My research interests include parallel and heterogeneous computing, algorithm/data structure for efficient and secure electronic design automation (EDA), and machine learning system (MLSys). Currently, I have growing interest in hardware support for cost-effective large language model (LLM) deployment.
This paper introduces AceRoute, an adaptive compute-efficient FPGA router that tackles the long-standing issue of lengthy FPGA compilation times given complicated FPGA architectures and designs to synthesize. We thoroughly profile modern FPGA routing patterns and identify the runtime hotspot: routing bottleneck connections in congested designs. However, previous works on routing acceleration hardly target mitigating connection-wise routing difficulties by characterizing device resource expansions and shifting path-exploration modes of connections.
In this work, we propose a bidirectional intra-connection routing paradigm for the first time, which efficiently navigates congested device regions by initiating searches from both source and sink nodes. This approach significantly outperforms traditional unidirectional exploration in congested conditions. Furthermore, for each connection to route, we develop an adaptive strategy to select the optimal search mode online between uni- and bi-directional based on the current congestion situation. Our approach is pluggable and versatile, allowing seamless integration into existing FPGA routers and providing instant speed improvements with merely several hundred lines of code.
Evaluation on FPGA24 contest benchmarks shows that our router, powered by adaptive bidirectional search, achieves over 2.4x and 3.2x faster routing on average with a serial and a 2-thread parallel version, respectively, compared with established routing tools RWRoute and Vivado. Additionally, when integrated into typical partition-based inter-connection parallel routers, our approach overcomes their inherent load-balance problems and amplifies the speedup to RWRoute from 2.2x to up to 5x.
IEEE S&P
Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity
Xinming
Wei, Jiaxi
Zhang, and Guojie
Luo
In IEEE Symposium on Security and Privacy (S&P), 2024
Due to the escalating complexity of chip design and the exorbitant cost of building cutting-edge manufacturing facilities, outsourcing the fabrication of Integrated Circuits (ICs) is prevalent in modern semiconductor industry. However, significant security risks may arise because untrustworthy foundries can conduct insidious attacks without close supervision. Since prior works show the feasibility of implementing practical foundry-level Trojan attacks that circumvent post-fabrication detection, IC designers should protect their IC layouts before sending them to a third-party foundry, and such protections are known as design-time defenses. To this end, security metrics for layout vulnerability assessment are crucial to test the effectiveness of the proposed defenses. However, existing metrics are geometric-only and Trojan-oblivious, failing to capture the fundamental aspects of foundry-level Trojan insertion and the associated side effects.
To bridge the gap between real attacks and threat prediction, we present SiliconCritic, a simulation-based, extensible framework that leverages design-time techniques to simulate the blackbox foundry-level Trojan attacks and post-fabrication analysis. SiliconCritic encodes the difficulty of inserting a specific Trojan into a finalized physical layout by measuring the variation of side-channel parameters (timing, power) after the simulated Trojan insertion, where larger deviations denote better detectability and thus enhanced security. SiliconCritic allows IC designers to interactively refine defensive strategies against the objective Trojan based on the feedback of side-channel analysis. Through evaluations on real-world ASIC designs and reported hardware Trojans, SiliconCritic demonstrates the limitations of existing layout-level defenses and highlights the influence of Trojan properties on defensive efficacy. Our work refreshes the understanding of Trojan prevention and suggests future directions for defenses against untrustworthy foundries.
DAC
GDSII-Guard: ECO Anti-Trojan Optimization with Exploratory Timing-Security Trade-Offs
Xinming
Wei, Jiaxi
Zhang, and Guojie
Luo
In ACM/IEEE Design Automation Conference (DAC), 2023
With the ever-shrinking feature size of transistors, the exorbitant cost has driven the massive outsourcing of integrated circuits (IC) fabrication. However, this outsourcing poses significant security risks because untrustworthy foundries can conduct insidious fabrication-time attacks without close supervision. Therefore, it is crucial to undertake design-time protection before sending finalized design layouts to the foundry. Foundry-level hardware Trojan has emerged as a major security threat, but existing design-time countermeasures lack sufficient consideration of good trade-offs between design security and performance.This work proposes an automatic framework, GDSII-Guard, to strengthen implemented physical layouts against potential fabrication-time Trojan attacks while preserving design performance, power, and quality. We develop an Engineering Change Order (ECO) placement and routing (P&R) flow containing elaborate anti-Trojan operators to prevent Trojan insertion. Moreover, we introduce a multi-objective optimization model with evolutionary strategies that incorporate anti-Trojan flow information to exploit balances between the aforementioned multiple design metrics. Experimental results demonstrate that GDSII-Guard reduces the overall risk of Trojan attacks on given designs by 98.8% with minimized timing, power, and design quality impact, surpassing existing approaches prominently.