首页 > 最新文献

2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)最新文献

英文 中文
Design of a Safe Convolutional Neural Network Accelerator 一种安全卷积神经网络加速器的设计
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00053
Zheng Xu, J. Abraham
Recently Machine Learning (ML) accelerators have grown into prominence with significant power and performance efficiency improvements over CPU and GPU. In this paper, we developed an Algorithm Based Error Checker (ABEC) for Concurrent Error Detection (CED) based on an industry quality Convolution Neural Network (CNN) accelerator with priority to meet high safety Diagnostic Coverage (DC) requirement and enhanced area and power efficiency. Furthermore, we developed an Algorithm Based Cluster Checker (ABCC) with coarse-grained error localization to improve run-time availability. Experimental results showed that we could achieve above 99% DC with only 30% area and power overhead for a selected configuration.
最近,机器学习(ML)加速器变得越来越突出,与CPU和GPU相比,它的功率和性能效率都有了显著提高。本文基于卷积神经网络(CNN)加速器,开发了一种基于算法的并发错误检测(CED)错误检查器(ABEC),以满足高安全诊断覆盖率(DC)要求,并提高了面积和功率效率。此外,我们开发了一个基于算法的集群检查器(ABCC),具有粗粒度的错误定位,以提高运行时的可用性。实验结果表明,对于选定的配置,我们可以在只有30%的面积和功率开销的情况下实现99%以上的直流。
{"title":"Design of a Safe Convolutional Neural Network Accelerator","authors":"Zheng Xu, J. Abraham","doi":"10.1109/ISVLSI.2019.00053","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00053","url":null,"abstract":"Recently Machine Learning (ML) accelerators have grown into prominence with significant power and performance efficiency improvements over CPU and GPU. In this paper, we developed an Algorithm Based Error Checker (ABEC) for Concurrent Error Detection (CED) based on an industry quality Convolution Neural Network (CNN) accelerator with priority to meet high safety Diagnostic Coverage (DC) requirement and enhanced area and power efficiency. Furthermore, we developed an Algorithm Based Cluster Checker (ABCC) with coarse-grained error localization to improve run-time availability. Experimental results showed that we could achieve above 99% DC with only 30% area and power overhead for a selected configuration.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"34 1","pages":"247-252"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84998275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transient Effect Ring Oscillators Leak Too 瞬态效应环形振荡器也泄漏
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00016
Ugo Mureddu, Brice Colombier, Nathalie Bochard, L. Bossuet, V. Fischer
Up to now, the transient effect ring oscillator (TERO) seemed to be a better building block for PUFs than a standard ring oscillator, since it was thought to be immune to electromagnetic analysis. Here, we report for the first time that TERO PUFs are in fact vulnerable to electromagnetic analysis too. First, we propose a spectral model of a TERO cell output, showing how to fit it to experimental data obtained with the help of a spectrum analyser to recover the number of oscillations of a TERO cell. We then extend it to two TERO cells oscillating simultaneously, and show how this ability can be used to fully clone a TERO PUF. These results should help designers to better plan for susceptibility of TERO PUFs to electromagnetic analysis in their future designs.
