首页 > 最新文献

ACM Journal on Emerging Technologies in Computing Systems最新文献

英文 中文
Design and Analysis of FPGA-based PUFs with Enhanced Performance for Hardware-oriented Security 基于fpga的面向硬件安全性能增强puf设计与分析
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3517813
N. Nalla Anandakumar, Mohammad S. Hashmi, Somitra Kumar Sanadhya

This article presents a thorough analysis of two distinct Physically Unclonable Functions (PUF), namely RO-PUF (Ring oscillator-based PUF) and RS-LPUF (RS Latch-based PUF), prototyped on FPGA. It is shown that the implemented PUFs possess significantly enhanced performance when compared to the state of the art. It is also identified that the enhancements are achieved through the incorporation of Programmable Delay Lines of FPGA Lookup Tables, the Temporal Majority Voting (TMV) scheme, and placed macro techniques for routing and placements of PUF units. The prototypes developed on Xilinx Artix-7 FPGAs are used for validation over the rated temperature range of 0-85°C with ±5% variation in the supply voltage. The proposed schemes when evaluated experimentally also achieve good uniformity, bit-aliasing, uniqueness, and reliability. Finally, it is shown that the proposed designs outperform the existing conventional PUFs in the area and speed tradeoff.

本文介绍了两个不同的物理不可克隆函数(PUF)的深入分析,即RO-PUF(基于环振荡器的PUF)和RS- lpuf(基于RS锁存器的PUF),在FPGA上原型。结果表明,与现有技术相比,所实现的puf具有显著增强的性能。还确定了增强是通过结合FPGA查找表的可编程延迟线,时间多数投票(TMV)方案以及用于路由和放置PUF单元的放置宏技术来实现的。在Xilinx Artix-7 fpga上开发的原型用于在0-85°C的额定温度范围内进行验证,电源电压变化±5%。实验结果表明,该方案具有良好的均匀性、位混叠性、唯一性和可靠性。最后,研究结果表明,所提出的设计在面积和速度权衡方面优于现有的传统puf。
{"title":"Design and Analysis of FPGA-based PUFs with Enhanced Performance for Hardware-oriented Security","authors":"N. Nalla Anandakumar, Mohammad S. Hashmi, Somitra Kumar Sanadhya","doi":"https://dl.acm.org/doi/10.1145/3517813","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3517813","url":null,"abstract":"<p>This article presents a thorough analysis of two distinct Physically Unclonable Functions (PUF), namely RO-PUF (Ring oscillator-based PUF) and RS-LPUF (RS Latch-based PUF), prototyped on FPGA. It is shown that the implemented PUFs possess significantly enhanced performance when compared to the state of the art. It is also identified that the enhancements are achieved through the incorporation of Programmable Delay Lines of FPGA Lookup Tables, the Temporal Majority Voting (TMV) scheme, and placed macro techniques for routing and placements of PUF units. The prototypes developed on Xilinx Artix-7 FPGAs are used for validation over the rated temperature range of 0-85°<i>C</i> with ±5% variation in the supply voltage. The proposed schemes when evaluated experimentally also achieve good uniformity, bit-aliasing, uniqueness, and reliability. Finally, it is shown that the proposed designs outperform the existing conventional PUFs in the area and speed tradeoff.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"15 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-level Modeling and Verification Platform for Elastic Circuits with Process Variation Considerations 考虑工艺变化的弹性电路高级建模与验证平台
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3534971
Meysam Zaeemi, Siamak Mohammadi

In addition to the advantages of asynchronous circuits, compatibility with synchronous EDA tools is another strength point of synchronous elastic circuits. Synchronous elastic circuits face some challenges, such as process variations that can compromise its performance and functionality, and the multitude of available implementations based on elastic elements’ combinations, meaning that choosing the best combination could not be simple. In this paper, a novel method is introduced to model and verify synchronous elastic circuits in the presence of variations. The model is based on xMAS, which is a new formal modeling paradigm to synthesize, test, and verify circuits and networks. In this method, various elastic elements are modeled and available in the form of a library in xMAS, so the designer can build complicated elastic circuits by combining different elastic elements. Additionally, by translating a high-level xMAS model into a SAN statistical model and using its capabilities, elements’ internal delays will be embedded, which makes the high-level modeling and elastic circuits’ high-resolution time analysis available. Based on the obtained results, elastic circuits are highly capable of tolerating variations. However, this phenomenon could lead to a maximum of 2.35% error in synchronization control units and data in these circuits.

