Opening (Welcome Message from Chairs) | ||
07:30 - 09:50 am | Invited Talk Session | |
07:30 - 08:10 am | Approximate Computing for Low Power Circuits and Systems Weiqiang Liu - Nanjing University of Aeronautics and Astronautics | |
08:10 - 08:20 am | Break | |
08:20 - 09:00 am | Automated and Sound Approximation of Numerical Kernels Eva Darulova - Max Planck Institute for Software Systems (MPI-SWS) | |
Approximate Computing The Holy Grail of Low-Energy Electronic Systems? Jari Nurmi - Tampere University | ||
09:50 - 10:00 am | Break | |
10:00 - 11:00 am | Regular Session 1 | Approximate computing in Machine Learning and DSP Applications | |
Neural Network Hardware Acceleration Based on Hybrid Approximate Multipliers Siyuan Liang, Ke Chen, Pengfei Huang, Peipei Yin and Weiqiang Liu | ||
10:20-10:40 am | CNN Compression through Retraining-free Weight Sharing Etienne Dupuis, David Novo, Ian O'Connor and Alberto Bosio | |
10:40-11:00 am | Combining Logic Refactoring and Approximate Computing to Power- and Area-Efficient Gaussian Filter Designs Marcio Monteiro, Ismael Seidel, Mateus Grellert, Jose Luis Gntzel, Leonardo Soares and Cristina Meinhardt | |
11:00 - 11:10 am | Break | |
11:10 am - 12:10 pm | Regular Session 2 | Approximate Design Techniques | |
Approximate PIM: An IMPLY-based Approximate Adder Seyed Erfan Fatemieh, Mohammad Reza Reshadinezhad and Nima Taherinejad | ||
11:30 11:50 am | Assertion-aware based approximate computing Moreno Bragaglio, Samuele Mori, Samuele Germiniani, Alberto Bosio, Marcello Traiola and Graziano Pravadelli | |
11:50 am 12:10 am | Task Scheduling on Mixed-Precision MPSoC Ahmad Sadigh Baroughi, Stefan Huemer, Hadi Shahriar Shahhoseini and Nima Taherinejad | |
12:10 - 12:20 pm | Break | |
12:20 - 01:20 pm | Regular Session 3 | Approximate Synthesis for FPGA targets | |
Approximation Space Exploration for FPGA Accelerators Using Fault Injection Ioannis Tsounis, Athanasios Papadimitriou and Mihalis Psarakis | ||
12:40 13:00 pm | Exploring a Decision Tree Synthesis Flow for Approximate Circuits Brunno Abreu, Jonata Carvalho, Mateus Grellert and Cristina Meinhardt | |
13:00 13:20 pm | A Catalog-based AIG-Rewriting Approach to the Design of Approximate Components Mario Barbareschi, Salvatore Barone, Nicola Mazzocca and Alberto Moriconi | |
13:20 - 13:30 pm | Closing Session |
Opening and Introduction | ||
11:05am - 11:50am | Keynote Talk 1 Session Chair: Yingyan (Celine) Lin, Rice University Light in AI: Toward Efficient and Robust Neurocomputing with Optical Neural Networks David Pan, The University of Texas at Austin | |
11:50am - 1:05pm | Session 1: Session Chair: Yingyan (Celine) Lin, Rice University Session Chair: Yingyan (Celine) Lin, Rice University | |
Efficient Audio-Visual Understanding on AR Devices Meng Li, Facebook | ||
Privacy in Federated Learning at Scale Peter Kairouz, Google | ||
12:40pm - 1:05pm | Co-Design for Low-Bitwidth Neural Networks with Dynamic Quantization Zhiru Zhang, Cornell University | |
Break | ||
1:25pm - 2:40pm | Session 2: Hardware-award Deep Learning Techniques Session Chair: Yingyan (Celine) Lin, Rice University | |
1:25pm - 1:50pm | The Lottery Ticket Hypothesis: On Sparse, Trainable Neural Networks Jonathan Frankle, Massachusetts Institute of Technology | |
1:50pm - 2:15pm | Intelligent Visual Computing Yuhao Zhu, University of Rochester | |
2:15pm - 2:40pm | Algorithm and Hardware Co-Design for Efficient Deep Learning: Sparse and Low-rank Perspectives Bo Yuan, Rugster University | |
2:40pm - 3:25pm | Keynote Talk 2 Session Chair: Yanzhi Wang, Northeastern University Democratizing TinyML: Generalization, Standardization and Automation Vijay Janapa Reddi, Harvard University | |
3:30pm - 4:45pm | Session 3: Emerging Device and Neuromorphic Computing Session Chair: Yanzhi Wang, Northeastern University | |
