Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

VLSI and Circuits, Embedded and Hardware Systems

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 112

Full-Text Articles in Computer Engineering

Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao Mar 2024

Protecting Return Address Integrity For Risc-V Via Pointer Authentication, Yuhe Zhao

Masters Theses

Embedded systems based on lightweight microprocessors are becoming more prevalent in various applications. However, the security of them remains a significant challenge due to the limited resources and exposure to external threats. Especially, some of these devices store sensitive data and control critical devices, making them high-value targets for attackers. Software security is particularly important because attackers can easily access these devices on the internet and obtain control of them by injecting malware.

Return address (RA) hijacking is a common software attack technique used to compromise control flow integrity (CFI) by manipulating memory, such as return-to-libc attacks. Several methods have …


Reinventing Integrated Photonic Devices And Circuits For High Performance Communication And Computing Applications, Venkata Sai Praneeth Karempudi Jan 2024

Reinventing Integrated Photonic Devices And Circuits For High Performance Communication And Computing Applications, Venkata Sai Praneeth Karempudi

Theses and Dissertations--Electrical and Computer Engineering

The long-standing technological pillars for computing systems evolution, namely Moore's law and Von Neumann architecture, are breaking down under the pressure of meeting the capacity and energy efficiency demands of computing and communication architectures that are designed to process modern data-centric applications related to Artificial Intelligence (AI), Big Data, and Internet-of-Things (IoT). In response, both industry and academia have turned to 'more-than-Moore' technologies for realizing hardware architectures for communication and computing. Fortunately, Silicon Photonics (SiPh) has emerged as one highly promising ‘more-than-Moore’ technology. Recent progress has enabled SiPh-based interconnects to outperform traditional electrical interconnects, offering advantages like high bandwidth density, …


Gen-Acceleration: Pioneering Work For Hardware Accelerator Generation Using Large Language Models, Durga Lakshmi Venkata Deepak Vungarala Dec 2023

Gen-Acceleration: Pioneering Work For Hardware Accelerator Generation Using Large Language Models, Durga Lakshmi Venkata Deepak Vungarala

Theses

Optimizing computational power is critical in the age of data-intensive applications and Artificial Intelligence (AI)/Machine Learning (ML). While facing challenging bottlenecks, conventional Von-Neumann architecture with implementing such huge tasks looks seemingly impossible. Hardware Accelerators are critical in efficiently deploying these technologies and have been vastly explored in edge devices. This study explores a state-of-the-art hardware accelerator; Gemmini is studied; we leveraged the open-sourced tool. Furthermore, we developed a Hardware Accelerator in the study we compared with the Non-Von-Neumann architecture. Gemmini is renowned for efficient matrix multiplication, but configuring it for specific tasks requires manual effort and expertise. We propose implementing …


Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad Dec 2023

Accelerating Machine Learning Inference For Satellite Component Feature Extraction Using Fpgas., Andrew Ekblad

Theses and Dissertations

Running computer vision algorithms requires complex devices with lots of computing power, these types of devices are not well suited for space deployment. The harsh radiation environment and limited power budgets have hindered the ability of running advanced computer vision algorithms in space. This problem makes running an on-orbit servicing detection algorithm very difficult. This work proposes using a low powered FPGA to accelerate the computer vision algorithms that enable satellite component feature extraction. This work uses AMD/Xilinx’s Zynq SoC and DPU IP to run model inference. Experiments in this work centered around improving model post processing by creating implementations …


Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya Dec 2023

Qasm-To-Hls: A Framework For Accelerating Quantum Circuit Emulation On High-Performance Reconfigurable Computers, Anshul Maurya

Theses and Dissertations

High-performance reconfigurable computers (HPRCs) make use of Field-Programmable Gate Arrays (FPGAs) for efficient emulation of quantum algorithms. Generally, algorithm-specific architectures are implemented on the FPGAs and there is very little flexibility. Moreover, mapping a quantum algorithm onto its equivalent FPGA emulation architecture is challenging. In this work, we present an automation framework for converting quantum circuits to their equivalent FPGA emulation architectures. The framework processes quantum circuits represented in Quantum Assembly Language (QASM) and derives high-level descriptions of the hardware emulation architectures for High-Level Synthesis (HLS) on HPRCs. The framework generates the code for a heterogeneous architecture consisting of a …


Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr Aug 2023

Sel4 On Risc-V - Developing High Assurance Platforms With Modular Open-Source Architectures, Michael A. Doran Jr

Masters Theses

Virtualization is now becoming an industry standard for modern embedded systems. Modern embedded systems can now support multiple applications on a single hardware platform while meeting power and cost requirements. Virtualization on an embedded system is achieved through the design of the hardware-software interface. Instruction set architecture, ISA, defines the hardware-software interface for an embedded system. At the hardware level the ISA, provides extensions to support virtualization.

