- Sponsor:
- sigda
No abstract available.
Proceeding Downloads
Age-aware Logic and Memory Co-Placement for RRAM-FPGAs
Resistive RAM (RRAM) is a promising non-volatile memory (NVM) device which can replace traditional SRAM as on-chip storage for logic and data in FPGAs. While RRAM outperforms SRAM by offering high scalability, low leakage power, and near-zero power-on ...
Ivory: Early-Stage Design Space Exploration Tool for Integrated Voltage Regulators
Despite being employed in burgeoning efforts to improve power delivery efficiency, integrated voltage regulators (IVRs) have yet to be evaluated in a rigorous, systematic, or quantitative manner. To fulfill this need, we present Ivory, a high-level ...
Multi-variable Dynamic Power Management for the GPU Subsystem
- Pietro Mercati,
- Raid Ayoub,
- Michael Kishinevsky,
- Eric Samson,
- Marc Beuchat,
- Francesco Paterna,
- Tajana Šimunić Rosing
In this work, we present a control-theoretic algorithm to improve the energy efficiency of the GPU targeting deadline-driven graphics applications. Our algorithm dynamically controls multiple power knobs within the GPU (DVFS and number of active slices) ...
Maximizing Forward Progress with Cache-aware Backup for Self-powered Non-volatile Processors
Energy harvesting is replacing battery to power embedded systems such as Internet of Things and wearable devices. Unstable energy supply brings challenges to energy harvesting powered system, resulting in frequent interruptions. Non-volatile processor ...
Adaptive Thermal Management for 3D ICs with Stacked DRAM Caches
We describe an adaptive thermal management system for 3D-ICs with stacked DRAM cache memories. We present a detailed analysis of the impact of 3D-IC hotspot aggregation on the refresh behavior of the stacked DRAM-based L3 cache. We also present the ...
Toss-up Wear Leveling: Protecting Phase-Change Memories from Inconsistent Write Patterns
Limited write endurance is one of major obstacles to adopt Phase Change Memories (PCMs) in practice as future main memory. Considering process variation (PV) and non-uniform write intensity, PCM cells with low endurance (i.e. weak cells) can wear out in ...
Exploiting Parallelism for Convolutional Connections in Processing-In-Memory Architecture
Deep convolutional neural networks (CNNs) are widely adopted in intelligent systems with unprecedented accuracy but at the cost of a substantial amount of data movement. Although recent development in processing-in-memory (PIM) architecture seeks to ...
3 Channel Dependency-Based Power Model for Mobile AMOLED Displays
Active matrix organic light-emitting diode (AMOLED) displays are being adopted in increasing number of smartphones. Most applications are now based on consistent user interfaces, such as games and instant messaging, and it is therefore crucial to ...
Arbitrary Precision and Complexity Tradeoffs for Gate-Level Information Flow Tracking
Hardware has become an increasingly attractive target for attackers, yet we still largely lack tools that enable us to analyze large designs for security flaws. Information flow tracking (IFT) models provide an approach to verifying a hardware design's ...
Leave the Cache Hierarchy Operation as It Is: A New Persistent Memory Accelerating Approach
Persistent memory places NVRAM on the memory bus, offering fast access to persistent data. Yet maintaining NVRAM data persistence raises a host of challenges. Most proposed schemes either incur much performance overhead or require substantial ...
Ultra-Efficient Processing In-Memory for Data Intensive Applications
Recent years have witnessed a rapid growth in the domain of Internet of Things (IoT). This network of billions of devices generates and exchanges huge amount of data. The limited cache capacity and memory bandwidth make transferring and processing such ...
Secure Information Flow Verification with Mutable Dependent Types
This paper presents a novel secure hardware description language (HDL) that uses an information flow type system to ensure that hardware is secure at design time. The novelty of this HDL lies in its ability to securely share hardware modules and storage ...
RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks
- Mehmet Kayaalp,
- Khaled N. Khasawneh,
- Hodjat Asghari Esfeden,
- Jesse Elwell,
- Nael Abu-Ghazaleh,
- Dmitry Ponomarev,
- Aamer Jaleel
Recently, side-channel attacks on Last Level Caches (LLCs) were demonstrated. The attacks require the ability to evict critical data from the cache hierarchy, making future accesses visible. We propose Relaxed Inclusion Caches (RIC), a low-complexity ...
Toggle MUX: How X-Optimism Can Lead to Malicious Hardware
To highlight a potential threat to hardware security, we propose a methodology to derive a trigger signal from the behavior of Verilog simulation models of field-programmable gate array (FPGA) primitives that behave X-optimistic. We demonstrate our ...
XFC: A Framework for eXploitable Fault Characterization in Block Ciphers
Fault attacks recover secret keys by exploiting faults injected during the execution of a block cipher. However, not all faults are exploitable and every exploitable fault is associated with an offline complexity to determine the key. The ideal fault ...
FFD: A Framework for Fake Flash Detection
Counterfeit electronics have become a big concern in the globalized semiconductor industry where chips might be recycled, remarked, cloned or overproduced. In this work, we advance the state-of-the-art counterfeit detection of flash memory, which is ...
