首页 > 最新文献

ACM Journal on Emerging Technologies in Computing Systems最新文献

英文 中文
Virtualizing Existing Fluidic Programs 虚拟化现有的流体程序
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-08-30 DOI: 10.1145/3558550
Caleb Winston, Max Willsey, L. Ceze
Fluidic automation, the practice of programmatically manipulating small fluids to execute laboratory protocols, has led to vastly increased productivity for biologists and chemists. Most fluidic programs, commonly referred to as protocols, are written using APIs that couple the protocol to specific hardware by referring to the physical locations on the device. This coupling makes isolation impossible, preventing portability, concurrent execution, and composition of protocols on the same device. We propose a system for virtualizing existing fluidic protocols on top of a single runtime system without modification. Our system presents an isolated view of the device to each running protocol, allowing it to assume it has sole access to hardware. We provide a proof-of-concept implementation that can concurrently execute and compose protocols written using the popular Opentrons Python API. Concurrent execution achieves near-linear speedup over serial execution, since protocols spend much of their time waiting.
流体自动化,即通过编程操作小流体来执行实验室协议的做法,极大地提高了生物学家和化学家的生产力。大多数流体程序(通常称为协议)都是使用API编写的,这些API通过参考设备上的物理位置将协议耦合到特定硬件。这种耦合使得隔离变得不可能,从而阻止了协议在同一设备上的可移植性、并发执行和组合。我们提出了一种用于在单个运行时系统之上虚拟化现有流体协议而不进行修改的系统。我们的系统为每个运行的协议提供了设备的独立视图,允许它假设自己只能访问硬件。我们提供了一个概念验证实现,可以同时执行和编写使用流行的Opentrons Python API编写的协议。与串行执行相比,并发执行实现了近乎线性的加速,因为协议花费了大量时间等待。
{"title":"Virtualizing Existing Fluidic Programs","authors":"Caleb Winston, Max Willsey, L. Ceze","doi":"10.1145/3558550","DOIUrl":"https://doi.org/10.1145/3558550","url":null,"abstract":"Fluidic automation, the practice of programmatically manipulating small fluids to execute laboratory protocols, has led to vastly increased productivity for biologists and chemists. Most fluidic programs, commonly referred to as protocols, are written using APIs that couple the protocol to specific hardware by referring to the physical locations on the device. This coupling makes isolation impossible, preventing portability, concurrent execution, and composition of protocols on the same device. We propose a system for virtualizing existing fluidic protocols on top of a single runtime system without modification. Our system presents an isolated view of the device to each running protocol, allowing it to assume it has sole access to hardware. We provide a proof-of-concept implementation that can concurrently execute and compose protocols written using the popular Opentrons Python API. Concurrent execution achieves near-linear speedup over serial execution, since protocols spend much of their time waiting.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 14"},"PeriodicalIF":2.2,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43954628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks 用于检测嵌入式神经网络故障注入攻击的加速哈希算法
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-08-10 DOI: 10.1145/3555808
Mojan Javaheripi, Jung-Woo Chang, F. Koushanfar
We propose AccHashtag, the first framework for high-accuracy detection of fault-injection attacks on Deep Neural Networks (DNNs) with provable bounds on detection performance. Recent literature in fault-injection attacks shows the severe DNN accuracy degradation caused by bit flips. In this scenario, the attacker changes a few DNN weight bits during execution by injecting faults to the dynamic random-access memory (DRAM). To detect bit flips, AccHashtag extracts a unique signature from the benign DNN prior to deployment. The signature is used to validate the model’s integrity and verify the inference output on the fly. We propose a novel sensitivity analysis that identifies the most vulnerable DNN layers to the fault-injection attack. The DNN signature is constructed by encoding the weights in vulnerable layers using a low-collision hash function. During DNN inference, new hashes are extracted from the target layers and compared against the ground-truth signatures. AccHashtag incorporates a lightweight methodology that allows for real-time fault detection on embedded platforms. We devise a specialized compute core for AccHashtag on field-programmable gate arrays (FPGAs) to facilitate online hash generation in parallel to DNN execution. Extensive evaluations with the state-of-the-art bit-flip attack on various DNNs demonstrate the competitive advantage of AccHashtag in terms of both attack detection and execution overhead.