In addition to an ISA that supports hypervisor extensions it is equally important to provide a hypervisor completely capable of exploiting the benefits of virtualization for securing modern embedded systems. Currently there does …


Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial May 2023

Vi Energy-Efficient Memristor-Based Neuromorphic Computing Circuits And Systems For Radiation Detection Applications, Jorge Iván Canales Verdial

Electrical and Computer Engineering ETDs

Radionuclide spectroscopic sensor data is analyzed with minimal power consumption through the use of neuromorphic computing architectures. Memristor crossbars are harnessed as the computational substrate in this non-conventional computing platform and integrated with CMOS-based neurons to mimic the computational dynamics observed in the mammalian brain’s visual cortex. Functional prototypes using spiking sparse locally competitive approximations are presented. The architectures are evaluated for classification accuracy and energy efficiency. The proposed systems achieve a 90% true positive accuracy with a high-resolution detector and 86% with a low-resolution detector.


Phone Microwave, Khanh Kim Hoang, Emily Zhou Mar 2023

Phone Microwave, Khanh Kim Hoang, Emily Zhou

Computer Engineering

This project involves the installation of remote-control capabilities in an antique 1980s microwave, effectively turning the microwave into a “smart” device. While preserving the original functionality of the microwave, a combination of software and hardware components allows for remote microwave operations. The microwave can be remotely operated by calling the built-in number, and more advanced settings and options can be utilized by texting. The microwave is also secured against unauthorized use with the addition of a PIN code that is required to operate the device.


Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak Dec 2022

Towards Multipronged On-Chip Memory And Data Protection From Verification To Design And Test, Senwen Kan, Jennifer Dworak

Computer Science and Engineering Theses and Dissertations

Modern System on Chips (SoCs) generally include embedded memories, and these memories may be vulnerable to malicious attacks such as hardware trojan horses (HTHs), test access port exploitation, and malicious software. This dissertation contributes verification as well as design obfuscation solutions aimed at design level detection of memory HTH circuits as well as obfuscation to prevent HTH triggering for embedded memory during functional operation. For malicious attack vectors stemming from test/debug interfaces, this dissertation presents novel solutions that enhance design verification and securitization of an IJTAG based test access interface. Such solutions can enhance SoC protection by preventing memory test …


Algorithm Optimization And Hardware Acceleration For Machine Learning Applications On Low-Energy Systems, Jianchi Sun Aug 2022

Algorithm Optimization And Hardware Acceleration For Machine Learning Applications On Low-Energy Systems, Jianchi Sun

All Dissertations

Machine learning (ML) has been extensively employed for strategy optimization, decision making, data classification, etc. While ML shows great triumph in its application field, the increasing complexity of the learning models introduces neoteric challenges to the ML system designs. On the one hand, the applications of ML on resource-restricted terminals, like mobile computing and IoT devices, are prevented by the high computational complexity and memory requirement. On the other hand, the massive parameter quantity for the modern ML models appends extra demands on the system's I/O speed and memory size. This dissertation investigates feasible solutions for those challenges with software-hardware …


Mars Prototype Rover Environmental Measurement System, James A. Renick Jun 2022

Mars Prototype Rover Environmental Measurement System, James A. Renick

Computer Engineering

In my senior project, the problem I am trying to solve is how to efficiently design, create, and install an original library onto a Mars prototype rover operating system and to further use that library to integrate a new weather measurement sensor device into the rover system with the necessary software and hardware implementations. This is an important and highly valued problem as many aerospace and other engineering companies utilize rovers and other autonomous systems for important research, explorations, and reconnaissance missions and goals. In solving this problem, I utilized many resources that were available to me such as advisors, …


Smartphone Control Of Rc Cars, Weston R. Fitzgerald Jun 2022

Smartphone Control Of Rc Cars, Weston R. Fitzgerald

Electrical Engineering

The smartphone-controlled RC (remote-controlled) car is an inexpensive remote-controlled car designed to be fast and portable. Instead of manufacturing, packaging, and shipping a separate controller, the remote control is implemented in a phone application, which saves time and money in both the design process and the manufacturing process. Utilizing the user’s smartphone is more cost-effective since mobile devices are a common recurrence, and packaging fewer devices results in overall better portability of the product.

This smartphone-controlled car is speedy and intuitive to learn for typical smartphone users. The user can change the car’s speed and direction wirelessly using their phone; …


Smart Bike Aftermarket System (Sbams), Noah Lamadanie, Jack Bullock, Dawson Beachy, John Albrecht Jan 2022

Smart Bike Aftermarket System (Sbams), Noah Lamadanie, Jack Bullock, Dawson Beachy, John Albrecht

Williams Honors College, Honors Research Projects

The Smart Bike Aftermarket System will be a set of connected modules, which, when installed on a standard bicycle, will allow it to mimic some of the safety and quality-of-life functionalities of an E-bike. The most notable of these safety features is an ability to detect vehicles approaching from behind and alert the user of potential collisions. The system will also implement lighting (Headlights, taillights, and turn signals), and a coupled application so a user can view more advanced information about their cycling. The primary advantage of this system over a standard E-bike is that it will have a lower …


Design, Extraction, And Optimization Tool Flows And Methodologies For Homogeneous And Heterogeneous Multi-Chip 2.5d Systems, Md Arafat Kabir Dec 2021

Design, Extraction, And Optimization Tool Flows And Methodologies For Homogeneous And Heterogeneous Multi-Chip 2.5d Systems, Md Arafat Kabir

Graduate Theses and Dissertations

Chip and packaging industries are making significant progress in 2.5D design as a result of increasing popularity of their application. In advanced high-density 2.5D packages, package redistribution layers become similar to chip Back-End-of-Line routing layers, and the gap between them scales down with pin density improvement. Chiplet-package interactions become significant and severely affect system performance and reliability. Moreover, 2.5D integration offers opportunities to apply novel design techniques. The traditional die-by-die design approach neither carefully considers these interactions nor fully exploits the cross-boundary design opportunities.

This thesis presents chiplet-package cross-boundary design, extraction, analysis, and optimization tool flows and methodologies for high-density …


Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett Dec 2021

Evaluation Of Robust Deep Learning Pipelines Targeting Low Swap Edge Deployment, David Carter Cornett

Masters Theses

The deep learning technique of convolutional neural networks (CNNs) has greatly advanced the state-of-the-art for computer vision tasks such as image classification and object detection. These solutions rely on large systems leveraging wattage-hungry GPUs to provide the computational power to achieve such performance. However, the size, weight and power (SWaP) requirements of these conventional GPU-based deep learning systems are not suitable when a solution requires deployment to so called "Edge" environments such as autonomous vehicles, unmanned aerial vehicles (UAVs) and smart security cameras.

The objective of this work is to benchmark FPGA-based alternatives to conventional GPU systems that have the …


On Improving Robustness Of Hardware Security Primitives And Resistance To Reverse Engineering Attacks, Vinay C. Patil Oct 2021

On Improving Robustness Of Hardware Security Primitives And Resistance To Reverse Engineering Attacks, Vinay C. Patil

Doctoral Dissertations

The continued growth of information technology (IT) industry and proliferation of interconnected devices has aggravated the problem of ensuring security and necessitated the need for novel, robust solutions. Physically unclonable functions (PUFs) have emerged as promising secure hardware primitives that can utilize the disorder introduced during manufacturing process to generate unique keys. They can be utilized as \textit{lightweight} roots-of-trust for use in authentication and key generation systems. Unlike insecure non-volatile memory (NVM) based key storage systems, PUFs provide an advantage -- no party, including the manufacturer, should be able to replicate the physical disorder and thus, effectively clone the PUF. …


Iot Garden Frost Alarm, Andrew James Jun 2021

Iot Garden Frost Alarm, Andrew James

Honors Theses

Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.