到目前为止,瞬态效应环形振荡器(TERO)似乎是一个比标准环形振荡器更好的puf构建模块,因为它被认为不受电磁分析的影响。在这里,我们首次报道TERO puf实际上也容易受到电磁分析的影响。首先,我们提出了一个TERO电池输出的频谱模型,展示了如何将其拟合到在频谱分析仪的帮助下获得的实验数据中,以恢复TERO电池的振荡次数。然后我们将其扩展到两个同时振荡的TERO细胞,并展示如何使用这种能力来完全克隆TERO PUF。这些结果将有助于设计人员在未来的设计中更好地规划TERO puf对电磁分析的敏感性。
{"title":"Transient Effect Ring Oscillators Leak Too","authors":"Ugo Mureddu, Brice Colombier, Nathalie Bochard, L. Bossuet, V. Fischer","doi":"10.1109/ISVLSI.2019.00016","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00016","url":null,"abstract":"Up to now, the transient effect ring oscillator (TERO) seemed to be a better building block for PUFs than a standard ring oscillator, since it was thought to be immune to electromagnetic analysis. Here, we report for the first time that TERO PUFs are in fact vulnerable to electromagnetic analysis too. First, we propose a spectral model of a TERO cell output, showing how to fit it to experimental data obtained with the help of a spectrum analyser to recover the number of oscillations of a TERO cell. We then extend it to two TERO cells oscillating simultaneously, and show how this ability can be used to fully clone a TERO PUF. These results should help designers to better plan for susceptibility of TERO PUFs to electromagnetic analysis in their future designs.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"433 1","pages":"37-42"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91551339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On-Chip Instruction Generation for Cross-Layer CNN Accelerator on FPGA FPGA上跨层CNN加速器的片上指令生成
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00011
Yiming Hu, Shuang Liang, Jincheng Yu, Yu Wang, Huazhong Yang
Convolutional neural networks (CNN) are gaining popularity in the field of computer vision. CNN-based methods are computational-intensive and resource-consuming, thus are hard to be integrated into embedded systems and applied to real-time task scenarios. Many FPGA based CNN accelerators have been proposed to get higher performance. Cross-layer CNN accelerator is designed to reduce the data transfer by fusing several layers. However, the instruction size that needs to be transferred is usually considerable, leading to a performance drop of cross-layer accelerators. In this study, we develop an on-chip instruction generation method based on the cross-layer accelerator to reduce the total instruction size transferred to the chip. We design the corresponding hardware module and modify existing object detection models according to the hardware structure to improve the accuracy of object detection tasks. The evaluation results show that in the same calculation process, our accelerator can achieve 35% data transfer reduction on the VGG16 network. The average instruction size and compilation time are reduced by 95% using our instruction generation method. The performance of the accelerator reaches 1414 GOP/s.
卷积神经网络(CNN)在计算机视觉领域越来越受欢迎。基于cnn的方法计算量大,资源消耗大,难以集成到嵌入式系统中,应用于实时任务场景。为了获得更高的性能,人们提出了许多基于FPGA的CNN加速器。跨层CNN加速器通过多层融合来减少数据传输。然而,需要传输的指令大小通常是相当大的,这导致跨层加速器的性能下降。在本研究中,我们开发了一种基于跨层加速器的片上指令生成方法,以减少传输到芯片的总指令大小。我们设计了相应的硬件模块,并根据硬件结构对现有的目标检测模型进行修改,以提高目标检测任务的准确性。评估结果表明,在相同的计算过程中,我们的加速器可以在VGG16网络上实现35%的数据传输减少。使用我们的指令生成方法,平均指令大小和编译时间减少了95%。加速器的性能达到1414 GOP/s。
{"title":"On-Chip Instruction Generation for Cross-Layer CNN Accelerator on FPGA","authors":"Yiming Hu, Shuang Liang, Jincheng Yu, Yu Wang, Huazhong Yang","doi":"10.1109/ISVLSI.2019.00011","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00011","url":null,"abstract":"Convolutional neural networks (CNN) are gaining popularity in the field of computer vision. CNN-based methods are computational-intensive and resource-consuming, thus are hard to be integrated into embedded systems and applied to real-time task scenarios. Many FPGA based CNN accelerators have been proposed to get higher performance. Cross-layer CNN accelerator is designed to reduce the data transfer by fusing several layers. However, the instruction size that needs to be transferred is usually considerable, leading to a performance drop of cross-layer accelerators. In this study, we develop an on-chip instruction generation method based on the cross-layer accelerator to reduce the total instruction size transferred to the chip. We design the corresponding hardware module and modify existing object detection models according to the hardware structure to improve the accuracy of object detection tasks. The evaluation results show that in the same calculation process, our accelerator can achieve 35% data transfer reduction on the VGG16 network. The average instruction size and compilation time are reduced by 95% using our instruction generation method. The performance of the accelerator reaches 1414 GOP/s.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"37 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87279612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SPN-DPUF: Substitution-Permutation Network Based Secure Circuit for Digital PUF SPN-DPUF:基于替换置换网络的数字PUF安全电路
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00018
Johan Marconot, D. Hély, Florian Pebay-Peyroula
Securing integrated circuits lifecycle requires authentication mechanisms in order to prevent counterfeiting and to prevent illegal access to private assets. Physical unclonable functions (PUFs) are good candidates to provide authentication services. However, PUFs may be sensitive to noise and environmental conditions inducing reliability issues. Digital PUFs (DPUFs), which are by design inherently robust, have recently been proposed. In this paper, we investigate the utilization, the security and the efficiency of interrogation circuitries for DPUFs. We present the concept of digital disorder based PUF primitives and related work on fabrication processes and interrogation circuitries for DPUFs, discussing their advantage and limitation. We then study the requirements to exploit this digital and reliable source of entropy and deploy a strong PUF design. We propose new models of logical layers for challenge-response mechanism based on substitution-permutation networks, which could be integrated along the randomized structure. We simulate and evaluate the different structures to estimate a first security-performance trade-off, respecting both security and resource constraints.
