BEGIN:VCALENDAR
VERSION:2.0
PRODID:DPCALENDAR
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:Europe/Amsterdam
BEGIN:STANDARD
DTSTART:20251026T010000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
END:STANDARD
BEGIN:STANDARD
DTSTART:20261025T010000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20260329T010000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
END:DAYLIGHT
END:VTIMEZONE
X-WR-TIMEZONE:Europe/Amsterdam
BEGIN:VEVENT
DTSTART;TZID=Europe/Amsterdam:20240521T110000
DTEND;TZID=Europe/Amsterdam:20240521T123000
UID:D0552A1C-15B8-4090-85CF-8DC91C6DD9AB
SUMMARY:​​&#x200B​Regular Session 1
CREATED:20240306T145445Z
DTSTAMP:20240306T145445Z
URL:https://ets24.ewi.tudelft.nl/index.php/home/program/conference-program/regular-session-1
DESCRIPTION:\N \N  \N   Moderators:\N  \N  Jaan Raik\N  \N   1\N  \N  , Stephan Eggersglüß\N  \N   2\N  \N \N\N\N \N  \N   Affiliations:\N  \N  \N   1\N  \N  Tallinn University of Technology (EE),\N  \N   2\N  \N  Siemens EDA (DE)\N \N\N\N \N  \N   Faulty Function Extraction for Defective Circuits\N  \N  \N   \N    \N   \N  \N \N \N  \N   \N    Authors:\N   \N   Chris Nigh\N   \N    1\N   \N   , Ruben Purdy\N   \N    1\N   \N   , Wei Li\N   \N    1\N   \N   , Subhasish Mitra\N   \N    2\N   \N   , R.D. Blanton\N   \N    1\N   \N  \N \N \N  \N   \N    Affiliations:\N   \N   \N    1\N   \N   Carnegie Mellon University (US),\N   \N    2\N   \N   Stanford University (US)\N  \N \N \N \N  \N   Abstract:\N  \N \N \N  \N   It is well known that understanding the behavior of silicon failures is an essential step in yield learning. It is also becoming more important for producing high quality silicon due to the increasing number of defects detected fortuitously. In order to meet this need, a new approach for extracting the precise faulty function from defective logic circuits is described. The approach is applied to nearly a 1,000 14nm failures and one use case of the results on improving ATPG is discussed.\N  \N \N \N \N  \N   Biography:\N  \N \N \N  \N   Shawn Blanton is a professor in the Electrical and Computer Engineering Department at Carnegie Mellon University. In 1995, he received his Ph.D. in Electrical Engineering and Computer Science from the University of Michigan, Ann Arbor. His research interests include various aspects of integrated system tests, testable design, and test methodology development.\N  \N \N \N  \N   \N    Time and Space Optimized Storage-based BIST under Multiple Voltages and Variations\N   \N   \N    \N     \N    \N   \N  \N  \N   \N    \N     Authors:\N    \N    Hanieh Jafarzadeh\N    \N     1\N    \N    , Florian Klemme\N    \N     1\N    \N    , Hussam Amrouch\N    \N     1, 3\N    \N    , Sybille Hellebrand\N    \N     2\N    \N    , Hans-Joachim Wunderlich\N    \N     1\N    \N   \N  \N  \N   \N    \N     Affiliations:\N    \N    \N     1\N    \N    University of Stuttgart (DE),\N    \N     2\N    \N    Paderborn University (DE),\N    \N     3\N    \N    Technical University of Munich (DE)\N   \N  \N  \N  \N   \N    Abstract:\N   \N  \N  \N   \N    Logic Built-In Self-Test (LBIST) with stored de- terministic patterns is supported by the major CAD vendors and is gaining increasing attention, especially for safety-critical applications such as automotive. It is used for both manufacturing and periodic in-field testing. An unresolved challenge so far stems from the inevitable process variations. This paper presents the first approach for storage-based BIST addressing delay faults under process variations and multiple voltages. A unified solution for pattern generation, test set compaction and BIST hardware is presented that is compatible with commercial schemes. The solution significantly outperforms traditional N-detect for tran- sition faults in terms of test set size, test application time and fault efficiency.\N   \N  \N  \N  \N   \N    Biography:\N   \N  \N  \N   \N    Hanieh Jafarzadeh graduated with a Bachelor's in Computer Hardware Engineering  at 2016 and a Master's in Computer Architecture at 2019 from Shahid Beheshti University, Tehran.. Since Feb 2021, she's with Prof. Wunderlich's group at university of Stuttgart, researching health state monitoring with the main focus on automatic pattern generation under PVT variations.\N   \N  \N  \N   \N    \N     Test Compression for Neuromorphic Chips\N    \N    \N     \N      \N     \N    \N   \N   \N    \N     \N      Authors:\N     \N     Xin-Ping Chen\N     \N      1\N     \N     , Hsu-Yu Huang\N     \N      1\N     \N     , Chu-Yun Hsiao\N     \N      1\N     \N     , Jennifer Shueh-Inn Hu\N     \N      2\N     \N     , James Chien-Mo Li\N     \N      1\N     \N    \N   \N   \N    \N     \N      Affiliations:\N     \N     \N      1\N     \N     National Taiwan University (TW),\N     \N      2\N     \N     Ming Chuan University (TW)\N    \N   \N   \N   \N    \N     Abstract:\N    \N   \N   \N    \N     We propose test compression techniques to reduce the test time (test configurations and test length) for neuromorphic chips. Our test compression techniques include Dynamic Test Compression (DTC) and Static Test Compression (STC). DTC generates test configurations with machine learning. STC reduces test length under the constraint of the significance level in Two-sample Hotelling’s T-square Test. Experiments on two neuromorphic architectures show that our proposed techniques can reduce the total test configurations by 90.44% and the total test length by 93.47%, respectively. Our run time is more than 10x faster than the previous method. The proposed techniques are independent of neuromorphic chips’ applications.\N    \N   \N   \N   \N    \N     Biography:\N    \N   \N   \N    \N     Xin-Ping Chen received a B.S. degree in electrical engineering from National Taiwan University (NTU), Taipei, Taiwan, in 2021, followed by an M.S. degree in electronics engineering from the same institution in 2023. His research includes test generation and test compression for neuromorphic chips.\N    \N   \N  \N \N\N
X-ALT-DESC;FMTTYPE=text/html:<div class="calendar-authors"> <p>  <b>   Moderators:  </b>  Jaan Raik  <sup>   1  </sup>  , Stephan Eggersglüß  <sup>   2  </sup> </p></div><div class="calendar-affiliations"> <p>  <b>   Affiliations:  </b>  <sup>   1  </sup>  Tallinn University of Technology (EE),  <sup>   2  </sup>  Siemens EDA (DE) </p></div><div class="calendar-item"> <div class="header-wrapper">  <h3 class="calendar-paperheader">   Faulty Function Extraction for Defective Circuits  </h3>  <div class="pdficon filter-red">   <a href="/index.php/download?filename=RS1-1.pdf" target="_blank">    <img src="/files/pdficon.svg"/>   </a>  </div> </div> <div class="calendar-authors">  <p>   <b>    Authors:   </b>   Chris Nigh   <sup>    1   </sup>   , Ruben Purdy   <sup>    1   </sup>   , Wei Li   <sup>    1   </sup>   , Subhasish Mitra   <sup>    2   </sup>   , R.D. Blanton   <sup>    1   </sup>  </p> </div> <div class="calendar-affiliations">  <p>   <b>    Affiliations:   </b>   <sup>    1   </sup>   Carnegie Mellon University (US),   <sup>    2   </sup>   Stanford University (US)  </p> </div> <input class="abstract-toggle" id="abstract-toggle-2" type="checkbox"/> <label class="collapsible" for="abstract-toggle-2">  <b>   Abstract:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   It is well known that understanding the behavior of silicon failures is an essential step in yield learning. It is also becoming more important for producing high quality silicon due to the increasing number of defects detected fortuitously. In order to meet this need, a new approach for extracting the precise faulty function from defective logic circuits is described. The approach is applied to nearly a 1,000 14nm failures and one use case of the results on improving ATPG is discussed.  </p> </div> <input class="abstract-toggle" id="biography-toggle-2" type="checkbox"/> <label class="collapsible" for="biography-toggle-2">  <b>   Biography:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Shawn Blanton is a professor in the Electrical and Computer Engineering Department at Carnegie Mellon University. In 1995, he received his Ph.D. in Electrical Engineering and Computer Science from the University of Michigan, Ann Arbor. His research interests include various aspects of integrated system tests, testable design, and test methodology development.  </p> </div> <div class="calendar-item">  <div class="header-wrapper">   <h3 class="calendar-paperheader">    Time and Space Optimized Storage-based BIST under Multiple Voltages and Variations   </h3>   <div class="pdficon filter-red">    <a href="/index.php/download?filename=RS1-2.pdf" target="_blank">     <img src="/files/pdficon.svg"/>    </a>   </div>  </div>  <div class="calendar-authors">   <p>    <b>     Authors:    </b>    Hanieh Jafarzadeh    <sup>     1    </sup>    , Florian Klemme    <sup>     1    </sup>    , Hussam Amrouch    <sup>     1, 3    </sup>    , Sybille Hellebrand    <sup>     2    </sup>    , Hans-Joachim Wunderlich    <sup>     1    </sup>   </p>  </div>  <div class="calendar-affiliations">   <p>    <b>     Affiliations:    </b>    <sup>     1    </sup>    University of Stuttgart (DE),    <sup>     2    </sup>    Paderborn University (DE),    <sup>     3    </sup>    Technical University of Munich (DE)   </p>  </div>  <input class="abstract-toggle" id="abstract-toggle-3" type="checkbox"/>  <label class="collapsible" for="abstract-toggle-3">   <b>    Abstract:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Logic Built-In Self-Test (LBIST) with stored de- terministic patterns is supported by the major CAD vendors and is gaining increasing attention, especially for safety-critical applications such as automotive. It is used for both manufacturing and periodic in-field testing. An unresolved challenge so far stems from the inevitable process variations. This paper presents the first approach for storage-based BIST addressing delay faults under process variations and multiple voltages. A unified solution for pattern generation, test set compaction and BIST hardware is presented that is compatible with commercial schemes. The solution significantly outperforms traditional N-detect for tran- sition faults in terms of test set size, test application time and fault efficiency.   </p>  </div>  <input class="abstract-toggle" id="biography-toggle-3" type="checkbox"/>  <label class="collapsible" for="biography-toggle-3">   <b>    Biography:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Hanieh Jafarzadeh graduated with a Bachelor's in Computer Hardware Engineering  at 2016 and a Master's in Computer Architecture at 2019 from Shahid Beheshti University, Tehran.. Since Feb 2021, she's with Prof. Wunderlich's group at university of Stuttgart, researching health state monitoring with the main focus on automatic pattern generation under PVT variations.   </p>  </div>  <div class="calendar-item">   <div class="header-wrapper">    <h3 class="calendar-paperheader">     Test Compression for Neuromorphic Chips    </h3>    <div class="pdficon filter-red">     <a href="/index.php/download?filename=RS1-3.pdf" target="_blank">      <img src="/files/pdficon.svg"/>     </a>    </div>   </div>   <div class="calendar-authors">    <p>     <b>      Authors:     </b>     Xin-Ping Chen     <sup>      1     </sup>     , Hsu-Yu Huang     <sup>      1     </sup>     , Chu-Yun Hsiao     <sup>      1     </sup>     , Jennifer Shueh-Inn Hu     <sup>      2     </sup>     , James Chien-Mo Li     <sup>      1     </sup>    </p>   </div>   <div class="calendar-affiliations">    <p>     <b>      Affiliations:     </b>     <sup>      1     </sup>     National Taiwan University (TW),     <sup>      2     </sup>     Ming Chuan University (TW)    </p>   </div>   <input class="abstract-toggle" id="abstract-toggle-4" type="checkbox"/>   <label class="collapsible" for="abstract-toggle-4">    <b>     Abstract:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     We propose test compression techniques to reduce the test time (test configurations and test length) for neuromorphic chips. Our test compression techniques include Dynamic Test Compression (DTC) and Static Test Compression (STC). DTC generates test configurations with machine learning. STC reduces test length under the constraint of the significance level in Two-sample Hotelling’s T-square Test. Experiments on two neuromorphic architectures show that our proposed techniques can reduce the total test configurations by 90.44% and the total test length by 93.47%, respectively. Our run time is more than 10x faster than the previous method. The proposed techniques are independent of neuromorphic chips’ applications.    </p>   </div>   <input class="abstract-toggle" id="biography-toggle-4" type="checkbox"/>   <label class="collapsible" for="biography-toggle-4">    <b>     Biography:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     Xin-Ping Chen received a B.S. degree in electrical engineering from National Taiwan University (NTU), Taipei, Taiwan, in 2021, followed by an M.S. degree in electronics engineering from the same institution in 2023. His research includes test generation and test compression for neuromorphic chips.    </p>   </div>  </div> </div></div>