我们提出了AccHashtag,这是第一个对深度神经网络(DNN)的故障注入攻击进行高精度检测的框架,其检测性能具有可证明的界限。最近关于故障注入攻击的文献表明,位翻转会导致DNN精度严重下降。在这种情况下,攻击者在执行过程中通过向动态随机存取存储器(DRAM)注入故障来更改一些DNN权重位。为了检测位翻转,AccHashtag在部署之前从良性DNN中提取一个唯一的签名。签名用于验证模型的完整性,并实时验证推理输出。我们提出了一种新的灵敏度分析,用于识别最易受到故障注入攻击的DNN层。DNN签名是通过使用低冲突哈希函数对易受攻击层中的权重进行编码来构建的。在DNN推断过程中,从目标层提取新的散列,并与基本事实签名进行比较。AccHashtag结合了一种轻量级方法,允许在嵌入式平台上进行实时故障检测。我们为现场可编程门阵列(FPGA)上的AccHashtag设计了一个专门的计算核心,以促进与DNN执行并行的在线哈希生成。对各种DNN的最先进的位翻转攻击进行了广泛的评估,证明了AccHashtag在攻击检测和执行开销方面的竞争优势。
{"title":"AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks","authors":"Mojan Javaheripi, Jung-Woo Chang, F. Koushanfar","doi":"10.1145/3555808","DOIUrl":"https://doi.org/10.1145/3555808","url":null,"abstract":"We propose AccHashtag, the first framework for high-accuracy detection of fault-injection attacks on Deep Neural Networks (DNNs) with provable bounds on detection performance. Recent literature in fault-injection attacks shows the severe DNN accuracy degradation caused by bit flips. In this scenario, the attacker changes a few DNN weight bits during execution by injecting faults to the dynamic random-access memory (DRAM). To detect bit flips, AccHashtag extracts a unique signature from the benign DNN prior to deployment. The signature is used to validate the model’s integrity and verify the inference output on the fly. We propose a novel sensitivity analysis that identifies the most vulnerable DNN layers to the fault-injection attack. The DNN signature is constructed by encoding the weights in vulnerable layers using a low-collision hash function. During DNN inference, new hashes are extracted from the target layers and compared against the ground-truth signatures. AccHashtag incorporates a lightweight methodology that allows for real-time fault detection on embedded platforms. We devise a specialized compute core for AccHashtag on field-programmable gate arrays (FPGAs) to facilitate online hash generation in parallel to DNN execution. Extensive evaluations with the state-of-the-art bit-flip attack on various DNNs demonstrate the competitive advantage of AccHashtag in terms of both attack detection and execution overhead.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 20"},"PeriodicalIF":2.2,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44391052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Taming Molecular Field-Coupling for Nanocomputing Design 纳米计算设计中的驯服分子场耦合
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-08-03 DOI: 10.1145/3552520
Yuri Ardesi, U. Garlando, F. Riente, G. Beretta, G. Piccinini, M. Graziano
Molecular Field-Coupling Nanocomputing (FCN) is one of the most promising technologies for overcoming Complementary Metal Oxide Semiconductor (CMOS) scaling issues. It encodes the information in the charge distribution of nanometric molecules and propagates it through local electrostatic intermolecular interaction. This technology promises very high speed at ambient temperatures with minimal power dissipation. The main research focus on molecular FCN is currently either on single-molecule low-level analysis or circuit design based on naïve assumptions. We aim to fill this gap, assessing the potential and feasibility of FCN. We present a bottom-up analysis and design framework that starts from the physical characterization of molecular and technological parameters and enables physical-aware FCN designs. The framework explicitly considers molecular physics, allowing the designer to tame the molecular interaction to ensure the computational capabilities of the final device. The framework permits studying possible physical effects that create cross-implications and correlations among physical and system-level layers considering possible behavior variability. We characterize and verify molecular propagation in increasingly structured layouts to design complex arithmetic circuits. The results highlight molecular FCN advantages, especially in area occupation, and provide valuable quantitative feedback to designers and technologists to support the assessment of molecular FCN and the realization of an eventual prototype.
