Zhou Zhao, Xinlu Chen, A. Srivastava, Lu Peng, S. Mohanty
{"title":"Compact Modeling of Graphene Barristor for Digital Integrated Circuit Design","authors":"Zhou Zhao, Xinlu Chen, A. Srivastava, Lu Peng, S. Mohanty","doi":"10.1109/ISVLSI.2017.104","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.104","url":null,"abstract":"Graphene barristor, in which a Schottky barrier formed between graphene layer and silicon layer can widen the bandgap with the control of gate voltage, is a promising method to enhance on/off current ratio in digital circuit design. In this work, a theoretical study is presented based on analog behavior modeling in SPICE. We have developed a compact device model to evaluate the performance of graphene barristors. The device simulation results show the on/off current ratio nearly 105 under the voltage variation which agrees closely with the reported experimental results. A complementary inverter is designed using the developed model to prove the feasibility of graphene barristor for use in future digital VLSI design. The energy per switching is between 1.1±0.52fJ under voltage variation.","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128733415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Brocard, B. Mathieu, J. Colonna, C. Santos, C. Fenouillet-Béranger, C. Lu, G. Cibrario, L. Brunet, P. Batude, F. Andrieu, S. Thuries, O. Billoint
{"title":"Transistor Temperature Deviation Analysis in Monolithic 3D Standard Cells","authors":"M. Brocard, B. Mathieu, J. Colonna, C. Santos, C. Fenouillet-Béranger, C. Lu, G. Cibrario, L. Brunet, P. Batude, F. Andrieu, S. Thuries, O. Billoint","doi":"10.1109/ISVLSI.2017.100","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.100","url":null,"abstract":"This study focuses on temperature deviation during operation of transistors inside a monolithic 3D standard cell built on two tiers. Early assessment of this topic is crucial to manage circuit design and requires both steady-state and transient thermal analysis at transistor level. A representative 3D standard cell in 14nm FDSOI technology is considered, using intermediate Back-End-Of-Line (iBEOL) and top tier BEOL. Steady-state and transient power dissipations in NMOS and PMOS are extracted from SPICE simulations with variables such as output load capacitance and operating temperature. 3D thermal simulations are then performed to assess the impact of design parameters such as routing densities, thicknesses of iBEOL and BEOL, their number of metal layers and packaging techniques. Steady-state and transient thermal simulations enable precise analysis to correlate temperature deviation of transistors with these parameters. Design guidelines are provided to limit the temperature deviation between top and bottom tier which can reach 7°Celsius during circuit operations in the worst case","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128817136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eleonora Testa, O. Zografos, Mathias Soeken, A. Vaysset, M. Manfrini, R. Lauwereins, G. Micheli
{"title":"Inverter Propagation and Fan-Out Constraints for Beyond-CMOS Majority-Based Technologies","authors":"Eleonora Testa, O. Zografos, Mathias Soeken, A. Vaysset, M. Manfrini, R. Lauwereins, G. Micheli","doi":"10.1109/ISVLSI.2017.37","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.37","url":null,"abstract":"Traditional logic synthesis faces challenges of meeting the requirements demanded by the many emerging nanotech-nologies that are based on logic models different from standard CMOS. Several emerging nanodevices including Quantum-dot Cellular Automata (QCA) and Spin Torque Majority Gates (STMG) are based on majority logic. In addition, technology constraints require to restrict the number of fan-outs or impose difficulties in realizing inversions. In this paper, we use a majority-based logic synthesis approach to synthesize inversion-free networks with restricted fan-out. We propose one algorithm that propagates all inversions to the primary inputs and another algorithm that limits the number of fan-outs of each majority gate. These algorithms show significant impact on QCA- and STMG-based circuits. Experimental results demonstrate that the average area-delay-energy product can be improved by 3.1× in QCA-based circuits and from 2.9× to 8.1× for STMG-based circuits.","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Martha Johanna Sepúlveda, Mathieu Gross, A. Zankl, G. Sigl
