Skip to main content

Showing 1–36 of 36 results for author: Bhunia, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.19418  [pdf, ps, other

    cs.AR cs.ET

    Enhancing Test Efficiency through Automated ATPG-Aware Lightweight Scan Instrumentation

    Authors: Sudipta Paria, Md Rezoan Ferdous, Aritra Dasgupta, Atri Chatterjee, Swarup Bhunia

    Abstract: Scan-based Design-for-Testability (DFT) measures are prevalent in modern digital integrated circuits to achieve high test quality at low hardware cost. With the advent of 3D heterogeneous integration and chiplet-based systems, the role of scan is becoming ever more important due to its ability to make internal design nodes controllable and observable in a systematic and scalable manner. However, t… ▽ More

    Submitted 25 May, 2025; originally announced May 2025.

    Comments: 10 pages, 8 figures, 5 tables

  2. arXiv:2504.18812  [pdf, other

    cs.CR cs.AR

    SynFuzz: Leveraging Fuzzing of Netlist to Detect Synthesis Bugs

    Authors: Raghul Saravanan, Sudipta Paria, Aritra Dasgupta, Venkat Nitin Patnala, Swarup Bhunia, Sai Manoj P D

    Abstract: In the evolving landscape of integrated circuit (IC) design, the increasing complexity of modern processors and intellectual property (IP) cores has introduced new challenges in ensuring design correctness and security. The recent advancements in hardware fuzzing techniques have shown their efficacy in detecting hardware bugs and vulnerabilities at the RTL abstraction level of hardware. However, t… ▽ More

    Submitted 16 May, 2025; v1 submitted 26 April, 2025; originally announced April 2025.

    Comments: 15 pages, 10 figures, 5 tables

  3. arXiv:2503.07568  [pdf, other

    cs.CR cs.AI cs.LG

    Runtime Detection of Adversarial Attacks in AI Accelerators Using Performance Counters

    Authors: Habibur Rahaman, Atri Chatterjee, Swarup Bhunia

    Abstract: Rapid adoption of AI technologies raises several major security concerns, including the risks of adversarial perturbations, which threaten the confidentiality and integrity of AI applications. Protecting AI hardware from misuse and diverse security threats is a challenging task. To address this challenge, we propose SAMURAI, a novel framework for safeguarding against malicious usage of AI hardware… ▽ More

    Submitted 10 March, 2025; originally announced March 2025.

    Comments: 7 pages, 8 figures

  4. arXiv:2502.14116  [pdf, other

    cs.CR

    SALTY: Explainable Artificial Intelligence Guided Structural Analysis for Hardware Trojan Detection

    Authors: Tanzim Mahfuz, Pravin Gaikwad, Tasneem Suha, Swarup Bhunia, Prabuddha Chakraborty

    Abstract: Hardware Trojans are malicious modifications in digital designs that can be inserted by untrusted supply chain entities. Hardware Trojans can give rise to diverse attack vectors such as information leakage (e.g. MOLES Trojan) and denial-of-service (rarely triggered bit flip). Such an attack in critical systems (e.g. healthcare and aviation) can endanger human lives and lead to catastrophic financi… ▽ More

    Submitted 19 February, 2025; originally announced February 2025.

  5. arXiv:2502.04303  [pdf

    cs.CR

    The 23andMe Data Breach: Analyzing Credential Stuffing Attacks, Security Vulnerabilities, and Mitigation Strategies

    Authors: Ryan Holthouse, Serena Owens, Suman Bhunia

    Abstract: In October 2023, 23andMe, a prominent provider of personal genetic testing, ancestry, and health information services, suffered a significant data breach orchestrated by a cybercriminal known as ``Golem.'' Initially, approximately 14,000 user accounts were compromised by a credential smear attack, exploiting reused usernames and passwords from previous data leaks. However, due to the interconnecte… ▽ More

    Submitted 6 February, 2025; originally announced February 2025.