分子场耦合纳米计算(FCN)是克服互补金属氧化物半导体(CMOS)缩放问题的最有前途的技术之一。它对纳米分子电荷分布中的信息进行编码,并通过局部静电分子间相互作用进行传播。这项技术承诺在环境温度下以最小的功耗实现非常高的速度。目前分子FCN的主要研究重点要么是单分子低水平分析,要么是基于naïve假设的电路设计。我们的目标是填补这一空白,评估FCN的潜力和可行性。我们提出了一个自下而上的分析和设计框架,从分子和技术参数的物理特性开始,使物理感知的FCN设计成为可能。该框架明确考虑了分子物理学,允许设计师控制分子相互作用,以确保最终设备的计算能力。考虑到可能的行为可变性,该框架允许研究在物理层和系统级层之间产生交叉含义和相关性的可能的物理效应。我们描述和验证分子传播在日益结构化的布局,以设计复杂的算术电路。结果突出了分子FCN的优势,特别是在面积占用方面,并为设计人员和技术人员提供了有价值的定量反馈,以支持分子FCN的评估和最终原型的实现。
{"title":"Taming Molecular Field-Coupling for Nanocomputing Design","authors":"Yuri Ardesi, U. Garlando, F. Riente, G. Beretta, G. Piccinini, M. Graziano","doi":"10.1145/3552520","DOIUrl":"https://doi.org/10.1145/3552520","url":null,"abstract":"Molecular Field-Coupling Nanocomputing (FCN) is one of the most promising technologies for overcoming Complementary Metal Oxide Semiconductor (CMOS) scaling issues. It encodes the information in the charge distribution of nanometric molecules and propagates it through local electrostatic intermolecular interaction. This technology promises very high speed at ambient temperatures with minimal power dissipation. The main research focus on molecular FCN is currently either on single-molecule low-level analysis or circuit design based on naïve assumptions. We aim to fill this gap, assessing the potential and feasibility of FCN. We present a bottom-up analysis and design framework that starts from the physical characterization of molecular and technological parameters and enables physical-aware FCN designs. The framework explicitly considers molecular physics, allowing the designer to tame the molecular interaction to ensure the computational capabilities of the final device. The framework permits studying possible physical effects that create cross-implications and correlations among physical and system-level layers considering possible behavior variability. We characterize and verify molecular propagation in increasingly structured layouts to design complex arithmetic circuits. The results highlight molecular FCN advantages, especially in area occupation, and provide valuable quantitative feedback to designers and technologists to support the assessment of molecular FCN and the realization of an eventual prototype.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 24"},"PeriodicalIF":2.2,"publicationDate":"2022-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46748427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EVHA: Explainable Vision System for Hardware Testing and Assurance—An Overview EVHA:用于硬件测试和保证的可解释视觉系统——综述
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-07-20 DOI: 10.1145/3590772
Md. Mahfuz Al Hasan, Md. Tahsin Mostafiz, Thomas An Le, Jake Julia, Nidish Vashistha, S. Taheri, N. Asadizanjani
Due to the ever-growing demands for electronic chips in different sectors, semiconductor companies have been mandated to offshore their manufacturing processes. This unwanted matter has made security and trustworthiness of their fabricated chips concerning and has caused the creation of hardware attacks. In this condition, different entities in the semiconductor supply chain can act maliciously and execute an attack on the design computing layers, from devices to systems. Our attack is a hardware Trojan that is inserted during mask generation/fabrication in an untrusted foundry. The Trojan leaves a footprint in the fabrication through addition, deletion, or change of design cells. To tackle this problem, we propose EVHA (Explainable Vision System for Hardware Testing and Assurance) in this work, which can detect the smallest possible change to a design in a low-cost, accurate, and fast manner. The inputs to this system are scanning electron microscopy images acquired from the integrated circuits under examination. The system output is the determination of integrated circuit status in terms of having any defect and/or hardware Trojan through addition, deletion, or change in the design cells at the cell level. This article provides an overview on the design, development, implementation, and analysis of our defense system.