LAST-MODIFIED:20240327T164537Z
SEQUENCE:1821052
LOCATION:Johan de Wittlaan 30\, 2517 JR Den Haag\, Zuid-Holland\, Netherlands
GEO:52.08989950;4.28243397
X-LOCATION-DISPLAYNAME:Room A1
X-ACCESS:1
X-HITS:848
X-COLOR:66c2a5
X-SHOW-END-TIME:1
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Amsterdam:20240521T140000
DTEND;TZID=Europe/Amsterdam:20240521T153000
UID:0C8D3DD6-A99E-458E-9FA7-AC6597B9F685
SUMMARY:​​&#x200BRegular Session 2
CREATED:20240306T145445Z
DTSTAMP:20240306T145445Z
URL:https://ets24.ewi.tudelft.nl/index.php/home/program/conference-program/new-event
DESCRIPTION:\N \N  \N   Moderators:\N  \N  Ioana Vatajelu\N  \N   1\N  \N  , Ernesto Sanchez\N  \N   2\N  \N \N\N\N \N  \N   Affiliations:\N  \N  \N   1\N  \N  TIMA - CNRS (FR),\N  \N   2\N  \N  Politecnico di Torino (IT)\N \N\N\N \N  \N   Detection of Stealthy Bitstreams in Cloud FPGAs using Graph Convolutional Networks\N  \N  \N   \N    \N   \N  \N \N \N  \N   \N    Authors:\N   \N   Jayeeta Chaudhuri, Krishnendu Chakrabarty\N  \N \N \N  \N   \N    Affiliation:\N   \N   Arizona State University (US)\N  \N \N \N \N  \N   Abstract:\N  \N \N \N  \N   FPGAs are frequently utilized in cloud computing environments for high performance computing and neural network accelerators. Furthermore, multi-tenancy allows multiple users to upload customized modules on the FPGA, while maintaining logical isolation. However, attackers can take advantage of the multi-tenant environment to launch voltage-based attacks and denial-of-service (DoS). An attacker might stealthily split power-wasting ring oscillators (ROs) across multiple windows within an FPGA configuration bitstream, making it challenging for traditional detection mechanisms to identify these dispersed components as part of a larger malicious circuit. We propose a methodology to detect these malicious bitstreams by transforming individual windows within an FPGA bitstream into a graph-based representation. Leveraging this graph structure, our method employs graph convolutional networks (GCNs) in the training phase to capture malicious patterns from the bitstreams. We use the classification accuracy, true-positive rate, and false-positive rate metrics to quantify the effectiveness of our method across diverse power-wasting circuits on multiple FPGA boards.\N  \N \N \N \N  \N   Biography:\N  \N \N \N  \N   Krishnendu Chakrabarty received the B.Tech. degree from the Indian Institute of Technology Kharagpur,  India, and the M.S.E. and Ph.D. degrees from the University of Michigan at Ann Arbor, USA.  He is the Fulton Professor of Microelectronics in the School of Electrical, Computer and Energy Engineering at ASU and CTO of SWAP Hub. He is the Director of the ASU Center on Semiconductor Microelectronics, a Fellow of ACM and AAAS, and a Golden Core Member of the IEEE Computer Society.\N  \N \N \N  \N   Best Paper Award Candidate\N  \N \N \N  \N   \N    Testing Spintronics Implemented Monte Carlo Dropout-Based Bayesian Neural Networks\N   \N   \N    \N     \N    \N   \N  \N  \N   \N    \N     Authors:\N    \N    Soyed Tuhin Ahmed\N    \N     1\N    \N    , Kamal Danouchi\N    \N     2\N    \N    , Michael Hefenbrock\N    \N     3\N    \N    , Guillaume Prenat\N    \N     2\N    \N    , Lorena Anghel\N    \N     2\N    \N    , Mehdi B. Tahoori\N    \N     1\N    \N   \N  \N  \N   \N    \N     Affiliations:\N    \N    \N     1\N    \N    Karlsruhe Institute of Technology (DE),\N    \N     2\N    \N    University of Grenoble Alpes,CEA,CNRS (FR),\N    \N     3\N    \N    RevoAI GmbH (DE)\N   \N  \N  \N  \N   \N    Abstract:\N   \N  \N  \N   \N    Bayesian Neural Networks (BayNNs) can inherently estimate predictive uncertainty, facilitating informed decision making. Dropout-based BayNNs are increasingly implemented in Spintronics-based computation-in-memory architectures for resource-constrained yet high-performance safety-critical applications. Although uncertainty estimation is important, the reliability of Dropout generation and BayNN computation is equally important for target applications but is overlooked in existing works. However, testing BayNNs is significantly more challenging compared to conventional NNs, due to their stochastic nature. In this paper, we present for the first time the model of the non-idealities of the Spintronics-based Dropout module and analyze their impact on uncertainty estimates and accuracy. Furthermore, we propose a testing framework based on repeatability ranking for Dropout-based BayNN with up to 100% fault coverage while using only 0.2% of training data as test vectors.\N   \N  \N  \N  \N   \N    Biography:\N   \N  \N  \N   \N    Soyed is a 4th-year PhD student at Karlsruhe Institute of Technology with Prof. Mehdi Tahoori. He received his master’s degree with merit from Technical University of Munich with Prof. Ulf Schlichtmann and his bachelor’s degree from American International University Bangladesh with Summa Cum Laude and University Gold Medal in 2016. His PhD research, has won three best paper nominations at IEEE VTS, DATE, and NanoArch conferences and won the best paper award from IEEE JETCAS Journal.\N   \N  \N  \N   \N    \N     On-chip Built-In Self-Calibration of Thermal Variations for Mixed-Signal In-Memory Computing\N    \N    \N     \N      \N     \N    \N   \N   \N    \N     \N      Authors:\N     \N     Gaurav Singh\N     \N      1\N     \N     , Omar Numan\N     \N      1\N     \N     , Dipesh Monga\N     \N      1\N     \N     , Martin Andraud\N     \N      1, 2\N     \N     , Kari Halonen\N     \N      1\N     \N    \N   \N   \N    \N     \N      Affiliations:\N     \N     \N      1\N     \N     Aalto University (FI),\N     \N      2\N     \N     UC Louvain (BE)\N    \N   \N   \N   \N    \N     Abstract:\N    \N   \N   \N    \N     In-memory computing (IMC) accelerators have become a pivotal architecture for enhancing AI algorithm computations, particularly critical for embedding deep neural networks (DNNs) in edge devices. The efficiency of these systems is paramount, yet IMC cores are prone to fluctuations due to process, temperature, and voltage variations, which can detrimentally impact DNN accuracy. This research introduces an innovative Built-In Self-Calibration (BISC) methodology, specifically designed to compensate for temperature-induced variations in mixed-signal IMC cores. The methodology enables real-time, on-chip adjustment of DNN weights during computation within the IMC core without modifying the computation path. The proposed approach, implemented on a silicon prototype, not only maintained DNN computation accuracy under substantial temperature variations but also fully compensated for almost 90% of the offset caused by these variations, without introducing any non-idealities.\N    \N   \N   \N   \N    \N     Biography:\N    \N   \N   \N    \N     Gaurav Singh, an IEEE Student Member, earned his M.Sc. in VLSI from Amity University, India, in 2015. He is currently pursuing his Ph.D. at Aalto University, Finland, focusing on low-power SoCs for sensor data processing. His research includes microprocessors, low-power SRAM, and serial interfaces, specifically integrating RISC-V with Compute In-Memory cores to enhance AI power efficiency.\N    \N   \N  \N \N\N
X-ALT-DESC;FMTTYPE=text/html:<div class="calendar-authors"> <p>  <b>   Moderators:  </b>  Ioana Vatajelu  <sup>   1  </sup>  , Ernesto Sanchez  <sup>   2  </sup> </p></div><div class="calendar-affiliations"> <p>  <b>   Affiliations:  </b>  <sup>   1  </sup>  TIMA - CNRS (FR),  <sup>   2  </sup>  Politecnico di Torino (IT) </p></div><div class="calendar-item"> <div class="header-wrapper">  <h3 class="calendar-paperheader">   Detection of Stealthy Bitstreams in Cloud FPGAs using Graph Convolutional Networks  </h3>  <div class="pdficon filter-red">   <a href="/index.php/download?filename=RS2-1.pdf" target="_blank">    <img src="/files/pdficon.svg"/>   </a>  </div> </div> <div class="calendar-authors">  <p>   <b>    Authors:   </b>   Jayeeta Chaudhuri, Krishnendu Chakrabarty  </p> </div> <div class="calendar-affiliations">  <p>   <b>    Affiliation:   </b>   Arizona State University (US)  </p> </div> <input class="abstract-toggle" id="abstract-toggle-2" type="checkbox"/> <label class="collapsible" for="abstract-toggle-2">  <b>   Abstract:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   FPGAs are frequently utilized in cloud computing environments for high performance computing and neural network accelerators. Furthermore, multi-tenancy allows multiple users to upload customized modules on the FPGA, while maintaining logical isolation. However, attackers can take advantage of the multi-tenant environment to launch voltage-based attacks and denial-of-service (DoS). An attacker might stealthily split power-wasting ring oscillators (ROs) across multiple windows within an FPGA configuration bitstream, making it challenging for traditional detection mechanisms to identify these dispersed components as part of a larger malicious circuit. We propose a methodology to detect these malicious bitstreams by transforming individual windows within an FPGA bitstream into a graph-based representation. Leveraging this graph structure, our method employs graph convolutional networks (GCNs) in the training phase to capture malicious patterns from the bitstreams. We use the classification accuracy, true-positive rate, and false-positive rate metrics to quantify the effectiveness of our method across diverse power-wasting circuits on multiple FPGA boards.  </p> </div> <input class="abstract-toggle" id="biography-toggle-2" type="checkbox"/> <label class="collapsible" for="biography-toggle-2">  <b>   Biography:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Krishnendu Chakrabarty received the B.Tech. degree from the Indian Institute of Technology Kharagpur,  India, and the M.S.E. and Ph.D. degrees from the University of Michigan at Ann Arbor, USA.  He is the Fulton Professor of Microelectronics in the School of Electrical, Computer and Energy Engineering at ASU and CTO of SWAP Hub. He is the Director of the ASU Center on Semiconductor Microelectronics, a Fellow of ACM and AAAS, and a Golden Core Member of the IEEE Computer Society.  </p> </div> <div class="calendar-authors">  <b style="color:red">   Best Paper Award Candidate  </b> </div> <div class="calendar-item">  <div class="header-wrapper">   <h3 class="calendar-paperheader">    Testing Spintronics Implemented Monte Carlo Dropout-Based Bayesian Neural Networks   </h3>   <div class="pdficon filter-red">    <a href="/index.php/download?filename=RS2-2.pdf" target="_blank">     <img src="/files/pdficon.svg"/>    </a>   </div>  </div>  <div class="calendar-authors">   <p>    <b>     Authors:    </b>    Soyed Tuhin Ahmed    <sup>     1    </sup>    , Kamal Danouchi    <sup>     2    </sup>    , Michael Hefenbrock    <sup>     3    </sup>    , Guillaume Prenat    <sup>     2    </sup>    , Lorena Anghel    <sup>     2    </sup>    , Mehdi B. Tahoori    <sup>     1    </sup>   </p>  </div>  <div class="calendar-affiliations">   <p>    <b>     Affiliations:    </b>    <sup>     1    </sup>    Karlsruhe Institute of Technology (DE),    <sup>     2    </sup>    University of Grenoble Alpes,CEA,CNRS (FR),    <sup>     3    </sup>    RevoAI GmbH (DE)   </p>  </div>  <input class="abstract-toggle" id="abstract-toggle-3" type="checkbox"/>  <label class="collapsible" for="abstract-toggle-3">   <b>    Abstract:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Bayesian Neural Networks (BayNNs) can inherently estimate predictive uncertainty, facilitating informed decision making. Dropout-based BayNNs are increasingly implemented in Spintronics-based computation-in-memory architectures for resource-constrained yet high-performance safety-critical applications. Although uncertainty estimation is important, the reliability of Dropout generation and BayNN computation is equally important for target applications but is overlooked in existing works. However, testing BayNNs is significantly more challenging compared to conventional NNs, due to their stochastic nature. In this paper, we present for the first time the model of the non-idealities of the Spintronics-based Dropout module and analyze their impact on uncertainty estimates and accuracy. Furthermore, we propose a testing framework based on repeatability ranking for Dropout-based BayNN with up to 100% fault coverage while using only 0.2% of training data as test vectors.   </p>  </div>  <input class="abstract-toggle" id="biography-toggle-3" type="checkbox"/>  <label class="collapsible" for="biography-toggle-3">   <b>    Biography:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Soyed is a 4th-year PhD student at Karlsruhe Institute of Technology with Prof. Mehdi Tahoori. He received his master’s degree with merit from Technical University of Munich with Prof. Ulf Schlichtmann and his bachelor’s degree from American International University Bangladesh with Summa Cum Laude and University Gold Medal in 2016. His PhD research, has won three best paper nominations at IEEE VTS, DATE, and NanoArch conferences and won the best paper award from IEEE JETCAS Journal.   </p>  </div>  <div class="calendar-item">   <div class="header-wrapper">    <h3 class="calendar-paperheader">     On-chip Built-In Self-Calibration of Thermal Variations for Mixed-Signal In-Memory Computing    </h3>    <div class="pdficon filter-red">     <a href="/index.php/download?filename=RS2-3.pdf" target="_blank">      <img src="/files/pdficon.svg"/>     </a>    </div>   </div>   <div class="calendar-authors">    <p>     <b>      Authors:     </b>     Gaurav Singh     <sup>      1     </sup>     , Omar Numan     <sup>      1     </sup>     , Dipesh Monga     <sup>      1     </sup>     , Martin Andraud     <sup>      1, 2     </sup>     , Kari Halonen     <sup>      1     </sup>    </p>   </div>   <div class="calendar-affiliations">    <p>     <b>      Affiliations:     </b>     <sup>      1     </sup>     Aalto University (FI),     <sup>      2     </sup>     UC Louvain (BE)    </p>   </div>   <input class="abstract-toggle" id="abstract-toggle-4" type="checkbox"/>   <label class="collapsible" for="abstract-toggle-4">    <b>     Abstract:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     In-memory computing (IMC) accelerators have become a pivotal architecture for enhancing AI algorithm computations, particularly critical for embedding deep neural networks (DNNs) in edge devices. The efficiency of these systems is paramount, yet IMC cores are prone to fluctuations due to process, temperature, and voltage variations, which can detrimentally impact DNN accuracy. This research introduces an innovative Built-In Self-Calibration (BISC) methodology, specifically designed to compensate for temperature-induced variations in mixed-signal IMC cores. The methodology enables real-time, on-chip adjustment of DNN weights during computation within the IMC core without modifying the computation path. The proposed approach, implemented on a silicon prototype, not only maintained DNN computation accuracy under substantial temperature variations but also fully compensated for almost 90% of the offset caused by these variations, without introducing any non-idealities.    </p>   </div>   <input class="abstract-toggle" id="biography-toggle-4" type="checkbox"/>   <label class="collapsible" for="biography-toggle-4">    <b>     Biography:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     Gaurav Singh, an IEEE Student Member, earned his M.Sc. in VLSI from Amity University, India, in 2015. He is currently pursuing his Ph.D. at Aalto University, Finland, focusing on low-power SoCs for sensor data processing. His research includes microprocessors, low-power SRAM, and serial interfaces, specifically integrating RISC-V with Compute In-Memory cores to enhance AI power efficiency.    </p>   </div>  </div> </div></div>
LAST-MODIFIED:20240325T151338Z
SEQUENCE:1642733
LOCATION:Johan de Wittlaan 30\, 2517 JR Den Haag\, Zuid-Holland\, Netherlands
GEO:52.08989950;4.28243397
X-LOCATION-DISPLAYNAME:Room A1
X-ACCESS:1
X-HITS:901
X-COLOR:66c2a5
X-SHOW-END-TIME:1
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Amsterdam:20240521T161500
DTEND;TZID=Europe/Amsterdam:20240521T174500
UID:FDDA1A12-D7C7-4EF1-9F7F-7FE692C312C4
SUMMARY:​​&#x200BRegular Session 3
CREATED:20240311T160627Z
DTSTAMP:20240311T160627Z
URL:https://ets24.ewi.tudelft.nl/index.php/home/program/conference-program/regular-session-3
DESCRIPTION:\N \N  \N   Moderators:\N  \N  Sybille Hellebrand\N  \N   1\N  \N  , Grzegorz Mrugalski\N  \N   2\N  \N \N\N\N \N  \N   Affiliations:\N  \N  \N   1\N  \N  Paderborn University (DE),\N  \N   2\N  \N  Siemens EDA (PL)\N \N\N\N \N  \N   Test and Repair Improvements for UCIe\N  \N  \N   \N    \N   \N  \N \N \N  \N   \N    Authors:\N   \N   Tsung-Hsuan Wang\N   \N    1, 2\N   \N   , Po-Yao Chuang\N   \N    1, 3\N   \N   , Francesco Lorenzelli\N   \N    1, 4\N   \N   , Erik Jan Marinissen\N   \N    1, 5\N   \N  \N \N \N  \N   \N    Affiliations:\N   \N   \N    1\N   \N   IMEC (BE),\N   \N    2\N   \N   NYCU (TW),\N   \N    3\N   \N   NTHU (TW),\N   \N    4\N   \N   KU Leuven (BE),\N   \N    5\N   \N   TU Eindhoven (NL)\N  \N \N \N \N  \N   Abstract:\N  \N \N \N  \N   The success of chiplet-based design critically depends on standards, especially those for die-to-die interconnects. Universal Chiplet Interconnect Express (UCIe) is such a standard, showing promising potential in its field. Among other things, UCIe standardizes the micro-bump map. It incorporates several spare interconnects able to “repair” defective interconnects. We outline a very efficient, aliasing-free test generation method for all hard and weak short and open manufacturing defects on die-to-die interconnects that uses just 16 test patterns, irrespective of the number of interconnects. We also propose to improve repairability of the UCIe interconnects through reorganizations of the micro-bump map that eliminate the risk for non-repairable (‘catastrophic’) defects and minimizes the usage of spare interconnects. The micro-bump map reorganizations are not backwards compatible and hence, since UCIe is still in its early stages of actual usage, it would be best to incorporate this improvement in the standard as soon as possible.\N  \N \N \N \N  \N   Biography:\N  \N \N \N  \N   Scientific Director at imec in Leuven, Belgium, where he is responsible for research on test and design-for-test, covering topics as diverse as 3D-stacked ICs, silicon photonics, CMOS technology nodes below 10nm, and STT-MRAMs.\NVisiting Researcher at Eindhoven University of Technology (TU/e) in the Netherlands.\NPreviously at NXP Semiconductors and Philips Research Laboratories in Eindhoven, Nijmegen, and Sunnyvale.\NMSc and PDEng degrees from TU/e.\N  \N \N \N  \N   Best Paper Award Candidate\N  \N \N \N  \N   \N    IEEE 1838 compliant scan encryption and integrity for 2.5/3D ICs\N   \N   \N    \N     \N    \N   \N  \N  \N   \N    \N     Authors:\N    \N    Juan Suzano[0,1,2],{Antoine Chastand\N    \N     1\N    \N    , Emanuele Valea\N    \N     2\N    \N    , Giorgio Di Natale\N    \N     3\N    \N    , Anthony Philippe\N    \N     2\N    \N    , Fady Abouzeid\N    \N     1\N    \N    , Philippe Roche\N    \N     1\N    \N   \N  \N  \N   \N    \N     Affiliations:\N    \N    \N     1\N    \N    STMicroelectronics (FR),\N    \N     2\N    \N    University Grenoble Alpes, CEA (FR),\N    \N     3\N    \N    University Grenoble Alpes, CNRS, Grenoble INP (FR)\N   \N  \N  \N  \N   \N    Abstract:\N   \N  \N  \N   \N    2.5D and 3D integrated circuits (IC) are the natural evolution of traditional 2D SoCs. 2.5D and 3D integration is the process of assembling pre-manufactured chiplets in an interposer or in a stack. This process can damage the chiplets or lead to faulty connections. Thus, the importance of post-bond test of chiplets. The IEEE Std 1838(TM)-2019 (IEEE 1838) design-for-testability (DFT) standard defines mandatory and optional structures for accessing DFT functions on the chiplet. Compliant chiplets form a DFT network that can be exploited by attackers to violate the confidentiality or integrity of the message transmitted over the serial path. In this work, we combine a message integrity verifica- tion system with a scan encryption mechanism to protect the scan chain of an IEEE 1838-compliant DFT implementation. The scan encryption prevents unauthorized actors from writing meaningful data into the scan chain. Message integrity verification makes messages from untrustworthy sources detectable. In conjunction, both security primitives protect the scan chain from malicious chiplets on the stack, scan-based attacks, and brute force attacks. The proposed solution causes less than 1% area overhead on designs composed of more than 5 million gates and less than 1% test time overhead for typical DFT implementations.\N   \N  \N  \N  \N   \N    Biography:\N   \N  \N  \N   \N    Juan Suzano received the B.S. degree in computer engineering from the federal university of Rio Grande do Sul and the M.S. degree from CPE Lyon through the double degree program BRAFITEC, in 2022. He is currently pursuing the Ph.D. degree in micro and nano electronics with Grenoble Alpes University in partnership with STMicroelectronics and CEA Grenoble. He is invested in the research and development of security hardware solutions for chiplet-based 2.5D and 3D integrated circuits.\N   \N  \N  \N   \N    \N     Design-for-Test for Intermittent Faults in STT-MRAMs\N    \N    \N     \N      \N     \N    \N   \N   \N    \N     \N      Authors:\N     \N     Sicong Yuan\N     \N      1, 3\N     \N     , Mohammad Amin Yaldagard\N     \N      1\N     \N     , Hanzhi Xun\N     \N      1\N     \N     , Moritz Fieback\N     \N      1\N     \N     , Erik Jan Marinissen\N     \N      3\N     \N     , Woojin Kim\N     \N      3\N     \N     , Siddharth Rao\N     \N      3\N     \N     , Sebastien Couet\N     \N      3\N     \N     , Mottaqiallah Taouil\N     \N      1, 2\N     \N     , Said Hamdioui\N     \N      1, 2\N     \N    \N   \N   \N    \N     \N      Affiliations:\N     \N     \N      1\N     \N     TU Delft (NL),\N     \N      2\N     \N     CognitiveIC (NL),\N     \N      3\N     \N     IMEC (BE)\N    \N   \N   \N   \N    \N     Abstract:\N    \N   \N   \N    \N     Guaranteeing high-quality test solutions for Spin-Transfer Torque Magnetic RAM (STT-MRAM) is a must to speed up its high-volume production. A high test quality requires maximizing the fault coverage. Detecting permanent faults is relatively simple compared to intermittent faults; the latter are faults (caused by non-environmental conditions) that appear and disappear as a function of time, and are therefore hard to detect. Testing for such faults in STT-MRAMs is even worse considering the Magnetic Tunneling Junction inherent property ‘intrinsic switching stochasticity’, which results in inevitable random write errors. This paper presents a novel Design-for-Testability (DFT) scheme for detecting intermittent faults in STT-MRAMs; it is based on monitoring the write current. The strength of the write current is inversely correlated to the write error rate; when the write current is smaller than the specification, the device is considered faulty. A reduction in the write current can be caused by any defect in the write path of the memory (e.g., interconnects and contacts). Simulation results based on industrial design show that applying DFT yields a superior coverage of intermittent faults compared to functional test methods, such as march tests.\N    \N   \N   \N   \N    \N     Biography:\N    \N   \N   \N    \N     SicongYuan is a phd candidate in Delft University of Technology, Netherlands\N    \N   \N  \N \N\N