除了异步电路的优点之外,与同步EDA工具的兼容性是同步弹性电路的另一个优点。同步弹性电路面临着一些挑战,例如可能损害其性能和功能的过程变化,以及基于弹性元件组合的大量可用实现,这意味着选择最佳组合可能并不简单。本文提出了一种新的方法来模拟和验证存在变化的同步弹性电路。该模型基于xMAS, xMAS是一种新的形式化建模范式,用于电路和网络的综合、测试和验证。该方法对各种弹性元件进行建模,并在xMAS中以库的形式提供,从而使设计人员可以通过组合不同的弹性元件来构建复杂的弹性电路。此外,通过将高级xMAS模型转换为SAN统计模型并使用其功能,可以嵌入元件的内部延迟,从而实现高级建模和弹性电路的高分辨率时间分析。根据得到的结果,弹性电路具有很强的容忍变化的能力。然而,这种现象可能导致同步控制单元和这些电路中的数据的最大误差为2.35%。
{"title":"High-level Modeling and Verification Platform for Elastic Circuits with Process Variation Considerations","authors":"Meysam Zaeemi, Siamak Mohammadi","doi":"https://dl.acm.org/doi/10.1145/3534971","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3534971","url":null,"abstract":"<p>In addition to the advantages of asynchronous circuits, compatibility with synchronous EDA tools is another strength point of synchronous elastic circuits. Synchronous elastic circuits face some challenges, such as process variations that can compromise its performance and functionality, and the multitude of available implementations based on elastic elements’ combinations, meaning that choosing the best combination could not be simple. In this paper, a novel method is introduced to model and verify synchronous elastic circuits in the presence of variations. The model is based on xMAS, which is a new formal modeling paradigm to synthesize, test, and verify circuits and networks. In this method, various elastic elements are modeled and available in the form of a library in xMAS, so the designer can build complicated elastic circuits by combining different elastic elements. Additionally, by translating a high-level xMAS model into a SAN statistical model and using its capabilities, elements’ internal delays will be embedded, which makes the high-level modeling and elastic circuits’ high-resolution time analysis available. Based on the obtained results, elastic circuits are highly capable of tolerating variations. However, this phenomenon could lead to a maximum of 2.35% error in synchronization control units and data in these circuits.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"107 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images 基于量子金刚石显微镜磁场图像的无监督深度学习硬件木马检测
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3531010
Maitreyi Ashok, Matthew J. Turner, Ronald L. Walsworth, Edlyn V. Levine, Anantha P. Chandrakasan

This article presents a method for hardware trojan detection in integrated circuits. Unsupervised deep learning is used to classify wide field-of-view (4 × 4 mm2), high spatial resolution magnetic field images taken using a Quantum Diamond Microscope (QDM). QDM magnetic imaging is enhanced using quantum control techniques and improved diamond material to increase magnetic field sensitivity by a factor of 4 and measurement speed by a factor of 16 over previous demonstrations. These upgrades facilitate the first demonstration of QDM magnetic field measurement for hardware trojan detection. Unsupervised convolutional neural networks and clustering are used to infer trojan presence from unlabeled data sets of 600 × 600 pixel magnetic field images without human bias. This analysis is shown to be more accurate than principal component analysis for distinguishing between field programmable gate arrays configured with trojan-free and trojan-inserted logic. This framework is tested on a set of scalable trojans that we developed and measured with the QDM. Scalable and TrustHub trojans are detectable down to a minimum trojan trigger size of 0.5% of the total logic. The trojan detection framework can be used for golden-chip-free detection, since knowledge of the chips’ identities is only used to evaluate detection accuracy.

