Leveraging the Advantages of High-level Synthesis

Leveraging the Advantages of High-level Synthesis
Author: Jianqi Chen
Publisher:
Total Pages:
Release: 2020
Genre: Computer security
ISBN:

Download Leveraging the Advantages of High-level Synthesis Book in PDF, Epub and Kindle

Today’s integrated circuits (IC) are more complicated than ever before, leading to extreme long development times. Therefore, many companies have began to rely on high-level synthesis (HLS) to increase their design productivity. One of the advantages of HLS is that many Register Transfer Level (RTL) designs with different area, latency, power trade-offs can be generated within a short period of time by simply modifying the synthesis options. There is no need to re-write the code as at the RT-level using low-level Hardware Description Languages (HDLs). This process can be even automated through HLS design space exploration (DSE). HLS DSE is the automatic process of generating unique micro-architectures from an untimed behavioral description for HLS. Out of all the micro-architectures the designer is only interested in the Pareto-optimal ones. Because the search space grows exponentially with the number of synthesis options, much work in the are of HLS DSE has been done in the past. In parallel, the IC industry has moved to a fabless model due to economic reason. This leads to many security risks. Moreover, power and temperature have become major concerns in modern IC design. Much work has addressed these topics at the RT-level. However, raising the level of abstraction to the behavioral level requires us to re-think these problems as this new level of abstraction poses new challenges and opportunities to address them. In this work, we leverage the advantages of HLS for hardware security, low-power and thermal-aware design. In particular the ability to automatically generate micro-architectures with unique characteristics. In particular, we present a thermal fingerprinting and watermarking technique to protect behavioral Intellectual Properties (BIPs). We introduce an obfuscation method that partitions BIPs into Application Specific IC (ASIC) and Field Programmable Gate Arrays (FPGA) to prevent designs from being reverse engineered. We also propose a runtime micro-architectural adaptation framework for FPGAs and thermal-aware C-based VLSI design method, exploiting the ability of HLS to generate a large number of RTL designs with different power and performance trade-offs. In summary, this dissertation addresses challenges that appear when raising the level of abstraction and leverages some of the unique advantages of HLS to address them.

High-Level Synthesis

High-Level Synthesis
Author: Philippe Coussy
Publisher: Springer Science & Business Media
Total Pages: 307
Release: 2008-08-01
Genre: Technology & Engineering
ISBN: 1402085885

Download High-Level Synthesis Book in PDF, Epub and Kindle

This book presents an excellent collection of contributions addressing different aspects of high-level synthesis from both industry and academia. It includes an overview of available EDA tool solutions and their applicability to design problems.

High-level Synthesis

High-level Synthesis
Author: Michael Fingeroff
Publisher: Xlibris Corporation
Total Pages: 334
Release: 2010
Genre: Computers
ISBN: 1450097243

Download High-level Synthesis Book in PDF, Epub and Kindle

Are you an RTL or system designer that is currently using, moving, or planning to move to an HLS design environment? Finally, a comprehensive guide for designing hardware using C++ is here. Michael Fingeroff's High-Level Synthesis Blue Book presents the most effective C++ synthesis coding style for achieving high quality RTL. Master a totally new design methodology for coding increasingly complex designs! This book provides a step-by-step approach to using C++ as a hardware design language, including an introduction to the basics of HLS using concepts familiar to RTL designers. Each chapter provides easy-to-understand C++ examples, along with hardware and timing diagrams where appropriate. The book progresses from simple concepts such as sequential logic design to more complicated topics such as memory architecture and hierarchical sub-system design. Later chapters bring together many of the earlier HLS design concepts through their application in simplified design examples. These examples illustrate the fundamental principles behind C++ hardware design, which will translate to much larger designs. Although this book focuses primarily on C and C++ to present the basics of C++ synthesis, all of the concepts are equally applicable to SystemC when describing the core algorithmic part of a design. On completion of this book, readers should be well on their way to becoming experts in high-level synthesis.

Information Security and Cryptology

Information Security and Cryptology
Author: Chunpeng Ge
Publisher: Springer Nature
Total Pages: 426
Release: 2024
Genre: Computer security
ISBN: 9819709458

Download Information Security and Cryptology Book in PDF, Epub and Kindle

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.

Applied Reconfigurable Computing

Applied Reconfigurable Computing
Author: Christian Hochberger
Publisher: Springer
Total Pages: 418
Release: 2019-04-02
Genre: Computers
ISBN: 3030172279

Download Applied Reconfigurable Computing Book in PDF, Epub and Kindle

This book constitutes the proceedings of the 15th International Symposium on Applied Reconfigurable Computing, ARC 2019, held in Darmstadt, Germany, in April 2019. The 20 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 52 submissions. In addition, the volume contains 1 invited paper. The papers were organized in topical sections named: Applications; partial reconfiguration and security; image/video processing; high-level synthesis; CGRAs and vector processing; architectures; design frameworks and methodology; convolutional neural networks.