X-ALT-DESC;FMTTYPE=text/html:<div class="calendar-authors"> <p>  <b>   Moderators:  </b>  Sybille Hellebrand  <sup>   1  </sup>  , Grzegorz Mrugalski  <sup>   2  </sup> </p></div><div class="calendar-affiliations"> <p>  <b>   Affiliations:  </b>  <sup>   1  </sup>  Paderborn University (DE),  <sup>   2  </sup>  Siemens EDA (PL) </p></div><div class="calendar-item"> <div class="header-wrapper">  <h3 class="calendar-paperheader">   Test and Repair Improvements for UCIe  </h3>  <div class="pdficon filter-red">   <a href="/index.php/download?filename=RS3-1.pdf" target="_blank">    <img src="/files/pdficon.svg"/>   </a>  </div> </div> <div class="calendar-authors">  <p>   <b>    Authors:   </b>   Tsung-Hsuan Wang   <sup>    1, 2   </sup>   , Po-Yao Chuang   <sup>    1, 3   </sup>   , Francesco Lorenzelli   <sup>    1, 4   </sup>   , Erik Jan Marinissen   <sup>    1, 5   </sup>  </p> </div> <div class="calendar-affiliations">  <p>   <b>    Affiliations:   </b>   <sup>    1   </sup>   IMEC (BE),   <sup>    2   </sup>   NYCU (TW),   <sup>    3   </sup>   NTHU (TW),   <sup>    4   </sup>   KU Leuven (BE),   <sup>    5   </sup>   TU Eindhoven (NL)  </p> </div> <input class="abstract-toggle" id="abstract-toggle-2" type="checkbox"/> <label class="collapsible" for="abstract-toggle-2">  <b>   Abstract:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   The success of chiplet-based design critically depends on standards, especially those for die-to-die interconnects. Universal Chiplet Interconnect Express (UCIe) is such a standard, showing promising potential in its field. Among other things, UCIe standardizes the micro-bump map. It incorporates several spare interconnects able to “repair” defective interconnects. We outline a very efficient, aliasing-free test generation method for all hard and weak short and open manufacturing defects on die-to-die interconnects that uses just 16 test patterns, irrespective of the number of interconnects. We also propose to improve repairability of the UCIe interconnects through reorganizations of the micro-bump map that eliminate the risk for non-repairable (‘catastrophic’) defects and minimizes the usage of spare interconnects. The micro-bump map reorganizations are not backwards compatible and hence, since UCIe is still in its early stages of actual usage, it would be best to incorporate this improvement in the standard as soon as possible.  </p> </div> <input class="abstract-toggle" id="biography-toggle-2" type="checkbox"/> <label class="collapsible" for="biography-toggle-2">  <b>   Biography:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Scientific Director at imec in Leuven, Belgium, where he is responsible for research on test and design-for-test, covering topics as diverse as 3D-stacked ICs, silicon photonics, CMOS technology nodes below 10nm, and STT-MRAMs.Visiting Researcher at Eindhoven University of Technology (TU/e) in the Netherlands.Previously at NXP Semiconductors and Philips Research Laboratories in Eindhoven, Nijmegen, and Sunnyvale.MSc and PDEng degrees from TU/e.  </p> </div> <div class="calendar-authors">  <b style="color:red">   Best Paper Award Candidate  </b> </div> <div class="calendar-item">  <div class="header-wrapper">   <h3 class="calendar-paperheader">    IEEE 1838 compliant scan encryption and integrity for 2.5/3D ICs   </h3>   <div class="pdficon filter-red">    <a href="/index.php/download?filename=RS3-2.pdf" target="_blank">     <img src="/files/pdficon.svg"/>    </a>   </div>  </div>  <div class="calendar-authors">   <p>    <b>     Authors:    </b>    Juan Suzano[0,1,2],{Antoine Chastand    <sup>     1    </sup>    , Emanuele Valea    <sup>     2    </sup>    , Giorgio Di Natale    <sup>     3    </sup>    , Anthony Philippe    <sup>     2    </sup>    , Fady Abouzeid    <sup>     1    </sup>    , Philippe Roche    <sup>     1    </sup>   </p>  </div>  <div class="calendar-affiliations">   <p>    <b>     Affiliations:    </b>    <sup>     1    </sup>    STMicroelectronics (FR),    <sup>     2    </sup>    University Grenoble Alpes, CEA (FR),    <sup>     3    </sup>    University Grenoble Alpes, CNRS, Grenoble INP (FR)   </p>  </div>  <input class="abstract-toggle" id="abstract-toggle-3" type="checkbox"/>  <label class="collapsible" for="abstract-toggle-3">   <b>    Abstract:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    2.5D and 3D integrated circuits (IC) are the natural evolution of traditional 2D SoCs. 2.5D and 3D integration is the process of assembling pre-manufactured chiplets in an interposer or in a stack. This process can damage the chiplets or lead to faulty connections. Thus, the importance of post-bond test of chiplets. The IEEE Std 1838(TM)-2019 (IEEE 1838) design-for-testability (DFT) standard defines mandatory and optional structures for accessing DFT functions on the chiplet. Compliant chiplets form a DFT network that can be exploited by attackers to violate the confidentiality or integrity of the message transmitted over the serial path. In this work, we combine a message integrity verifica- tion system with a scan encryption mechanism to protect the scan chain of an IEEE 1838-compliant DFT implementation. The scan encryption prevents unauthorized actors from writing meaningful data into the scan chain. Message integrity verification makes messages from untrustworthy sources detectable. In conjunction, both security primitives protect the scan chain from malicious chiplets on the stack, scan-based attacks, and brute force attacks. The proposed solution causes less than 1% area overhead on designs composed of more than 5 million gates and less than 1% test time overhead for typical DFT implementations.   </p>  </div>  <input class="abstract-toggle" id="biography-toggle-3" type="checkbox"/>  <label class="collapsible" for="biography-toggle-3">   <b>    Biography:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Juan Suzano received the B.S. degree in computer engineering from the federal university of Rio Grande do Sul and the M.S. degree from CPE Lyon through the double degree program BRAFITEC, in 2022. He is currently pursuing the Ph.D. degree in micro and nano electronics with Grenoble Alpes University in partnership with STMicroelectronics and CEA Grenoble. He is invested in the research and development of security hardware solutions for chiplet-based 2.5D and 3D integrated circuits.   </p>  </div>  <div class="calendar-item">   <div class="header-wrapper">    <h3 class="calendar-paperheader">     Design-for-Test for Intermittent Faults in STT-MRAMs    </h3>    <div class="pdficon filter-red">     <a href="/index.php/download?filename=RS3-3.pdf" target="_blank">      <img src="/files/pdficon.svg"/>     </a>    </div>   </div>   <div class="calendar-authors">    <p>     <b>      Authors:     </b>     Sicong Yuan     <sup>      1, 3     </sup>     , Mohammad Amin Yaldagard     <sup>      1     </sup>     , Hanzhi Xun     <sup>      1     </sup>     , Moritz Fieback     <sup>      1     </sup>     , Erik Jan Marinissen     <sup>      3     </sup>     , Woojin Kim     <sup>      3     </sup>     , Siddharth Rao     <sup>      3     </sup>     , Sebastien Couet     <sup>      3     </sup>     , Mottaqiallah Taouil     <sup>      1, 2     </sup>     , Said Hamdioui     <sup>      1, 2     </sup>    </p>   </div>   <div class="calendar-affiliations">    <p>     <b>      Affiliations:     </b>     <sup>      1     </sup>     TU Delft (NL),     <sup>      2     </sup>     CognitiveIC (NL),     <sup>      3     </sup>     IMEC (BE)    </p>   </div>   <input class="abstract-toggle" id="abstract-toggle-4" type="checkbox"/>   <label class="collapsible" for="abstract-toggle-4">    <b>     Abstract:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     Guaranteeing high-quality test solutions for Spin-Transfer Torque Magnetic RAM (STT-MRAM) is a must to speed up its high-volume production. A high test quality requires maximizing the fault coverage. Detecting permanent faults is relatively simple compared to intermittent faults; the latter are faults (caused by non-environmental conditions) that appear and disappear as a function of time, and are therefore hard to detect. Testing for such faults in STT-MRAMs is even worse considering the Magnetic Tunneling Junction inherent property ‘intrinsic switching stochasticity’, which results in inevitable random write errors. This paper presents a novel Design-for-Testability (DFT) scheme for detecting intermittent faults in STT-MRAMs; it is based on monitoring the write current. The strength of the write current is inversely correlated to the write error rate; when the write current is smaller than the specification, the device is considered faulty. A reduction in the write current can be caused by any defect in the write path of the memory (e.g., interconnects and contacts). Simulation results based on industrial design show that applying DFT yields a superior coverage of intermittent faults compared to functional test methods, such as march tests.    </p>   </div>   <input class="abstract-toggle" id="biography-toggle-4" type="checkbox"/>   <label class="collapsible" for="biography-toggle-4">    <b>     Biography:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     SicongYuan is a phd candidate in Delft University of Technology, Netherlands    </p>   </div>  </div> </div></div>
LAST-MODIFIED:20240325T152200Z
SEQUENCE:1206933
LOCATION:Johan de Wittlaan 30\, 2517 JR Den Haag\, Zuid-Holland\, Netherlands
GEO:52.08989950;4.28243397
X-LOCATION-DISPLAYNAME:Room A1
X-ACCESS:1
X-HITS:758
X-COLOR:66c2a5
X-SHOW-END-TIME:1
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Amsterdam:20240522T091500
DTEND;TZID=Europe/Amsterdam:20240522T101500
UID:A48CDA03-6096-4A6E-BC01-6C1CEEF22EBE
SUMMARY: ​​&#x200BRegular Session 4
CREATED:20240311T160816Z
DTSTAMP:20240311T160816Z
URL:https://ets24.ewi.tudelft.nl/index.php/home/program/conference-program/regular-session-4
