scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Design & Test of Computers in 2019"


Journal ArticleDOI
TL;DR: The state of the art in IDS is surveyed, with special emphasis on techniques for detecting attacks on CAN modules, which are of paramount importance to automotive security.
Abstract: Editor’s note: Control Area Network (CAN) is one of the most popular targets for malicious attacks and exploitations in modern automotive systems. The goal of intrusion detection systems (IDS) is to identify and mitigate security attacks; consequently, they are of paramount importance to automotive security. This article surveys the state of the art in IDS, with special emphasis on techniques for detecting attacks on CAN modules. —Sandip Ray, University of Florida

78 citations


Journal ArticleDOI
TL;DR: The authors propose two strategies to enhance fault tolerance of systolic array based deep neural network accelerators.
Abstract: Editor’s note: Systolic array is embracing its renaissance after being accepted by Google TPU as the core computing architecture of machine learning acceleration. In this article, the authors propose two strategies to enhance fault tolerance of systolic array based deep neural network accelerators. —Yiran Chen, Duke University

62 citations


Journal ArticleDOI
TL;DR: An academic perspective of the problem is provided, starting with a survey of recent advances in intelligent sensing, computation, communication, and energy management for resource-constrained IoT sensor nodes and leading to a future outlook and needs.
Abstract: Editor’s note: This article provides an academic perspective of the problem, starting with a survey of recent advances in intelligent sensing, computation, communication, and energy management for resource-constrained IoT sensor nodes and leading to a future outlook and needs. —Shreyas Sen, Purdue University

54 citations


Journal ArticleDOI
TL;DR: The vision of the future and important technologies that might play a strong role in enabling the vision of trillion smart connected sensors are presented and an industry and government perspective to the problem of intelligence resource constrained IoT nodes is provided.
Abstract: Editor’s note: This article provides an industry and government perspective to the problem of intelligence resource constrained IoT nodes and presents the vision of the future and important technologies that might play a strong role in enabling the vision of trillion smart connected sensors. — Shreyas Sen, Purdue University

47 citations


Journal ArticleDOI
TL;DR: In this article, Bhunia reviewed introductory concepts and building blocks for quantum computing and depicts the challenges as well as prospects associated with design, test, and fabrication of quantum devices, including quantum logic gates and memory.
Abstract: Editor’s note: As an emerging technology, quantum computing brings unique promises in creating a fundamentally different paradigm of information processing. This article reviews introductory concepts and building blocks—quantum logic gates and memory, i.e., qubits, for quantum computing and depicts the challenges as well as prospects associated with design, test, and fabrication of quantum devices. —Swarup Bhunia, Case Western Reserve University

45 citations


Journal ArticleDOI
TL;DR: An open-source platform for wearable health monitoring that can enable autonomous collection of clinically relevant data is presented and reference implementations of human activity and gesture recognition applications within this platform are provided.
Abstract: Editor’s note: This article presents an open-source platform for wearable health monitoring. It aims to design a standard set of hardware/software and wearable devices that can enable autonomous collection of clinically relevant data. It provides reference implementations of human activity and gesture recognition applications within this platform. –Jana, Doppa, Washington State University

34 citations


Journal ArticleDOI
TL;DR: This article explores the design of high-density, low-power, and high-speed embedded nonvolatile memory arrays exploiting the unique device characteristics of the emerging ferroelectric FETs.
Abstract: Editor’s note: This article explores the design of high-density, low-power, and high-speed embedded nonvolatile memory arrays exploiting the unique device characteristics of the emerging ferroelectric FETs. — Vivek De, Intel Corporation

32 citations


Journal ArticleDOI
TL;DR: With the hindsight of over three years, Miller reflects on the lessons learned from this experience, and how to exploit a vulnerability in head unit to control the physical aspects of the driving subsystem, including steering and braking.
Abstract: Editor’s note: In 2015, Miller and Valasek demonstrated one of the most celebrated hacks on automotive systems, when they managed to remotely compromise a 2014 Jeep Cherokee. They showed how to exploit a vulnerability in head unit to control the physical aspects of the driving subsystem, including steering and braking. In this article, with the hindsight of over three years, Miller reflects on the lessons learned from this experience. – Sandip Roy, University of Florida

31 citations


Journal ArticleDOI
TL;DR: The model is used to analyze the impact of analog synapse device characteristics on the performance of a two-layer multi-layer perceptron (MLP) neural network and identify critical device properties to guide technology development.
Abstract: Editor’s note: In this article, the authors present a circuit-level macro model (“NeuroSim” simulator) to estimate circuit-level performance of neuroinspired architectures to facilitate design space exploration. The model is used to analyze the impact of analog synapse device characteristics on the performance of a two-layer multi-layer perceptron (MLP) neural network and identify critical device properties (on/off ratio and asymmetry, in this case) to guide technology development.—An Chen, Semiconductor Research Corporation