本文提出了一种集成电路中硬件木马的检测方法。无监督深度学习用于对使用量子钻石显微镜(QDM)拍摄的宽视场(4 × 4 mm2)高空间分辨率磁场图像进行分类。使用量子控制技术和改进的金刚石材料增强了QDM磁成像,将磁场灵敏度提高了4倍,测量速度提高了16倍。这些升级促进了QDM磁场测量硬件木马检测的首次演示。无监督卷积神经网络和聚类用于从600 × 600像素磁场图像的未标记数据集中推断木马的存在,没有人为偏差。这种分析被证明比主成分分析更准确,用于区分配置了无木马和木马插入逻辑的现场可编程门阵列。我们在一组可扩展的木马上测试了这个框架,这些木马是我们用QDM开发和测量的。可扩展和trustthub木马可以检测到最小的木马触发器大小为总逻辑的0.5%。木马检测框架可用于无金芯片检测,因为芯片身份的知识仅用于评估检测准确性。
{"title":"Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images","authors":"Maitreyi Ashok, Matthew J. Turner, Ronald L. Walsworth, Edlyn V. Levine, Anantha P. Chandrakasan","doi":"https://dl.acm.org/doi/10.1145/3531010","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3531010","url":null,"abstract":"<p>This article presents a method for hardware trojan detection in integrated circuits. Unsupervised deep learning is used to classify wide field-of-view (4 × 4 mm<sup>2</sup>), high spatial resolution magnetic field images taken using a Quantum Diamond Microscope (QDM). QDM magnetic imaging is enhanced using quantum control techniques and improved diamond material to increase magnetic field sensitivity by a factor of 4 and measurement speed by a factor of 16 over previous demonstrations. These upgrades facilitate the first demonstration of QDM magnetic field measurement for hardware trojan detection. Unsupervised convolutional neural networks and clustering are used to infer trojan presence from unlabeled data sets of 600 × 600 pixel magnetic field images without human bias. This analysis is shown to be more accurate than principal component analysis for distinguishing between field programmable gate arrays configured with trojan-free and trojan-inserted logic. This framework is tested on a set of scalable trojans that we developed and measured with the QDM. Scalable and TrustHub trojans are detectable down to a minimum trojan trigger size of 0.5% of the total logic. The trojan detection framework can be used for golden-chip-free detection, since knowledge of the chips’ identities is only used to evaluate detection accuracy.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"2006 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Practical Shared Optical Cache With Hybrid MWSR/R-SWMR NoC for Multicore Processors 一种实用的多核处理器MWSR/R-SWMR NoC混合共享光缓存
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3531012
Haiyang Han, Theoni Alexoudi, Chris Vagionas, Nikos Pleros, Nikos Hardavellas

Conventional electronic memory hierarchies are intrinsically limited in their ability to overcome the memory wall due to scaling constraints. Optical caches and interconnects can mitigate these constraints, and enable processors to reach performance and energy efficiency unattainable by purely electronic means. However, the promised benefits cannot be realized through a simple replacement process; to reach its full potential, the architecture needs to be holistically redesigned. This article proposes Pho$, an opto-electronic memory hierarchy architecture for multicores. Pho$ replaces conventional core-private electronic caches with a large shared optical L1 built with optical SRAMs. The shared optical cache is supported by Pho$Net, a novel hybrid MWSR/R-SWMR optical NoC that provides low-latency and high-bandwidth communication between the electronic cores and the shared optical L1 at low optical loss. Pho$Net’s unique network arbitration protocol seamlessly co-arbitrates the request and reply sub-networks and facilitates cache requests and replies that optimize for the common case of cache hits. Through Pho$ we solve the problems that render previous designs impractical. Our results show that Pho$ achieves on average 1.41× performance speedup (3.89× max) and 31% lower energy-delay product (90% max) against conventional designs. Moreover, the Pho$Net optical NoC for core-cache communication consumes 70% less power compared to directly applying previously proposed optical NoC architectures.

