P. Schaumont’s research while affiliated with Virginia Tech and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (41)


Fast Dynamic Memory Integration in Co-Simulation Frameworks for Multiprocessor System on-Chip
  • Article

October 2007

·

7 Reads

·

2 Citations

O. Villa

·

P. Schaumont

·

I. Verbauwhede

·

[...]

·

In this paper is proposed a technique to integrate and simulate a dynamic memory in a multiprocessor framework based on C/C++/SystemC. Using host machine's memory management capabilities, dynamic data processing is supported without compromising speed and accuracy of the simulation. A first prototype in a shared memory context is presented.




Multilevel design validation in a secure embedded system

January 2006

·

10 Reads

·

2 Citations

We present a simulation-based methodology to support secure embedded design. The methodology is explained through a case study, the Thumbpod-2 portable embedded fingerprint authenticator. By using multilevel validation, we can observe the flow of sensitive information through the system as it takes on multiple forms, from software variables to hardware bus-signals. This allows shielding off of unwanted side-channel information leaks at the protocol, software, or hardware level. We discuss how the ThumbPod-2 design is partitioned into a side-channel-free implementation, and how a codesign environment called GEZEL is used to validate this partitioning process at each abstraction level.


Energy and performance analysis of mapping parallel multi-threaded tasks for an on-chip multi-processor system

November 2005

·

14 Reads

Multiprocessor systems offer superior performance and potentially better energy-reduction than single-processor systems. It all depends, however, on how well the application can be mapped onto the architecture. Indeed, a careful tradeoff of energy and performance requires a thorough understanding of the energy consumption pattern of the application across the architecture. We develop a simulation platform, MultiPo-Sim, which returns the cycle-accurate performance and energy consumption of a multiprocessor system, for both hardware components and software primitives. On the hardware level, energy scaling techniques can be modeled and each processing core can operate at different energy modes. MultiPo-Sim achieves 331K cycles per second simulation speed for a four-processor system on a 3GHz, 512MByte Fedora-2 PC. On the software level, data parallelizing and task parallelizing are two common models of multi-thread programming. By using MultiPo-Sim, we show that they show different energy and performance characteristics when mapping onto a multi-processor system.


A race-free hardware modeling language
  • Conference Paper
  • Full-text available

August 2005

·

175 Reads

·

2 Citations

We describe race-free properties of a hardware description language called GEZEL. The language describes networks of cycle-true finite-state-machines with datapaths (FSMDs). We derive a set of four rules under which a network of such FSMDs satisfies the Kahn principle. When applying those rules, GEZEL programs will be determinate and a designer will thus obtain race-free hardware. We define extended FSMD networks as FSMD networks for which some components are user-defined and not specified as FSMDs. An important result is that the determinate properties of the FSMD network are also valid for the extended FSMD network provided that the user-defined components are determinate. Most hardware description languages do not have this determinacy. Their simulation semantics are dependent on simulator implementation, and on a run-time race resolution mechanism. We therefore position GEZEL as a model of computation that RTL designers should have in mind while creating RTL models. In fact, we can generate SystemC and other HDL code from GEZEL models, thereby guaranteeing the determinacy in the generated HDL code.

Download

A side-channel leakage free coprocessor IC in 0.18μm CMOS for embedded AES-based cryptographic and biometric processing

July 2005

·

54 Reads

·

67 Citations

Security ICs are vulnerable to side-channel attacks (SCAs) that find the secret key by monitoring the power consumption and other information that is leaked by the switching behavior of digital CMOS gates. This paper describes a side-channel attack resistant coprocessor IC and its design techniques. The IC has been fabricated in 0.18μm CMOS. The coprocessor, which is used for embedded cryptographic and biometric processing, consists of four components: an advanced encryption standard (AES) based cryptographic engine, a fingerprint-matching oracle, template storage, and an interface unit. Two functionally identical coprocessors have been fabricated on the same die. The first, 'secure', coprocessor is implemented using a logic style called wave dynamic digital logic (WDDL) and a layout technique called differential routing. The second, 'insecure', coprocessor is implemented using regular standard cells and regular routing techniques. Measurement-based experimental results show that a differential power analysis (DPA) attack on the insecure coprocessor requires only 8,000 acquisitions to disclose the entire 128b secret key. The same attack on the secure coprocessor still does not disclose the entire secret key at 1,500,000 acquisitions. This improvement in DPA resistance of at least 2 orders of magnitude makes the attack de facto infeasible. The required number of measurements is larger than the lifetime of the secret key in most practical systems.


Cooperative multithreading on embedded multiprocessor architectures enables energy-scalable design

July 2005

·

25 Reads

·

23 Citations

We propose an embedded multiprocessor architecture and its associated thread-based programming model. Using a cycle-true simulation model of this architecture, we are able to estimate energy savings for a threaded C program. The savings are obtained by voltage- and frequency-scaling of the individual processors. We port a fingerprint minutiae detection application onto this architecture, and show the resulting performance on single-, dual-, and quad-processor configurations. The energy-scaled quad-processor version results in a 77 % energy reduction over the single-processor non-scaled implementation, at only a 2.2 % degradation in cycle count.