确保集成电路的生命周期需要认证机制,以防止假冒和防止非法访问私人资产。物理不可克隆函数(puf)是提供身份验证服务的良好候选者。然而,puf可能对噪声和环境条件敏感,从而导致可靠性问题。数字puf (dpuf)在设计上具有固有的鲁棒性,最近被提出。本文研究了dpuf讯问电路的利用率、安全性和效率。我们提出了基于数字无序的PUF原语的概念,以及dpuf的制造工艺和询问电路的相关工作,讨论了它们的优点和局限性。然后我们研究了利用这个数字和可靠的熵源的需求,并部署了一个强大的PUF设计。提出了基于替代置换网络的挑战-响应机制的逻辑层模型,该模型可以沿随机结构集成。我们模拟和评估不同的结构,以估计第一个安全性能权衡,同时尊重安全和资源约束。
{"title":"SPN-DPUF: Substitution-Permutation Network Based Secure Circuit for Digital PUF","authors":"Johan Marconot, D. Hély, Florian Pebay-Peyroula","doi":"10.1109/ISVLSI.2019.00018","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00018","url":null,"abstract":"Securing integrated circuits lifecycle requires authentication mechanisms in order to prevent counterfeiting and to prevent illegal access to private assets. Physical unclonable functions (PUFs) are good candidates to provide authentication services. However, PUFs may be sensitive to noise and environmental conditions inducing reliability issues. Digital PUFs (DPUFs), which are by design inherently robust, have recently been proposed. In this paper, we investigate the utilization, the security and the efficiency of interrogation circuitries for DPUFs. We present the concept of digital disorder based PUF primitives and related work on fabrication processes and interrogation circuitries for DPUFs, discussing their advantage and limitation. We then study the requirements to exploit this digital and reliable source of entropy and deploy a strong PUF design. We propose new models of logical layers for challenge-response mechanism based on substitution-permutation networks, which could be integrated along the randomized structure. We simulate and evaluate the different structures to estimate a first security-performance trade-off, respecting both security and resource constraints.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"9 1","pages":"49-54"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87625711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Not All Feed-Forward MUX PUFs Generate Unique Signatures 并不是所有的前馈MUX puf都产生唯一的签名
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00017
A. Ayling, S. V. S. Avvaru, K. Parhi
A fundamental property of physical unclonable functions (PUFs) is that they generate unique outputs that cannot be reproduced by another chip, even with an identical circuit and layout design. Several configurations of feed-forward PUFs (FF PUFs) are evaluated in terms of their interchip variation, a measure of uniqueness. In general, PUFs are considered to be unique due to symmetry in their path delay distributions, which are typically Gaussian. In this paper, we prove that certain FF PUFs can result in skewed path delay distributions leading to poor uniqueness. In these PUFs, the total delay difference is sum of a symmetric Gaussian distribution and an asymmetric half-Gaussian distribution. We also compute empirical estimates and verify our observations by simulating 200 PUFs in each FF configuration. It is observed that (1) FF PUFs with one intermediate arbiter and odd number of feed-forward loops and (2) FF PUFs in cascade or separate configurations have degraded interchip variation. This is the first study to observe and prove the non-uniqueness property of such PUFs.
