{"title":"SeNonDiv: Securing Non-Volatile Memory using Hybrid Memory and Critical Data Diversion","authors":"Arijit Nath, Manik B. Bhosle, H. Kapoor","doi":"10.1109/ISQED51717.2021.9424292","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424292","url":null,"abstract":"The emerging Non-volatile memories are projected as alternatives of traditional DRAM-based main memories. However, their non-volatility feature leads to serious security vulnerabilities. The sensitive data stored in these memories can be easily taken away due to prolonged data retention. A wide variety of encryption-based techniques protect these data at the cost of harmful side effects of encryption algorithms like high encryption/decryption latency and increased encryption induced write activities. It launches a tug-of-war between security provisioning and system performance degradation as well as shortened lifetime of NVMs. In this paper, we propose a data-diversion based technique that protects the security-sensitive data of the applications by allocating the security critical pages in the volatile DRAM part of a DRAM-PCM hybrid main memory system on page faults. Experimental evaluation shows significant improvements in performance and lifetime compared to a partial encryption and a full encryption based technique.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An End-to-end Multi-task Object Detection using Embedded GPU in Autonomous Driving","authors":"Shangli Zhou, Mimi Xie, Yufang Jin, Fei Miao, Caiwen Ding","doi":"10.1109/ISQED51717.2021.9424308","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424308","url":null,"abstract":"Autonomous driving has gained popularity due to its high reliability compared to human drivers. Autonomous vehicles combine variety of sensors to perceive their surroundings, and use deep learning (DL) to extract complicated information from the sensing data. However, there are several challenges: Many DL models have explosive model sizes, and therefore not only time consuming but also power consuming when implementing on embedded systems on vehicles, further degrading the battery life-cycle. The current on-board AI treats lane detection and car location separately. In this paper, we propose an end-to-end multi-task environment detection framework. We fuse the 3D point cloud object detection model and lane detection model, with model compression technique applied. As on-board sensors forward information to the multi-task network, it not only parallel two detection tasks to extract combination information, but also reduces entire running time of the DL model. Experiments show by adding the model compression technique, the running speed of multi-task model improves more than $2times$. Also, running time of lane detection model on Nvidia Jetson TX2 is almost $6times$ less comparing with running on CPU, which shows reasonableness of using embedded AI computing device on autonomous vehicle.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122997968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salma Elmalaki, B. U. Demirel, Mojtaba Taherisadr, Sara Stern-Nezer, Jack J. Lin, M. A. Faruque
{"title":"Towards Internet-of-Things for Wearable Neurotechnology","authors":"Salma Elmalaki, B. U. Demirel, Mojtaba Taherisadr, Sara Stern-Nezer, Jack J. Lin, M. A. Faruque","doi":"10.1109/ISQED51717.2021.9424364","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424364","url":null,"abstract":"This paper outlines the prevalent challenges for the emerging wearable neurotechnology in modern IoT systems. We underline the recent insights in neuroscience and the ability to decode the brain circuitry with high confidence. We address the imminent challenges of translating the advanced high-cost medical setup for neural activity recording to a commodity IoT system. Emphasis is placed on non-invasive wearable sensing technology and the advances in data analytic for neurosignals. In particular, we focus on human-in-the-loop IoT systems where privacy concerns of leaking private human state and energy limitations for local data processing lay significant constraints on such systems’ architecture. Along the way, we envision applications that will reach their full potential and provide the promised functionality by embedding wearable neurotechnology in their design. We end the paper by highlighting the prominent research opportunities and challenges for designing and developing the next generation of low-cost, energy-efficient, privacy-aware, and ubiquitous wearable neurotechnology. Most of these research challenges need to be addressed from a multi-disciplinary approach. Researchers from various communities need to coordinate and collaborate to successfully advance the research, development, and standardization of such neurotechnologies for the larger benefit of society.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123898754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Mirzaeian, J. Kosecka, H. Homayoun, T. Mohsenin, Avesta Sasan
