Skip to main content

Showing 1–4 of 4 results for author: Sciuto, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.04361  [pdf, other

    cs.AR

    Iris: Automatic Generation of Efficient Data Layouts for High Bandwidth Utilization

    Authors: Stephanie Soldavini, Donatella Sciuto, Christian Pilato

    Abstract: Optimizing data movements is becoming one of the biggest challenges in heterogeneous computing to cope with data deluge and, consequently, big data applications. When creating specialized accelerators, modern high-level synthesis (HLS) tools are increasingly efficient in optimizing the computational aspects, but data transfers have not been adequately improved. To combat this, novel architectures… ▽ More

    Submitted 8 November, 2022; originally announced November 2022.

    Comments: Accepted for presentation at ASPDAC'23

  2. Optimizing the Use of Behavioral Locking for High-Level Synthesis

    Authors: Christian Pilato, Luca Collini, Luca Cassano, Donatella Sciuto, Siddharth Garg, Ramesh Karri

    Abstract: The globalization of the electronics supply chain requires effective methods to thwart reverse engineering and IP theft. Logic locking is a promising solution, but there are many open concerns. First, even when applied at a higher level of abstraction, locking may result in significant overhead without improving the security metric. Second, optimizing a security metric is application-dependent and… ▽ More

    Submitted 7 June, 2022; v1 submitted 20 May, 2021; originally announced May 2021.

    Comments: Accepted for publication in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

  3. ASSURE: RTL Locking Against an Untrusted Foundry

    Authors: Christian Pilato, Animesh Basak Chowdhury, Donatella Sciuto, Siddharth Garg, Ramesh Karri

    Abstract: Semiconductor design companies are integrating proprietary intellectual property (IP) blocks to build custom integrated circuits (IC) and fabricate them in a third-party foundry. Unauthorized IC copies cost these companies billions of dollars annually. While several methods have been proposed for hardware IP obfuscation, they operate on the gate-level netlist, i.e., after the synthesis tools embed… ▽ More

    Submitted 18 April, 2021; v1 submitted 11 October, 2020; originally announced October 2020.

    Comments: Accepted for publication in IEEE Transactions on VLSI Systems on 06-Apr-2021

  4. arXiv:0710.4685  [pdf

    cs.AR

    Reliable System Specification for Self-Checking Data-Paths

    Authors: C. Bolchini, F. Salice, D. Sciuto, L. Pomante

    Abstract: The design of reliable circuits has received a lot of attention in the past, leading to the definition of several design techniques introducing fault detection and fault tolerance properties in systems for critical applications/environments. Such design methodologies tackled the problem at different abstraction levels, from switch-level to logic, RT level, and more recently to system level. Aim… ▽ More

    Submitted 25 October, 2007; originally announced October 2007.

    Comments: Submitted on behalf of EDAA (http://www.edaa.com/)

    Journal ref: Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)