3:30pm - 3:55pm | NeuroSim Benchmark Framework Shimeng Yu, Georgia Institute of Technology | |
3:55pm - 4:20pm | Memristive devices and arrays for computing Jianhua Yoshua Yang, University of Southern California | |
4:20pm - 4:45pm | Secure and Efficient Deep Learning Computing-in-Memory, A Software and Hardware Co-Design Perspective Deliang Fan, Arizona State University |
7:20 am 7:30 am | Welcome message from the chair Gang Qu | |
7:30 am 8:30 am | Session 1 Logic Locking Chair: Gang Qu, University of Maryland Provably-Secure Logic Locking: From Theory to Practice Authors: Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran and Ozgur Sinanoglu Speaker: Prof. Jeyavijayan Rajendran Pirates of the Carry-Boolean: Exploring Structural Artifacts of Logic Locking with SAIL Authors: Prabuddha Chakraborty, Jonathan Cruz, Abdulrahman Alaql and Swarup Bhunii Speaker: Prabuddha Chakraborty | |
8:30 am 9:30 am | Session 2 Trust Execution Environment Chair: Nader Sehatbaksh, University of California, Los Angeles SANCTUARY: ARMing TrustZone with User-space Enclaves Authors: Emmanuel Stapf, Ferdinand Brasser, David Gens, Patrick Jauernig and Ahmad-Reza Sadeghi Speaker: Emmanuel Stapf HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments Authors: Ghada Dessouky, Tommaso Frassetto and Ahmad-Reza Sadeghi Speaker: Tommaso Frassetto | |
9:30 am 10:30 am | Session 3 Side-Channel Analysis Chair: Ian Harris, University of California, Irvine The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations Authors: Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin and Francesco Regazzoni Speaker: Dr. Stjepan Picek Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange Protocols Authors: Aydin Aysu, Youssef Tobah, Mohit Tiwari, Andreas Gerstlauer and Michael Orshansky Speaker: Prof. Aydin Aysu | |
break | ||
Session 4 Identification: from Recycled IC to DNN Chair: Yingjie Lao, Clemson University Recycled IC Detection Based on Statistical Methods Authors: Ke Huang, Yu Liu, Nenad Korolija, John Carulli and Yiorgos Makris Speaker: Prof. Yiorgos Makris DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks Authors: Huili Chen, Cheng Fu, Bita Darvish Rouhani, Jishen Zhao and Farinaz Koushanfar Speaker: Huili Chen | ||
Session 5 Buffer Exploitation and Memory Safety Chair: Jiafeng Xie, Villanova University SpectreRSB: Spectre attacks using the return stack buffer Authors: Esmaeil Mohammadian Koruyeh, Khaled Khaswaneh, Chengyue Song and Nael Abu-Ghazaleh Speaker: Prof. Nael Abu-Ghazaleh Secure TLBs Authors: Shuwen Deng, Wenjie Xiong and Jakub Szefer Speaker: Shuwen Deng CHEx86: Context-Sensitive Enforcement of Memory Safety via Microcode-Enabled Capabilities Authors: Rasool Sharifi and Ashish Venkat Speaker: Rasool Sharifi | ||
1:15 pm 1:30 pm | closing remarks Johanna Sepulveda |
Please note that the Cadence workshop requires a separate registration, and in order to ensure proper support through the workshop, only a limited number of participants can attend. Please consider the workshop's website for more detailed information.
07:20 - 08:00 am | Overview and introduction Sarmad Dahir / Frederik Kautz |
08:00 - 09:00 am | Embedded processors and tool chains with first Hands-on Ernesto Cristopher Villegas / Muhammad Ali |
09:15 10:15 am | Mapping, execution and measurement of applications with second Hands-On Frederik Kautz/ Ernesto Cristopher Villegas |
10:30 11:30 am | Basic hardware accelerator with third Hands-On Sarmad Dahir |
Accelerator design, integration and validation in SystemC with fourth Hand-On Sarmad Dahir / Muhammad Ali | |
01:00 - 01:30 pm | Summary Sarmad Dahir |
Please note that WOSET is a co-located workshop and requires a separate registration. Please consider WOSETs website for more detailed information.
Please note that SLIP is a co-located workshop and requires a separate registration. Please consider SLIPs website for more detailed information.
Website: