skip to main content
10.1145/3061639acmconferencesBook PagePublication PagesdacConference Proceedingsconference-collections
DAC '17: Proceedings of the 54th Annual Design Automation Conference 2017
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
DAC '17: The 54th Annual Design Automation Conference 2017 Austin TX USA June 18 - 22, 2017
ISBN:
978-1-4503-4927-7
Published:
18 June 2017
Sponsors:
EDAC, SIGDA, IEEE-CEDA
In-Cooperation:
Next Conference
June 23 - 27, 2024
San Francisco , CA , USA
Bibliometrics
Abstract

No abstract available.

research-article
Public Access
Age-aware Logic and Memory Co-Placement for RRAM-FPGAs

Resistive RAM (RRAM) is a promising non-volatile memory (NVM) device which can replace traditional SRAM as on-chip storage for logic and data in FPGAs. While RRAM outperforms SRAM by offering high scalability, low leakage power, and near-zero power-on ...

research-article
Public Access
Ivory: Early-Stage Design Space Exploration Tool for Integrated Voltage Regulators

Despite being employed in burgeoning efforts to improve power delivery efficiency, integrated voltage regulators (IVRs) have yet to be evaluated in a rigorous, systematic, or quantitative manner. To fulfill this need, we present Ivory, a high-level ...

research-article
Multi-variable Dynamic Power Management for the GPU Subsystem

In this work, we present a control-theoretic algorithm to improve the energy efficiency of the GPU targeting deadline-driven graphics applications. Our algorithm dynamically controls multiple power knobs within the GPU (DVFS and number of active slices) ...

research-article
Maximizing Forward Progress with Cache-aware Backup for Self-powered Non-volatile Processors

Energy harvesting is replacing battery to power embedded systems such as Internet of Things and wearable devices. Unstable energy supply brings challenges to energy harvesting powered system, resulting in frequent interruptions. Non-volatile processor ...

research-article
Public Access
Adaptive Thermal Management for 3D ICs with Stacked DRAM Caches

We describe an adaptive thermal management system for 3D-ICs with stacked DRAM cache memories. We present a detailed analysis of the impact of 3D-IC hotspot aggregation on the refresh behavior of the stacked DRAM-based L3 cache. We also present the ...

research-article
Toss-up Wear Leveling: Protecting Phase-Change Memories from Inconsistent Write Patterns

Limited write endurance is one of major obstacles to adopt Phase Change Memories (PCMs) in practice as future main memory. Considering process variation (PV) and non-uniform write intensity, PCM cells with low endurance (i.e. weak cells) can wear out in ...

research-article
Exploiting Parallelism for Convolutional Connections in Processing-In-Memory Architecture

Deep convolutional neural networks (CNNs) are widely adopted in intelligent systems with unprecedented accuracy but at the cost of a substantial amount of data movement. Although recent development in processing-in-memory (PIM) architecture seeks to ...

research-article
3 Channel Dependency-Based Power Model for Mobile AMOLED Displays

Active matrix organic light-emitting diode (AMOLED) displays are being adopted in increasing number of smartphones. Most applications are now based on consistent user interfaces, such as games and instant messaging, and it is therefore crucial to ...

research-article
Open Access
Arbitrary Precision and Complexity Tradeoffs for Gate-Level Information Flow Tracking

Hardware has become an increasingly attractive target for attackers, yet we still largely lack tools that enable us to analyze large designs for security flaws. Information flow tracking (IFT) models provide an approach to verifying a hardware design's ...

research-article
Leave the Cache Hierarchy Operation as It Is: A New Persistent Memory Accelerating Approach

Persistent memory places NVRAM on the memory bus, offering fast access to persistent data. Yet maintaining NVRAM data persistence raises a host of challenges. Most proposed schemes either incur much performance overhead or require substantial ...

research-article
Public Access
Ultra-Efficient Processing In-Memory for Data Intensive Applications

Recent years have witnessed a rapid growth in the domain of Internet of Things (IoT). This network of billions of devices generates and exchanges huge amount of data. The limited cache capacity and memory bandwidth make transferring and processing such ...

research-article
Public Access
Secure Information Flow Verification with Mutable Dependent Types

This paper presents a novel secure hardware description language (HDL) that uses an information flow type system to ensure that hardware is secure at design time. The novelty of this HDL lies in its ability to securely share hardware modules and storage ...

research-article
RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks

Recently, side-channel attacks on Last Level Caches (LLCs) were demonstrated. The attacks require the ability to evict critical data from the cache hierarchy, making future accesses visible. We propose Relaxed Inclusion Caches (RIC), a low-complexity ...

research-article
Toggle MUX: How X-Optimism Can Lead to Malicious Hardware

To highlight a potential threat to hardware security, we propose a methodology to derive a trigger signal from the behavior of Verilog simulation models of field-programmable gate array (FPGA) primitives that behave X-optimistic. We demonstrate our ...

research-article
XFC: A Framework for eXploitable Fault Characterization in Block Ciphers

Fault attacks recover secret keys by exploiting faults injected during the execution of a block cipher. However, not all faults are exploitable and every exploitable fault is associated with an offline complexity to determine the key. The ideal fault ...