DESCRIPTION:\N \N  \N   Moderators:\N  \N  Vladimir Zivkovic\N  \N   1\N  \N  , Michele Portolan\N  \N   2\N  \N \N\N\N \N  \N   Affiliations:\N  \N  \N   1\N  \N  Siemens EDA (DK),\N  \N   2\N  \N  Grenoble INP (FR)\N \N\N\N \N  \N   Characterization of Ultra-low Random Jitter Reduction Methods up to 36 GHz\N  \N  \N   \N    \N   \N  \N \N \N  \N   \N    Authors:\N   \N   David Keezer\N   \N    1\N   \N   , Dany Minier\N   \N    2\N   \N   , Hongjie Li\N   \N    3\N   \N  \N \N \N  \N   \N    Affiliations:\N   \N   \N    1\N   \N   Eastern Institute of Technology (CN),\N   \N    2\N   \N   Boreas Technologies (CA),\N   \N    3\N   \N   Tianjin University (CN)\N  \N \N \N \N  \N   Abstract:\N  \N \N \N  \N   This paper describes methods for reducing and measuring random jitter (RJ) of clock signals in multi-GHz test instruments. The methods are based on real-time averaging of parallel/synchronized signals with uncorrelated RJ. Prior work (up to 10 GHz) is extended by experimental demonstration up to 36 GHz with RJ below 200 femtoseconds (fs). The theory of operation is reviewed and experimental results are shown for 12 and 36 GHz. A de-embedding procedure is used to separate the jitter contribution of the test instruments (jitter “floor”) from the measured values to obtain a better estimate of the actual ultra-low jitter values of the measured signals. The effects of amplitude imbalance, signal-skew, cycle-to-cycle jitter correlation, and component-added RJ are measured and analyzed.\N  \N \N \N \N  \N   Biography:\N  \N \N \N  \N   Dr. Keezer is a Chair professor of Information Science and Technology at the Eastern Institute of Technology in Ningbo, China.  \NBefore joining EIT in 2022, he was a Professor of Electrical and Computer Engineering at Georgia Institute of Technology (for 27 years) and is currently Professor emeritus.  \NHe has published over 270 peer-reviewed articles and has been an IEEE Fellow since 2010.\N  \N \N \N  \N   \N    Hierarchical Fault Simulation for Mixed-Signal Circuits Using Template Based Fault Response Modeling\N   \N   \N    \N     \N    \N   \N  \N  \N   \N    \N     Authors:\N    \N    Tolga Aksoy\N    \N     1\N    \N    , Nikhil Sagar Modala\N    \N     1\N    \N    , Lakshmanan Balasubramanian\N    \N     2\N    \N    , Rubin Parekhji\N    \N     2\N    \N    , Sule Ozev\N    \N     1\N    \N   \N  \N  \N   \N    \N     Affiliations:\N    \N    \N     1\N    \N    Arizona State University (US),\N    \N     2\N    \N    Texas Instruments (IN)\N   \N  \N  \N  \N   \N    Abstract:\N   \N  \N  \N   \N    The objective of fault simulation is to estimate the fault coverage of a given test input. Established fault models in the analog domain are based on detailed transistor-level netlists. Existing fault simulation tools inject and analyze fault responses at this level of detail. However, extending fault simulation to large circuits, especially when digital signals and/or frequency translation is involved, can be difficult due to the nature of simulations. Designers work with models at higher abstraction levels where simulations are more efficient. The goal of this paper is to bridge the gap between available transistor-level fault simulation tools, where fault simulation can be accurate, and behavioral abstraction levels, where simulation time can be shorter. We aim to achieve this by judiciously adding various functional enhancements to individual functional blocks from a list of templates into their behavioral model until the responses at the two abstraction levels match. Transistor-level simulations are only limited to smaller functional blocks, where they are feasible, and individual fault responses are captured for behavioral simulations. Experimental results on two example circuits, a flash ADC and a PLL, show that accurate simulations can be achieved at a fraction of the simulation time.\N   \N  \N \N\N
X-ALT-DESC;FMTTYPE=text/html:<div class="calendar-authors"> <p>  <b>   Moderators:  </b>  Vladimir Zivkovic  <sup>   1  </sup>  , Michele Portolan  <sup>   2  </sup> </p></div><div class="calendar-affiliations"> <p>  <b>   Affiliations:  </b>  <sup>   1  </sup>  Siemens EDA (DK),  <sup>   2  </sup>  Grenoble INP (FR) </p></div><div class="calendar-item"> <div class="header-wrapper">  <h3 class="calendar-paperheader">   Characterization of Ultra-low Random Jitter Reduction Methods up to 36 GHz  </h3>  <div class="pdficon filter-red">   <a href="/index.php/download?filename=RS4-1.pdf" target="_blank">    <img src="/files/pdficon.svg"/>   </a>  </div> </div> <div class="calendar-authors">  <p>   <b>    Authors:   </b>   David Keezer   <sup>    1   </sup>   , Dany Minier   <sup>    2   </sup>   , Hongjie Li   <sup>    3   </sup>  </p> </div> <div class="calendar-affiliations">  <p>   <b>    Affiliations:   </b>   <sup>    1   </sup>   Eastern Institute of Technology (CN),   <sup>    2   </sup>   Boreas Technologies (CA),   <sup>    3   </sup>   Tianjin University (CN)  </p> </div> <input class="abstract-toggle" id="abstract-toggle-2" type="checkbox"/> <label class="collapsible" for="abstract-toggle-2">  <b>   Abstract:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   This paper describes methods for reducing and measuring random jitter (RJ) of clock signals in multi-GHz test instruments. The methods are based on real-time averaging of parallel/synchronized signals with uncorrelated RJ. Prior work (up to 10 GHz) is extended by experimental demonstration up to 36 GHz with RJ below 200 femtoseconds (fs). The theory of operation is reviewed and experimental results are shown for 12 and 36 GHz. A de-embedding procedure is used to separate the jitter contribution of the test instruments (jitter “floor”) from the measured values to obtain a better estimate of the actual ultra-low jitter values of the measured signals. The effects of amplitude imbalance, signal-skew, cycle-to-cycle jitter correlation, and component-added RJ are measured and analyzed.  </p> </div> <input class="abstract-toggle" id="biography-toggle-2" type="checkbox"/> <label class="collapsible" for="biography-toggle-2">  <b>   Biography:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Dr. Keezer is a Chair professor of Information Science and Technology at the Eastern Institute of Technology in Ningbo, China.  Before joining EIT in 2022, he was a Professor of Electrical and Computer Engineering at Georgia Institute of Technology (for 27 years) and is currently Professor emeritus.  He has published over 270 peer-reviewed articles and has been an IEEE Fellow since 2010.  </p> </div> <div class="calendar-item">  <div class="header-wrapper">   <h3 class="calendar-paperheader">    Hierarchical Fault Simulation for Mixed-Signal Circuits Using Template Based Fault Response Modeling   </h3>   <div class="pdficon filter-red">    <a href="/index.php/download?filename=RS4-2.pdf" target="_blank">     <img src="/files/pdficon.svg"/>    </a>   </div>  </div>  <div class="calendar-authors">   <p>    <b>     Authors:    </b>    Tolga Aksoy    <sup>     1    </sup>    , Nikhil Sagar Modala    <sup>     1    </sup>    , Lakshmanan Balasubramanian    <sup>     2    </sup>    , Rubin Parekhji    <sup>     2    </sup>    , Sule Ozev    <sup>     1    </sup>   </p>  </div>  <div class="calendar-affiliations">   <p>    <b>     Affiliations:    </b>    <sup>     1    </sup>    Arizona State University (US),    <sup>     2    </sup>    Texas Instruments (IN)   </p>  </div>  <input class="abstract-toggle" id="abstract-toggle-3" type="checkbox"/>  <label class="collapsible" for="abstract-toggle-3">   <b>    Abstract:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    The objective of fault simulation is to estimate the fault coverage of a given test input. Established fault models in the analog domain are based on detailed transistor-level netlists. Existing fault simulation tools inject and analyze fault responses at this level of detail. However, extending fault simulation to large circuits, especially when digital signals and/or frequency translation is involved, can be difficult due to the nature of simulations. Designers work with models at higher abstraction levels where simulations are more efficient. The goal of this paper is to bridge the gap between available transistor-level fault simulation tools, where fault simulation can be accurate, and behavioral abstraction levels, where simulation time can be shorter. We aim to achieve this by judiciously adding various functional enhancements to individual functional blocks from a list of templates into their behavioral model until the responses at the two abstraction levels match. Transistor-level simulations are only limited to smaller functional blocks, where they are feasible, and individual fault responses are captured for behavioral simulations. Experimental results on two example circuits, a flash ADC and a PLL, show that accurate simulations can be achieved at a fraction of the simulation time.   </p>  </div> </div></div>
LAST-MODIFIED:20240520T205748Z
SEQUENCE:6065372
LOCATION:Johan de Wittlaan 30\, 2517 JR Den Haag\, Zuid-Holland\, Netherlands
GEO:52.08989950;4.28243397
X-LOCATION-DISPLAYNAME:Room A1
X-ACCESS:1
X-HITS:721
X-COLOR:66c2a5
X-SHOW-END-TIME:1
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Amsterdam:20240522T110000
DTEND;TZID=Europe/Amsterdam:20240522T123000
UID:9CA027CE-8455-470B-9B3A-5DB8440C4C41
SUMMARY: ​​&#x200BRegular Session 5
CREATED:20240311T160816Z
DTSTAMP:20240311T160816Z
URL:https://ets24.ewi.tudelft.nl/index.php/home/program/conference-program/regular-session-5
DESCRIPTION:\N \N  \N   Moderators:\N  \N  Annachiara Ruospo\N  \N   1\N  \N  , Zebo Peng\N  \N   2\N  \N \N\N\N \N  \N   Affiliations:\N  \N  \N   1\N  \N  Politecnico di Torino (IT),\N  \N   2\N  \N  Linköping University (SE)\N \N\N\N \N  \N   Degradation Monitoring Through Software-controlled On-chip Sensors for RISC-V\N  \N  \N   \N    \N   \N  \N \N \N  \N   \N    Authors:\N   \N   S. Maryam Ghasemi, Jonas Krautter, Tara Gheshlaghi, Sergej Meschkov, Dennis R. E. Gnad, Mehdi B. Tahoori\N  \N \N \N  \N   \N    Affiliation:\N   \N   Karlsruhe Institute of Technology (DE)\N  \N \N \N \N  \N   Abstract:\N  \N \N \N  \N   Complex systems are subject to various hardware and software defects and faults through the entire design and deployment lifecycle. Many of such defects originate at the electrical or circuit levels, but manifest as functional failures in the field. In this study, we present a methodology for embed- ding and employing software-controlled runtime variation and degradation sensors on a RISC-V SoC to enable system-level and functional testing in the field. We demonstrate the effectiveness of the entire platform through an FPGA implementation. Delay defects and path degradations are emulated by injecting artificial delay elements into the critical path of a specific instruction. We also emulate the effect of workload-induced runtime stress with tunable software-controlled power wasters. Combining various sensors, we show that transient fluctuations, which are caused by temperature or workload, can be effectively separated from persistent delay increase, which is caused by latent manufacturing defects or aging.\N  \N \N \N \N  \N   Biography:\N  \N \N \N  \N   Maryam received her Bachelor's and Master's degrees from the University of Tehran in the field of Electrical Engineering-Digital Systems. In September 2022, she joined the CDNC group at the Karlsruhe Institute of Technology (KIT) as a PhD student under the supervision of Professor Mehdi Tahoori. Her areas of interest include Silicon Lifecycle Management (SLM), Silent Data Corruption (SDC), RISC-V processors, FPGAs, testing, and deep learning.\N  \N \N \N  \N   Best Paper Award Candidate\N  \N \N \N  \N   \N    Cross-Layer Reliability Analysis of NVDLA Accelerators: Exploring the Configuration Space\N   \N   \N    \N     \N    \N   \N  \N  \N   \N    \N     Authors:\N    \N    Alessandro Veronesi\N    \N     1\N    \N    , Alessandro Nazzari\N    \N     2\N    \N    , Dario Passarello\N    \N     2\N    \N    , Milos Krstic\N    \N     1, 3\N    \N    , Michele Favalli\N    \N     4\N    \N    , Luca Cassano\N    \N     2\N    \N    , Antonio Miele\N    \N     2\N    \N    , Davide Bertozzi\N    \N     5\N    \N    , Cristiana Bolchini\N    \N     1\N    \N   \N  \N  \N   \N    \N     Affiliations:\N    \N    \N     1\N    \N    IHP - Microelectronics (DE),\N    \N     2\N    \N    Politecnico di Milano (IT),\N    \N     3\N    \N    University of Potsdam (DE),\N    \N     4\N    \N    University degli Studi di Ferrara (IT),\N    \N     5\N    \N    University of Manchester (UK)\N   \N  \N  \N  \N   \N    Abstract:\N   \N  \N  \N   \N    Investigating the effects of Single Event Upset in domain-specific accelerators represents one of the key enablers to deploy Deep Neural Networks (DNNs) in mission-critical edge applications. Currently, reliability analyses related to DNNs mainly focus either on the DNNs model, at application level, or on the hardware accelerator, at architecture level. This paper presents a systematic cross-layer reliability analysis of NVIDIA Deep-Learning Accelerator, a popular family of industry-grade, open and free DNN accelerators. The goals are i) to analyze the propagation of faults from the hardware to the application level, and ii) to compare different architectural configurations. Our investigation delivers new insights into the performance-accuracy-reliability trade-off spanned by the configuration space of Deep Learning accelerators. In particular, the Failure in Time can be reduced up to 4.3x for the same DNN model accuracy and by up to 9.4x for the same performance, while accounting 6.5x inference latency and 1.1% accuracy drop, respectively.