传统的电子存储器层次结构在克服由于缩放限制而产生的存储器墙的能力方面受到本质上的限制。光学缓存和互连可以减轻这些限制,并使处理器达到纯电子手段无法达到的性能和能源效率。然而,承诺的好处不能通过简单的更换过程实现;为了充分发挥其潜力,需要对体系结构进行全面的重新设计。本文提出了Pho$,一种多核光电存储器层次结构。Pho$用光学ram构建的大型共享光学L1取代了传统的核心专用电子缓存。Pho$Net是一种新型的MWSR/R-SWMR混合光学NoC,可在电子核心和共享光L1之间以低光损耗提供低延迟和高带宽通信。Pho$Net独特的网络仲裁协议无缝地共同仲裁请求和应答子网络,并促进缓存请求和应答,优化缓存命中的常见情况。通过Pho$,我们解决了使以前的设计不切实际的问题。我们的研究结果表明,与传统设计相比,Pho$实现了平均1.41倍的性能加速(最大3.89倍)和31%的能量延迟产品(最大90%)。此外,用于核心缓存通信的Pho$Net光NoC与直接应用先前提出的光NoC架构相比,功耗降低了70%。
{"title":"A Practical Shared Optical Cache With Hybrid MWSR/R-SWMR NoC for Multicore Processors","authors":"Haiyang Han, Theoni Alexoudi, Chris Vagionas, Nikos Pleros, Nikos Hardavellas","doi":"https://dl.acm.org/doi/10.1145/3531012","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3531012","url":null,"abstract":"<p>Conventional electronic memory hierarchies are intrinsically limited in their ability to overcome the memory wall due to scaling constraints. Optical caches and interconnects can mitigate these constraints, and enable processors to reach performance and energy efficiency unattainable by purely electronic means. However, the promised benefits cannot be realized through a simple replacement process; to reach its full potential, the architecture needs to be holistically redesigned. This article proposes Pho$, an opto-electronic memory hierarchy architecture for multicores. Pho$ replaces conventional core-private electronic caches with a large shared optical L1 built with optical SRAMs. The shared optical cache is supported by Pho$Net, a novel hybrid MWSR/R-SWMR optical NoC that provides low-latency and high-bandwidth communication between the electronic cores and the shared optical L1 at low optical loss. Pho$Net’s unique network arbitration protocol seamlessly co-arbitrates the request and reply sub-networks and facilitates cache requests and replies that optimize for the common case of cache hits. Through Pho$ we solve the problems that render previous designs impractical. Our results show that Pho$ achieves on average 1.41× performance speedup (3.89× max) and 31% lower energy-delay product (90% max) against conventional designs. Moreover, the Pho$Net optical NoC for core-cache communication consumes 70% less power compared to directly applying previously proposed optical NoC architectures.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"24 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sorting in Memristive Memory 记忆内存中的排序
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3517181
Mohsen Riahi Alam, M. Hassan Najafi, Nima Taherinejad

Sorting data is needed in many application domains. Traditionally, the data is read from memory and sent to a general-purpose processor or application-specific hardware for sorting. The sorted data is then written back to the memory. Reading/writing data from/to memory and transferring data between memory and processing unit incur significant latency and energy overhead. In this work, we develop the first architectures for in-memory sorting of data to the best of our knowledge. We propose two architectures. The first architecture is applicable to the conventional format of representing data, i.e., weighted binary radix. The second architecture is proposed for developing unary processing systems, where data is encoded as uniform unary bit-streams. As we present, each of the two architectures has different advantages and disadvantages, making one or the other more suitable for a specific application. However, the common property of both is a significant reduction in the processing time compared to prior sorting designs. Our evaluations show on average 37 × and 138× energy reduction for binary and unary designs, respectively, compared to conventional CMOS off-memory sorting systems in a 45 nm technology. We designed a 3×3 and a 5×5 Median filter using the proposed sorting solutions, which we used for processing 64×64 pixel images. Our results show a reduction of 14× and 634× in energy and latency, respectively, with the proposed binary, and 5.6× and 152×103 in energy and latency with the proposed unary approach compared to those of the off-memory binary and unary designs for the 3 × 3 Median filtering system.