物理不可克隆功能(puf)的一个基本特性是它们产生的唯一输出不能被其他芯片复制,即使具有相同的电路和布局设计。前馈puf (FF puf)的几种配置根据其芯片间变化进行评估,这是一种唯一性度量。一般来说,puf被认为是唯一的,因为它们的路径延迟分布是对称的,通常是高斯分布。在本文中,我们证明了某些FF puf会导致路径延迟分布偏斜,从而导致唯一性差。在这些puf中,总延迟差是对称高斯分布和非对称半高斯分布的和。我们还计算了经验估计,并通过模拟每个FF配置中的200个puf来验证我们的观察结果。观察到(1)具有一个中间仲裁器和奇数个前馈环路的FF puf和(2)级联或单独配置的FF puf在芯片间的变化会降低。这是第一次观察并证明这类puf的非唯一性。
{"title":"Not All Feed-Forward MUX PUFs Generate Unique Signatures","authors":"A. Ayling, S. V. S. Avvaru, K. Parhi","doi":"10.1109/ISVLSI.2019.00017","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00017","url":null,"abstract":"A fundamental property of physical unclonable functions (PUFs) is that they generate unique outputs that cannot be reproduced by another chip, even with an identical circuit and layout design. Several configurations of feed-forward PUFs (FF PUFs) are evaluated in terms of their interchip variation, a measure of uniqueness. In general, PUFs are considered to be unique due to symmetry in their path delay distributions, which are typically Gaussian. In this paper, we prove that certain FF PUFs can result in skewed path delay distributions leading to poor uniqueness. In these PUFs, the total delay difference is sum of a symmetric Gaussian distribution and an asymmetric half-Gaussian distribution. We also compute empirical estimates and verify our observations by simulating 200 PUFs in each FF configuration. It is observed that (1) FF PUFs with one intermediate arbiter and odd number of feed-forward loops and (2) FF PUFs in cascade or separate configurations have degraded interchip variation. This is the first study to observe and prove the non-uniqueness property of such PUFs.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"118 1","pages":"43-48"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87966051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ferroelectric FET Based TCAM Designs for Energy Efficient Computing 基于铁电场效应管的TCAM节能计算设计
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00085
Xunzhao Yin, D. Reis, M. Niemier, X. Hu
As Moore's law based device scaling and accompanying performance scaling trends slow down, there is increasing interest in new technologies and computational paradigms that enable faster and more energy-efficient information processing. Meanwhile, there is growing evidence that in the context of traditional Boolean circuits and/or von Neumann architectures, it will be challenging for beyond-CMOS devices to compete with the CMOS technology. Exploiting the unique characteristics of emerging devices – especially in the context of alternative circuits and architectural paradigms – has the potential to offer orders of magnitude improvement in terms of energy and/or performance. In this work, we show how our research work has leveraged the unique characteristics of emerging devices to build efficient circuits and architectures with significant improvements in energy and performance for various data-intensive applications. Specifically, we consider Ferroelectric FETs (FeFETs) which are nonvolatile and can function as both a transistor and a storage element. This unique property enables FeFETs to be used for building area efficient and low-power ternary content addressable memories (TCAMs). TCAMs are desirable in many applications including network routers and cognitive learning tasks. Using models calibrated by experimentally demonstrated ferroelectric material or device, as well as detailed circuit simulations, we show that the FeFET-based TCAMs we proposed can enable orders of magnitude improvements in energy efficiency and performance when considering array-level computing tasks in the IoT domain.