  6. arXiv:2502.04287  [pdf

    cs.CR

    Breaking the Vault: A Case Study of the 2022 LastPass Data Breach

    Authors: Jessica Gentles, Mason Fields, Garrett Goodman, Suman Bhunia

    Abstract: Managing the security of employee work computers has become increasingly important as today's work model shifts to remote and hybrid work plans. In this paper, we explore the recent 2022 LastPass data breach, in which the attacker obtained sensitive customer data by exploiting a software vulnerability on a DevSecOps engineer's computer. We discuss the methodology of the attacker as well as the imp… ▽ More

    Submitted 6 February, 2025; originally announced February 2025.

  7. arXiv:2501.17760  [pdf, ps, other

    cs.CR

    Unraveling Log4Shell: Analyzing the Impact and Response to the Log4j Vulnerabil

    Authors: John Doll, Carson McCarthy, Hannah McDougall, Suman Bhunia

    Abstract: The realm of technology frequently confronts threats posed by adversaries exploiting loopholes in programs. Among these, the Log4Shell vulnerability in the Log4j library stands out due to its widespread impact. Log4j, a prevalent software library for log recording, is integrated into millions of devices worldwide. The Log4Shell vulnerability facilitates remote code execution with relative ease. It… ▽ More

    Submitted 29 January, 2025; originally announced January 2025.

  8. arXiv:2501.12292  [pdf, other

    cs.CR

    Library-Attack: Reverse Engineering Approach for Evaluating Hardware IP Protection

    Authors: Aritra Dasgupta, Sudipta Paria, Christopher Sozio, Andrew Lukefahr, Swarup Bhunia

    Abstract: Existing countermeasures for hardware IP protection, such as obfuscation, camouflaging, and redaction, aim to defend against confidentiality and integrity attacks. However, within the current threat model, these techniques overlook the potential risks posed by a highly skilled adversary with privileged access to the IC supply chain, who may be familiar with critical IP blocks and the countermeasur… ▽ More

    Submitted 21 January, 2025; originally announced January 2025.

  9. arXiv:2411.07308  [pdf, other

    cs.CR cs.AI

    X-DFS: Explainable Artificial Intelligence Guided Design-for-Security Solution Space Exploration

    Authors: Tanzim Mahfuz, Swarup Bhunia, Prabuddha Chakraborty

    Abstract: Design and manufacturing of integrated circuits predominantly use a globally distributed semiconductor supply chain involving diverse entities. The modern semiconductor supply chain has been designed to boost production efficiency, but is filled with major security concerns such as malicious modifications (hardware Trojans), reverse engineering (RE), and cloning. While being deployed, digital syst… ▽ More

    Submitted 11 November, 2024; originally announced November 2024.

  10. arXiv:2406.05282  [pdf, other

    cs.AR

    Look-Up Table based Neural Network Hardware

    Authors: Ovishake Sen, Chukwufumnanya Ogbogu, Peyman Dehghanzadeh, Janardhan Rao Doppa, Swarup Bhunia, Partha Pratim Pande, Baibhab Chatterjee

    Abstract: Traditional digital implementations of neural accelerators are limited by high power and area overheads, while analog and non-CMOS implementations suffer from noise, device mismatch, and reliability issues. This paper introduces a CMOS Look-Up Table (LUT)-based Neural Accelerator (LUT-NA) framework that reduces the power, latency, and area consumption of traditional digital accelerators through pr… ▽ More

    Submitted 30 September, 2024; v1 submitted 7 June, 2024; originally announced June 2024.