\N   \N  \N  \N  \N   \N    Biography:\N   \N  \N  \N   \N    Graduated in March 2020 at University of Ferrara (IT), A. Veronesi is at the moment PhD student at IHP - Microelectronics (DE).\NHis research majorly focus on computer architecture, dependable AI systems, and cross-layer verification methodologies.\N   \N  \N  \N   \N    \N     CGAN-based Automated Fault Injection\N    \N    \N     \N      \N     \N    \N   \N   \N    \N     \N      Authors:\N     \N     Troya Cagil Köylü, Cornelis Christiaan Berg, Praveen Vadnala\N    \N   \N   \N    \N     \N      Affiliation:\N     \N     Riscure B.V. (NL)\N    \N   \N   \N   \N    \N     Abstract:\N    \N   \N   \N    \N     Fault injection is a major threat to electronic devices. Consequently, developers or independent test labs spend significant time and effort in identifying fault injection vulnerabilities. While there are proposed methods to automate fault injection vulnerability identification, their performance depend on observing many successful glitches first to generate more of them. This takes a considerable amount of time and it is common for fault injection campaigns to produce no or very few successful glitches initially. To address this issue, we propose a conditional generative adversarial network (CGAN)-based automated fault injection method. Our method finds promising regions in the parameter space even without observing successful glitches, as well as adjusts itself after observing them. Experimental results show that our method proposes at least 1.3 times more successful glitch parameters than the state of the art in both voltage and electromagnetic (EM)-based fault injection.\N    \N   \N   \N   \N    \N     Biography:\N    \N   \N   \N    \N     Troya Koylu, born in 1992 in Turkey, completed his bachelors and masters studies in Bilkent University. In 2023, he was awarded the PhD title by the Delft University of Technology, with the thesis "Countermeasures against Fault Injection Attacks in Neural Networks and Processors". Since then, he is working in Riscure as a security analyst and researcher.\N    \N   \N  \N \N\N
X-ALT-DESC;FMTTYPE=text/html:<div class="calendar-authors"> <p>  <b>   Moderators:  </b>  Annachiara Ruospo  <sup>   1  </sup>  , Zebo Peng  <sup>   2  </sup> </p></div><div class="calendar-affiliations"> <p>  <b>   Affiliations:  </b>  <sup>   1  </sup>  Politecnico di Torino (IT),  <sup>   2  </sup>  Linköping University (SE) </p></div><div class="calendar-item"> <div class="header-wrapper">  <h3 class="calendar-paperheader">   Degradation Monitoring Through Software-controlled On-chip Sensors for RISC-V  </h3>  <div class="pdficon filter-red">   <a href="/index.php/download?filename=RS5-1.pdf" target="_blank">    <img src="/files/pdficon.svg"/>   </a>  </div> </div> <div class="calendar-authors">  <p>   <b>    Authors:   </b>   S. Maryam Ghasemi, Jonas Krautter, Tara Gheshlaghi, Sergej Meschkov, Dennis R. E. Gnad, Mehdi B. Tahoori  </p> </div> <div class="calendar-affiliations">  <p>   <b>    Affiliation:   </b>   Karlsruhe Institute of Technology (DE)  </p> </div> <input class="abstract-toggle" id="abstract-toggle-2" type="checkbox"/> <label class="collapsible" for="abstract-toggle-2">  <b>   Abstract:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Complex systems are subject to various hardware and software defects and faults through the entire design and deployment lifecycle. Many of such defects originate at the electrical or circuit levels, but manifest as functional failures in the field. In this study, we present a methodology for embed- ding and employing software-controlled runtime variation and degradation sensors on a RISC-V SoC to enable system-level and functional testing in the field. We demonstrate the effectiveness of the entire platform through an FPGA implementation. Delay defects and path degradations are emulated by injecting artificial delay elements into the critical path of a specific instruction. We also emulate the effect of workload-induced runtime stress with tunable software-controlled power wasters. Combining various sensors, we show that transient fluctuations, which are caused by temperature or workload, can be effectively separated from persistent delay increase, which is caused by latent manufacturing defects or aging.  </p> </div> <input class="abstract-toggle" id="biography-toggle-2" type="checkbox"/> <label class="collapsible" for="biography-toggle-2">  <b>   Biography:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Maryam received her Bachelor's and Master's degrees from the University of Tehran in the field of Electrical Engineering-Digital Systems. In September 2022, she joined the CDNC group at the Karlsruhe Institute of Technology (KIT) as a PhD student under the supervision of Professor Mehdi Tahoori. Her areas of interest include Silicon Lifecycle Management (SLM), Silent Data Corruption (SDC), RISC-V processors, FPGAs, testing, and deep learning.  </p> </div> <div class="calendar-authors">  <b style="color:red">   Best Paper Award Candidate  </b> </div> <div class="calendar-item">  <div class="header-wrapper">   <h3 class="calendar-paperheader">    Cross-Layer Reliability Analysis of NVDLA Accelerators: Exploring the Configuration Space   </h3>   <div class="pdficon filter-red">    <a href="/index.php/download?filename=RS5-2.pdf" target="_blank">     <img src="/files/pdficon.svg"/>    </a>   </div>  </div>  <div class="calendar-authors">   <p>    <b>     Authors:    </b>    Alessandro Veronesi    <sup>     1    </sup>    , Alessandro Nazzari    <sup>     2    </sup>    , Dario Passarello    <sup>     2    </sup>    , Milos Krstic    <sup>     1, 3    </sup>    , Michele Favalli    <sup>     4    </sup>    , Luca Cassano    <sup>     2    </sup>    , Antonio Miele    <sup>     2    </sup>    , Davide Bertozzi    <sup>     5    </sup>    , Cristiana Bolchini    <sup>     1    </sup>   </p>  </div>  <div class="calendar-affiliations">   <p>    <b>     Affiliations:    </b>    <sup>     1    </sup>    IHP - Microelectronics (DE),    <sup>     2    </sup>    Politecnico di Milano (IT),    <sup>     3    </sup>    University of Potsdam (DE),    <sup>     4    </sup>    University degli Studi di Ferrara (IT),    <sup>     5    </sup>    University of Manchester (UK)   </p>  </div>  <input class="abstract-toggle" id="abstract-toggle-3" type="checkbox"/>  <label class="collapsible" for="abstract-toggle-3">   <b>    Abstract:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Investigating the effects of Single Event Upset in domain-specific accelerators represents one of the key enablers to deploy Deep Neural Networks (DNNs) in mission-critical edge applications. Currently, reliability analyses related to DNNs mainly focus either on the DNNs model, at application level, or on the hardware accelerator, at architecture level. This paper presents a systematic cross-layer reliability analysis of NVIDIA Deep-Learning Accelerator, a popular family of industry-grade, open and free DNN accelerators. The goals are i) to analyze the propagation of faults from the hardware to the application level, and ii) to compare different architectural configurations. Our investigation delivers new insights into the performance-accuracy-reliability trade-off spanned by the configuration space of Deep Learning accelerators. In particular, the Failure in Time can be reduced up to 4.3x for the same DNN model accuracy and by up to 9.4x for the same performance, while accounting 6.5x inference latency and 1.1% accuracy drop, respectively.   </p>  </div>  <input class="abstract-toggle" id="biography-toggle-3" type="checkbox"/>  <label class="collapsible" for="biography-toggle-3">   <b>    Biography:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Graduated in March 2020 at University of Ferrara (IT), A. Veronesi is at the moment PhD student at IHP - Microelectronics (DE).His research majorly focus on computer architecture, dependable AI systems, and cross-layer verification methodologies.   </p>  </div>  <div class="calendar-item">   <div class="header-wrapper">    <h3 class="calendar-paperheader">     CGAN-based Automated Fault Injection    </h3>    <div class="pdficon filter-red">     <a href="/index.php/download?filename=RS5-3.pdf" target="_blank">      <img src="/files/pdficon.svg"/>     </a>    </div>   </div>   <div class="calendar-authors">    <p>     <b>      Authors:     </b>     Troya Cagil Köylü, Cornelis Christiaan Berg, Praveen Vadnala    </p>   </div>   <div class="calendar-affiliations">    <p>     <b>      Affiliation:     </b>     Riscure B.V. (NL)    </p>   </div>   <input class="abstract-toggle" id="abstract-toggle-4" type="checkbox"/>   <label class="collapsible" for="abstract-toggle-4">    <b>     Abstract:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     Fault injection is a major threat to electronic devices. Consequently, developers or independent test labs spend significant time and effort in identifying fault injection vulnerabilities. While there are proposed methods to automate fault injection vulnerability identification, their performance depend on observing many successful glitches first to generate more of them. This takes a considerable amount of time and it is common for fault injection campaigns to produce no or very few successful glitches initially. To address this issue, we propose a conditional generative adversarial network (CGAN)-based automated fault injection method. Our method finds promising regions in the parameter space even without observing successful glitches, as well as adjusts itself after observing them. Experimental results show that our method proposes at least 1.3 times more successful glitch parameters than the state of the art in both voltage and electromagnetic (EM)-based fault injection.    </p>   </div>   <input class="abstract-toggle" id="biography-toggle-4" type="checkbox"/>   <label class="collapsible" for="biography-toggle-4">    <b>     Biography:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     Troya Koylu, born in 1992 in Turkey, completed his bachelors and masters studies in Bilkent University. In 2023, he was awarded the PhD title by the Delft University of Technology, with the thesis "Countermeasures against Fault Injection Attacks in Neural Networks and Processors". Since then, he is working in Riscure as a security analyst and researcher.    </p>   </div>  </div> </div></div>
LAST-MODIFIED:20240325T152755Z
SEQUENCE:1207179
LOCATION:Johan de Wittlaan 30\, 2517 JR Den Haag\, Zuid-Holland\, Netherlands
GEO:52.08989950;4.28243397
X-LOCATION-DISPLAYNAME:Room A1
X-ACCESS:1
X-HITS:714
X-COLOR:66c2a5
X-SHOW-END-TIME:1
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Amsterdam:20240523T110000
DTEND;TZID=Europe/Amsterdam:20240523T123000
UID:4CD5A05E-11B8-494E-A621-87CA617BE486
SUMMARY:​Regular Session 6
CREATED:20240313T095721Z
DTSTAMP:20240313T095721Z
URL:https://ets24.ewi.tudelft.nl/index.php/home/program/conference-program/regular-session-8