在许多应用程序领域中都需要对数据进行排序。传统上,从内存中读取数据并将其发送到通用处理器或特定于应用程序的硬件进行排序。然后将排序后的数据写回内存。从内存读取/写入数据以及在内存和处理单元之间传输数据会产生显著的延迟和能量开销。在这项工作中,我们尽我们所知开发了内存中数据排序的第一个体系结构。我们提出了两种架构。第一种架构适用于表示数据的传统格式,即加权二进制基数。第二个架构是为开发一元处理系统而提出的,其中数据被编码为统一的一元比特流。正如我们所介绍的,这两种体系结构都有不同的优点和缺点,使其中一种更适合特定的应用程序。然而,两者的共同特性是与先前的分选设计相比,处理时间显着减少。我们的评估显示,与传统的45纳米CMOS非存储分选系统相比,二进制和一元设计的能耗分别平均降低37倍和138倍。我们使用提出的排序解决方案设计了一个3×3和一个5×5中值滤波器,我们将其用于处理64×64像素图像。我们的研究结果表明,与3 × 3 Median滤波系统的非内存二进制和一元设计相比,所提出的二进制方法的能量和延迟分别减少了14倍和634倍,所提出的一元方法的能量和延迟分别减少了5.6倍和152×103。
{"title":"Sorting in Memristive Memory","authors":"Mohsen Riahi Alam, M. Hassan Najafi, Nima Taherinejad","doi":"https://dl.acm.org/doi/10.1145/3517181","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3517181","url":null,"abstract":"<p>Sorting data is needed in many application domains. Traditionally, the data is read from memory and sent to a general-purpose processor or application-specific hardware for sorting. The sorted data is then written back to the memory. Reading/writing data from/to memory and transferring data between memory and processing unit incur significant latency and energy overhead. In this work, we develop the first architectures for in-memory sorting of data to the best of our knowledge. We propose two architectures. The first architecture is applicable to the conventional format of representing data, i.e., weighted binary radix. The second architecture is proposed for developing unary processing systems, where data is encoded as uniform unary bit-streams. As we present, each of the two architectures has different advantages and disadvantages, making one or the other more suitable for a specific application. However, the common property of both is a significant reduction in the processing time compared to prior sorting designs. Our evaluations show on average 37 × and 138× energy reduction for binary and unary designs, respectively, compared to conventional CMOS off-memory sorting systems in a 45 nm technology. We designed a 3×3 and a 5×5 Median filter using the proposed sorting solutions, which we used for processing 64×64 pixel images. Our results show a reduction of 14× and 634× in energy and latency, respectively, with the proposed binary, and 5.6× and 152×10<sup>3</sup> in energy and latency with the proposed unary approach compared to those of the off-memory binary and unary designs for the 3 × 3 Median filtering system.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"18 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network ScatterVerif:利用配电网反射响应对电路板进行验证
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3513087
Tahoura Mosavirik, Fatemeh Ganji, Patrick Schaumont, Shahin Tajik

The globalization of electronic systems’ fabrication has made some of our most critical systems vulnerable to supply chain attacks. Implanting spy chips on the printed circuit boards (PCBs) or replacing genuine components with counterfeit/recycled ones are examples of such attacks. Unfortunately, conventional attack detection schemes for PCBs are ad hoc, costly, unscalable, and error prone. This work introduces a holistic physical verification framework for PCBs, called ScatterVerif, based on the characterization of the PCBs’ power distribution network. First, we demonstrate how scattering parameters, frequently used for impedance characterization of RF circuits, can characterize the entire PCB with a single measurement. Second, we present how a class of machine learning algorithms, namely the Gaussian mixture model, can be applied to the measurements to automatically classify/cluster the genuine and tampered/counterfeit PCBs. We show that these attacks affect the overall impedance of a PCB differently in various frequency ranges, hence the conventional impedance measurements using a constant-frequency electrical stimulus might leave the attack undetected. We conduct extensive experiments on counterfeit and tampered devices and demonstrate that these attacks can be detected with high confidence. Finally, we show that the acquired data from the power distribution network characterization can also be deployed for fingerprinting genuine PCBs.