    Comments: 7 pages

  11. arXiv:2405.09763  [pdf, other

    cs.AI cs.ET cs.MA eess.SY

    Fusion Intelligence: Confluence of Natural and Artificial Intelligence for Enhanced Problem-Solving Efficiency

    Authors: Rohan Reddy Kalavakonda, Junjun Huan, Peyman Dehghanzadeh, Archit Jaiswal, Soumyajit Mandal, Swarup Bhunia

    Abstract: This paper introduces Fusion Intelligence (FI), a bio-inspired intelligent system, where the innate sensing, intelligence and unique actuation abilities of biological organisms such as bees and ants are integrated with the computational power of Artificial Intelligence (AI). This interdisciplinary field seeks to create systems that are not only smart but also adaptive and responsive in ways that m… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: 7 pages, 4 figures, 1 Table

  12. arXiv:2311.10581  [pdf, other

    cs.AR cs.ET

    LUNA-CIM: Lookup Table based Programmable Neural Processing in Memory

    Authors: Peyman Dehghanzadeh, Baibhab Chatterjee, Swarup Bhunia

    Abstract: This paper presents a novel approach for performing computations using Look-Up Tables (LUTs) tailored specifically for Compute-in-Memory applications. The aim is to address the scalability challenges associated with LUT-based computation by reducing storage requirements and energy consumption while capitalizing on the faster and more energy-efficient nature of look-up methods compared to conventio… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

  13. arXiv:2311.08621  [pdf, other

    cs.NI

    Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT

    Authors: Angela Grace Famera, Raj Mani Shukla, Suman Bhunia

    Abstract: A botnet is an army of zombified computers infected with malware and controlled by malicious actors to carry out tasks such as Distributed Denial of Service (DDoS) attacks. Billions of Internet of Things (IoT) devices are primarily targeted to be infected as bots since they are configured with weak credentials or contain common vulnerabilities. Detecting botnet propagation by monitoring the networ… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: Paper submitted to conference

  14. arXiv:2311.06261  [pdf, other

    cs.CY cs.AI

    With ChatGPT, do we have to rewrite our learning objectives -- CASE study in Cybersecurity

    Authors: Peter Jamieson, Suman Bhunia, Dhananjai M. Rao

    Abstract: With the emergence of Artificial Intelligent chatbot tools such as ChatGPT and code writing AI tools such as GitHub Copilot, educators need to question what and how we should teach our courses and curricula in the future. In reality, automated tools may result in certain academic fields being deeply reduced in the number of employable people. In this work, we make a case study of cybersecurity und… ▽ More

    Submitted 26 September, 2023; originally announced November 2023.

  15. arXiv:2308.06932  [pdf, other

    cs.CR cs.AR

    DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection

    Authors: Sudipta Paria, Aritra Dasgupta, Swarup Bhunia

    Abstract: Securing critical assets in a bus-based System-On-Chip (SoC) is imperative to mitigate potential vulnerabilities and prevent unauthorized access, ensuring the integrity, availability, and confidentiality of the system. Ensuring security throughout the SoC design process is a formidable task owing to the inherent intricacies in SoC designs and the dispersion of assets across diverse IPs. Large Lang… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

    Comments: 15 pages, 7 figures, 8 tables

  16. arXiv:2308.02792  [pdf, other

    cs.CR cs.AR

    DiSPEL: Distributed Security Policy Enforcement for Bus-based SoC

    Authors: Sudipta Paria, Swarup Bhunia

    Abstract: The current zero trust model adopted in System-on-Chip (SoC) design is vulnerable to various malicious entities, and modern SoC designs must incorporate various security policies to protect sensitive assets from unauthorized access. These policies involve complex interactions between multiple IP blocks, which poses challenges for SoC designers and security experts when implementing these policies… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

    Comments: 14 Pages, 9 Figures

  17. arXiv:2307.07631  [pdf, other

    cs.LG

    Towards Model-Size Agnostic, Compute-Free, Memorization-based Inference of Deep Learning

    Authors: Davide Giacomini, Maeesha Binte Hashem, Jeremiah Suarez, Swarup Bhunia, Amit Ranjan Trivedi

    Abstract: The rapid advancement of deep neural networks has significantly improved various tasks, such as image and speech recognition. However, as the complexity of these models increases, so does the computational cost and the number of parameters, making it difficult to deploy them on resource-constrained devices. This paper proposes a novel memorization-based inference (MBI) that is compute free and onl… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