research-article
Public Access
FFD: A Framework for Fake Flash Detection

Counterfeit electronics have become a big concern in the globalized semiconductor industry where chips might be recycled, remarked, cloned or overproduced. In this work, we advance the state-of-the-art counterfeit detection of flash memory, which is ...

research-article
Efficient Hierarchical Performance Modeling for Integrated Circuits via Bayesian Co-Learning

With the continuous drive towards integrated circuits scaling, efficient performance modeling is becoming more crucial yet, more challenging. In this paper, we propose a novel method of hierarchical performance modeling based on Bayesian co-learning. We ...

research-article
Public Access
Delay Locking: Security Enhancement of Logic Locking against IC Counterfeiting and Overproduction

Logic locking is a technique that has been proposed to thwart IC counterfeiting and overproduction by untrusted foundry. Recently, the security of logic locking is threatened by a new attack called SAT attack, which can effectively decipher the correct ...

research-article
Coupled circuit/EM simulation for radio frequency circuits

In radio frequency (RF) circuits the lumped model assumptions are often not valid anymore. To circumvent this problem, mixed-level circuit/electro-magnetic/device simulation allows the use of Maxwell's and semiconductor equations for the critical ...

research-article
Public Access
Secure and Reliable XOR Arbiter PUF Design: An Experimental Study based on 1 Trillion Challenge Response Pair Measurements

This paper shows that performing an XOR operation between the outputs of parallel arbiter PUFs generates a more secure output at the expense of reduced stability. In this work, we evaluate the security and stability of XOR PUFs using 1,000,000 randomly ...

research-article
Public Access
ASSURE: Authentication Scheme for SecURE Energy Efficient Non-Volatile Memories

Data tampering threatens data integrity in emerging non-volatile memories (NVMs). Whereas Merkle Tree (MT) memory authentication is effective in thwarting data tampering attacks, it drastically increases cell writes and memory accesses, adversely ...

research-article
Efficient Bayesian Yield Optimization Approach for Analog and SRAM Circuits

Conventional yield optimization approaches rely on accurate yield estimation for given design parameters, which would be computational intensive. In this paper, a novel Bayesian yield optimization approach is proposed for analog and SRAM circuits. An ...

research-article
Public Access
A Scaling Compatible, Synthesis Friendly VCO-based Delta-sigma ADC Design and Synthesis Methodology

Conventional analog/mixed-signal (AMS) circuits design methodology relying heavily on the use of operational amplifiers (opamps) to process signals in voltage-domain (VD) encounters severe difficulties in advanced nanometer-scale CMOS process. We ...

research-article
On Mitigation of Side-Channel Attacks in 3D ICs: Decorrelating Thermal Patterns from Power and Activity

Various side-channel attacks (SCAs) on ICs have been successfully demonstrated and also mitigated to some degree. In the context of 3D ICs, however, prior art has mainly focused on efficient implementations of classical SCA countermeasures. That is, ...

research-article
Extensibility-Driven Automotive In-Vehicle Architecture Design: Invited

Increasingly more software-based applications are being developed and deployed in modern vehicles. As a result, the extensibility of a system design has become an important issue in order to accommodate more future applications and update of existing ...

research-article
Cryo-CMOS Electronic Control for Scalable Quantum Computing: Invited

Quantum computers1 could revolutionize computing in a profound way due to the massive speedup they promise. A quantum computer comprises a cryogenic quantum processor and a classical electronic controller. When scaling up the cryogenic quantum processor ...

research-article
PriSearch: Efficient Search on Private Data

We propose PriSearch, a provably secure methodology for two-party string search. The scenario involves two parties, Alice (holding a query string) and Bob (holding a text), who wish to perform a string search while keeping both the query and the text ...

research-article
Extensibility in Automotive Security: Current Practice and Challenges: Invited

A modern automotive design contains over a hundred microprocessors, several cyber-physical modules, connectivity to a variety of networks, and several hundred megabytes of software. The future is anticipated to see an even sharper rise in complexity of ...

research-article
An Architecture for Learning Stream Distributions with Application to RNG Testing

Learning cumulative distribution functions (CDFs) is a widely studied problem in data stream summarization. While current techniques have efficient software implementations, their efficiency depends on updates to data structures that are not easily ...

research-article
Dynamic Platforms for Uncertainty Management in Future Automotive E/E Architectures: Invited

Current automotive E/E architectures are comprised of hardware and software and are mostly designed in a monolithic approach, static over the lifetime of the vehicle. Design, implementation and updates are mostly performed on a per-component-basis, ...

Index Terms

  1. Proceedings of the 54th Annual Design Automation Conference 2017
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Acceptance Rates

        Overall Acceptance Rate1,770of5,499submissions,32%
        YearSubmittedAcceptedRate
        DAC '0765915223%
        DAC '0362815224%
        DAC '0249114730%
        DAC '9945115434%
        DAC '9740013935%
        DAC '9637714238%
        DAC '9426010038%
        DAC '9042712529%
        DAC '8946515634%
        DAC '8840012531%
        DAC '8735113839%
        DAC '8630012441%
        DAC '8429011640%
        Overall5,4991,77032%