2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)最新文献

筛选
英文 中文
The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks 使用CMOS FD-SOI而不是CMOS本体来增强ic抵御激光攻击的情况
J. Dutertre, V. Beroulle, P. Candelier, Louis-Barthelemy Faber, M. Flottes, P. Gendrier, D. Hély, R. Leveugle, P. Maistri, G. D. Natale, Athanasios Papadimitriou, B. Rouzeyre
{"title":"The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks","authors":"J. Dutertre, V. Beroulle, P. Candelier, Louis-Barthelemy Faber, M. Flottes, P. Gendrier, D. Hély, R. Leveugle, P. Maistri, G. D. Natale, Athanasios Papadimitriou, B. Rouzeyre","doi":"10.1109/IOLTS.2018.8474230","DOIUrl":"https://doi.org/10.1109/IOLTS.2018.8474230","url":null,"abstract":"At first used to emulate the effects of radioactive ionizing particules passing through integrated circuits (ICs), laser illumination is also used to inject faults into the computations of secure ICs for the purpose of retrieving secret data. The CMOS FD-SOI technology is expected to be less sensitive to laser faults injection than the more usual CMOS bulk technology. We report in this work an experimental assessment of the interest of using FD-SOI rather than CMOS bulk to decrease laser sensitivity. Our experiments were conducted on test chips at the 28nm node for both technologies with laser pulse durations in the picosecond and nanosecond ranges.","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132116168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Self-Stabilizing High-Speed Communication in Multi-Synchronous GALS Architectures 多同步GALS体系结构中的自稳定高速通信
Martin Perner, U. Schmid
{"title":"Self-Stabilizing High-Speed Communication in Multi-Synchronous GALS Architectures","authors":"Martin Perner, U. Schmid","doi":"10.1109/IOLTS.2018.8474221","DOIUrl":"https://doi.org/10.1109/IOLTS.2018.8474221","url":null,"abstract":"We describe a simple self-stabilizing point-to-point communication protocol for multi-synchronous GALS (globally asynchronous locally synchronous) systems. Its implementation is based on a ring buffer, which compensates for the clock deviations of sender and receiver. Read and write pointers separated by a suitable offset facilitate metastability-free operation without the need for synchronizers. We conduct a detailed analysis of the required buffer size and offset, which allows to tailor the protocol to given clock parameters like frequency bounds and synchronization precision. Simulation results obtained by means of a VHDL implementation of our approach prove its practical feasibility.","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130966227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-Cost Soft Error Tolerant Read Circuit for Single/Multi-Level Cross-Point RRAM Arrays 用于单/多级交叉点RRAM阵列的低成本软容错读电路
Hossein Bardareh, Amir M. Hajisadeghi, H. Zarandi
{"title":"A Low-Cost Soft Error Tolerant Read Circuit for Single/Multi-Level Cross-Point RRAM Arrays","authors":"Hossein Bardareh, Amir M. Hajisadeghi, H. Zarandi","doi":"10.1109/IOLTS.2018.8474076","DOIUrl":"https://doi.org/10.1109/IOLTS.2018.8474076","url":null,"abstract":"Although RRAM as an emerging non-volatile memory has solved many dr awbacks of conventional memor ies, it has deficiencies needed to be maintained. The objective of this paper is to suppress the soft er ror susceptibility of CMOSbased peripheral read circuits for both SLC and MLC crosspoint RRAM arrays thr ough sizing of tr ansistor s with regard to area, power, and delay constr aints. The results revealed that the soft err or r ate (SER) has improved around 18.4 and 53.7 times mor e than the default sizing in case of fully-robust sizing besides minor area overhead for both SLC and MLC RRAM ar r ays, respectively. However, the static power and delay of MLC ar r ay are the overheads.","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performances VS Reliability: how to exploit Approximate Computing for Safety-Critical applications 性能VS可靠性:如何在安全关键应用中利用近似计算
G. Rodrigues, F. Kastensmidt, V. Pouget, A. Bosio
{"title":"Performances VS Reliability: how to exploit Approximate Computing for Safety-Critical applications","authors":"G. Rodrigues, F. Kastensmidt, V. Pouget, A. Bosio","doi":"10.1109/IOLTS.2018.8474122","DOIUrl":"https://doi.org/10.1109/IOLTS.2018.8474122","url":null,"abstract":"Approximate Computing (AxC) paradigm aims at designing energy-efficient systems, saving computational resources, and presenting better execution times. AxC aims to selectively violate the specifications, trading accuracy off for efficiency. It has been demonstrated in the literature the effectiveness of imprecise computation for both software and hardware components implementing inexact algorithms, showing an inherent resiliency to errors. On the other hand, the hidden cost of AxC is the reduction on the inherent resiliency to errors of an application. This paper aims at analyzing the impact of AxC on the reliability.","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126427106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