电子系统制造的全球化使得我们的一些最关键的系统容易受到供应链攻击。在印刷电路板(pcb)上植入间谍芯片或用假冒/回收的组件替换正品组件都是此类攻击的例子。不幸的是,传统的pcb攻击检测方案是临时的、昂贵的、不可扩展的,而且容易出错。这项工作介绍了pcb的整体物理验证框架,称为ScatterVerif,基于pcb配电网络的特征。首先,我们展示了经常用于射频电路阻抗表征的散射参数如何通过一次测量来表征整个PCB。其次,我们介绍了一类机器学习算法,即高斯混合模型,如何应用于测量,以自动分类/聚类正品和篡改/假冒pcb。我们表明,这些攻击在不同频率范围内对PCB的整体阻抗影响不同,因此使用恒频电刺激的传统阻抗测量可能会使攻击未被检测到。我们对伪造和篡改的设备进行了广泛的实验,并证明可以高可信度地检测到这些攻击。最后,我们证明了从配电网络特性中获得的数据也可以用于指纹识别正品pcb。
{"title":"ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network","authors":"Tahoura Mosavirik, Fatemeh Ganji, Patrick Schaumont, Shahin Tajik","doi":"https://dl.acm.org/doi/10.1145/3513087","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3513087","url":null,"abstract":"<p>The globalization of electronic systems’ fabrication has made some of our most critical systems vulnerable to supply chain attacks. Implanting spy chips on the <b>printed circuit boards (PCBs)</b> or replacing genuine components with counterfeit/recycled ones are examples of such attacks. Unfortunately, conventional attack detection schemes for PCBs are ad hoc, costly, unscalable, and error prone. This work introduces a holistic physical verification framework for PCBs, called <i>ScatterVerif</i>, based on the characterization of the PCBs’ power distribution network. First, we demonstrate how scattering parameters, frequently used for impedance characterization of RF circuits, can characterize the entire PCB with a single measurement. Second, we present how a class of machine learning algorithms, namely the Gaussian mixture model, can be applied to the measurements to automatically classify/cluster the genuine and tampered/counterfeit PCBs. We show that these attacks affect the overall impedance of a PCB differently in various frequency ranges, hence the conventional impedance measurements using a constant-frequency electrical stimulus might leave the attack undetected. We conduct extensive experiments on counterfeit and tampered devices and demonstrate that these attacks can be detected with high confidence. Finally, we show that the acquired data from the power distribution network characterization can also be deployed for fingerprinting genuine PCBs.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"2 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NORM: An FPGA-based Non-volatile Memory Emulation Framework for Intermittent Computing NORM:一种基于fpga的非易失性存储器仿真框架
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3517812
Simone Ruffini, Luca Caronti, Kasım Sinan Yıldırım, Davide Brunelli

Today’s intermittent computing systems operate by relying only on harvested energy accumulated in their tiny energy reservoirs, typically capacitors. An intermittent device dies due to a power failure when there is no energy in its capacitor and boots again when the harvested energy is sufficient to power its hardware components. Power failures prevent the forward progress of computation due to the frequent loss of computational state. To remedy this problem, intermittent computing systems comprise built-in fast non-volatile memories with high write endurance to store information that persists despite frequent power failures. However, the lack of design tools makes fast-prototyping these systems difficult. Even though FPGAs are common platforms for fast prototyping and behavioral verification of continuously powered architectures, they do not target prototyping intermittent computing systems. This article introduces a new FPGA-based framework, named NORM (Non-volatile memORy eMulator), to emulate and verify the behavior of any intermittent computing system that exploits fast non-volatile memories. Our evaluation showed that NORM can be used to emulate and validate FeRAM-based transiently powered hardware architectures successfully.