由于不同行业对电子芯片的需求不断增长,半导体公司被要求将其制造过程离岸。这一不必要的问题使他们制造的芯片的安全性和可信度受到关注,并导致了硬件攻击的产生。在这种情况下,半导体供应链中的不同实体可能会恶意行动,并对从设备到系统的设计计算层进行攻击。我们的攻击是一种硬件特洛伊木马,在不受信任的代工厂中生成/制造掩码时插入。特洛伊木马通过添加、删除或更改设计单元在制造过程中留下足迹。为了解决这个问题,我们在这项工作中提出了EVHA(用于硬件测试和保证的可解释视觉系统),它可以以低成本、准确和快速的方式检测设计的最小变化。该系统的输入是从被检查的集成电路获得的扫描电子显微镜图像。系统输出是通过在单元级别添加、删除或更改设计单元来确定集成电路状态是否存在任何缺陷和/或硬件特洛伊木马。本文概述了我们的防御系统的设计、开发、实施和分析。
{"title":"EVHA: Explainable Vision System for Hardware Testing and Assurance—An Overview","authors":"Md. Mahfuz Al Hasan, Md. Tahsin Mostafiz, Thomas An Le, Jake Julia, Nidish Vashistha, S. Taheri, N. Asadizanjani","doi":"10.1145/3590772","DOIUrl":"https://doi.org/10.1145/3590772","url":null,"abstract":"Due to the ever-growing demands for electronic chips in different sectors, semiconductor companies have been mandated to offshore their manufacturing processes. This unwanted matter has made security and trustworthiness of their fabricated chips concerning and has caused the creation of hardware attacks. In this condition, different entities in the semiconductor supply chain can act maliciously and execute an attack on the design computing layers, from devices to systems. Our attack is a hardware Trojan that is inserted during mask generation/fabrication in an untrusted foundry. The Trojan leaves a footprint in the fabrication through addition, deletion, or change of design cells. To tackle this problem, we propose EVHA (Explainable Vision System for Hardware Testing and Assurance) in this work, which can detect the smallest possible change to a design in a low-cost, accurate, and fast manner. The inputs to this system are scanning electron microscopy images acquired from the integrated circuits under examination. The system output is the determination of integrated circuit status in terms of having any defect and/or hardware Trojan through addition, deletion, or change in the design cells at the cell level. This article provides an overview on the design, development, implementation, and analysis of our defense system.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":" ","pages":"1 - 25"},"PeriodicalIF":2.2,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45801619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA 基于FPGA的后量子密码系统密钥生成器的可靠构造
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-06-23 DOI: 10.1145/3544921
Alvaro Cintas Canto, Mehran Mozaffari Kermani, R. Azarderakhsh
Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solution whose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022–2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.
量子计算的进步推动了对低功耗、低能耗、安全的加密算法的需求,这些算法可以抵御潜在的攻击。在后量子时代,人们研究了不同的解决方案。基于代码的加密技术是一种可行的解决方案,其硬件架构已成为NIST标准化过程中的研究重点,并已进入最后一轮(将于2022-2024年完成)。然而,尽管这些结构(如McEliece和Niederreiter公钥加密)具有很强的纠错特性,但先前的研究已经证明,它们的硬件实现在面对环境故障产物和故意故障(即微分故障分析)时存在脆弱性。以前表明,根据所使用的代码,即,经典或简化(使用准二进Goppa码或准循环交替码),可以观察到错误检测中的缺陷。在这项工作中,首次提出了有效的故障检测结构来解决这些缺点。这些方案基于规则奇偶校验、交错奇偶校验和两种不同的循环冗余校验(CRC),即CRC-2和CRC-8。在不失去通用性的情况下,我们对McEliece变体进行了实验,注意到所提出的方案可以用于其他基于代码的密码系统。我们在现场可编程门阵列Kintex-7器件xc7k70tfbv676-1上进行了错误检测能力评估和实现,以验证所提出方法的实用性。为了证明约束嵌入式系统的适用性,评估了所提出方案的性能退化和开销。
{"title":"Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA","authors":"Alvaro Cintas Canto, Mehran Mozaffari Kermani, R. Azarderakhsh","doi":"10.1145/3544921","DOIUrl":"https://doi.org/10.1145/3544921","url":null,"abstract":"Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solution whose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022–2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":" ","pages":"1 - 20"},"PeriodicalIF":2.2,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46207354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
RT-RCG: Neural Network and Accelerator Search Towards Effective and Real-time ECG Reconstruction from Intracardiac Electrograms. RT-RCG:从心内电图有效实时重建心电的神经网络和加速器搜索。
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-04-01 Epub Date: 2022-03-16 DOI: 10.1145/3465372
Yongan Zhang, Anton Banta, Yonggan Fu, Mathews M John, Allison Post, Mehdi Razavi, Joseph Cavallaro, Behnaam Aazhang, Yingyan Lin

There exists a gap in terms of the signals provided by pacemakers (i.e., intracardiac electrogram (EGM)) and the signals doctors use (i.e., 12-lead electrocardiogram (ECG)) to diagnose abnormal rhythms. Therefore, the former, even if remotely transmitted, are not sufficient for doctors to provide a precise diagnosis, let alone make a timely intervention. To close this gap and make a heuristic step towards real-time critical intervention in instant response to irregular and infrequent ventricular rhythms, we propose a new framework dubbed RT-RCG to automatically search for (1) efficient Deep Neural Network (DNN) structures and then (2) corresponding accelerators, to enable Real-Time and high-quality Reconstruction of ECG signals from EGM signals. Specifically, RT-RCG proposes a new DNN search space tailored for ECG reconstruction from EGM signals, and incorporates a differentiable acceleration search (DAS) engine to efficiently navigate over the large and discrete accelerator design space to generate optimized accelerators. Extensive experiments and ablation studies under various settings consistently validate the effectiveness of our RT-RCG. To the best of our knowledge, RT-RCG is the first to leverage neural architecture search (NAS) to simultaneously tackle both reconstruction efficacy and efficiency.