24 citations


Journal ArticleDOI
TL;DR: The threats and countermeasures for IEEE test infrastructure standards are reviewed, showing test infrastructure has been shown to be a portal for hackers.
Abstract: Editor’s note: Test infrastructure has been shown to be a portal for hackers. This article reviews the threats and countermeasures for IEEE test infrastructure standards. — Ramesh Karri, Tandon School of Engineering, Polytechnic Institute, New York University

22 citations


Journal ArticleDOI
TL;DR: A SPICE-compatible compact model for a range of thin-film transistors that can be manufactured at low cost and on flexible materials using printing technologies is described.
Abstract: Editor’s note: Thin-film transistors can be manufactured at low cost and on flexible materials using printing technologies. These characteristics make them very well suited to many IoT applications, particularly wearable electronics. However, circuit and system designers require device models for these new devices. This article describes a SPICE-compatible compact model for a range of thin-film transistors. The authors have validated the models on three thin-film transistor technologies. — Dimitrios Serpanos, University of Patras — Marilyn Wolf, Georgia Institute of Technology

Journal ArticleDOI
TL;DR: A survey of current automotive security research is presented, showing how emerging automotive systems are governed by various complicated hardware and software systems and the importance of security in these systems.
Abstract: Editor’s note: Emerging automotive systems are governed by various complicated hardware and software systems. Hence, security is an important issue in highly interconnected automotive systems. This article presents a survey of current automotive security research. — Partha Pratim Pande, Washington State University

Journal ArticleDOI
TL;DR: The landscape of designing computing systems with emerging devices is discussed, highlighting the importance of undertaking device-architecture codesign to harness the true benefits of beyond-CMOS devices.
Abstract: Editor’s note: Emerging non-CMOS devices have various advantages and challenges. It is important to undertake device-architecture codesign to harness the true benefits of beyond-CMOS devices. This article discusses the landscape of designing computing systems with emerging devices. —Partha Pratim Pande, Washington State University

Journal ArticleDOI
TL;DR: This paper presents a summary of the state-of-the-art advances in mm-scale computing focusing on the mm3 platform and describes the current state of the art on the platform.
Abstract: Editor’s note: This article presents a summary of the state-of-the-art advances in mm-scale computing focusing on the mm3 platform.—Shreyas Sen, Purdue University

Journal ArticleDOI
TL;DR: In this paper, Chen et al. presented a hardware building block for probabilistic spin logic (PSL) consisting of a p-bit made from an embedded low-barrier unstable magnetic tunnel junction (MTJ) and a capacitive voltage adder.
Abstract: Editor’s note: In this article, the authors present a hardware building block for probabilistic spin logic (PSL) consisting of a probabilistic bit (p-bit) made from an embedded low-barrier unstable magnetic tunnel junction (MTJ) and a capacitive voltage adder. It was demonstrated through simulation that these interconnected building blocks can be designed to solve a small instance of the NP-complete Subset Sum Problem. —An Chen, Semiconductor Research Corporation

Journal ArticleDOI
TL;DR: The authors propose an ingenious watermarking methodology inspired by HW Trojans for efficiently and effectively protecting the authenticity of HW IPs.
Abstract: Editor’s note: Hardware watermarking (HW) is supposed to protect the authenticity of HW intellectual properties (IPs) but face the dual challenge of high overhead and ease of removal. HW Trojans are designed to overcome those same challenges for a very different purpose. In this article, the authors propose an ingenious watermarking methodology inspired by HW Trojans for efficiently and effectively protecting the authenticity of HW IPs. —Axel Jantsch, KTH Royal Institute of Technology

Journal ArticleDOI
TL;DR: This survey article presents various design challenges regarding VLSI design targeted for IoT.
Abstract: Editor’s note: Low cost, low form-factor, and highly energy-efficient very-large-scale integration (VLSI) design is key for the success of the Internet-of-Things (IoT) paradigm. This survey article presents various design challenges regarding VLSI design targeted for IoT. —Partha Pratim Pande, Washington State University

Journal ArticleDOI
TL;DR: A portable lightweight fingerprinting framework is described that can be used for indoor navigation and localization while improving localization accuracy and overcoming the challenge of device heterogeneity.
Abstract: Editor’s note: Fingerprinting is essential for indoor navigation and localization due to its low cost, accuracy, and resiliency to multipath effects in constrained environments. This article aims to overcome the challenge of device heterogeneity and describes a portable lightweight fingerprinting framework while improving localization accuracy.—Paul Bogdan, University of Southern California

Journal ArticleDOI
TL;DR: An advanced reversible arithmetic logic unit with built-in testability for single bit-flip errors is presented.
Abstract: Editor’s note: This article presents an advanced reversible arithmetic logic unit with built-in testability for single bit-flip errors. —Shreyas Sen, Purdue University

Journal ArticleDOI
TL;DR: The principles of high-dimensional (HD) computing as a brain-inspired paradigm, with variables and operations encoded in vectors with high dimensionality (e.g., 10,000) are reviewed.
Abstract: Editor–s note: The author reviews the principles of high-dimensional (HD) computing as a brain-inspired paradigm, with variables and operations encoded in vectors with high dimensionality (e.g., 10,000). HD computing has been shown to be a robust novel approach with promising applications in language and biosignal processing. —An Chen, Semiconductor Research Corporation (SRC) and IBM