今天的间歇性计算系统仅依靠微小的蓄水池(通常是电容器)中收集的能量来运行。当电容器中没有能量时,间歇性设备由于电源故障而死亡,当收集的能量足以为其硬件组件供电时,再次启动。由于计算状态的频繁丢失,电源故障阻碍了计算的向前进行。为了解决这个问题,间歇性计算系统包括内置的具有高写入持久性的快速非易失性存储器,以便在频繁电源故障的情况下仍然存储信息。然而,缺乏设计工具使得这些系统的快速原型制作变得困难。尽管fpga是快速原型和连续动力架构行为验证的通用平台,但它们并不针对间歇性计算系统的原型。本文介绍了一个新的基于fpga的框架,名为NORM (Non-volatile memORy eMulator),用于模拟和验证任何利用快速非易失性存储器的间歇计算系统的行为。我们的评估表明,NORM可以成功地用于模拟和验证基于feram的瞬态供电硬件架构。
{"title":"NORM: An FPGA-based Non-volatile Memory Emulation Framework for Intermittent Computing","authors":"Simone Ruffini, Luca Caronti, Kasım Sinan Yıldırım, Davide Brunelli","doi":"https://dl.acm.org/doi/10.1145/3517812","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3517812","url":null,"abstract":"<p>Today’s intermittent computing systems operate by relying only on harvested energy accumulated in their tiny energy reservoirs, typically capacitors. An intermittent device dies due to a power failure when there is no energy in its capacitor and boots again when the harvested energy is sufficient to power its hardware components. Power failures prevent the forward progress of computation due to the frequent loss of computational state. To remedy this problem, intermittent computing systems comprise built-in fast non-volatile memories with high write endurance to store information that persists despite frequent power failures. However, the lack of design tools makes fast-prototyping these systems difficult. Even though FPGAs are common platforms for fast prototyping and behavioral verification of continuously powered architectures, they do not target prototyping intermittent computing systems. This article introduces a new FPGA-based framework, named NORM (<b>N</b>on-volatile mem<b>OR</b>y e<b>M</b>ulator), to emulate and verify the behavior of any intermittent computing system that exploits fast non-volatile memories. Our evaluation showed that NORM can be used to emulate and validate FeRAM-based transiently powered hardware architectures successfully.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"9 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CNN Hardware Accelerator Using Triangle-based Convolution 基于三角卷积的CNN硬件加速器
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-13 DOI: https://dl.acm.org/doi/10.1145/3544975
Amal Thomas K, Soumyajit Poddar, Hemanta Kumar Mondal

Convolutional neural networks (CNNs) have gained a massive impression in the fields of computer vision and especially in the embedded applications because of their high accuracy and performance. However, high computational complexity and power consumption due to convolution operations causes a high demand for low-power accelerators. A 3D geometric optimization strategy is proposed to alleviate the area and power requirements of Multiply Accumulate operations prevalent in all spatial CNNs. The proposed technique is generic and may be easily scaled for accelerators performing spatial 2D convolution.