起搏器提供的信号(即心内电图(EGM))与医生用于诊断异常节律的信号(即12导联心电图(ECG))存在差距。因此,前者即使远程传播,也不足以让医生提供准确的诊断,更不用说及时的干预了。为了缩小这一差距,并在对不规则和罕见心室节律的即时反应进行实时关键干预方面迈出启发式的一步,我们提出了一个名为RT-RCG的新框架,用于自动搜索(1)高效的深度神经网络(DNN)结构,然后(2)相应的加速器,从而实现实时和高质量地从EGM信号中重建ECG信号。具体来说,RT-RCG提出了一种新的深度神经网络搜索空间,用于从EGM信号中重建ECG,并结合了一个可微加速度搜索(DAS)引擎,以有效地导航大型离散加速器设计空间以生成优化的加速器。广泛的实验和消融研究在不同的设置一致验证我们的RT-RCG的有效性。据我们所知,RT-RCG是第一个利用神经结构搜索(NAS)同时解决重建效果和效率的技术。
{"title":"RT-RCG: Neural Network and Accelerator Search Towards Effective and Real-time ECG Reconstruction from Intracardiac Electrograms.","authors":"Yongan Zhang,&nbsp;Anton Banta,&nbsp;Yonggan Fu,&nbsp;Mathews M John,&nbsp;Allison Post,&nbsp;Mehdi Razavi,&nbsp;Joseph Cavallaro,&nbsp;Behnaam Aazhang,&nbsp;Yingyan Lin","doi":"10.1145/3465372","DOIUrl":"https://doi.org/10.1145/3465372","url":null,"abstract":"<p><p>There exists a gap in terms of the signals provided by pacemakers (i.e., intracardiac electrogram (EGM)) and the signals doctors use (i.e., 12-lead electrocardiogram (ECG)) to diagnose abnormal rhythms. Therefore, the former, even if remotely transmitted, are not sufficient for doctors to provide a precise diagnosis, let alone make a timely intervention. To close this gap and make a heuristic step towards real-time critical intervention in instant response to irregular and infrequent ventricular rhythms, we propose a new framework dubbed RT-RCG to automatically search for (1) efficient Deep Neural Network (DNN) structures and then (2) corresponding accelerators, to enable <b>R</b>eal-<b>T</b>ime and high-quality <b>R</b>econstruction of E<b>C</b>G signals from E<b>G</b>M signals. Specifically, RT-RCG proposes a new DNN search space tailored for ECG reconstruction from EGM signals, and incorporates a differentiable acceleration search (DAS) engine to efficiently navigate over the large and discrete accelerator design space to generate optimized accelerators. Extensive experiments and ablation studies under various settings consistently validate the effectiveness of our RT-RCG. To the best of our knowledge, RT-RCG is the first to leverage neural architecture search (NAS) to simultaneously tackle both reconstruction efficacy and efficiency.</p>","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"18 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9236221/pdf/nihms-1816470.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40408394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FPIC: A Novel Semantic Dataset for Optical PCB Assurance FPIC:一种新的用于光学PCB保证的语义数据集
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-02-17 DOI: 10.1145/3588032
Nathan Jessurun, Olivia P. Dizon-Paradis, Jacob Harrison, Shajib Ghosh, M. Tehranipoor, D. Woodard, N. Asadizanjani
Outsourced PCB fabrication necessitates increased hardware assurance capabilities. Several assurance techniques based on AOI have been proposed that leverage PCB images acquired using digital cameras. We review state-of-the-art AOI techniques and observe a strong, rapid trend toward ML solutions. These require significant amounts of labeled ground truth data, which is lacking in the publicly available PCB data space. We contribute the FPIC dataset to address this need. Additionally, we outline new hardware security methodologies enabled by our dataset.