随着基于摩尔定律的设备扩展和伴随的性能扩展趋势放缓,人们对能够实现更快、更节能的信息处理的新技术和计算范式的兴趣越来越大。与此同时,越来越多的证据表明,在传统布尔电路和/或冯·诺伊曼架构的背景下,超越CMOS的器件将面临与CMOS技术竞争的挑战。利用新兴器件的独特特性-特别是在替代电路和架构范例的背景下-有可能在能量和/或性能方面提供数量级的改进。在这项工作中,我们展示了我们的研究工作如何利用新兴设备的独特特性来构建高效的电路和架构,并在能源和性能方面显著改善各种数据密集型应用。具体来说,我们考虑了铁电场效应管(fefet),它是非易失性的,可以同时用作晶体管和存储元件。这种独特的特性使fet能够用于构建面积高效和低功耗的三元内容可寻址存储器(TCAMs)。tcam在包括网络路由器和认知学习任务在内的许多应用中都是理想的。使用经实验证明的铁电材料或器件校准的模型,以及详细的电路模拟,我们表明,在考虑物联网领域的阵列级计算任务时,我们提出的基于fet的TCAMs可以使能效和性能得到数量级的提高。
{"title":"Ferroelectric FET Based TCAM Designs for Energy Efficient Computing","authors":"Xunzhao Yin, D. Reis, M. Niemier, X. Hu","doi":"10.1109/ISVLSI.2019.00085","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00085","url":null,"abstract":"As Moore's law based device scaling and accompanying performance scaling trends slow down, there is increasing interest in new technologies and computational paradigms that enable faster and more energy-efficient information processing. Meanwhile, there is growing evidence that in the context of traditional Boolean circuits and/or von Neumann architectures, it will be challenging for beyond-CMOS devices to compete with the CMOS technology. Exploiting the unique characteristics of emerging devices – especially in the context of alternative circuits and architectural paradigms – has the potential to offer orders of magnitude improvement in terms of energy and/or performance. In this work, we show how our research work has leveraged the unique characteristics of emerging devices to build efficient circuits and architectures with significant improvements in energy and performance for various data-intensive applications. Specifically, we consider Ferroelectric FETs (FeFETs) which are nonvolatile and can function as both a transistor and a storage element. This unique property enables FeFETs to be used for building area efficient and low-power ternary content addressable memories (TCAMs). TCAMs are desirable in many applications including network routers and cognitive learning tasks. Using models calibrated by experimentally demonstrated ferroelectric material or device, as well as detailed circuit simulations, we show that the FeFET-based TCAMs we proposed can enable orders of magnitude improvements in energy efficiency and performance when considering array-level computing tasks in the IoT domain.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"252 1","pages":"437-442"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72660694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Countering Botnet of Things using Blockchain-Based Authenticity Framework 使用基于区块链的真实性框架对抗僵尸网络
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00112
Pinchen Cui, Ujjwal Guin
The success and widespread use of Internet of Things (IoT) bring remarkable contributions and economic benefits in various fields. However, the increasing number of devices also raises security concerns. The prevalence of Botnet of Things (BoT) has been observed and it has been recently reported that the launched attacks affect multiple domains and have caused unacceptable losses. As majority of IoT devices are manufactured off-shore, ensuring their identity becomes one of the major challenges. Cloned devices, with backdoors for malicious purposes, can provide an undue advantage of the adversary to compromise a system even though proper security measures are in place. In this paper, we propose a novel blockchain-based framework to provide traceability of hardware. A unique identity for every IoT device is ensured using a physically unclonable function (PUF). The blockchain provides the verification of these devices by comparing these unique IDs. HyperLedger is selected to implement the blockchain-based framework, and its performance is being evaluated and analyzed.