{"title":"Exploiting Bus Communication to Improve Cache Attacks on Systems-on-Chips","authors":"Martha Johanna Sepúlveda, Mathieu Gross, A. Zankl, G. Sigl","doi":"10.1109/ISVLSI.2017.57","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.57","url":null,"abstract":"Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). Given the continuous distribution of IoT devices, data confidentiality and user privacy are of utmost importance. However, with the growing complexity of SoCs, the risk of malware infections and trojans introduced at design time increases significantly. A vital threat to system security are so-called side-channel attacks based on cache observations. While mainly studied on desktop and server systems, recent publications have analyzed cache attacks on mobile devices and network-on-chip platforms. In this work, we investigate cache attacks on System-on-Chips implementing bus based communication. To this end, we present two contributions. First, we demonstrate an improved Prime+Probe based cache attack on AES-128 that, for the first time, exploits the bus communication to increase its efficiency. Second, we integrate two countermeasures (Shuffling and Mini-table) and evaluate their impact on the attack. The results show that our improved attack recovers the full key twice as fast as Prime+Probe without exploiting bus communication. Moreover, we propose protection techniques that are feasible and effectively mitigate both original and improved attack.","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"1042 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131624952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PACT: Priority-Aware Phase-Based Cache Tuning for Embedded Systems","authors":"Sam Gianelli, Tosiron Adegbija","doi":"10.1109/ISVLSI.2017.77","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.77","url":null,"abstract":"Due to the cache's significant impact on an embedded system, much research has focused on cache optimizations, such as reduced energy consumption or improved performance. However, throughout an embedded system's lifetime, the system may have different optimization priorities, due to variable operating conditions and requirements. Variable optimization priorities, embedded systems' stringent design constraints, and the fact that applications typically have execution phases with varying runtime resource requirements, necessitate new robust optimization techniques that can dynamically adapt to different optimization goals. In this paper, we present priority-aware phase-based cache tuning (PACT), which tunes an embedded system's cache at runtime in order to dynamically adhere the cache configurations to varying optimization goals (specifically EDP, energy, and execution time), application execution phases, and operating conditions, while accruing minimal runtime overheads.","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132851555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Workload Characterization for the Internet of Medical Things (IoMT)","authors":"Ankur Limaye, Tosiron Adegbija","doi":"10.1109/ISVLSI.2017.60","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.60","url":null,"abstract":"We perform an extensive study of medical applications that will potentially execute on the Internet of Medical Things (IoMT), from an edge computing perspective. Using this study, we perform a workload characterization of potential IoMT applications and explore the microarchitecture implications of these applications. Our study includes workloads spanning a variety of medical applications including medical image processing algorithms, inverse Radon transform, and implantable heart monitors. We compare these workloads' characteristics to an existing embedded systems benchmark suite, MiBench, to reveal their differences and similarities. The analysis presented herein will enable the study and design of right-provisioned microprocessors for the IoMT, and provide a framework for studying the execution characteristics of workloads in other emerging Internet of Things application domains.","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116601669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. S. Kumar, S. Sahoo, Abhishek Mahapatra, Ayass Kant Swain, K. Mahapatra
{"title":"A Flexible Pay-per-Device Licensing Scheme for FPGA IP Cores","authors":"K. S. Kumar, S. Sahoo, Abhishek Mahapatra, Ayass Kant Swain, K. Mahapatra","doi":"10.1109/ISVLSI.2017.123","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.123","url":null,"abstract":"FPGA based product development companies need third party IP cores to complete the product design time effectively and cost effectively. The one-time payment upfront licensing of IP cores is impractical for FPGA based products, which does not benefit either IP core vendors or product engineering companies. There is a need for good competitive pricing scheme which benefit product development companies and also secure the revenue to IP core vendors. The Pay-per-Device (PPD) pricing model scheme is a suitable pricing scheme. The PPD pricing schemes proposed in the past are complex in terms of communication between different stake holders and inflexible for product development companies to change the FPGA vendor. In this paper, we propose a PPD pricing scheme which overcomes the disadvantages of earlier techniques with better key management and without compromising the security of IP cores. The product development company can change the FPGA vendor at any time in