state-of-the-art PUFs, our approach can reduce hardware overhead effectively. Finally, the robustness of the All-Spin PUF against emerging modeling attacks is verified as well.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"1 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Assessment of Phase-Based Ranging Systems in a Multipath Environment 多路径环境下基于相位的测距系统安全评估
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3517809
Arslan Riaz, Dylan Nash, Jonathan Ngo, Chiraag Juvekar, Phillip Nadeau, Tao Yu, Rabia Tugce Yazicigil

Phase-based ranging has been widely deployed in proximity detection scenarios including security-critical applications due to their low implementation complexity on existing transceivers. In this work, the security of multi-carrier phase-based ranging systems in a multipath propagation environment is investigated. We present a threat model that can successfully target any decreasing distance in different multipath environmental conditions rendering the phase-based ranging method insecure. We assess the feasibility of attacks in various attack scenarios through simulations using a multipath channel and demonstrate a simplified version of the attacker model implemented in hardware. We show that the attacker can spoof the measured distance to less than one meter when the devices are separated by 30 meters. The evaluation of possible countermeasures and their limitations for different threat models is performed.

相位测距由于其在现有收发器上的低实现复杂性,已广泛应用于包括安全关键应用在内的接近检测场景。本文研究了多载波相位测距系统在多径传播环境下的安全性。我们提出了一个可以在不同多径环境条件下成功瞄准任意递减距离的威胁模型,使得基于相位的测距方法不安全。我们通过使用多路径通道的模拟来评估各种攻击场景中攻击的可行性,并演示了在硬件中实现的攻击者模型的简化版本。我们证明,当设备相距30米时,攻击者可以将测量到的距离欺骗到不到一米。对不同威胁模型的可能对策及其局限性进行了评估。
{"title":"Security Assessment of Phase-Based Ranging Systems in a Multipath Environment","authors":"Arslan Riaz, Dylan Nash, Jonathan Ngo, Chiraag Juvekar, Phillip Nadeau, Tao Yu, Rabia Tugce Yazicigil","doi":"https://dl.acm.org/doi/10.1145/3517809","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3517809","url":null,"abstract":"<p>Phase-based ranging has been widely deployed in proximity detection scenarios including security-critical applications due to their low implementation complexity on existing transceivers. In this work, the security of multi-carrier phase-based ranging systems in a multipath propagation environment is investigated. We present a threat model that can successfully target any decreasing distance in different multipath environmental conditions rendering the phase-based ranging method insecure. We assess the feasibility of attacks in various attack scenarios through simulations using a multipath channel and demonstrate a simplified version of the attacker model implemented in hardware. We show that the attacker can spoof the measured distance to less than one meter when the devices are separated by 30 meters. The evaluation of possible countermeasures and their limitations for different threat models is performed.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"11 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extreme Partial-Sum Quantization for Analog Computing-In-Memory Neural Network Accelerators 模拟内存计算神经网络加速器的极值部分和量化
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3528104
Yulhwa Kim, Hyungjun Kim, Jae-Joon Kim

In Analog Computing-in-Memory (CIM) neural network accelerators, analog-to-digital converters (ADCs) are required to convert the analog partial sums generated from a CIM array to digital values. The overhead from ADCs substantially degrades the energy efficiency of CIM accelerators so that previous works attempted to lower the ADC resolution considering the distribution of the partial sums. Despite the efforts, the required ADC resolution still remains relatively high. In this article, we propose the data-driven partial sum quantization scheme, which exhaustively searches for the optimal quantization range with little computational burden. We also report that analyzing the characteristics of the partial sum distributions at each layer gives an additional information to further reduce the ADC resolution compared to previous works that mostly used the characteristics of the partial sum distributions of the entire network. Based on the finer-level data-driven approach combined with retraining, we present a methodology for extreme partial-sum quantization. Experimental results show that the proposed method can reduce the ADC resolution to 2 to 3 bits for CIFAR-10 dataset, which is the smaller ADC bit resolution than any previous CIM-based NN accelerators.