物联网的成功和广泛应用在各个领域带来了显著的贡献和经济效益。然而,设备数量的增加也引发了安全问题。僵尸网络物联网(BoT)的流行已经被观察到,最近有报道称,发起的攻击影响到多个领域,并造成了不可接受的损失。由于大多数物联网设备都是在海上制造的,因此确保其身份成为主要挑战之一。克隆的设备带有用于恶意目的的后门,即使采取了适当的安全措施,也可以为攻击者提供不适当的优势来破坏系统。在本文中,我们提出了一种新的基于区块链的框架来提供硬件的可追溯性。使用物理不可克隆功能(PUF)确保每个物联网设备的唯一身份。区块链通过比较这些唯一的id来验证这些设备。选择HyperLedger来实现基于区块链的框架,并对其性能进行评估和分析。
{"title":"Countering Botnet of Things using Blockchain-Based Authenticity Framework","authors":"Pinchen Cui, Ujjwal Guin","doi":"10.1109/ISVLSI.2019.00112","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00112","url":null,"abstract":"The success and widespread use of Internet of Things (IoT) bring remarkable contributions and economic benefits in various fields. However, the increasing number of devices also raises security concerns. The prevalence of Botnet of Things (BoT) has been observed and it has been recently reported that the launched attacks affect multiple domains and have caused unacceptable losses. As majority of IoT devices are manufactured off-shore, ensuring their identity becomes one of the major challenges. Cloned devices, with backdoors for malicious purposes, can provide an undue advantage of the adversary to compromise a system even though proper security measures are in place. In this paper, we propose a novel blockchain-based framework to provide traceability of hardware. A unique identity for every IoT device is ensured using a physically unclonable function (PUF). The blockchain provides the verification of these devices by comparing these unique IDs. HyperLedger is selected to implement the blockchain-based framework, and its performance is being evaluated and analyzed.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"27 1","pages":"598-603"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88425572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
iMACE: In-Memory Acceleration of Classic McEliece Encoder 经典mcelece编码器的内存加速
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00098
Karthikeyan Nagarajan, Sina Sayyah Ensan, S. Mandal, Swaroop Ghosh, A. Chattopadhyay
Asymmetric code-based crypto-systems have been developed in the last decade due to rapid evolution of quantum computing that can potentially compromise RSA and ECC based crypto-systems. The McEliece crypto-system based on the general decoding problem is one of the front runner candidates for post-quantum cryptography but the energy-efficiency is limited by the heavy data traffic between the processing elements and the memory. In memory-computing (IMC) architectures can remove the energy-efficiency barriers posed by Von-Neumann computing due to movement of data between the processor and the memory. Emerging non-volatile memories (NVM) such as, Resistive RAM (ReRAM) implemented in a crossbar array are promising substrates to realize IMC due to excellent High Resistance State (HRS) to Low Resistance State (LRS) ratios and high-densities. Therefore, McEliece can be benefited substantially by in-memory acceleration. We propose, iMACE, a high performance and area-efficient hardware implementation of the core encoding function of McEliece by exploiting ReRAM-based IMC. Simulation results show 18.8X-94X better throughput and 46%-97% reduction in energy consumption compared to the FPGA-based implementation.
由于量子计算的快速发展,基于非对称代码的加密系统在过去十年中得到了发展,这可能会危及基于RSA和ECC的加密系统。基于通用解码问题的McEliece密码系统是后量子密码技术的热门候选方案之一,但由于处理单元和存储器之间的数据流量大,其能效受到限制。在内存计算(IMC)体系结构中,由于数据在处理器和存储器之间的移动,可以消除冯-诺伊曼计算所带来的能效障碍。新兴的非易失性存储器(NVM),如在交叉棒阵列中实现的电阻性RAM (ReRAM),由于其优异的高电阻状态(HRS)与低电阻状态(LRS)比和高密度,是实现IMC的有前途的衬底。因此,McEliece可以从内存加速中获益。我们利用基于reram的IMC,提出了McEliece核心编码功能的高性能、面积高效的硬件实现iMACE。仿真结果表明,与基于fpga的实现相比,吞吐量提高18.8X-94X,能耗降低46%-97%。