DESCRIPTION:\N \N  \N   Moderators:\N  \N  Ilia Polian\N  \N   1\N  \N  , Alessandro Savino\N  \N   2\N  \N \N\N\N \N  \N   Affiliations:\N  \N  \N   1\N  \N  University of Stuttgart (DE),\N  \N   2\N  \N  Politecnico di Torino (IT)\N \N\N\N \N  \N   Power Analysis Attack Against post-SAT Logic Locking schemes\N  \N  \N   \N    \N   \N  \N \N \N  \N   \N    Authors:\N   \N   Nassim Riadi, Florent Bruguier, Pascal Benoit, Sophie Dupuis, Marie-Lise Flottes\N  \N \N \N  \N   \N    Affiliation:\N   \N   LIRMM,Univ. Montpellier/CNRS (FR)\N  \N \N \N \N  \N   Abstract:\N  \N \N \N  \N   Due to the globalization of the semiconductor industry, Integrated Circuits (ICs) and Intellectual Properties (IPs) are susceptible to specific threats. IP piracy, overproduction, and introduction of hardware Trojans can indeed compromise valuable design information and trust in the design flow. Logic Locking (LL) is one of the most popular Design-for-Trust techniques that aims to thwart these threats because of the wide range of risks it can prevent. This approach evolves from year to year in order to make it resistant to ever more advanced attacks. While most advanced LL solutions are assumed to be resistant against differential power analysis (DPA), we propose a new attack framework for challenging these approaches and show on several benchmarks that it is possible to reveal more than 88% of the key bits used for locking the designs thanks to DPA.\N  \N \N \N \N  \N   Biography:\N  \N \N \N  \N   Nassim riadi received his Master degree in integrated electronics systems from university of Montpellier In 2022 He is currently pursuing a PhD at Lirmm. His area of interest is design for trust with a particular interest in logic locking techniques.\N  \N \N \N  \N   \N    A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation\N   \N   \N    \N     \N    \N   \N  \N  \N   \N    \N     Authors:\N    \N    Yong Liu\N    \N     1\N    \N    , Yuejun Liu\N    \N     1\N    \N    , Yongbin Zhou\N    \N     1, 2\N    \N    , Yiwen Gao\N    \N     1\N    \N    , Zehua Qiao\N    \N     2\N    \N    , Huaxin Wang\N    \N     1\N    \N   \N  \N  \N   \N    \N     Affiliations:\N    \N    \N     1\N    \N    Nanjing University of Science and Technology (CN),\N    \N     2\N    \N    Chinese Academy of Sciences (CN)\N   \N  \N  \N  \N   \N    Abstract:\N   \N  \N  \N   \N    Post-Quantum Cryptography (PQC) was proposed due to the potential threats quantum computer attacks against conventional public key cryptosystems, and four PQC algorithms besides CRYSTALS-Dilithium (Dilithium for short) have so far been selected for National Institute of Standards and Technology (NIST) standardization. However, the selected algorithms are still vulnerable to side-channel attacks in practice, and their physical security need to be further evaluated. This paper proposes two efficient power analysis attacks against Dilithium implementation, the optimized fast two-stage approach and the single-bit approach, aiming at reducing the key guess space. Our findings reveal that the optimized approach outperforms the conservative approach and the fast two-stage approach proposed in ICCD 2021 by factors of 338 and 49, respectively. Similarly, compared to these two approaches, the single-bit approach achieves acceleration of 367 times and 53 times, respectively.\N   \N  \N  \N  \N   \N    Biography:\N   \N  \N  \N   \N    Yong Liu is currently a master's student at Nanjing University of Science and Technology (CN).His main research interests include side-channel attacks and cryptographic engineering.\N   \N  \N  \N   \N    \N     Counteracting Rowhammer by Data Alternation\N    \N    \N     \N      \N     \N    \N   \N   \N    \N     \N      Authors:\N     \N     Stefan A. Lung, Georgi Gaydadjiev, Said Hamdioui, Mottaqiallah Taouil\N    \N   \N   \N    \N     \N      Affiliation:\N     \N     Delft University of Technology (NL)\N    \N   \N   \N   \N    \N     Abstract:\N    \N   \N   \N    \N     Modern DRAMs are vulnerable to Rowhammer attacks, demanding robust protection methods to mitigate these attacks. Existing solutions aim at increased resilience by improving design and/or adjusting operation parameters, limit row access count by throttling and prevent bit flips by timely row refreshing. However, scaling these methods for future DRAM technologies may incur significant costs in terms of area, power and/or latency. This study analyses the impact of the values of the neighbouring cells on victim cells and introduces a row alternation protection method, which is a novel approach that alternates the data of attacker rows on each access to lower the chance of bit flips in victim rows. Our analysis show that the minimum Rowhammer count to cause a bitflip in a particular cell does not only depend on vertical neighbours from the attacker row, but also on the value of the horizontal neighbours from the victim row as well as diagonal cells from the attacker row. Row alternation is able to protect the majority of the vulnerable cells (i.e., with 65%) for the DRAM used in our case study and in cases where unsuccessful it significantly increases the average minimum required Rowhammer account by 18%.\N    \N   \N   \N   \N    \N     Biography:\N    \N   \N   \N    \N     Stefan Lung is a graduate from The Delft University of Technology. He received his bachelor's degree in Mechatronics from The Hague University of Applied Sciences and his master's degree Embedded Systems from The Delft University of Technology. He is currently employed at the Royal Netherlands Aerospace Centre as an embedded systems cybersecurity research and developer for aerospace and space applications. His interests are cybersecurity, hardware dependability, IC design and advanced computing architectures.\N    \N   \N  \N \N\N
X-ALT-DESC;FMTTYPE=text/html:<div class="calendar-authors"> <p>  <b>   Moderators:  </b>  Ilia Polian  <sup>   1  </sup>  , Alessandro Savino  <sup>   2  </sup> </p></div><div class="calendar-affiliations"> <p>  <b>   Affiliations:  </b>  <sup>   1  </sup>  University of Stuttgart (DE),  <sup>   2  </sup>  Politecnico di Torino (IT) </p></div><div class="calendar-item"> <div class="header-wrapper">  <h3 class="calendar-paperheader">   Power Analysis Attack Against post-SAT Logic Locking schemes  </h3>  <div class="pdficon filter-red">   <a href="/index.php/download?filename=RS6-1.pdf" target="_blank">    <img src="/files/pdficon.svg"/>   </a>  </div> </div> <div class="calendar-authors">  <p>   <b>    Authors:   </b>   Nassim Riadi, Florent Bruguier, Pascal Benoit, Sophie Dupuis, Marie-Lise Flottes  </p> </div> <div class="calendar-affiliations">  <p>   <b>    Affiliation:   </b>   LIRMM,Univ. Montpellier/CNRS (FR)  </p> </div> <input class="abstract-toggle" id="abstract-toggle-2" type="checkbox"/> <label class="collapsible" for="abstract-toggle-2">  <b>   Abstract:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Due to the globalization of the semiconductor industry, Integrated Circuits (ICs) and Intellectual Properties (IPs) are susceptible to specific threats. IP piracy, overproduction, and introduction of hardware Trojans can indeed compromise valuable design information and trust in the design flow. Logic Locking (LL) is one of the most popular Design-for-Trust techniques that aims to thwart these threats because of the wide range of risks it can prevent. This approach evolves from year to year in order to make it resistant to ever more advanced attacks. While most advanced LL solutions are assumed to be resistant against differential power analysis (DPA), we propose a new attack framework for challenging these approaches and show on several benchmarks that it is possible to reveal more than 88% of the key bits used for locking the designs thanks to DPA.  </p> </div> <input class="abstract-toggle" id="biography-toggle-2" type="checkbox"/> <label class="collapsible" for="biography-toggle-2">  <b>   Biography:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Nassim riadi received his Master degree in integrated electronics systems from university of Montpellier In 2022 He is currently pursuing a PhD at Lirmm. His area of interest is design for trust with a particular interest in logic locking techniques.  </p> </div> <div class="calendar-item">  <div class="header-wrapper">   <h3 class="calendar-paperheader">    A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation   </h3>   <div class="pdficon filter-red">    <a href="/index.php/download?filename=RS6-2.pdf" target="_blank">     <img src="/files/pdficon.svg"/>    </a>   </div>  </div>  <div class="calendar-authors">   <p>    <b>     Authors:    </b>    Yong Liu    <sup>     1    </sup>    , Yuejun Liu    <sup>     1    </sup>    , Yongbin Zhou    <sup>     1, 2    </sup>    , Yiwen Gao    <sup>     1    </sup>    , Zehua Qiao    <sup>     2    </sup>    , Huaxin Wang    <sup>     1    </sup>   </p>  </div>  <div class="calendar-affiliations">   <p>    <b>     Affiliations:    </b>    <sup>     1    </sup>    Nanjing University of Science and Technology (CN),    <sup>     2    </sup>    Chinese Academy of Sciences (CN)   </p>  </div>  <input class="abstract-toggle" id="abstract-toggle-3" type="checkbox"/>  <label class="collapsible" for="abstract-toggle-3">   <b>    Abstract:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Post-Quantum Cryptography (PQC) was proposed due to the potential threats quantum computer attacks against conventional public key cryptosystems, and four PQC algorithms besides CRYSTALS-Dilithium (Dilithium for short) have so far been selected for National Institute of Standards and Technology (NIST) standardization. However, the selected algorithms are still vulnerable to side-channel attacks in practice, and their physical security need to be further evaluated. This paper proposes two efficient power analysis attacks against Dilithium implementation, the optimized fast two-stage approach and the single-bit approach, aiming at reducing the key guess space. Our findings reveal that the optimized approach outperforms the conservative approach and the fast two-stage approach proposed in ICCD 2021 by factors of 338 and 49, respectively. Similarly, compared to these two approaches, the single-bit approach achieves acceleration of 367 times and 53 times, respectively.   </p>  </div>  <input class="abstract-toggle" id="biography-toggle-3" type="checkbox"/>  <label class="collapsible" for="biography-toggle-3">   <b>    Biography:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Yong Liu is currently a master's student at Nanjing University of Science and Technology (CN).His main research interests include side-channel attacks and cryptographic engineering.   </p>  </div>  <div class="calendar-item">   <div class="header-wrapper">    <h3 class="calendar-paperheader">     Counteracting Rowhammer by Data Alternation    </h3>    <div class="pdficon filter-red">     <a href="/index.php/download?filename=RS6-3.pdf" target="_blank">      <img src="/files/pdficon.svg"/>     </a>    </div>   </div>   <div class="calendar-authors">    <p>     <b>      Authors:     </b>     Stefan A. Lung, Georgi Gaydadjiev, Said Hamdioui, Mottaqiallah Taouil    </p>   </div>   <div class="calendar-affiliations">    <p>     <b>      Affiliation:     </b>     Delft University of Technology (NL)    </p>   </div>   <input class="abstract-toggle" id="abstract-toggle-4" type="checkbox"/>   <label class="collapsible" for="abstract-toggle-4">    <b>     Abstract:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     Modern DRAMs are vulnerable to Rowhammer attacks, demanding robust protection methods to mitigate these attacks. Existing solutions aim at increased resilience by improving design and/or adjusting operation parameters, limit row access count by throttling and prevent bit flips by timely row refreshing. However, scaling these methods for future DRAM technologies may incur significant costs in terms of area, power and/or latency. This study analyses the impact of the values of the neighbouring cells on victim cells and introduces a row alternation protection method, which is a novel approach that alternates the data of attacker rows on each access to lower the chance of bit flips in victim rows. Our analysis show that the minimum Rowhammer count to cause a bitflip in a particular cell does not only depend on vertical neighbours from the attacker row, but also on the value of the horizontal neighbours from the victim row as well as diagonal cells from the attacker row. Row alternation is able to protect the majority of the vulnerable cells (i.e., with 65%) for the DRAM used in our case study and in cases where unsuccessful it significantly increases the average minimum required Rowhammer account by 18%.    </p>   </div>   <input class="abstract-toggle" id="biography-toggle-4" type="checkbox"/>   <label class="collapsible" for="biography-toggle-4">    <b>     Biography:    </b>   </label>   <div class="calendar-abstract abstract-content">    <p align="justify">     Stefan Lung is a graduate from The Delft University of Technology. He received his bachelor's degree in Mechatronics from The Hague University of Applied Sciences and his master's degree Embedded Systems from The Delft University of Technology. He is currently employed at the Royal Netherlands Aerospace Centre as an embedded systems cybersecurity research and developer for aerospace and space applications. His interests are cybersecurity, hardware dependability, IC design and advanced computing architectures.    </p>   </div>  </div> </div></div>