在内存模拟计算(CIM)神经网络加速器中,需要模数转换器(adc)将CIM阵列生成的模拟部分和转换为数字值。ADC的开销大大降低了CIM加速器的能源效率,因此以前的工作试图降低ADC的分辨率,考虑到部分和的分布。尽管如此,所需的ADC分辨率仍然相对较高。在本文中,我们提出了数据驱动的部分和量化方案,该方案在计算量很小的情况下穷尽搜索最优量化范围。我们还报告说,与之前主要使用整个网络的部分和分布特征的工作相比,分析每层部分和分布的特征提供了额外的信息,以进一步降低ADC分辨率。基于精细级数据驱动方法和再训练相结合,提出了一种极值部分和量化方法。实验结果表明,该方法可以将CIFAR-10数据集的ADC分辨率降低到2 ~ 3位,比以往任何基于cim的神经网络加速器的ADC位分辨率都要小。
{"title":"Extreme Partial-Sum Quantization for Analog Computing-In-Memory Neural Network Accelerators","authors":"Yulhwa Kim, Hyungjun Kim, Jae-Joon Kim","doi":"https://dl.acm.org/doi/10.1145/3528104","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3528104","url":null,"abstract":"<p>In Analog Computing-in-Memory (CIM) neural network accelerators, analog-to-digital converters (ADCs) are required to convert the analog partial sums generated from a CIM array to digital values. The overhead from ADCs substantially degrades the energy efficiency of CIM accelerators so that previous works attempted to lower the ADC resolution considering the distribution of the partial sums. Despite the efforts, the required ADC resolution still remains relatively high. In this article, we propose the data-driven partial sum quantization scheme, which exhaustively searches for the optimal quantization range with little computational burden. We also report that analyzing the characteristics of the partial sum distributions at each layer gives an additional information to further reduce the ADC resolution compared to previous works that mostly used the characteristics of the partial sum distributions of the entire network. Based on the finer-level data-driven approach combined with retraining, we present a methodology for extreme partial-sum quantization. Experimental results show that the proposed method can reduce the ADC resolution to 2 to 3 bits for CIFAR-10 dataset, which is the smaller ADC bit resolution than any previous CIM-based NN accelerators.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"62 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-varying Metamaterial-enabled Directional Modulation Schemes for Physical Layer Security in Wireless Communication Links 无线通信链路物理层安全的时变超材料定向调制方案
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3513088
Alireza Nooraiepour, Shaghayegh Vosoughitabar, Chung-Tse Michael Wu, Waheed U. Bajwa, Narayan B. Mandayam

Novel transmission schemes, enabled by recent advances in the fields of metamaterial (MTM), leaky-wave antenna (LWA) and directional modulation (DM), are proposed for enhancing the physical layer (PHY) security. MTM-LWAs, which offer compact, integrated, and cost-effective alternatives to the classic phased-array architectures, are particularly of interest for emerging wireless communication systems including Internet-of-Things. The proposed secure schemes are devised to accomplish the functionalities of directional modulation (DM) transmitters for orthogonal frequency-division multiplexing (OFDM) and non-contiguous OFDM transmissions, while enjoying the implementation benefits of MTM-LWAs. Specifically, transmitter architectures based on the idea of time-modulated MTM-LWA have been put forth as a promising solution for PHY security for the first time. The PHY security for the proposed schemes are investigated from the point of view of both passive and active attacks where an adversary aims to decode secret information and feed spurious data to the legitimate receiver, respectively. Numerical simulations reveal that even when the adversary employs sophisticated state-of-the-art deep learning based attacks, the proposed transmission schemes are resistant to these attacks and reliably guarantee system security.

利用超材料(MTM)、漏波天线(LWA)和定向调制(DM)等领域的最新进展,提出了提高物理层(PHY)安全性的新传输方案。mtm - lwa为传统相控阵架构提供了紧凑、集成和经济高效的替代方案,尤其适用于包括物联网在内的新兴无线通信系统。所提出的安全方案旨在实现正交频分复用(OFDM)和非连续OFDM传输的方向调制(DM)发射机的功能,同时享受mtm - lwa的实现优势。具体来说,基于时间调制MTM-LWA思想的发射机架构首次被提出,作为一种很有前途的物理层安全解决方案。从被动攻击和主动攻击的角度对所提出方案的PHY安全性进行了研究,攻击者的目标分别是解码秘密信息和向合法接收方提供虚假数据。数值模拟表明,即使对手采用了最先进的基于深度学习的攻击,所提出的传输方案也能抵抗这些攻击,并可靠地保证系统安全。
{"title":"Time-varying Metamaterial-enabled Directional Modulation Schemes for Physical Layer Security in Wireless Communication Links","authors":"Alireza Nooraiepour, Shaghayegh Vosoughitabar, Chung-Tse Michael Wu, Waheed U. Bajwa, Narayan B. Mandayam","doi":"https://dl.acm.org/doi/10.1145/3513088","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3513088","url":null,"abstract":"<p>Novel transmission schemes, enabled by recent advances in the fields of metamaterial (MTM), leaky-wave antenna (LWA) and directional modulation (DM), are proposed for enhancing the physical layer (PHY) security. MTM-LWAs, which offer compact, integrated, and cost-effective alternatives to the classic phased-array architectures, are particularly of interest for emerging wireless communication systems including Internet-of-Things. The proposed secure schemes are devised to accomplish the functionalities of directional modulation (DM) transmitters for orthogonal frequency-division multiplexing (OFDM) and non-contiguous OFDM transmissions, while enjoying the implementation benefits of MTM-LWAs. Specifically, transmitter architectures based on the idea of time-modulated MTM-LWA have been put forth as a promising solution for PHY security for the first time. The PHY security for the proposed schemes are investigated from the point of view of both passive and active attacks where an adversary aims to decode secret information and feed spurious data to the legitimate receiver, respectively. Numerical simulations reveal that even when the adversary employs sophisticated state-of-the-art deep learning based attacks, the proposed transmission schemes are resistant to these attacks and reliably guarantee system security.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"24 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Journal on Emerging Technologies in Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1