{"title":"iMACE: In-Memory Acceleration of Classic McEliece Encoder","authors":"Karthikeyan Nagarajan, Sina Sayyah Ensan, S. Mandal, Swaroop Ghosh, A. Chattopadhyay","doi":"10.1109/ISVLSI.2019.00098","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00098","url":null,"abstract":"Asymmetric code-based crypto-systems have been developed in the last decade due to rapid evolution of quantum computing that can potentially compromise RSA and ECC based crypto-systems. The McEliece crypto-system based on the general decoding problem is one of the front runner candidates for post-quantum cryptography but the energy-efficiency is limited by the heavy data traffic between the processing elements and the memory. In memory-computing (IMC) architectures can remove the energy-efficiency barriers posed by Von-Neumann computing due to movement of data between the processor and the memory. Emerging non-volatile memories (NVM) such as, Resistive RAM (ReRAM) implemented in a crossbar array are promising substrates to realize IMC due to excellent High Resistance State (HRS) to Low Resistance State (LRS) ratios and high-densities. Therefore, McEliece can be benefited substantially by in-memory acceleration. We propose, iMACE, a high performance and area-efficient hardware implementation of the core encoding function of McEliece by exploiting ReRAM-based IMC. Simulation results show 18.8X-94X better throughput and 46%-97% reduction in energy consumption compared to the FPGA-based implementation.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"122 1","pages":"513-518"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79106215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Defense-Net: Defend Against a Wide Range of Adversarial Attacks through Adversarial Detector 防御网:通过对抗性检测器防御广泛的对抗性攻击
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00067
A. S. Rakin, Deliang Fan
Recent studies have demonstrated that Deep Neural Networks(DNNs) are vulnerable to adversarial input perturbations: meticulously engineered slight perturbations can result in inappropriate categorization of valid images. Adversarial Training has been one of the successful defense approaches in recent times. In this work, we propose an alternative to adversarial training by training a separate model with adversarial examples instead of the original classifier. We train an adversarial detector network known as 'Defense-Net' with strong adversary while training the original classifier with only clean training data. We propose a new adversarial cross entropy loss function to train Defense-Net appropriately differentiate between different adversarial examples. Defense-Net solves three major concerns regarding the development of a successful adversarial defense method. First, our defense does not have clean data accuracy degradation in contrast to traditional adversarial training based defenses. Second, we demonstrate this resiliency with experiments on the MNIST and CIFAR-10 data sets, and show that the state-of-the-art accuracy under the most powerful known white-box attack was increased from 94.02 % to 99.2 % on MNIST, and 47 % to 94.79 % on CIFAR-10. Finally, unlike most recent defenses, our approach does not suffer from obfuscated gradient and can successfully defend strong BPDA, PGD, FGSM and C & W attacks.
最近的研究表明,深度神经网络(dnn)容易受到对抗性输入扰动的影响:精心设计的轻微扰动可能导致对有效图像的不适当分类。对抗训练是近年来成功的防御方法之一。在这项工作中,我们提出了一种对抗训练的替代方法,即用对抗样本来训练一个单独的模型,而不是原始的分类器。我们用强大的对手训练一个称为“Defense-Net”的对抗性检测器网络,同时只使用干净的训练数据训练原始分类器。我们提出了一种新的对抗性交叉熵损失函数来训练防御网络,以适当区分不同的对抗性样本。防御网解决了有关开发成功的对抗性防御方法的三个主要问题。首先,与传统的基于对抗性训练的防御相比,我们的防御没有干净的数据准确性下降。其次,我们通过MNIST和CIFAR-10数据集的实验证明了这种弹性,并表明在已知最强大的白盒攻击下,最先进的准确率在MNIST上从94.02%增加到99.2%,在CIFAR-10上从47%增加到94.79%。最后,与最近的防御不同,我们的方法不受混淆梯度的影响,可以成功防御强大的BPDA, PGD, FGSM和C & W攻击。
{"title":"Defense-Net: Defend Against a Wide Range of Adversarial Attacks through Adversarial Detector","authors":"A. S. Rakin, Deliang Fan","doi":"10.1109/ISVLSI.2019.00067","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00067","url":null,"abstract":"Recent studies have demonstrated that Deep Neural Networks(DNNs) are vulnerable to adversarial input perturbations: meticulously engineered slight perturbations can result in inappropriate categorization of valid images. Adversarial Training has been one of the successful defense approaches in recent times. In this work, we propose an alternative to adversarial training by training a separate model with adversarial examples instead of the original classifier. We train an adversarial detector network known as 'Defense-Net' with strong