卷积神经网络(Convolutional neural networks, cnn)以其优异的精度和性能在计算机视觉领域,尤其是嵌入式应用中获得了广泛的关注。然而,由于卷积运算的高计算复杂度和高功耗导致对低功耗加速器的高需求。提出了一种三维几何优化策略,以缓解空间cnn中普遍存在的乘法累加运算对面积和功率的需求。所提出的技术是通用的,可以很容易地扩展到执行空间二维卷积的加速器。
{"title":"A CNN Hardware Accelerator Using Triangle-based Convolution","authors":"Amal Thomas K, Soumyajit Poddar, Hemanta Kumar Mondal","doi":"https://dl.acm.org/doi/10.1145/3544975","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3544975","url":null,"abstract":"<p>Convolutional neural networks (CNNs) have gained a massive impression in the fields of computer vision and especially in the embedded applications because of their high accuracy and performance. However, high computational complexity and power consumption due to convolution operations causes a high demand for low-power accelerators. A 3D geometric optimization strategy is proposed to alleviate the area and power requirements of Multiply Accumulate operations prevalent in all spatial CNNs. The proposed technique is generic and may be easily scaled for accelerators performing spatial 2D convolution.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"48 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Approaches and Techniques for Security Verification of Computer Systems 计算机系统安全验证方法与技术综述
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-10-06 DOI: 10.1145/3564785
Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, O. Demir, Jakub Szefer
This article surveys the landscape of security verification approaches and techniques for computer systems at various levels: from a software-application level all the way to the physical hardware level. Different existing projects are compared, based on the tools used and security aspects being examined. Since many systems require both hardware and software components to work together to provide the system’s promised security protections, it is not sufficient to verify just the software levels or just the hardware levels in a mutually exclusive fashion. This survey especially highlights system levels that are verified by the different existing projects and presents to the readers the state of the art in hardware and software system security verification. Few approaches come close to providing full-system verification, and there is still much room for improvement.
本文从软件应用程序级别到物理硬件级别,从各个层面考察了计算机系统的安全验证方法和技术。根据所使用的工具和正在审查的安全方面,对不同的现有项目进行了比较。由于许多系统需要硬件和软件组件协同工作,以提供系统承诺的安全保护,因此仅验证软件级别或仅以互斥方式验证硬件级别是不够的。这项调查特别强调了由不同现有项目验证的系统级别,并向读者展示了硬件和软件系统安全验证的最新技术。很少有方法能够提供完整的系统验证,而且还有很大的改进空间。
{"title":"Survey of Approaches and Techniques for Security Verification of Computer Systems","authors":"Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, O. Demir, Jakub Szefer","doi":"10.1145/3564785","DOIUrl":"https://doi.org/10.1145/3564785","url":null,"abstract":"This article surveys the landscape of security verification approaches and techniques for computer systems at various levels: from a software-application level all the way to the physical hardware level. Different existing projects are compared, based on the tools used and security aspects being examined. Since many systems require both hardware and software components to work together to provide the system’s promised security protections, it is not sufficient to verify just the software levels or just the hardware levels in a mutually exclusive fashion. This survey especially highlights system levels that are verified by the different existing projects and presents to the readers the state of the art in hardware and software system security verification. Few approaches come close to providing full-system verification, and there is still much room for improvement.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 34"},"PeriodicalIF":2.2,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43261224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
B-open Defect: A Novel Defect Model in FinFET Technology B-open缺陷:FinFET技术中一种新的缺陷模型
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-09-16 DOI: 10.1145/3564244
Freddy Forero, V. Champac, M. Renovell
This article proposes an electrical analysis of a new defect mechanism, to be named as b-open defect, which may occur in nanometer technologies due to the use of the Self-Aligned Double Patterning (SADP) technique. In metal lines making use of the SADP technique, a single dust particle may cause the simultaneous occurrence of a bridge defect and an open defect. When the two defects impact the same gates, the electrical effects of the bridge and the open combine and exhibit a new specific electrical behavior; we call this new defect behavior a b-open. As a consequence, existing test generation methodologies may miss defect detection. The electrical behavior of the b-open defect is first analyzed graphically and then validated through extensive SPICE simulations. The test pattern conditions to detect the b-open defect are finally determined, and it is shown that the b-open defect requires specific test generation.
本文提出了一种新的缺陷机制的电学分析,被命名为b-开放缺陷,这可能会出现在纳米技术中,由于使用自对准双模式(SADP)技术。在使用SADP技术的金属线中,单个粉尘颗粒可能同时导致桥缺陷和开放缺陷的发生。当两个缺陷冲击同一栅极时,电桥和开路的电效应结合在一起,呈现出新的比电行为;我们称这种新的缺陷行为为b-open。因此,现有的测试生成方法可能会错过缺陷检测。首先用图形分析了b-开口缺陷的电学行为,然后通过大量的SPICE模拟验证了其电学行为。最后确定了检测b开缺陷的测试模式条件,并表明b开缺陷需要特定的测试生成。
{"title":"B-open Defect: A Novel Defect Model in FinFET Technology","authors":"Freddy Forero, V. Champac, M. Renovell","doi":"10.1145/3564244","DOIUrl":"https://doi.org/10.1145/3564244","url":null,"abstract":"This article proposes an electrical analysis of a new defect mechanism, to be named as b-open defect, which may occur in nanometer technologies due to the use of the Self-Aligned Double Patterning (SADP) technique. In metal lines making use of the SADP technique, a single dust particle may cause the simultaneous occurrence of a bridge defect and an open defect. When the two defects impact the same gates, the electrical effects of the bridge and the open combine and exhibit a new specific electrical behavior; we call this new defect behavior a b-open. As a consequence, existing test generation methodologies may miss defect detection. The electrical behavior of the b-open defect is first analyzed graphically and then validated through extensive SPICE simulations. The test pattern conditions to detect the b-open defect are finally determined, and it is shown that the b-open defect requires specific test generation.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 19"},"PeriodicalIF":2.2,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42011631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
ACM Journal on Emerging Technologies in Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1