{"title":"Piezoelectric CMOS Charger: Highest Output-Power Design","authors":"Siyu Yang, G. Rincón-Mora","doi":"10.1109/ISQED48828.2020.9137018","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9137018","url":null,"abstract":"Wireless microsensors and internet of things that add intelligence to the surroundings need ambient energy to extend life and expand functionality. Piezoelectric transducer can turn vibrations into electrical charge, and with the recycling bridge power stage, it can keep the highest voltage across the transducer and output the most power into the battery. This paper examines how to design the optimum recycling bridge power stage. Specifically, this paper theorizes the optimum size of the switches, the optimum inductor, and how to operate the circuit so that it losses the least power. The ohmic loss should equal charge loss to yield the lowest total loss on a MOSFET switch. The loss on the switches and the inductor are co-optimized. The switched inductor charger is optimized for discontinuous conduction mode. The resulting optimized power stage is 92% efficient.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rehabilitation System for Limbs using IMUs","authors":"Chun-Jui Chen, Yi-Ting Lin, Chia-Chun Lin, Yung-Chih Chen, Yun-Ju Lee, Chun-Yao Wang","doi":"10.1109/ISQED48828.2020.9137026","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9137026","url":null,"abstract":"In this work, we present an IMU-based rehabilitation system for upper and lower limbs. This system uses two wearable IMU sensors to detect rehabilitation motions of patients suffering from frozen shoulder, knee surgery, and hip surgery. The sensors are also connected to a smartphone via Bluetooth, and an Android APP is designed to show the correctness and the statistics of the rehabilitation exercises. The experimental results show that the average errors of knee angle, and elbow angle are both less than 5°. The average recognition rates of all the rehabilitation exercises are larger than 85%.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121392093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Scalable FPGA Engine for Parallel Acceleration of Singular Value Decomposition","authors":"Yu Wang, Jeong-Jun Lee, Yu Ding, Peng Li","doi":"10.1109/ISQED48828.2020.9137055","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9137055","url":null,"abstract":"Singular value decomposition (SVD) is a fundamental computational kernel and tool wildly used in data analytics such as least squares regression, principle components analysis (PCA), and pattern recognition. While a number of dedicated hardware processors have been proposed to accelerate the computationally intensive SVD computation, these designs suffer from poor flexibly and scalability, and/or lack full consideration of compute and data movement challenges associated with SVD. This paper presents a scalable parallel SVD FPGA engine based on the Hestenes-Jacobi method. We propose a so-called Maximum Data Sharing (MDS) ordering, which maximizes on-chip data reuse, and significantly reduces the expensive off-chip data movements and bandwidth requirement. Our SVD engine can flexibly decompose rectangular matrices with variable sizes and speed up SVD computation by $80mathrm{X}$ to $300mathrm{X}$ when compared with software SVD solvers such as the Eigen package running on high-performance CPUs. It can process much larger matrices than the previously reported FPGA designs.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
{"title":"Strong Anti-SAT: Secure and Effective Logic Locking","authors":"Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava","doi":"10.1109/ISQED48828.2020.9136983","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9136983","url":null,"abstract":"Logic locking has been proposed as strong protection of intellectual property (IP) against security threats in the IC supply chain especially when the fabrication facility is untrusted. Such techniques use additional locking circuitry to inject incorrect behavior into the digital functionality when the key is incorrect. A family of attacks known as “SAT attacks” provides a strong mathematical formulation to find the correct key of locked circuits. Many conventional SAT-resilient logic locking schemes fail to inject sufficient error into the circuit when the key is incorrect: there are usually very few (or only one) input minterms that cause any error at the circuit output [18], [20]–[22]. The state-of-the-art stripped functionality logic locking (SFLL) [24] technique provides a wide spectrum of configurations which introduced a trade-off between security (i.e. SAT attack complexity) and effectiveness (i.e. the amount of error injected by a wrong key). In this work, we prove that such a trade-off is universal among all logic locking techniques. In order to attain high effectiveness of locking without compromising security, we propose a novel secure and effective logic locking scheme, called Strong Anti-SAT (SAS). SAS has the following significant improvements over existing techniques. (1) We prove that SAS's security against SAT attack is not compromised by increases in effectiveness. (2) In contrast to prior work which focused solely on the circuit-level locking impact, we integrate SAS-locked modules into an 80386 processor and show that SAS has a high application-level impact. (3) SAS's hardware overhead is smaller than that of existing techniques.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132892228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs","authors":"S. A. Islam, Love Kumar Sah, S. Katkoori","doi":"10.1109/ISQED48828.2020.9137024","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9137024","url":null,"abstract":"Offshoring the proprietary Intellectual property (IP) has recently increased the threat of malicious logic insertion in the form of Hardware Trojan (HT). A potential and stealthy HT is triggered with nets that switch rarely during regular circuit operation. Detection of HT in the host design requires exhaustive simulation to activate the HT during pre- and post-silicon. Although the nets with variable switching probability less than a threshold are primarily chosen as a good candidate for Trojan triggering, there is no systematic fine-grained approach for earlier detection of rare nets from word-level measures of input signals. In this paper, we propose a high-level technique to estimate the nets with the rare activity of arithmetic modules from word-level information. Specifically, for a given module, we use the knowledge of internal construction of the architecture to detect “low activity” and “local regions” without resorting to expensive RTL and other low-level simulations. The presented heuristic method abstracts away from the low-level details of design and describes the rare activity of bits (modules) in a word (architecture) as a function of signal statistics. The resulting quick estimates of nets in rare regions allows a designer to develop a compact test generation algorithm without the knowledge of the bit-level activity. We determine the effect of different positions of the breakpoint in the input signal to calculate the accuracy of the approach. We conduct a set of experiments on six adder architectures and four multiplier architectures. The average error to calculate the rare nets between RTL simulation and estimated values are below 2% in all architectures.