adversary while training the original classifier with only clean training data. We propose a new adversarial cross entropy loss function to train Defense-Net appropriately differentiate between different adversarial examples. Defense-Net solves three major concerns regarding the development of a successful adversarial defense method. First, our defense does not have clean data accuracy degradation in contrast to traditional adversarial training based defenses. Second, we demonstrate this resiliency with experiments on the MNIST and CIFAR-10 data sets, and show that the state-of-the-art accuracy under the most powerful known white-box attack was increased from 94.02 % to 99.2 % on MNIST, and 47 % to 94.79 % on CIFAR-10. Finally, unlike most recent defenses, our approach does not suffer from obfuscated gradient and can successfully defend strong BPDA, PGD, FGSM and C & W attacks.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"86 1","pages":"332-337"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79004962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of Compilers Effects on OpenMP Soft Error Resiliency 评估编译器对OpenMP软错误弹性的影响
Pub Date : 2019-07-15 DOI: 10.1109/ISVLSI.2019.00055
Jonas Gava, Vitor V. Bandeira, R. Reis, Luciano Ost
Software engineers are using different compilers and parallel programming models (e.g., Pthreads, OpenMP) to take the best performance offered by multicore systems. Both programming models and compilers have specific characteristics, which directly impact on applications code footprint, performance, power-efficiency and reliability. The occurrence of soft errors in multicore systems is a growing reliability issue in several domains (e.g., automotive, medical, avionics). In this scenario, this paper investigates the impact of widely adopted compilers on the soft error reliability of applications implemented with OpenMP library. Fault injection campaigns consider 3 open-source compilers (GNU/GCC 5.5.0, 7.3.1, Clang 6.0.1), 16 OpenMP benchmarks executing on single, dual and quad-core versions of the Arm Cortex-A72 processor. Results show that, on average, Clang is 15.85% more reliable than both versions of GCC, which demonstrate to be more sensitive to the optimisation flags when compared to Clang.
软件工程师正在使用不同的编译器和并行编程模型(例如,Pthreads, OpenMP)来获得多核系统提供的最佳性能。编程模型和编译器都有特定的特性,这些特性直接影响到应用程序的代码占用、性能、能效和可靠性。在多个领域(如汽车、医疗、航空电子),多核系统中出现软错误是一个日益严重的可靠性问题。在这种情况下,本文研究了广泛采用的编译器对使用OpenMP库实现的应用程序的软错误可靠性的影响。故障注入活动考虑3个开源编译器(GNU/GCC 5.5.0, 7.3.1, Clang 6.0.1), 16个OpenMP基准测试,在单核,双核和四核版本的Arm Cortex-A72处理器上执行。结果显示,平均而言,Clang的可靠性比两个版本的GCC都高15.85%,这表明与Clang相比,Clang对优化标志更加敏感。
{"title":"Evaluation of Compilers Effects on OpenMP Soft Error Resiliency","authors":"Jonas Gava, Vitor V. Bandeira, R. Reis, Luciano Ost","doi":"10.1109/ISVLSI.2019.00055","DOIUrl":"https://doi.org/10.1109/ISVLSI.2019.00055","url":null,"abstract":"Software engineers are using different compilers and parallel programming models (e.g., Pthreads, OpenMP) to take the best performance offered by multicore systems. Both programming models and compilers have specific characteristics, which directly impact on applications code footprint, performance, power-efficiency and reliability. The occurrence of soft errors in multicore systems is a growing reliability issue in several domains (e.g., automotive, medical, avionics). In this scenario, this paper investigates the impact of widely adopted compilers on the soft error reliability of applications implemented with OpenMP library. Fault injection campaigns consider 3 open-source compilers (GNU/GCC 5.5.0, 7.3.1, Clang 6.0.1), 16 OpenMP benchmarks executing on single, dual and quad-core versions of the Arm Cortex-A72 processor. Results show that, on average, Clang is 15.85% more reliable than both versions of GCC, which demonstrate to be more sensitive to the optimisation flags when compared to Clang.","PeriodicalId":6703,"journal":{"name":"2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"26 1","pages":"259-264"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75025130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1