  18. arXiv:2204.11095  [pdf, ps, other

    cs.DC

    EdgeKeeper: Resilient and Lightweight Coordination for Mobile Edge Computing Systems

    Authors: S. Bhunia, R. Stoleru, M. Sagor, A. Haroon, A. Altaweel, M. Chao, M. Maurice, R. Blalock

    Abstract: Mobile Edge Computing (MEC) has been gaining significant interest from first responders and tactical teams, primarily because they can employ handheld mobile devices to form a computing cluster (for computing tasks like face/scene recognition, virtual assistance) when connectivity to the cloud is not present or it is limited. High user mobility in first responder or tactical environments makes MEC… ▽ More

    Submitted 23 April, 2022; originally announced April 2022.

    Comments: 12 Pages

  19. arXiv:2204.10823  [pdf, ps, other

    cs.DC

    R-Drive: Resilient Data Storage and Sharing for Mobile Edge Computing Systems

    Authors: M. Sagor, R. Stoleru, S. Bhunia, M. Chao, A. Haroon, A. Altaweel, M. Maurice, R. Blalock

    Abstract: Mobile edge computing (MEC) systems (in which intensive computation and data storage tasks are performed locally, due to the absence of communication infrastructure for connectivity to the cloud) are currently being developed for disaster response applications and for tactical environments. MEC applications for these scenarios generate and process significant mission-critical and personal data tha… ▽ More

    Submitted 22 April, 2022; originally announced April 2022.

    Comments: 13 pages

  20. arXiv:2204.08580  [pdf, other

    cs.CR

    Automatic Hardware Trojan Insertion using Machine Learning

    Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia

    Abstract: Due to the current horizontal business model that promotes increasing reliance on untrusted third-party Intellectual Properties (IPs), CAD tools, and design facilities, hardware Trojan attacks have become a serious threat to the semiconductor industry. Development of effective countermeasures against hardware Trojan attacks requires: (1) fast and reliable exploration of the viable Trojan attack sp… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

  21. arXiv:2112.00304  [pdf, other

    cs.CR cs.AR

    Software Variants for Hardware Trojan Detection and Resilience in COTS Processors

    Authors: Mahmudul Hasan, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque

    Abstract: The commercial off-the-shelf (COTS) component based ecosystem provides an attractive system design paradigm due to the drastic reduction in development time and cost compared to custom solutions. However, it brings in a growing concern of trustworthiness arising from the possibility of embedded malicious logic, or hardware Trojans in COTS components. Existing trust-verification approaches are typi… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

  22. arXiv:2111.14956  [pdf, other

    cs.CR cs.LG

    Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

    Authors: Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque

    Abstract: System-on-chip (SoC) developers increasingly rely on pre-verified hardware intellectual property (IP) blocks acquired from untrusted third-party vendors. These IPs might contain hidden malicious functionalities or hardware Trojans to compromise the security of the fabricated SoCs. Recently, supervised machine learning (ML) techniques have shown promising capability in identifying nets of potential… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

  23. arXiv:2101.02729  [pdf, other

    cs.AI cs.AR cs.ET cs.LG cs.NE

    Neural Storage: A New Paradigm of Elastic Memory

    Authors: Prabuddha Chakraborty, Swarup Bhunia

    Abstract: Storage and retrieval of data in a computer memory plays a major role in system performance. Traditionally, computer memory organization is static - i.e., they do not change based on the application-specific characteristics in memory access behaviour during system operation. Specifically, the association of a data block with a search pattern (or cues) as well as the granularity of a stored data do… ▽ More

    Submitted 7 January, 2021; originally announced January 2021.