外包PCB制造需要提高硬件保证能力。已经提出了几种基于AOI的保证技术,利用使用数码相机获取的PCB图像。我们回顾了最先进的AOI技术,并观察到ML解决方案的强劲、快速趋势。这些需要大量标记的地面实况数据,而这在公开可用的PCB数据空间中是缺乏的。我们提供FPIC数据集来满足这一需求。此外,我们还概述了数据集支持的新硬件安全方法。
{"title":"FPIC: A Novel Semantic Dataset for Optical PCB Assurance","authors":"Nathan Jessurun, Olivia P. Dizon-Paradis, Jacob Harrison, Shajib Ghosh, M. Tehranipoor, D. Woodard, N. Asadizanjani","doi":"10.1145/3588032","DOIUrl":"https://doi.org/10.1145/3588032","url":null,"abstract":"Outsourced PCB fabrication necessitates increased hardware assurance capabilities. Several assurance techniques based on AOI have been proposed that leverage PCB images acquired using digital cameras. We review state-of-the-art AOI techniques and observe a strong, rapid trend toward ML solutions. These require significant amounts of labeled ground truth data, which is lacking in the publicly available PCB data space. We contribute the FPIC dataset to address this need. Additionally, we outline new hardware security methodologies enabled by our dataset.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"19 1","pages":"1 - 21"},"PeriodicalIF":2.2,"publicationDate":"2022-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46633704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Built-in Self-Test and Fault Localization for Inter-Layer Vias in Monolithic 3D ICs 单片三维集成电路层间通孔的内置自检与故障定位
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-31 DOI: 10.1145/3464430
Arjun Chaudhuri, Sanmitra Banerjee, Jinwoo Kim, Heechun Park, B. W. Ku, S. Kannan, K. Chakrabarty, S. Lim
Monolithic 3D (M3D) integration provides massive vertical integration through the use of nanoscale inter-layer vias (ILVs). However, high integration density and aggressive scaling of the inter-layer dielectric make ILVs especially prone to defects. We present a low-cost built-in self-test (BIST) method that requires only two test patterns to detect opens, stuck-at faults, and bridging faults (shorts) in ILVs. We also propose an extended BIST architecture for fault detection, called Dual-BIST, to guarantee zero ILV fault masking due to single BIST faults and negligible ILV fault masking due to multiple BIST faults. We analyze the impact of coupling between adjacent ILVs arranged in a 1D array in block-level partitioned designs. Based on this analysis, we present a novel test architecture called Shared-BIST with the added functionality of localizing single and multiple faults, including coupling-induced faults. We introduce a systematic clustering-based method for designing and integrating a delay bank with the Shared-BIST architecture for testing small-delay defects in ILVs with minimal yield loss. Simulation results for four two-tier M3D benchmark designs highlight the effectiveness of the proposed BIST framework.
单片3D (M3D)集成通过使用纳米级层间通孔(ILVs)提供大规模垂直集成。然而,高集成度和层间介电的严重结垢使得ilv特别容易产生缺陷。我们提出了一种低成本的内置自检(BIST)方法,该方法只需要两种测试模式来检测ilv中的打开、卡在故障和桥接故障(短路)。我们还提出了一种扩展的BIST结构,称为双BIST,用于故障检测,以保证由于单个BIST故障导致的ILV故障屏蔽为零,而由于多个BIST故障导致的ILV故障屏蔽可以忽略不计。我们分析了在块级分区设计中排列成一维阵列的相邻ilv之间耦合的影响。基于这一分析,我们提出了一种新的测试体系结构,称为Shared-BIST,该体系结构增加了单个和多个故障的定位功能,包括耦合引起的故障。我们介绍了一种基于系统聚类的方法,用于设计和集成具有共享- bist架构的延迟库,以最小的产量损失测试ilv中的小延迟缺陷。四个两层M3D基准设计的仿真结果突出了所提出的BIST框架的有效性。
{"title":"Built-in Self-Test and Fault Localization for Inter-Layer Vias in Monolithic 3D ICs","authors":"Arjun Chaudhuri, Sanmitra Banerjee, Jinwoo Kim, Heechun Park, B. W. Ku, S. Kannan, K. Chakrabarty, S. Lim","doi":"10.1145/3464430","DOIUrl":"https://doi.org/10.1145/3464430","url":null,"abstract":"Monolithic 3D (M3D) integration provides massive vertical integration through the use of nanoscale inter-layer vias (ILVs). However, high integration density and aggressive scaling of the inter-layer dielectric make ILVs especially prone to defects. We present a low-cost built-in self-test (BIST) method that requires only two test patterns to detect opens, stuck-at faults, and bridging faults (shorts) in ILVs. We also propose an extended BIST architecture for fault detection, called Dual-BIST, to guarantee zero ILV fault masking due to single BIST faults and negligible ILV fault masking due to multiple BIST faults. We analyze the impact of coupling between adjacent ILVs arranged in a 1D array in block-level partitioned designs. Based on this analysis, we present a novel test architecture called Shared-BIST with the added functionality of localizing single and multiple faults, including coupling-induced faults. We introduce a systematic clustering-based method for designing and integrating a delay bank with the Shared-BIST architecture for testing small-delay defects in ILVs with minimal yield loss. Simulation results for four two-tier M3D benchmark designs highlight the effectiveness of the proposed BIST framework.