UML for SOC Design

UML for SOC Design
Author: Grant Martin
Publisher: Springer Science & Business Media
Total Pages: 278
Release: 2006-07-01
Genre: Technology & Engineering
ISBN: 0387257454

Download UML for SOC Design Book in PDF, Epub and Kindle

A tutorial approach to using the UML modeling language in system-on-chip design Based on the DAC 2004 tutorial, applicable for students and professionals Contributions by top-level international researchers The best work at the first UML for SoC workshop Unique combination of both UML capabilities and SoC design issues Condenses research and development ideas that are only found in multiple conference proceedings and many other books into one place Will be the seminal reference work for this area for years to come

Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications

Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications
Author: Tiziana Margaria
Publisher: Springer
Total Pages: 874
Release: 2016-10-04
Genre: Computers
ISBN: 3319471694

Download Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications Book in PDF, Epub and Kindle

The two-volume set LNCS 9952 and LNCS 9953 constitutes the refereed proceedings of the 7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2016, held in Imperial, Corfu, Greece, in October 2016. The papers presented in this volume were carefully reviewed and selected for inclusion in the proceedings. Featuring a track introduction to each section, the papers are organized in topical sections named: statistical model checking; evaluation and reproducibility of program analysis and verification; ModSyn-PP: modular synthesis of programs and processes; semantic heterogeneity in the formal development of complex systems; static and runtime verification: competitors or friends?; rigorous engineering of collective adaptive systems; correctness-by-construction and post-hoc verification: friends or foes?; privacy and security issues in information systems; towards a unified view of modeling and programming; formal methods and safety certification: challenges in the railways domain; RVE: runtime verification and enforcement, the (industrial) application perspective; variability modeling for scalable software evolution; detecting and understanding software doping; learning systems: machine-learning in software products and learning-based analysis of software systems; testing the internet of things; doctoral symposium; industrial track; RERS challenge; and STRESS.

Machine Learning in VLSI Computer-Aided Design

Machine Learning in VLSI Computer-Aided Design
Author: Ibrahim (Abe) M. Elfadel
Publisher: Springer
Total Pages: 694
Release: 2019-03-15
Genre: Technology & Engineering
ISBN: 3030046664

Download Machine Learning in VLSI Computer-Aided Design Book in PDF, Epub and Kindle

This book provides readers with an up-to-date account of the use of machine learning frameworks, methodologies, algorithms and techniques in the context of computer-aided design (CAD) for very-large-scale integrated circuits (VLSI). Coverage includes the various machine learning methods used in lithography, physical design, yield prediction, post-silicon performance analysis, reliability and failure analysis, power and thermal analysis, analog design, logic synthesis, verification, and neuromorphic design. Provides up-to-date information on machine learning in VLSI CAD for device modeling, layout verifications, yield prediction, post-silicon validation, and reliability; Discusses the use of machine learning techniques in the context of analog and digital synthesis; Demonstrates how to formulate VLSI CAD objectives as machine learning problems and provides a comprehensive treatment of their efficient solutions; Discusses the tradeoff between the cost of collecting data and prediction accuracy and provides a methodology for using prior data to reduce cost of data collection in the design, testing and validation of both analog and digital VLSI designs. From the Foreword As the semiconductor industry embraces the rising swell of cognitive systems and edge intelligence, this book could serve as a harbinger and example of the osmosis that will exist between our cognitive structures and methods, on the one hand, and the hardware architectures and technologies that will support them, on the other....As we transition from the computing era to the cognitive one, it behooves us to remember the success story of VLSI CAD and to earnestly seek the help of the invisible hand so that our future cognitive systems are used to design more powerful cognitive systems. This book is very much aligned with this on-going transition from computing to cognition, and it is with deep pleasure that I recommend it to all those who are actively engaged in this exciting transformation. Dr. Ruchir Puri, IBM Fellow, IBM Watson CTO & Chief Architect, IBM T. J. Watson Research Center

Behavioral Synthesis for Hardware Security

Behavioral Synthesis for Hardware Security
Author: Srinivas Katkoori
Publisher: Springer Nature
Total Pages: 397
Release: 2022-02-08
Genre: Technology & Engineering
ISBN: 3030788415

Download Behavioral Synthesis for Hardware Security Book in PDF, Epub and Kindle

This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they provide readers with synthesis techniques for six automated security solutions, namely, hardware obfuscation, hardware Trojan detection, IP watermarking, state encoding, side channel attack resistance, and information flow tracking. Provides a single-source reference to behavioral synthesis for hardware security; Describes automatic synthesis techniques for algorithmic obfuscation, using code transformations; Includes behavioral synthesis techniques for intellectual property protection.