CT-bus: a heterogeneous CDMA/TDMA bus for future SOC

December 2004

·

52 Reads

·

25 Citations

CDMA interconnect is a new interconnect mechanism for future SoC. Compared to a conventional TDMA-based bus, a CDMA-based bus has better channel isolation and channel continuity. We introduce a new bus architecture called CT-bus, which mixes and takes strengths of both CDMA-based and TDMA-based interconnect schemes. A CT-bus gives designers the ability to cope with widely varying communication requirements. We propose a method and a tool to explore the mapping of heterogeneous traffic flows onto the CT-bus. Simulation results on a multimedia mobile phone system show that traffic flows mapped onto a CT-bus meet the latency requirements while the same traffic flows mapped onto a conventional TDMA-only bus violate these requirements.


Embedded software integration for coarse-grain reconfigurable systems

May 2004

·

15 Reads

·

25 Citations

Summary form only given. Coarse-grain reconfigurable systems offer high performance and energy-efficiency, provided an efficient run-time reconfiguration mechanism is available. Using an embedded software vantage point, we define three levels of reconfigurability for such systems, each with a different degree of coupling between embedded software and reconfigurable hardware. We classify reconfigurable systems starting with tightly-coupled coprocessors and evolving to processor networks. This results in a gradual increase of energy-efficiency when compared to software-only systems, at the cost of increasing programming complexity. Using several sample applications including signal-, crypto-, and network-processing acceleration units, we demonstrate energy-efficiency improvements of 12 times over software for tightly-coupled systems up to 84 times for network-on-chip systems.


Citations (34)


... Conversely, side-channel attacks extract design information while the device operates by observing its reaction to user-defined stimuli [6], [7], [8]. Several wellknown attacks in this category, including differential power analysis (DPA) [9], extract design characteristics using current consumption measured across different combinations of input signals. Another powerful tool in the arsenal of physical attacks is fault injection, which can successfully compromise an embedded cryptographic implementation even with a single fault. ...

Reference:

Laser Fault Injection Vulnerability Assessment and Mitigation with Case Study on PG-TVD Logic Cells
Circuits and design techniques for secure ICs resistant to side-channel attacks
  • Citing Conference Paper
  • January 2006

... The ARM instruction-set simulator has been modified to support a communication interface for the multiprocessor environment and to model a parameterizable memory hierarchy. The Shared Memory models are based on the work presented in [16]. Timing models for these components have been tuned with respect to [4] obtaining an accuracy at cycle level. ...

Fast Dynamic Memory Integration in Co-Simulation Frameworks for Multiprocessor System on-Chip
  • Citing Article
  • October 2007

... The use of software reconfigurable hardware has been common in rapid prototyping and the introduction of FPGA by Xilinx in the mid 80's spurred a lot of research efforts in the development of reconfigurable FPGA-based systems (a good survey can be found in [9]). Today, reconfigurable hardware is gaining ground even in final implementations [10], especially in cases where new functionality may be added during the life cycle of the product or where in field error correction has to be provided, and in the past couple of years, there has been a serious attempt at developing platforms that combine micro-processors and reconfigurable logic on the same chip [12, 13, 1, 2]. The resulting platforms gain efficiency in terms of speed and power consumption (Rabaey has recently reported two orders of magnitude difference in power consumption between a full software implementation and mixed softwarereconfigurable hardware one [8]) without giving up much in terms of flexibility. ...

A quick safari in the reconfiguration jungle
  • Citing Article
  • January 2001

... The Cathedral-3 high-level synthesis system, developed in our lab, is based on the above concepts. It is targeted to high-speed real-time signal processing functions, which have a low potential for time multiplexing 39,57], and extends the older Cathedral-2 methodology 52] which is embedded in the commercial Mistral-2 environment of EDC/ Mentor 40]. Cathedral 3 has been used intensively in the mobile terminal design. ...

Synthesis of high throughput dsp asics using application specific data paths
  • Citing Article

... The design presented by Hodjat and Verbauwhede in Ref. 33 attached the AES coprocessor to the LEON2 processor on a dedicated interface. In Ref. 34, the authors transferred data to and from the coprocessor via memory-mapped I/O. These two designs are implemented on Xilinx Virtex-II FPGA on which the LEON2 core without extension needs 4856 LUTs at 50 MHz. ...

Embedded software integration for coarse-grain reconfigurable systems
  • Citing Conference Paper
  • May 2004

... Since Kocher et al. [2] showed the first successful PA attacks, there have been dozens of proposals for new SCA attacks and countermeasures. These attacks and countermeasures all tend to concentrate on a single abstraction level at a time [7]. For example, the Smart Card software is developed on fixed hardware platforms, so the results in that area are software-based solutions. ...

Multilevel design validation in a secure embedded system
  • Citing Conference Paper
  • January 2006

... In recent years, researchers have shown the effectiveness of power-analysis attacks to reveal the encryption key in cryptographic circuits. There have been many countermeasures are proposed, e.g., masking [31], random instruction injection [39], non-deterministic processors [40], random register renaming [41], secure co-processors [42], and cell-level countermeasures [43]. In this work, we employ the cell-level countermeasure, i.e. to build secure logic gates. ...

A side-channel leakage free coprocessor IC in 0.18μm CMOS for embedded AES-based cryptographic and biometric processing
  • Citing Conference Paper
  • July 2005

... The GEZEL [13], [12] language and design environment for exploration, simulation and implementation of domainspecific architectures supports only one clock domain, thus is limited to synchronous designs, and its approach to skip cycles, does not improve the simulation performance in case of permanent state activity, e.g. if the hardware design includes periodic counters. ...

A race-free hardware modeling language