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"38 1","pages":"22:1-22:37"},"PeriodicalIF":2.2,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64043098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Compact Modeling of Noisy Quantum Computers: A Molecular-Spin-Qubit Case of Study 噪声量子计算机的紧凑建模:一个分子自旋量子比特的研究案例
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-31 DOI: 10.1145/3474223
Mario Simoni, G. Cirillo, G. Turvani, M. Graziano, M. Zamboni
Classical simulation of Noisy Intermediate Scale Quantum computers is a crucial task for testing the expected performance of real hardware. The standard approach, based on solving Schrödinger and Lindblad equations, is demanding when scaling the number of qubits in terms of both execution time and memory. In this article, attempts in defining compact models for the simulation of quantum hardware are proposed, ensuring results close to those obtained with standard formalism. Molecular Nuclear Magnetic Resonance quantum hardware is the target technology, where three non-ideality phenomena—common to other quantum technologies—are taken into account: decoherence, off-resonance qubit evolution, and undesired qubit-qubit residual interaction. A model for each non-ideality phenomenon is embedded into a MATLAB simulation infrastructure of noisy quantum computers. The accuracy of the models is tested on a benchmark of quantum circuits, in the expected operating ranges of quantum hardware. The corresponding outcomes are compared with those obtained via numeric integration of the Schrödinger equation and the Qiskit’s QASMSimulator. The achieved results give evidence that this work is a step forward towards the definition of compact models able to provide fast results close to those obtained with the traditional physical simulation strategies, thus paving the way for their integration into a classical simulator of quantum computers.
噪声中尺度量子计算机的经典仿真是测试实际硬件预期性能的关键任务。基于求解Schrödinger和Lindblad方程的标准方法,在扩展量子位的数量时,在执行时间和内存方面都要求很高。在本文中,我们尝试为量子硬件的模拟定义紧致模型,以确保结果接近于用标准形式得到的结果。分子核磁共振量子硬件是目标技术,其中考虑了其他量子技术常见的三种非理想现象:退相干、非共振量子比特演化和不希望的量子比特-量子比特剩余相互作用。每个非理想现象的模型嵌入到噪声量子计算机的MATLAB仿真基础结构中。在量子电路的基准测试中,在量子硬件的预期工作范围内,对模型的准确性进行了测试。将相应的结果与通过Schrödinger方程和Qiskit的qasm模拟器的数值积分得到的结果进行了比较。所取得的结果表明,这项工作朝着紧凑模型的定义迈出了一步,该模型能够提供接近传统物理模拟策略获得的快速结果,从而为将其集成到经典量子计算机模拟器中铺平了道路。
{"title":"Towards Compact Modeling of Noisy Quantum Computers: A Molecular-Spin-Qubit Case of Study","authors":"Mario Simoni, G. Cirillo, G. Turvani, M. Graziano, M. Zamboni","doi":"10.1145/3474223","DOIUrl":"https://doi.org/10.1145/3474223","url":null,"abstract":"\u0000 Classical simulation of Noisy Intermediate Scale Quantum computers is a crucial task for testing the expected performance of real hardware. The standard approach, based on solving Schrödinger and Lindblad equations, is demanding when scaling the number of qubits in terms of both execution time and memory. In this article, attempts in defining compact models for the simulation of quantum hardware are proposed, ensuring results close to those obtained with standard formalism. Molecular Nuclear Magnetic Resonance quantum hardware is the target technology, where three non-ideality phenomena—common to other quantum technologies—are taken into account: decoherence, off-resonance qubit evolution, and undesired qubit-qubit residual interaction. A model for each non-ideality phenomenon is embedded into a\u0000 MATLAB\u0000 simulation infrastructure of noisy quantum computers. The accuracy of the models is tested on a benchmark of quantum circuits, in the expected operating ranges of quantum hardware. The corresponding outcomes are compared with those obtained via numeric integration of the Schrödinger equation and the Qiskit’s QASMSimulator. The achieved results give evidence that this work is a step forward towards the definition of compact models able to provide fast results close to those obtained with the traditional physical simulation strategies, thus paving the way for their integration into a classical simulator of quantum computers.\u0000","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"18 1","pages":"11:1-11:26"},"PeriodicalIF":2.2,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64045372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Polyhedral-Based Compilation Framework for In-Memory Neural Network Accelerators 基于多面体的内存神经网络加速器编译框架