  24. arXiv:2012.03162  [pdf, other

    cs.CR

    MeLPUF: Memory-in-Logic PUF Structures for Low-Overhead IC Authentication

    Authors: Christopher Vega, Shubhra Deb Paul, Patanjali SLPSK, Swarup Bhunia

    Abstract: Physically Unclonable Functions (PUFs) are used for securing electronic devices across the implementation spectrum ranging from Field Programmable Gate Array (FPGA) to system on chips (SoCs). However, existing PUF implementations often suffer from one or more significant deficiencies: (1) significant design overhead; (2) difficulty to configure and integrate based on application-specific requireme… ▽ More

    Submitted 29 March, 2023; v1 submitted 5 December, 2020; originally announced December 2020.

  25. arXiv:2010.15329  [pdf, other

    cs.CR

    Scalable Attack-Resistant Obfuscation of Logic Circuits

    Authors: Abdulrahman Alaql, Swarup Bhunia

    Abstract: Hardware IP protection has been one of the most critical areas of research in the past years. Recently, attacks on hardware IPs (such as reverse engineering or cloning) have evolved as attackers have developed sophisticated techniques. Therefore, hardware obfuscation has been introduced as a powerful tool to protect IPs against piracy attacks. However, many recent attempts to break existing obfusc… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

  26. arXiv:2010.05209  [pdf, ps, other

    cs.CR

    SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection

    Authors: Abhishek Nair, Patanjali SLPSK, Chester Rebeiro, Swarup Bhunia

    Abstract: The emergence of distributed manufacturing ecosystems for electronic hardware involving untrusted parties has given rise to diverse trust issues. In particular, IP piracy, overproduction, and hardware Trojan attacks pose significant threats to digital design manufacturers. Watermarking has been one of the solutions employed by the semiconductor industry to overcome many of the trust issues. Howeve… ▽ More

    Submitted 11 October, 2020; originally announced October 2020.

    Comments: 5 page version

  27. arXiv:2009.06742  [pdf, other

    cs.CV eess.IV

    Leveraging Domain Knowledge using Machine Learning for Image Compression in Internet-of-Things

    Authors: Prabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia

    Abstract: The emergent ecosystems of intelligent edge devices in diverse Internet of Things (IoT) applications, from automatic surveillance to precision agriculture, increasingly rely on recording and processing variety of image data. Due to resource constraints, e.g., energy and communication bandwidth requirements, these applications require compressing the recorded images before transmission. For these a… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

  28. arXiv:2006.06806  [pdf, other

    cs.CR

    Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

    Authors: Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R. D., Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu , et al. (11 additional authors not shown)

    Abstract: Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  29. arXiv:2003.12632  [pdf, other

    cs.CR cs.AR

    An Automated Framework for Board-level Trojan Benchmarking

    Authors: Tamzidul Hoque, Shuo Yang, Aritra Bhattacharyay, Jonathan Cruz, Swarup Bhunia

    Abstract: Economic and operational advantages have led the supply chain of printed circuit boards (PCBs) to incorporate various untrusted entities. Any of the untrusted entities are capable of introducing malicious alterations to facilitate a functional failure or leakage of secret information during field operation. While researchers have been investigating the threat of malicious modification within the s… ▽ More

    Submitted 27 March, 2020; originally announced March 2020.

    Comments: 7 pages, 9 figures

  30. Algorithms in Linear Algebraic Groups

    Authors: Sushil Bhunia, Ayan Mahalanobis, Pralhad Shinde, Anupam Singh

    Abstract: This paper presents some algorithms in linear algebraic groups. These algorithms solve the word problem and compute the spinor norm for orthogonal groups. This gives us an algorithmic definition of the spinor norm. We compute the double coset decomposition with respect to a Siegel maximal parabolic subgroup, which is important in computing infinite-dimensional representations for some algebraic gr… ▽ More

    Submitted 12 March, 2020; originally announced March 2020.