[Title page] (标题页)
{"title":"[Title page]","authors":"","doi":"10.1109/iolts.2018.8474102","DOIUrl":"https://doi.org/10.1109/iolts.2018.8474102","url":null,"abstract":"","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133667544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive ECC Techniques for Reliability and Yield Enhancement of Phase Change Memory 提高相变存储器可靠性和良率的自适应ECC技术
Shyue-Kung Lu, Hui-Ping Li, K. Miyase
{"title":"Adaptive ECC Techniques for Reliability and Yield Enhancement of Phase Change Memory","authors":"Shyue-Kung Lu, Hui-Ping Li, K. Miyase","doi":"10.1109/IOLTS.2018.8474118","DOIUrl":"https://doi.org/10.1109/IOLTS.2018.8474118","url":null,"abstract":"The yield and reliability issues are important challenges for the emerging phase change memory (PCM). Hard repair techniques based on fault replacement and error correction codes are usually used to cure these dilemmas. However, the probability of occurring permanent faults is low and soft errors are not a main threat for PCM, equipping ECC for each data word will waste a lot of storage space. Therefore, an adaptive ECC technique is proposed to solve this drawback. The main idea is to equip ECC for memory words when they are detected faulty. A separated ECC DRAM is used for storing the check bits. According to experimental results, the degradation of repair rate is almost negligible. However, the hardware overhead is at least 70% lower than the original ECC technique.","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis 老化对模板分析检测硬件木马的影响
Naghmeh Karimi, J. Danger, S. Guilley
{"title":"On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis","authors":"Naghmeh Karimi, J. Danger, S. Guilley","doi":"10.1109/IOLTS.2018.8474089","DOIUrl":"https://doi.org/10.1109/IOLTS.2018.8474089","url":null,"abstract":"With the outsourcing of design flow, ensuring the security and trustworthiness of integrated circuits has become more challenging. Potential malicious modification of circuits, so-called Hardware Trojans Horses (HTH), has emerged as a major security threat. When triggered, the HTH delivers its payload resulting in denial of service, decreasing the device performance, or leaking sensitive information. Deploying VLSI testing schemes to detect HTH may fail in most cases as HTH are designed such that they are rarely activated. Side-channel analysis schemes have a higher detection coverage. The template analysis is the most powerful side-channel tool from an information theoretic point of view. In this paper, we focus on the template analysis used for detecting HTH in cryptographic devices, and study the effect of device aging on the success of these HTH detection schemes. Due to aging, electrical specifications of transistors, and in turn the power signatures used by template schemes change over time. We focus on Negative-Bias Temperature Instability and Hot-Carrier Injection aging mechanisms. We use the PRESENT cipher as a target, and mount several template attacks at different aging times on target devices and a genuine device used as reference. We deduce the authenticity of the target devices based on the attack success rates obtained by template analysis. Our results show that aging makes template-based HTH detection easier as it needs less traces in old devices compared to the new one (137 traces for a 20-week old device versus 195 traces for a new one).","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117065015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Emulation of an ASIC Power, Temperature and Aging Monitor System for FPGA Prototyping 基于FPGA原型的ASIC功率、温度和老化监测系统仿真
A. Listl, Daniel Mueller-Gritschneder, F. Kluge, Ulf Schlichtmann