IF 2.2 4区 计算机科学 Q3 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-31 DOI: 10.1145/3469847
Jianhui Han, Xiang Fei, Zhaolin Li, Youhui Zhang
Memristor-based processing-in-memory architecture is a promising solution to the memory bottleneck in the neural network ( NN ) processing. A major challenge for the programmability of such architectures is the automatic compilation of high-level NN workloads, from various operators to the memristor-based hardware that may provide programming interfaces with different granularities. This article proposes a source-to-source compilation framework for such memristor-based NN accelerators, which can conduct automatic detection and mapping of multiple NN operators based on the flexible and rich representation capability of the polyhedral model. In contrast to previous studies, it implements support for pipeline generation to exploit the parallelism in the NN loads to leverage hardware resources for higher efficiency. The evaluation based on synthetic kernels and NN benchmarks demonstrates that the proposed framework can reliably detect and map the target operators. Case studies on typical memristor-based architectures also show its generality over various architectural designs. The evaluation further demonstrates that compared with existing polyhedral-based compilation frameworks that do not support the pipelined execution, the performance can upgrade by an order of magnitude with the pipelined execution, which emphasizes the necessity of our improvement.
基于忆阻器的内存处理架构是解决神经网络处理中内存瓶颈的一种很有前途的方法。这种架构的可编程性面临的一个主要挑战是高级神经网络工作负载的自动编译,从各种操作符到可能提供不同粒度编程接口的基于忆阻器的硬件。本文提出了一种基于记忆电阻器的神经网络加速器的源到源编译框架,该框架利用多面体模型灵活丰富的表示能力,对多个神经网络算子进行自动检测和映射。与以往的研究相比,它实现了对管道生成的支持,以利用神经网络负载的并行性来利用硬件资源以提高效率。基于合成核和神经网络基准的评估表明,该框架能够可靠地检测和映射目标算子。对典型的基于忆阻器的体系结构的案例研究也表明了它在各种体系结构设计中的通用性。评估进一步表明,与现有的不支持流水线执行的基于多面体的编译框架相比,流水线执行的性能可以提升一个数量级,从而强调了我们改进的必要性。
{"title":"Polyhedral-Based Compilation Framework for In-Memory Neural Network Accelerators","authors":"Jianhui Han, Xiang Fei, Zhaolin Li, Youhui Zhang","doi":"10.1145/3469847","DOIUrl":"https://doi.org/10.1145/3469847","url":null,"abstract":"\u0000 Memristor-based processing-in-memory architecture is a promising solution to the memory bottleneck in the\u0000 neural network\u0000 (\u0000 NN\u0000 ) processing. A major challenge for the programmability of such architectures is the automatic compilation of high-level NN workloads, from various operators to the memristor-based hardware that may provide programming interfaces with different granularities. This article proposes a source-to-source compilation framework for such memristor-based NN accelerators, which can conduct automatic detection and mapping of multiple NN operators based on the flexible and rich representation capability of the polyhedral model. In contrast to previous studies, it implements support for pipeline generation to exploit the parallelism in the NN loads to leverage hardware resources for higher efficiency. The evaluation based on synthetic kernels and NN benchmarks demonstrates that the proposed framework can reliably detect and map the target operators. Case studies on typical memristor-based architectures also show its generality over various architectural designs. The evaluation further demonstrates that compared with existing polyhedral-based compilation frameworks that do not support the pipelined execution, the performance can upgrade by an order of magnitude with the pipelined execution, which emphasizes the necessity of our improvement.\u0000","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"18 1","pages":"15:1-15:23"},"PeriodicalIF":2.2,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64044603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ACM Journal on Emerging Technologies in Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1