Journal ArticleDOI
TL;DR: The authors survey different attacks on digital microfluidic biochips and propose to use randomized checkpoints as hardware-based countermeasures to address security vulnerabilities.
Abstract: Attacks on cyber-physical microfluidic systems have emerged as a rising threat and call for an immediate solution. In this article, the authors survey different attacks on digital microfluidic biochips and propose to use randomized checkpoints as hardware-based countermeasures to address security vulnerabilities. —Ujjwal Guin, Auburn University

Journal ArticleDOI
TL;DR: This article analyzes the impact of manufacturing and physical defects across all layers of the bio-chip architectures and proposes a graph theory-inspired formulation for maximizing the fault coverage through test point insertion.
Abstract: Microfluidic very large scale integration (mVLSI) plays a crucial role for designing point-of-care systems. This article analyzes the impact of manufacturing and physical defects across all layers of the bio-chip architectures and proposes a graph theory-inspired formulation for maximizing the fault coverage through test point insertion. This represents a worthwhile contribution to design-for-testability of mVLSI systems. —Paul Bogdan, University of Southern California

Journal ArticleDOI
TL;DR: A framework for energy-aware network routing architecture suitable for both active and passive data, and energy management is proposed, which exploits the multichannel capacity and effectiveness of the IEEE 802.11af standard.
Abstract: Editor’s note: This article proposes a framework for energy-aware network routing architecture suitable for both active and passive data, and energy management is proposed. It exploits the multichannel capacity and effectiveness of the IEEE 802.11af standard and allows baseband utilization by all available gateway and nodes in the distribution system environment.—Said Hamdioui, Delft University of Technology

Journal ArticleDOI
TL;DR: IoT system architectures for computing at the edge of the Internet and the use of FPGAs as edge devices for industrial automation are discussed.
Abstract: Editor’s note: Industrial automation is an important application area for the Internet-of-Things (IoT) technologies. In this article, Fournaris et al. discuss IoT system architectures for computing at the edge of the Internet and the use of FPGAs as edge devices.—Marilyn Wolf, Georgia Institute of Technology

Journal ArticleDOI
TL;DR: This article presents a framework for reverse engineering a legacy system and determining how modern devices may be used to replace the system or individual components.
Abstract: Maintaining legacy systems, especially in military and aeronautic applications, can pose a significant challenge when system components become obsolete. Obtaining these components through brokers can easily introduce counterfeit devices and otherwise compromise the reliability and security of the system. This article presents a framework for reverse engineering a legacy system and determining how modern devices may be used to replace the system or individual components. —–Jennifer Dworak, Southern Methodist University

Journal ArticleDOI
TL;DR: This article presents a survey regarding data-driven techniques to design sustainable computing systems.
Abstract: Editor’s note: Data-driven design methods are a promising way to design computing systems at various scales. This article presents a survey regarding data-driven techniques to design sustainable computing systems. — Partha Pratim Pande, Washington State University

Journal ArticleDOI
TL;DR: A reconfigurable logic family comprised of spin-based devices that may be dynamically configured/reconfigured owing the versatility of the giant spin-Hall effect (GSHE) device is proposed.
Abstract: Editor’s note: This article proposes a reconfigurable logic family comprised of spin-based devices that may be dynamically configured/reconfigured owing the versatility of the giant spin-Hall effect (GSHE) device. A GSHE device can be used to realize numerous Boolean logic functions, and the proposed spin-based polymorphic logic has the potential to be extremely area efficient. —Michael Niemier, University of Notre Dame

Journal ArticleDOI
TL;DR: This article pioneers a self-powered, small-form-factor, light-weight, low-cost, and a patch-type ultraviolet (UV) meter for measuring the UV radiation with significant impact on human health and smart sensing.
Abstract: This article pioneers a self-powered, small-form-factor, light-weight, low-cost, and a patch-type ultraviolet (UV) meter for measuring the UV radiation with significant impact on human health and smart sensing.—Paul Bogdan, University of Southern California

Journal ArticleDOI
TL;DR: This tutorial, written based on the authors’ strong industry experience, outlines the key challenges associated with functional safety and practices as well as standards to address them.
Abstract: Editor’s note: Assurance of functional safety is a critical component of automotive SoC design, specifically in the context of autonomous driving and advanced driver assistance. This tutorial, written based on the authors’ strong industry experience, outlines the key challenges associated with functional safety and practices as well as standards to address them.—Swarup Bhunia, Case Western Reserve University

Journal ArticleDOI
TL;DR: The platform has been applied to verification of a pedestrian tracking application to demonstrate its effectiveness and is presented as a platform for hardware/ software co-design and co-verification with a flexible hardware/software interface.
Abstract: This article presents a platform for hardware/software co-design and co-verification with a flexible hardware/software interface. The platform has been applied to verification of a pedestrian tracking application to demonstrate its effectiveness. –Wen Chen, NXP Semiconductors NV