    Comments: arXiv admin note: text overlap with arXiv:1901.00892, arXiv:1504.03794

    MSC Class: Primary 11E57; 15A21; Secondary 20G05; 15A66

    Journal ref: Adv. Appl. Clifford Algebras 30, 31 (2020)

  31. arXiv:1809.10743  [pdf

    cs.CR

    SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

    Authors: Prabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia

    Abstract: Obfuscation is a technique for protecting hardware intellectual property (IP) blocks against reverse engineering, piracy, and malicious modifications. Current obfuscation efforts mainly focus on functional locking of a design to prevent black-box usage. They do not directly address hiding design intent through structural transformations, which is an important objective of obfuscation. We note that… ▽ More

    Submitted 27 September, 2018; originally announced September 2018.

    Comments: 6 pages, 6 figures, 8 tables

  32. arXiv:1805.10815  [pdf, other

    cs.CR cs.NI

    NETRA: Enhancing IoT Security using NFV-based Edge Traffic Analysis

    Authors: Rishi Sairam, Suman Sankar Bhunia, Vijayanand Thangavelu, Mohan Gurusamy

    Abstract: This is the era of smart devices or things which are fueling the growth of Internet of Things (IoT). It is impacting every sphere around us, making our life dependent on this technological feat. It is of high concern that these smart things are being targeted by cyber criminals taking advantage of heterogeneity, minuscule security features and vulnerabilities within these devices. Conventional cen… ▽ More

    Submitted 28 May, 2018; originally announced May 2018.

  33. arXiv:1701.02446  [pdf, other

    cs.CR

    SIPHON: Towards Scalable High-Interaction Physical Honeypots

    Authors: Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Tippenhauer, Asaf Shabtai, Yuval Elovici

    Abstract: In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the security of networked embedded devices. In this work, we focus on the adaptation of Honeypots for improving the security of IoTs. Low-interaction honeypots are used so far in the context of IoT. Such honeypots are limited and easily detectable, and thus, there is a need to find ways how to develop high-inte… ▽ More

    Submitted 11 January, 2017; v1 submitted 10 January, 2017; originally announced January 2017.

  34. arXiv:1010.2447  [pdf

    cs.CR

    Collaborative Trust: A Novel Paradigm of Trusted Mobile Computing

    Authors: Tatini Mal-Sarkar, Swarup Bhunia

    Abstract: With increasing complexity of modern-day mobile devices, security of these devices in presence of myriad attacks by an intelligent adversary is becoming a major issue. The vast majority of cell phones still remain unsecured from many existing and emerging security threats. To address the security threats in mobile devices we are exploring a technology, which we refer as "Collaborative Trust". It i… ▽ More

    Submitted 12 October, 2010; originally announced October 2010.

    Comments: 3 pages, internal technical report

  35. arXiv:0710.4729  [pdf

    cs.AR

    Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits

    Authors: Saibal Mukhopadhyay, Swarup Bhunia, Kaushik Roy

    Abstract: In nanometer scaled CMOS devices significant increase in the subthreshold, the gate and the reverse biased junction band-to-band-tunneling (BTBT) leakage, results in the large increase of total leakage power in a logic circuit. Leakage components interact with each other in device level (through device geometry, doping profile) and also in the circuit level (through node voltages). Due to the ci… ▽ More

    Submitted 25 October, 2007; originally announced October 2007.

    Comments: Submitted on behalf of EDAA (http://www.edaa.com/)

    Journal ref: Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)

  36. arXiv:0710.4663  [pdf

    cs.AR

    Statistical Modeling of Pipeline Delay and Design of Pipeline under Process Variation to Enhance Yield in sub-100nm Technologies

    Authors: Animesh Datta, Swarup Bhunia, Saibal Mukhopadhyay, Nilanjan Banerjee, Kaushik Roy

    Abstract: Operating frequency of a pipelined circuit is determined by the delay of the slowest pipeline stage. However, under statistical delay variation in sub-100nm technology regime, the slowest stage is not readily identifiable and the estimation of the pipeline yield with respect to a target delay is a challenging problem. We have proposed analytical models to estimate yield for a pipelined design ba… ▽ More

    Submitted 25 October, 2007; originally announced October 2007.

    Comments: Submitted on behalf of EDAA (http://www.edaa.com/)

    Journal ref: Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)