the product life cycle by incorporating the proposed PPD pricing model. The proposed scheme is verified on Xilinx Artix-7 series FPGA.","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132778677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adiabatic Computing Based Low-Power and DPA-Resistant Lightweight Cryptography for IoT Devices","authors":"H. Thapliyal, T. S. S. Varun, S. D. Kumar","doi":"10.1109/ISVLSI.2017.115","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.115","url":null,"abstract":"Internet of Things (IoT) devices are mostly small and operate wirelessly on limited battery supply, and therefore have stringent constraints on power consumption and hardware resources. Lightweight cryptography (LWC) provides cryptographic solutions for resource-constrained IoT devices. LWC based IoT devices are vulnerable to side-channel attacks such as Differential Power Analysis (DPA). The existing CMOS-based countermeasures for DPA are not suitable for circuits working under energy constraints. Adiabatic logic is one of the promising computing paradigms to design energy-efficient and DPAresistant hardware. Therefore, we have investigated the usefulness of adiabatic logic for low-power and DPA-resistant LWC for IoT devices. In this paper, the PRESENT-80 LWC algorithm is used as a benchmark circuit. The PRESENT-80 algorithm is implemented using Symmetric Pass Gate Adiabatic Logic (SPGAL). SPICE simulations at 12.5 MHz validated that one round of PRESENT-80 implemented using SPGAL gates saves 83% and 91% of power consumption in comparison to CMOS and SABL (Sense Amplifier Based Logic) based implementations, respectively. The security of SPGAL based PRESENT-80 has been evaluated by performing a DPA attack through SPICE simulations. We proved that the SPGAL-based implementation of the PRESENT-80 algorithm is resistant to DPA attacks. Further, low-leakage nano-electronic device FinFET can provide powerefficient solutions for IoT devices. Therefore, the design of the PRESENT-80 algorithm using FinFET based SPGAL gates is also presented. The simulations proved that adiabatic FinFET circuits consume low-power and are more resistant to DPA attacks as compared to adiabatic CMOS circuits.","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134195801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hierarchical and Programmable OTA-C Filter","authors":"M. Bhanja, B. Ray","doi":"10.1109/ISVLSI.2017.95","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.95","url":null,"abstract":"A systematic synthesis approach for designing a voltage-mode multifunction operational transconductance amplifier (OTA)-C biquadratic has been described using programmable first order filter. The proposed filter shows lower sensitivities, high frequency response, lower output noise. The proposed second order filter has been converted to third order butterworth and elliptic filter employing a single capacitor. Hierarchical analysis has been maintained through the synthesis of higher order band pass filter (BPF) and high pass filter (HPF) using the proposed biquadratic. All the proposed theory are validated with SPICE simulations.","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131468079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. SudeendraKumar, S. Sahoo, Abhishek Mahapatra, Ayass Kant Swain, K. Mahapatra
{"title":"Analysis of Side-Channel Attack AES Hardware Trojan Benchmarks against Countermeasures","authors":"K. SudeendraKumar, S. Sahoo, Abhishek Mahapatra, Ayass Kant Swain, K. Mahapatra","doi":"10.1109/ISVLSI.2017.106","DOIUrl":"https://doi.org/10.1109/ISVLSI.2017.106","url":null,"abstract":"Hardware Trojan (HT) is one of the well known hardware security issue in research community in last one decade. HT research is mainly focused on HT detection, HT defense and designing novel HT's. HT's are inserted by an adversary for leaking secret data, denial of service attacks etc. Trojan benchmark circuits for processors, cryptography and communication protocols from Trust-hub are widely used in HT research. And power analysis based side channel attacks and designing countermeasures against side channel attacks is a well established research area. Trust-Hub provides a power based side-channel attack promoting Advanced Encryption Standard (AES) HT benchmarks for research. In this work, we analyze the strength of AES HT benchmarks in the presence well known side-channel attack countermeasures. Masking, Random delay insertion and tweaking the operating frequency of clock used in sensitive operations are applied on AES benchmarks. Simulation and power profiling studies confirm that side-channel promoting HT benchmarks are resilient against these selected countermeasures and even in the presence of these countermeasures; an adversary can get the sensitive data by triggering the HT.","PeriodicalId":187936,"journal":{"name":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134020274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}