ebook img

Frontiers of Quality Electronic Design (QED). AI, IoT and Hardware Security PDF

690 Pages·2023·23.799 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Frontiers of Quality Electronic Design (QED). AI, IoT and Hardware Security

Ali Iranmanesh Editor Frontiers of Quality Electronic Design (QED) AI, IoT and Hardware Security Frontiers of Quality Electronic Design (QED) Ali Iranmanesh Editor Frontiers of Quality Electronic Design (QED) AI, IoT and Hardware Security Editor AliIranmanesh SiliconValleyPolytechnicInstitute LosAltosHills,CA,USA ISBN978-3-031-16343-2 ISBN978-3-031-16344-9 (eBook) https://doi.org/10.1007/978-3-031-16344-9 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNatureSwitzerland AG2023 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar ordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface Thisbookintendstoexplorethelatesttrendsintopicsrelatedtoelectronicdesign, with emphasis on hardware security and application of AI. It is formatted as a collectionofarticles,intheformofchapters,eachwrittenbyoneorseveralauthors withexpertiseintheirfield. I was motivated to create this book through my close association with many technicalconferences,especiallytheeventsorganizedbytheInternationalSociety for Quality Electronic Design (ISQED), a non-profit international organization devoted to innovation and advancement in electronic design, and engineering education, which I founded 23 years ago. Since inception, the organization has spanned over 30 events in various topics related to the field of electronic design, covering topics such as IC design, IoT, Sensors, smart power grid, solar energy technologies,andengineeringeducation. Successfulimplementation ofthese events has resultedinawealthof technical articles to the engineering community. Today, the majority of these articles are availablethroughISQEDproceedingsandIEEEdigitallibrary,Xplore. Last year, I approached several ISQED authors to see if there is any interest to start a book series around the same topics, where authors can get around conference’s page limitations and delve deeper into technical subjects, and so the seedofthisbookwasplanted. Initially, my goal was to cover the entire electronic design cycle, from design concept to manufacturing, and application and, in the process, highlight use of emergingfieldssuchasartificialintelligence(AI)andmachinelearning(ML)and their application in the design process. This turned out to be a major undertaking, andattheend,Ihadtobecontentwithasmallersetoftopics,whicharepresented in this book. I hope I am able to continue the task and create follow-up books to coverafewotherimportanttopics,whichwerenotcoveredinthepresentvolume. v vi Preface I would like to thank all authors for contributing to this book. Biographies of eachchapter’sauthorsareshownattheendofthechapter.Moreover,Iwouldlike toacknowledgemanyothers,whohavevolunteeredtoreviewthemanuscripts,and providevaluablefeedbacktoauthors. LosAltosHills,CA,USA AliIranmanesh July2022 Acknowledgements Specialthankstofollowingchapterreviewers: Prof.OmidKavehei,UniversityofSydney Prof.AhmedullahAziz,UniversityofTennessee,Knoxville Prof.SiddharthaNath,UniversityofCalifornia,SanDiego Prof.MasoudZabihi,UniversityofMinnesota Prof.XinfeiGuo,UniversityofMichigan Prof.BasselSoudan,CollegeofComputingandInformatics Prof.DivyaAkellaKamakshi,UniversityofVirginia Prof.AlvaroCintasCanto,MarymountUniversity Prof.BhasinShivam,NanyangTechnologicalUniversity Prof.AminRezaei,CaliforniaStateUniversity,LongBeach Prof.ChidhambaranathanR,UtahStateUniversity Dr.DeepashreeSengupta,SynopsysInc. vii Contents NANDFlashMemoryDevicesSecurityEnhancementBasedon PhysicalUnclonableFunctions ................................................. 1 SiarheiS.ZalivakaandAlexanderA.Ivaniuk ReRAM-BasedNeuromorphicComputing.................................... 43 FabihaNowshinandYangYi Flash:A“Forgotten”TechnologyinVLSIDesign ........................... 67 SunilP.Khatri,SarmaVrudhula,MontherAbusultan,KunalBharathi, Shao-WeiChu,Cheng-YenLee,KylerR.Scott,GianSingh, andAnkitWagle NonvolatileMemoryTechnologies:Characteristics,Deployment, andResearchChallenges........................................................ 