Efficient Hierarchical Performance Modeling for Integrated Circuits via Bayesian Co-Learning
With the continuous drive towards integrated circuits scaling, efficient performance modeling is becoming more crucial yet, more challenging. In this paper, we propose a novel method of hierarchical performance modeling based on Bayesian co-learning. We ...
Delay Locking: Security Enhancement of Logic Locking against IC Counterfeiting and Overproduction
Logic locking is a technique that has been proposed to thwart IC counterfeiting and overproduction by untrusted foundry. Recently, the security of logic locking is threatened by a new attack called SAT attack, which can effectively decipher the correct ...
Coupled circuit/EM simulation for radio frequency circuits
In radio frequency (RF) circuits the lumped model assumptions are often not valid anymore. To circumvent this problem, mixed-level circuit/electro-magnetic/device simulation allows the use of Maxwell's and semiconductor equations for the critical ...
Secure and Reliable XOR Arbiter PUF Design: An Experimental Study based on 1 Trillion Challenge Response Pair Measurements
This paper shows that performing an XOR operation between the outputs of parallel arbiter PUFs generates a more secure output at the expense of reduced stability. In this work, we evaluate the security and stability of XOR PUFs using 1,000,000 randomly ...
ASSURE: Authentication Scheme for SecURE Energy Efficient Non-Volatile Memories
Data tampering threatens data integrity in emerging non-volatile memories (NVMs). Whereas Merkle Tree (MT) memory authentication is effective in thwarting data tampering attacks, it drastically increases cell writes and memory accesses, adversely ...
Efficient Bayesian Yield Optimization Approach for Analog and SRAM Circuits
Conventional yield optimization approaches rely on accurate yield estimation for given design parameters, which would be computational intensive. In this paper, a novel Bayesian yield optimization approach is proposed for analog and SRAM circuits. An ...
A Scaling Compatible, Synthesis Friendly VCO-based Delta-sigma ADC Design and Synthesis Methodology
Conventional analog/mixed-signal (AMS) circuits design methodology relying heavily on the use of operational amplifiers (opamps) to process signals in voltage-domain (VD) encounters severe difficulties in advanced nanometer-scale CMOS process. We ...
On Mitigation of Side-Channel Attacks in 3D ICs: Decorrelating Thermal Patterns from Power and Activity
Various side-channel attacks (SCAs) on ICs have been successfully demonstrated and also mitigated to some degree. In the context of 3D ICs, however, prior art has mainly focused on efficient implementations of classical SCA countermeasures. That is, ...
Extensibility-Driven Automotive In-Vehicle Architecture Design: Invited
Increasingly more software-based applications are being developed and deployed in modern vehicles. As a result, the extensibility of a system design has become an important issue in order to accommodate more future applications and update of existing ...
Cryo-CMOS Electronic Control for Scalable Quantum Computing: Invited
- Fabio Sebastiano,
- Harald Homulle,
- Bishnu Patra,
- Rosario Incandela,
- Jeroen van Dijk,
- Lin Song,
- Masoud Babaie,
- Andrei Vladimirescu,
- Edoardo Charbon
Quantum computers1 could revolutionize computing in a profound way due to the massive speedup they promise. A quantum computer comprises a cryogenic quantum processor and a classical electronic controller. When scaling up the cryogenic quantum processor ...
PriSearch: Efficient Search on Private Data
We propose PriSearch, a provably secure methodology for two-party string search. The scenario involves two parties, Alice (holding a query string) and Bob (holding a text), who wish to perform a string search while keeping both the query and the text ...
Extensibility in Automotive Security: Current Practice and Challenges: Invited
A modern automotive design contains over a hundred microprocessors, several cyber-physical modules, connectivity to a variety of networks, and several hundred megabytes of software. The future is anticipated to see an even sharper rise in complexity of ...
An Architecture for Learning Stream Distributions with Application to RNG Testing
Learning cumulative distribution functions (CDFs) is a widely studied problem in data stream summarization. While current techniques have efficient software implementations, their efficiency depends on updates to data structures that are not easily ...
Dynamic Platforms for Uncertainty Management in Future Automotive E/E Architectures: Invited
Current automotive E/E architectures are comprised of hardware and software and are mostly designed in a monolithic approach, static over the lifetime of the vehicle. Design, implementation and updates are mostly performed on a per-component-basis, ...
Cited By
-
Joshi R and Acken J (2020). Sneak Path Characterization in Memristor Crossbar Circuits, International Journal of Electronics, 10.1080/00207217.2020.1843716, 108:8, (1255-1272), Online publication date: 3-Aug-2021.
-
Pan D, Lin Y, Xu X, Ou J, Gallagher E and Buck P (2017). Machine learning for mask/wafer hotspot detection and mask synthesis Photomask Technology, 10.1117/12.2282943, 9781510613768, (10)
-
Shreyanth S, Harshitha D and Niveditha S (2023). Implementation of Machine Learning in VLSI Integrated Circuit Design, SN Computer Science, 10.1007/s42979-022-01580-5, 4:2
Index Terms
- Proceedings of the 54th Annual Design Automation Conference 2017