{"title":"Diverse Knowledge Distillation (DKD): A Solution for Improving The Robustness of Ensemble Models Against Adversarial Attacks","authors":"Ali Mirzaeian, J. Kosecka, H. Homayoun, T. Mohsenin, Avesta Sasan","doi":"10.1109/ISQED51717.2021.9424353","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424353","url":null,"abstract":"This paper proposes an ensemble learning model that is resistant to adversarial attacks. To build resilience, we introduced a training process where each member learns a radically distinct latent space. Member models are added one at a time to the ensemble. Simultaneously, the loss function is regulated by a reverse knowledge distillation, forcing the new member to learn different features and map to a latent space safely distanced from those of existing members. We assessed the security and performance of the proposed solution on image classification tasks using CIFAR10 and MNIST datasets and showed security and performance improvement compared to the state of the art defense methods.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117275063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shobhit Belwal, Rajat Bhattacharjya, Kaustav Goswami, D. Banerjee
{"title":"ACLA: An Approximate Carry-Lookahead Adder with Intelligent Carry Judgement and Correction","authors":"Shobhit Belwal, Rajat Bhattacharjya, Kaustav Goswami, D. Banerjee","doi":"10.1109/ISQED51717.2021.9424329","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424329","url":null,"abstract":"Approximate computing in recent times has emerged as a popular alternative to conventional computing techniques. Fault-tolerant applications in the domains of machine learning, signal processing, and computer vision have shown promising results using approximate computing. Approximations on adders and multipliers have been widely proposed in literature and innovations on that front are still a necessity so as to target specific applications. In this paper, an approximate carry-lookahead adder (ACLA) is proposed which makes use of an intelligent approach for judging the carry of subsequent stages. Also, a correction mechanism is proposed so as to hinder substantial accuracy loss. Experimental results show that ACLA is faster than the traditional ripple-carry adder by 70.5% for 32-bit configurations on an average. In terms of accuracy, for 32-bit configurations, ACLA outperforms other state-of-the-art adders such as SARA [1] and BCSA [2] by 51%.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115262025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Correlation between Resource Minimization and Interconnect Complexities in High-Level Synthesis","authors":"S. Dutt, Xiuyan Zhang, Ouwen Shi","doi":"10.1109/ISQED51717.2021.9424266","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424266","url":null,"abstract":"As the technology node of VLSI designs advances to sub10 nm, two interconnect-centric metrics of a circuit, the interconnect complexity (either number of interconnects or wirelength/WL) and congestion, become critically important across all design stages alongside conventional resource or function-unit (FU)-centric metrics like area/number-of-FUs and leakage power. High Level synthesis (HLS), one of the earliest and most impactful design stages, rarely monitors interconnect metrics, which makes their recovery at later stages very difficult. HLS algorithms and tools typically perform FU-centric minimization via operation scheduling, module selection (S&MS) and binding. As a consequence, it mostly overlooks interconnect-based metrics. In this paper, we explore whether this can adversely affect interconnect metrics, and in general explore the correlation between FU-centric optimization in S&MS, and the resulting interconnect metrics co-optimized (along with FU metrics) in the later binding stage(s). For this purpose we develop a probabilistic analysis for post-scheduling binding to estimate interconnect metrics, and verify its accuracy by comparison to empirical results across different scheduling techniques that generate different degrees of FU optimization. Based on both empirical and analytical results we predict how interconnects metrics will pan out with different degrees of FU optimization. Finally, based on our analysis, we also provide suggestions to improve interconnect metrics for whatever FU optimization degree an available S&MS technique can achieve.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115783166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning","authors":"Yuze Wang, Peng Liu, Xiaoxia Han, Yingtao Jiang","doi":"10.1109/ISQED51717.2021.9424314","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424314","url":null,"abstract":"Nowadays malicious vendors can easily insert hardware Trojans into integrated circuit chips as the entire integrated chip supply chain involves numerous design houses and manufacturers on a global scale. It is thereby becoming a necessity to expose any possible hardware Trojans, if they ever exist in a chip. A typical Trojan circuit is made of a trigger and a payload that are interconnected with a trigger net. As trigger net can be viewed as the signature of a hardware Trojan, in this paper, we propose a gate-level hardware Trojan detection method and model that can be applied to screen the entire chip for trigger nets. In specific, we extract the trigger-net features for each net from known netlists and use the machine learning method to train multiple detection models according to the trigger modes. The detection models are used to identify suspicious trigger nets from the netlist of the integrated circuit under detection, and score each net in terms of suspiciousness value. By flagging the top 2% suspicious nets with the highest suspiciousness values, we shall be able to detect majority hardware Trojans, with an average accuracy rate of 96%.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115227673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yutian Gui, A. Siddiqui, Geraldine Shirley Nicholas, Marcus Hughes, F. Saqib