{"title":"Emulation of an ASIC Power, Temperature and Aging Monitor System for FPGA Prototyping","authors":"A. Listl, Daniel Mueller-Gritschneder, F. Kluge, Ulf Schlichtmann","doi":"10.1109/IOLTS.2018.8474284","DOIUrl":"https://doi.org/10.1109/IOLTS.2018.8474284","url":null,"abstract":"Technology scaling has enabled the fabrication of Multi-Processor Systems-on-Chips (MPSoCs), which satisfy the ever growing demand for performance, while continuously reducing the chip size. Thus, scaling has also led to new challenges such as increasing power densities, which critically influence the chip temperatures and accelerate device degradation due to aging. Runtime power management can be utilized to counter these reliability threats to increase the lifetime of a system. For the development of runtime power management strategies monitoring data for power, temperature and aging is required. In this paper we propose a real-time power, temperature and aging monitor system (eTAPMon) for FPGA prototypes of MPSoCs. The monitor system emulates data characterized from the target ASIC design. The emulation approach models the behavior of ASIC power monitors based on an instruction-level energy model, temperature monitors based on a linear regression model obtained from thermal offline simulations and aging monitors based on a critical path model to compute the decreasing timing margin due to aging. An accelerated aging emulation is possible to predict aged ASIC behavior. Hence, this FPGA emulation enables the early evaluation of runtime power management strategies.","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115169187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Error Resilient Neuromorphic Networks Using Checker Neurons 使用检查神经元的错误弹性神经形态网络
Sujay Pandey, Suvadeep Banerjee, A. Chatterjee
{"title":"Error Resilient Neuromorphic Networks Using Checker Neurons","authors":"Sujay Pandey, Suvadeep Banerjee, A. Chatterjee","doi":"10.1109/IOLTS.2018.8474075","DOIUrl":"https://doi.org/10.1109/IOLTS.2018.8474075","url":null,"abstract":"The last decade has seen tremendous advances in the application of artificial neural networks to solving problems that mimic human intelligence. Many of these systems are implemented using traditional digital compute engines where errors can occur during memory accesses or during numerical computation. While such networks are inherently error resilient, specific errors can result in incorrect decisions. This work develops a low overhead error detection and correction approach for multilayer artificial neural networks, here the hidden layer functions are approximated using checker neurons. Experimental results show that a high coverage of injected errors can be achieved with extremely low computational overhead using consistency properties of the encoded checks. A key side benefit is that the checks can flag errors when the network is presented outlier data that do not correspond to data with which the network is trained to operate.","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"2023 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cross-Layer Control Adaptation for Autonomous System Resilience 自治系统弹性的跨层控制自适应
Md Imran Momtaz, Suvadeep Banerjee, Sujay Pandey, J. Abraham, A. Chatterjee
{"title":"Cross-Layer Control Adaptation for Autonomous System Resilience","authors":"Md Imran Momtaz, Suvadeep Banerjee, Sujay Pandey, J. Abraham, A. Chatterjee","doi":"10.1109/IOLTS.2018.8474159","DOIUrl":"https://doi.org/10.1109/IOLTS.2018.8474159","url":null,"abstract":"The last decade has seen tremendous advances in the transformation of ubiquitous control, computing and communication platforms that are anytime, anywhere. These platforms allow humans to interact with machines through sensing, control and actuation functions in ways not imaginable a few decades ago. While robust control techniques aim to maintain autonomous system performance in the presence of bounded modeling errors, they are not designed to manage large multi- parameter variations and internal component failures that are inevitable during lengthy periods of field deployment. To address the trustworthiness of autonomous systems in the field, we propose a cross-layer error resilience approach in which errors are detected and corrected at appropriate levels of the design (hardware-through software) with the objective of minimizing the latency of error recovery while maintaining high failure coverage. At the control processor level, soft errors in the digital control processor are considered. At the system level, sensor and actuator failures are analyzed. These impairments define the health of the system. A methodology for adapting the control procedure of the autonomous system to compensate for degraded system health is proposed. It is shown how this methodology can be applied to simple linear and nonlinear control systems to maintain system performance in the presence of internal component failures. Experimental results demonstrate the feasibility of the proposed methodology.","PeriodicalId":241735,"journal":{"name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信