LAST-MODIFIED:20240507T145524Z
SEQUENCE:4769883
LOCATION:Johan de Wittlaan 30\, 2517 JR Den Haag\, Zuid-Holland\, Netherlands
GEO:52.08989950;4.28243397
X-LOCATION-DISPLAYNAME:Room Gaugain + Dali
X-ACCESS:1
X-HITS:720
X-COLOR:66c2a5
X-SHOW-END-TIME:1
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Europe/Amsterdam:20240523T140000
DTEND;TZID=Europe/Amsterdam:20240523T153000
UID:45AE86C5-890D-49FF-BB27-BD87C842D5CE
SUMMARY:&#x200BRegular Session 7
CREATED:20240311T160816Z
DTSTAMP:20240311T160816Z
URL:https://ets24.ewi.tudelft.nl/index.php/home/program/conference-program/regular-session-7
DESCRIPTION:\N \N  \N   Moderator:\N  \N  Tara Ghasempouri\N \N\N\N \N  \N   Affiliation:\N  \N  Tallinn University of Technology (EE)\N \N\N\N \N  \N   Fault Sensitivity Analysis of Printed Bespoke Multilayer Perceptron Classifiers\N  \N  \N   \N    \N   \N  \N \N \N  \N   \N    Authors:\N   \N   Priyanjana Pal\N   \N    1\N   \N   , Florentia Afentaki\N   \N    1, 2\N   \N   , Haibin Zhao\N   \N    1\N   \N   , Gurol Saglam\N   \N    1\N   \N   , Michael Hefenbrock\N   \N    3\N   \N   , Georgios Zervakis\N   \N    2\N   \N   , Michael Beigl\N   \N    1\N   \N   , Mehdi B. Tahoori\N   \N    1\N   \N  \N \N \N  \N   \N    Affiliations:\N   \N   \N    1\N   \N   Karlsruhe Institute of Technology (DE),\N   \N    2\N   \N   University of Patras (GR),\N   \N    3\N   \N   RevoAI GmbH (DE)\N  \N \N \N \N  \N   Abstract:\N  \N \N \N  \N   Printed Electronics (PE) is an emerging technology with flexible substrates and ultra-low-cost manufacturing, providing an appealing alternative to traditional wafer-scale silicon fabrication. With the increasing integration of various printed neural network (NN) architectures in diverse applications, the reliability of printed circuits has become a critical concern. This work provides a comprehensive analysis of the fault sensitivity on a variety of classification tasks for various digital and analog realizations of printed multilayer perceptrons (MLPs). We further evaluate different digital architectures, i.e., generic, bespoke, and approximate, to provide a comprehensive fault analysis on different benchmark datasets.\N  \N \N \N \N  \N   Biography:\N  \N \N \N  \N   Priyanjana Pal received her B.Tech. in ECE from NIT Agartala in 2018 and M.Tech. in EE from IIT Gandhinagar in 2020. She worked as a Senior ESD engineer at Global Foundries, Bangalore for nearly three years. In 2022, she joined as a PhD researcher with Prof. Mehdi Tahoori's group at Karlsruhe Institute of Technology(KIT), Germany.  Her current research interests are in circuit design with CAD tools, reliability testing of printed circuits, and designing ML-trained flexible neuromorphic circuits.\N  \N \N \N  \N   \N    Polynomial Formal Verification of Approximate Adders with Constant Cutwidth\N   \N   \N    \N     \N    \N   \N  \N  \N   \N    \N     Authors:\N    \N    Mohamed Nadeem\N    \N     1\N    \N    , Chandan Kumar Jha\N    \N     1\N    \N    , Rolf Drechsler\N    \N     2\N    \N   \N  \N  \N   \N    \N     Affiliations:\N    \N    \N     1\N    \N    University of Bremen (DE),\N    \N     2\N    \N    DFKI (DE)\N   \N  \N  \N  \N   \N    Abstract:\N   \N  \N  \N   \N    In the context of digital circuits, formal verification methods have been well-studied to ensure their functional correctness. However, several verification methods fail to provide an upper bound for the time and space complexity. Therefore, Polynomial Formal Verification (PFV) has been introduced to address this problem. Unlike prior works, which have shown that approximate circuits can be verified in polynomial time, we show that approximate circuits with a constant cutwidth can be verified even in linear time. Since approximate circuits have become ubiquitous in error-resilient applications, it becomes essential to guarantee their correctness. While prior works have been limited to formal error analysis, we use Answer Set Programming (ASP) based formal verification to guarantee that the approximate circuit matches its functional specification. In this paper, we first show that several approximate adder circuits exhibit a constant cutwidth. We then provide a PFV approach that relies on this cutwidth as a structural property of the circuits to guarantee a linear-time verification w.r.t. the bitwidth using ASP. Finally, we evaluate several approximate adders in terms of the upper bound of the cutwidth, and verification time.\N   \N  \N  \N  \N   \N    Biography:\N   \N  \N  \N   \N    Mohamed Nadeem is a PhD student in Computer Architecture group under the supervision of Prof. Rolf Drechsler at the University of Bremen. Prior to that, he completed my Master's degree in Computational logic at Techincal University of Dresden, where he was working in the Knowledge Representation and Human Reasoning Group. His Research interests are Knowledge Representation, Logic Synthesis, and Polynomial Formal Verification.\N   \N  \N \N\N
X-ALT-DESC;FMTTYPE=text/html:<div class="calendar-authors"> <p>  <b>   Moderator:  </b>  Tara Ghasempouri </p></div><div class="calendar-affiliations"> <p>  <b>   Affiliation:  </b>  Tallinn University of Technology (EE) </p></div><div class="calendar-item"> <div class="header-wrapper">  <h3 class="calendar-paperheader">   Fault Sensitivity Analysis of Printed Bespoke Multilayer Perceptron Classifiers  </h3>  <div class="pdficon filter-red">   <a href="/index.php/download?filename=RS7-1.pdf" target="_blank">    <img src="/files/pdficon.svg"/>   </a>  </div> </div> <div class="calendar-authors">  <p>   <b>    Authors:   </b>   Priyanjana Pal   <sup>    1   </sup>   , Florentia Afentaki   <sup>    1, 2   </sup>   , Haibin Zhao   <sup>    1   </sup>   , Gurol Saglam   <sup>    1   </sup>   , Michael Hefenbrock   <sup>    3   </sup>   , Georgios Zervakis   <sup>    2   </sup>   , Michael Beigl   <sup>    1   </sup>   , Mehdi B. Tahoori   <sup>    1   </sup>  </p> </div> <div class="calendar-affiliations">  <p>   <b>    Affiliations:   </b>   <sup>    1   </sup>   Karlsruhe Institute of Technology (DE),   <sup>    2   </sup>   University of Patras (GR),   <sup>    3   </sup>   RevoAI GmbH (DE)  </p> </div> <input class="abstract-toggle" id="abstract-toggle-2" type="checkbox"/> <label class="collapsible" for="abstract-toggle-2">  <b>   Abstract:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Printed Electronics (PE) is an emerging technology with flexible substrates and ultra-low-cost manufacturing, providing an appealing alternative to traditional wafer-scale silicon fabrication. With the increasing integration of various printed neural network (NN) architectures in diverse applications, the reliability of printed circuits has become a critical concern. This work provides a comprehensive analysis of the fault sensitivity on a variety of classification tasks for various digital and analog realizations of printed multilayer perceptrons (MLPs). We further evaluate different digital architectures, i.e., generic, bespoke, and approximate, to provide a comprehensive fault analysis on different benchmark datasets.  </p> </div> <input class="abstract-toggle" id="biography-toggle-2" type="checkbox"/> <label class="collapsible" for="biography-toggle-2">  <b>   Biography:  </b> </label> <div class="calendar-abstract abstract-content">  <p align="justify">   Priyanjana Pal received her B.Tech. in ECE from NIT Agartala in 2018 and M.Tech. in EE from IIT Gandhinagar in 2020. She worked as a Senior ESD engineer at Global Foundries, Bangalore for nearly three years. In 2022, she joined as a PhD researcher with Prof. Mehdi Tahoori's group at Karlsruhe Institute of Technology(KIT), Germany.  Her current research interests are in circuit design with CAD tools, reliability testing of printed circuits, and designing ML-trained flexible neuromorphic circuits.  </p> </div> <div class="calendar-item">  <div class="header-wrapper">   <h3 class="calendar-paperheader">    Polynomial Formal Verification of Approximate Adders with Constant Cutwidth   </h3>   <div class="pdficon filter-red">    <a href="/index.php/download?filename=RS7-2.pdf" target="_blank">     <img src="/files/pdficon.svg"/>    </a>   </div>  </div>  <div class="calendar-authors">   <p>    <b>     Authors:    </b>    Mohamed Nadeem    <sup>     1    </sup>    , Chandan Kumar Jha    <sup>     1    </sup>    , Rolf Drechsler    <sup>     2    </sup>   </p>  </div>  <div class="calendar-affiliations">   <p>    <b>     Affiliations:    </b>    <sup>     1    </sup>    University of Bremen (DE),    <sup>     2    </sup>    DFKI (DE)   </p>  </div>  <input class="abstract-toggle" id="abstract-toggle-3" type="checkbox"/>  <label class="collapsible" for="abstract-toggle-3">   <b>    Abstract:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    In the context of digital circuits, formal verification methods have been well-studied to ensure their functional correctness. However, several verification methods fail to provide an upper bound for the time and space complexity. Therefore, Polynomial Formal Verification (PFV) has been introduced to address this problem. Unlike prior works, which have shown that approximate circuits can be verified in polynomial time, we show that approximate circuits with a constant cutwidth can be verified even in linear time. Since approximate circuits have become ubiquitous in error-resilient applications, it becomes essential to guarantee their correctness. While prior works have been limited to formal error analysis, we use Answer Set Programming (ASP) based formal verification to guarantee that the approximate circuit matches its functional specification. In this paper, we first show that several approximate adder circuits exhibit a constant cutwidth. We then provide a PFV approach that relies on this cutwidth as a structural property of the circuits to guarantee a linear-time verification w.r.t. the bitwidth using ASP. Finally, we evaluate several approximate adders in terms of the upper bound of the cutwidth, and verification time.   </p>  </div>  <input class="abstract-toggle" id="biography-toggle-3" type="checkbox"/>  <label class="collapsible" for="biography-toggle-3">   <b>    Biography:   </b>  </label>  <div class="calendar-abstract abstract-content">   <p align="justify">    Mohamed Nadeem is a PhD student in Computer Architecture group under the supervision of Prof. Rolf Drechsler at the University of Bremen. Prior to that, he completed my Master's degree in Computational logic at Techincal University of Dresden, where he was working in the Knowledge Representation and Human Reasoning Group. His Research interests are Knowledge Representation, Logic Synthesis, and Polynomial Formal Verification.   </p>  </div> </div></div>
LAST-MODIFIED:20240325T152818Z
SEQUENCE:1207202
LOCATION:Johan de Wittlaan 30\, 2517 JR Den Haag\, Zuid-Holland\, Netherlands
GEO:52.08989950;4.28243397
X-LOCATION-DISPLAYNAME:Room A1
X-ACCESS:1
X-HITS:648
X-COLOR:66c2a5
X-SHOW-END-TIME:1
END:VEVENT
END:VCALENDAR