{"title":"A Lightweight Delay-based Authentication Scheme for DMA Attack Mitigation","authors":"Yutian Gui, A. Siddiqui, Geraldine Shirley Nicholas, Marcus Hughes, F. Saqib","doi":"10.1109/ISQED51717.2021.9424262","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424262","url":null,"abstract":"With the extensive application of the Direct Memory Access (DMA) technique, the efficiency of data transfer between the peripheral and the host machine has been improved dramatically. However, these optimizations also introduce security vulnerabilities and expose the process of data transmission to DMA attacks that utilize the feature of direct access to steal the data stored in the live memory on the victim system. In this paper, we propose a lightweight scheme to provide resilience to DMA attacks without physical and protocol-level modification. The proposed scheme constructs a unique identifier for each DMA-supported PCIe device based on profiling time and builds a trusted database for authentication. The experimental result shows that the proposed methodology eliminates most of the noise produced in the measuring process for identifier construction and the success rate of authentication is 100% for all the devices.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126009534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jainaveen Sundaram, S. Gopal, T. Thomas, Edward Burton, E. Ramirez
{"title":"A Reconfigurable Asynchronous SERDES for Heterogenous Chiplet Interconnects","authors":"Jainaveen Sundaram, S. Gopal, T. Thomas, Edward Burton, E. Ramirez","doi":"10.1109/ISQED51717.2021.9424296","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424296","url":null,"abstract":"With advancing packaging technologies, multi-die integration is gaining prominence among players in the semiconductor industry for its ability to create a system with heterogenous functionalities (Digital Logic/High-speed I/O etc. at its most efficient process node) hence improving overall silicon yield. This work presents a source- synchronous die-to-die I/O using a self-timed loop (behaviorally analogous to a gated ring oscillator) that generates high-speed edges, eliminating any power-hungry PLL/DLLs found in traditional die-to-die I/O interfaces. In addition, the proposed asynchronous architecture enables easy reconfigurability of data rates under a small form factor and efficient design-reuse. The scheme achieves a maximum of 4.8Gbps/wire at 0.4pJ/b generating an effective shoreline bandwidth of 1.47Tbps/mm.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123098839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Srinivasa, A. Ramanathan, Jainaveen Sundaram, Dileep Kurian, S. Gopal, Nilesh Jain, Anuradha Srinivasan, R. Iyer, N. Vijaykrishnan, T. Karnik
{"title":"Trends and Opportunities for SRAM Based In-Memory and Near-Memory Computation","authors":"S. Srinivasa, A. Ramanathan, Jainaveen Sundaram, Dileep Kurian, S. Gopal, Nilesh Jain, Anuradha Srinivasan, R. Iyer, N. Vijaykrishnan, T. Karnik","doi":"10.1109/ISQED51717.2021.9424263","DOIUrl":"https://doi.org/10.1109/ISQED51717.2021.9424263","url":null,"abstract":"Changes in application trends along with increasing number of connected devices have led to explosion in the amount of data being generated every single day. Computing systems need to efficiently process these huge amounts of data and generate results, classify objects, stream high quality videos and so on. In-Memory Computing and Near-Memory Computing have been emerged as the popular design choices to address the challenges in executing the above-mentioned tasks. Through In-Memory Computing, SRAM Banks can be repurposed as compute engines while performing Bulk Boolean operations. Near-Memory techniques have shown promise in improving the performance of Machine learning tasks. By carefully understanding the design we describe the opportunities towards amalgamating both these design techniques for obtaining further performance enhancement and achieving lower power budget while executing fundamental Machine Learning primitives. In this work, we take the example of Sparse Matrix Multiplication, and design an I-NMC accelerator which speeds up the index handling by 10x-60x and 10x-70x energy efficiency based on the workload dimensions as compared with non I-NMC solution occupying just 1% of the overall hardware area.","PeriodicalId":123018,"journal":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129955567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}