137 SadhanaRaiandBasavarajTalawar DataAnalyticsandMachineLearningforCoverageClosure .............. 175 RavivGal,WesamIbraheem,ZivNevo,BilalSaleh,andAviZiv Cell-AwareModelGenerationUsingMachineLearning.................... 227 Pierred’Hondt,AymenLadhar,PatrickGirard,andArnaudVirazel Neuromorphic Computing: A Path to Artificial Intelligence ThroughEmulatingHumanBrains............................................ 259 NoahZins,YanZhang,ChunxiuYu,andHongyuAn AIforCybersecurityinDistributedAutomotiveIoTSystems.............. 297 VipinKumarKukkala,SooryaaVigneshThiruloga,andSudeepPasricha Ultralow-Power Implementation of Neural Networks Using Inverter-BasedMemristiveCrossbars......................................... 327 Shaghayegh Vahdat, Mehdi Kamal, Ali Afzali-Kusha, andMassoudPedram ix x Contents AI-BasedHardwareSecurityMethodsforInternet-of-Things Applications....................................................................... 387 JayaDofeandWafiDanesh Enabling Edge Computing Using Emerging Memory Technologies:FromDevicetoArchitecture................................... 415 ArmanRoohi,ShaahinAngizi,andDeliangFan IoTCommercialandIndustrialApplicationsandAI-PoweredIoT........ 465 KhaledAhmedNagaty HardwareandSystemSecurity:AttacksandCountermeasures AgainstHardwareTrojans...................................................... 501 KonstantinosLiakos,GeorgiosGeorgakilas,andFotisPlessas FPGASecurity:SecurityThreatsfromUntrustedFPGACAD Toolchain.......................................................................... 551 SandeepSunkavilli,ZhimingZhang,andQiaoyanYu DoSAttackModelsandMitigationFrameworksforNoC-BasedSoCs.... 575 MitaliSinha,SidharthaSankarRout,andSujayDeb DefenseagainstSecurityThreatswithRegardtoSoCLifeCycle.......... 611 UshaMehtaandJayeshPopat DefectDiagnosisTechniquesforSiliconCustomerReturns ................ 641 PatrickGirard,AlbertoBosio,AymenLadhar,andArnaudVirazel Index............................................................................... 677 About the Authors Monther Abusultan received his B.Sc. degree with highest honors in CE with a minor in EE (2008) and his M.S. degree (2010) from Montana State University, Bozeman. He received his Ph.D. degree (2017) from Texas A&M University, College Station. He joined the Advanced Design team at Intel Oregon in 2017 where he worked on the development of Intel’s future process technology nodes, then joined Microsoft Silicon Engineering and Solutions in 2021 to work on the development of Microsoft’s custom microprocessors. He has published in many areas of VLSI including low power FPGA design, GPGPUs, flash-based digital design,logicsynthesis,andoptimization. Ali Afzali-Kusha received the B.Sc. degree from the Sharif University of Tech- nology, Tehran, Iran, in 1988, the M.Sc. degree from the University of Pittsburgh, Pittsburgh, PA, USA, in 1991, and the Ph.D. degree from the University of Michigan, Ann Arbor, USA, in 1994, all in electrical engineering. Dr. Afzali- Kusha has been with the University of Tehran since 1995, where he is currently a professor in the School of Electrical and Computer Engineering. His current researchinterestsincludelow-powerhigh-performancedesignmethodologiesfrom thephysicaldesignleveltothesystemlevel,efficienthardwareimplementationof neuralnetworks,in-memorycomputing. Shaahin Angizi is currently an assistant professor in the Department of Elec- trical and Computer Engineering, New Jersey Institute of Technology (NJIT), Newark,NJ,USA,andthedirectoroftheAdvancedCircuit-to-ArchitectureDesign Laboratory. He completed his doctoral studies in Electrical Engineering at the School of Electrical, Computer and Energy Engineering, Arizona State University (ASU),Tempe,AZin2021.Hisprimaryresearchinterestsincludeultra-low-power in-memory computing based on volatile & non-volatile memories, in-sensor com- putingforIoT,brain-inspired(neuromorphic)computing,andacceleratordesignfor deepneuralnetworksandbioinformatics. xi

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.