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"4 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Transfer Learning on Modeling Physical Unclonable Functions","authors":"Qian Wang, Omid Aramoon, Pengfei Qiu, G. Qu","doi":"10.1109/ISQED48828.2020.9137057","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9137057","url":null,"abstract":"Physical Unclonable Function (PUF) is seen as a promising alternative to traditional cryptographic algorithms for secure and lightweight device authentication for the diverse IoT use cases. However, the essential security of PUF is threatened by a kind of machine learning (ML) based modeling attacks which could successfully impersonate the PUF by using known challenge and response pairs (CPRs). However, existing modeling methods require access to an extremely large set of CRPs which makes them unrealistic and impractical in the real world scenarios. To handle the limitation of available CRPs from the attack perspective, we explore the possibility to transfer a well-tuned model trained with unlimited CRPs to a target PUF with limited number of CRPs. Experimental results show that the proposed transfer learning-based scheme could achieve the same accuracy level with 64% less of CRPs in average. Besides, we also evaluate the proposed transfer learning method with side-channel information and it demonstrates in reducing the number of CRPs significantly.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132026972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SeqL: Secure Scan-Locking for IP Protection","authors":"S. Potluri, Aydin Aysu, Akash Kumar","doi":"10.1109/ISQED48828.2020.9136991","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9136991","url":null,"abstract":"Existing logic-locking attacks are known to successfully decrypt functionally correct key of a locked combinational circuit. It is possible to extend these attacks to real-world Silicon-based Intellectual Properties (IPs, which are sequential circuits) through scan-chains by selectively initializing the combinational logic and analyzing the responses. In this paper, we propose SeqL, which achieves functional isolation and locks selective flip-flop functional-input/scan-output pairs, thus rendering the decrypted key functionally incorrect. We conduct a formal study of the scan-locking problem and demonstrate automating our proposed defense on any given IP. We show that SeqL hides functionally correct keys from the attacker, thereby increasing the likelihood of the decrypted key being functionally incorrect. When tested on pipelined combinational benchmarks (ISCAS, MCNC), sequential benchmarks (ITC) and a fully-fledged RISC-V CPU, SeqL gave 100% resilience to a broad range of state-of-the-art attacks including SAT [1], Double-DIP [2], HackTest [3], SMT [4], FALL [5], Shift-and-Leak [6] and Multi-cycle attacks [7].","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132086047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xianwei Cheng, Hui-Qun Zhao, M. Kandemir, S. Mohanty, Beilei Jiang, Marzieh Vaeztourshizi, M. Kamal, M. Pedram, Mohammad Nasim Imtiaz Khan, Chak Yuen Cheng, Sung-Hao Lin, Abdullah Ash, Swaroop Ghosh
{"title":"ISQED'20 Best Papers","authors":"Xianwei Cheng, Hui-Qun Zhao, M. Kandemir, S. Mohanty, Beilei Jiang, Marzieh Vaeztourshizi, M. Kamal, M. Pedram, Mohammad Nasim Imtiaz Khan, Chak Yuen Cheng, Sung-Hao Lin, Abdullah Ash, Swaroop Ghosh","doi":"10.1109/ISQED48828.2020.9137010","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9137010","url":null,"abstract":"ISQED'20 Best Papers","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"192 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134192325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-Graph Approach to Temperature Dependent Skew Scheduling","authors":"M. Kaneko","doi":"10.1109/ISQED48828.2020.9137032","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9137032","url":null,"abstract":"Temperature is one of the major sources of delay variability which may cause timing violations. In this paper, a novel design method of temperature dependent intentional skew is proposed in order to improve the performances (clock frequency, operating temperature range, etc.) of a sequential circuit under the temperature dependent delay variability. Our approach is based on a constraint graph which consists of two subgraphs and edges for bridging these two subgraphs. One subgraph is for representing constraints at a specified low-end operating temperature, another subgraph is for constraints at a high-end temperature, and bridging edges constrain the relation between the amounts of skew at the low-end and high-end temperatures reflecting the characteristics of the temperature dependency of intentional skews. Our approach can handle the mixture of various types of temperature dependent delays of both signal propagation delays in a combinatorial circuit and clock propagation delays for intentional skews.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128965270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiyuan An, Kangjun Bai, Moqi Zhang, Y. Yi, Yifang Liu
{"title":"Deep Neural Network Based Speech Recognition Systems Under Noise Perturbations","authors":"Qiyuan An, Kangjun Bai, Moqi Zhang, Y. Yi, Yifang Liu","doi":"10.1109/ISQED48828.2020.9136978","DOIUrl":"https://doi.org/10.1109/ISQED48828.2020.9136978","url":null,"abstract":"Automatic speech recognition, which plays an important role in human-computer interactions, is the cornerstone of communication between human and smart devices. In the past few years, deep neural networks (DNNs) have been deployed in automatic speech recognition with great success. However, recent research has discovered that DNNs are not robust against small perturbations. In this work, we investigate the capability of noise immunity in various neural network models through the speech recognition task. When the noise is introduced into the original speech audio, our experimental results demonstrate that the phoneme error rate (PER) degrades as the signal-to-noise ratio (SNR) reduces across all evaluated neural network models. On the other hand, when the noise is introduced into the Mel-frequency cepstral coefficient (MFCC) features, the multilayer perceptron (MLP) network model outperforms all other recurrent neural network (RNN) models.","PeriodicalId":225828,"journal":{"name":"2020 21st International Symposium on Quality Electronic Design (ISQED)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127363778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}