94 research outputs found

    Device for Data Storage and Processing, and Method Thereof

    Get PDF
    A device for data storage and processing includes: at least two input racetrack elements having a plurality of first magnetization regions; at least one output racetrack element having a plurality of second magnetization regions, wherein a magnetization vector is adapted to switch from a first direction to the opposite one, or vice versa, by way of a magnetic field of reduced intensity compared with a magnetic field required to produce a similar switching of a magnetization vector of the first magnetization region, wherein the input racetrack elements and output racetrack element are configured in such a way as to constitute at least one elementary logic gate, wherein at least two of the first magnetization regions are magnetically coupled to at least one of the second magnetization regions

    RISC-Vlim, a RISC-V Framework for Logic-in-Memory Architectures

    Get PDF
    Most modern CPU architectures are based on the von Neumann principle, where memory and processing units are separate entities. Although processing unit performance has improved over the years, memory capacity has not followed the same trend, creating a performance gap between them. This problem is known as the "memory wall" and severely limits the performance of a microprocessor. One of the most promising solutions is the "logic-in-memory" approach. It consists of merging memory and logic units, enabling data to be processed directly inside the memory itself. Here we propose an RISC-V framework that supports logic-in-memory operations. We substitute data memory with a circuit capable of storing data and of performing in-memory computation. The framework is based on a standard memory interface, so different logic-in-memory architectures can be inserted inside the microprocessor, based both on CMOS and emerging technologies. The main advantage of this framework is the possibility of comparing the performance of different logic-in-memory solutions on code execution. We demonstrate the effectiveness of the framework using a CMOS volatile memory and a memory based on a new emerging technology, racetrack logic. The results demonstrate an improvement in algorithm execution speed and a reduction in energy consumption

    ERIC: An Efficient and Practical Software Obfuscation Framework

    Get PDF
    Modern cloud computing systems distribute software executables over a network to keep the software sources, which are typically compiled in a security-critical cluster, secret. We develop ERIC, a new, efficient, and general software obfuscation framework. ERIC protects software against (i) static analysis, by making only an encrypted version of software executables available to the human eye, no matter how the software is distributed, and (ii) dynamic analysis, by guaranteeing that an encrypted executable can only be correctly decrypted and executed by a single authenticated device. ERIC comprises key hardware and software components to provide efficient software obfuscation support: (i) a hardware decryption engine (HDE) enables efficient decryption of encrypted hardware in the target device, (ii) the compiler can seamlessly encrypt software executables given only a unique device identifier. Both the hardware and software components are ISA-independent, making ERIC general. The key idea of ERIC is to use physical unclonable functions (PUFs), unique device identifiers, as secret keys in encrypting software executables. Malicious parties that cannot access the PUF in the target device cannot perform static or dynamic analyses on the encrypted binary. We develop ERIC's prototype on an FPGA to evaluate it end-to-end. Our prototype extends RISC-V Rocket Chip with the hardware decryption engine (HDE) to minimize the overheads of software decryption. We augment the custom LLVM-based compiler to enable partial/full encryption of RISC-V executables. The HDE incurs minor FPGA resource overheads, it requires 2.63% more LUTs and 3.83% more flip-flops compared to the Rocket Chip baseline. LLVM-based software encryption increases compile time by 15.22% and the executable size by 1.59%. ERIC is publicly available and can be downloaded from https://github.com/kasirgalabs/ERICComment: DSN 2022 - The 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Network

    MEMRISTOR BASED SENSOR

    Get PDF
    A sensor comprises a plurality of sensor elements arranged in an array . Each sensor element is memristive and has an electrical resistance characteristic related to exposure to a species to be sensed . The sensor elements are arranged to be connectable such that at least one sensor element is connected in parallel with at least one other sensor element . By using appropriate connections , the array of sensor elements can be read

    Simulation Environment with Customized RISC-V Instructions for Logic-in-Memory Architectures

    Get PDF
    Nowadays, various memory-hungry applications like machine learning algorithms are knocking "the memory wall". Toward this, emerging memories featuring computational capacity are foreseen as a promising solution that performs data process inside the memory itself, so-called computation-in-memory, while eliminating the need for costly data movement. Recent research shows that utilizing the custom extension of RISC-V instruction set architecture to support computation-in-memory operations is effective. To evaluate the applicability of such methods further, this work enhances the standard GNU binary utilities to generate RISC-V executables with Logic-in-Memory (LiM) operations and develop a new gem5 simulation environment, which simulates the entire system (CPU, peripherals, etc.) in a cycle-accurate manner together with a user-defined LiM module integrated into the system. This work provides a modular testbed for the research community to evaluate potential LiM solutions and co-designs between hardware and software

    Thoracic Endovascular Aortic Repair for Type B Acute Aortic Dissection Complicated by Descending Thoracic Aneurysm

    Get PDF
    OBJECTIVES: To analyse the results and review the literature about thoracic aortic endovascular repair (TEVAR) for type B acute aortic dissection (TBAAD) complicated by descending thoracic aortic aneurysm (DTA) in the hyperacute or acute phases. METHODS: This was a multicentre, observational descriptive study. Inclusion criteria were TBAAD with a DTA of 6550 mm, TBAAD on an already known aneurysmal descending thoracic aorta, and TBAAD presenting with an enlarged aorta with a total diameter <50 mm, but with >50% diameter increase compared with a previous computed tomography angiography (CTA) showing a non-dissected aorta with normal sizing. Primary endpoints were early and long-term survival, freedom from TEVAR and aortic related mortality (ARM), and freedom from re-intervention. RESULTS: Twenty-two patients were included in the analysis. The mean aortic diameter was 66 \ub1 26 mm (range 42-130; IQR 51-64). The in hospital TEVAR related mortality was 14% (n = 3). The mean radiological follow-up was 56 \ub1 45 months (range 6-149; IQR 12-82), and the follow-up index 0.97 \ub1 0.1. All surviving patients were available for follow-up. During follow-up the cumulative mortality was 26% (n = 5) and TEVAR related mortality was 5% (n = 1). Overall the estimate of survival was 82% (95%CI: 61.5-93) at 1 year, and 64% at 5 years. Ongoing primary clinical success was 79% (re-intervention n = 4). Freedom from aortic related mortality was 86% (95%CI: 66-95) at 1 and 5 year, while freedom from re-intervention was 95% (95%CI: 75.5-95) at 1 year, and 77% (95%CI: 50-92) at 5 years. CONCLUSIONS: In our experience, DTA is a frequent complication from the very beginning of the clinical onset of TBAAD. In this high-risk cohort, TEVAR showed satisfactory results, better than those predicted by the risk score for open repair, with favourable stability of the aortic diameter and no aortic related adverse events during follow-up
    • …
    corecore