The system as designed …


Smart E-Bike Conversion Kit And Helmet, Megan West, Marena Trujillo, Hossein Asghari May 2021

Smart E-Bike Conversion Kit And Helmet, Megan West, Marena Trujillo, Hossein Asghari

Honors Thesis

With many state governments across the United States implementing shutdowns to prevent the spread of COVID-19, many bike retailers have seen dramatic increases in bike sales. Electric bicycles (e-bikes) have become increasingly popular as the public searches for alternatives to public transportation. Unfortunately, e-bike users assume some risk by riding bikes that are faster than conventional bicycles. While kits to convert conventional bicycles to e-bikes exist, no “smart” e-bike/helmet kit specifically designed to keep the user safe is currently available on the market. To mitigate risks, a smart e-bike conversion kit with multiple novel safety features, including auditory and visual …


A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner May 2021

A Secure Architecture For Defense Against Return Address Corruption, Grayson J. Bruner

Masters Theses

The advent of the Internet of Things has brought about a staggering level of inter-connectivity between common devices used every day. Unfortunately, security is not a high priority for developers designing these IoT devices. Often times the trade-off of security comes at too high of a cost in other areas, such as performance or power consumption. This is especially prevalent in resource-constrained devices, which make up a large number of IoT devices. However, a lack of security could lead to a cascade of security breaches rippling through connected devices. One of the most common attacks used by hackers is return …


Side Channel Attack Counter Measure Using A Moving Target Architecture, Jithin Joseph Apr 2021

Side Channel Attack Counter Measure Using A Moving Target Architecture, Jithin Joseph

Electrical and Computer Engineering ETDs

A novel countermeasure to side-channel power analysis attacks called Side-channel Power analysis Resistance for Encryption Algorithms using DPR or SPREAD is investigated in this thesis. The countermeasure leverages a strategy that is best characterized as a moving target architecture. Modern field programmable gate arrays (FPGA) architectures provide support for dynamic partial reconfiguration (DPR), a feature that allows real-time reconfiguration of the programmable logic (PL). The moving target architecture proposed in this work leverages DPR to implement a power analysis countermeasure to side-channel attacks, the most common of which are referred to as differential power analysis (DPA) and correlation power analysis …


Addressing Security Challenges In Embedded Systems And Multi-Tenant Fpgas, Georgios Provelengios Apr 2021

Addressing Security Challenges In Embedded Systems And Multi-Tenant Fpgas, Georgios Provelengios

Doctoral Dissertations

Embedded systems and field-programmable gate arrays (FPGAs) have become crucial parts of the infrastructure that supports our modern technological world. Given the multitude of threats that are present, the need for secure computing systems is undeniably greater than ever. Embedded systems and FPGAs are governed by characteristics that create unique security challenges and vulnerabilities. Despite their array of uses, embedded systems are often built with modest microprocessors that do not support the conventional security solutions used by workstations, such as virus scanners. In the first part of this dissertation, a microprocessor defense mechanism that uses a hardware monitor to protect …


Designing Novel Hardware Security Primitives For Smart Computing Devices, Amitkumar Degada Jan 2021

Designing Novel Hardware Security Primitives For Smart Computing Devices, Amitkumar Degada

Theses and Dissertations--Electrical and Computer Engineering

Smart computing devices are miniaturized electronics devices that can sense their surroundings, communicate, and share information autonomously with other devices to work cohesively. Smart devices have played a major role in improving quality of the life and boosting the global economy. They are ubiquitously present, smart home, smart city, smart girds, industry, healthcare, controlling the hazardous environment, and military, etc. However, we have witnessed an exponential rise in potential threat vectors and physical attacks in recent years. The conventional software-based security approaches are not suitable in the smart computing device, therefore, hardware-enabled security solutions have emerged as an attractive choice. …


Smart Doggy Door, Jaret Helminski, Brandon Caldwell, Jason Marcum, Nathaniel Hall Jan 2021

Smart Doggy Door, Jaret Helminski, Brandon Caldwell, Jason Marcum, Nathaniel Hall

Williams Honors College, Honors Research Projects

The smart doggy door is an engineering senior design project which will be completed in the spring of 2021. The goal of this project is to design and implement a dog door that can detect when a dog is near. After that it will determine if the dog is allowed to use the door and it will then open if the dog is allowed to go through the door. This device will also send a notification to the dogs owner via an app on their phone. This device will allow dog owners to keep unwanted animals out as well as …


Soil Sensor Network, Andrea Wyder, Ross Klonowski, Alexis Alves, Luke Farnsworth Jan 2021

Soil Sensor Network, Andrea Wyder, Ross Klonowski, Alexis Alves, Luke Farnsworth

Williams Honors College, Honors Research Projects

Water management during crop irrigation is a problem for the agricultural industry. To help farmers better maintain water usage, a wireless soil sensor network comprised of a sensor pod and wireless communication has been designed and implemented. It was proven that the sensor pod can be installed 6-8 inches below the ground and communicate up to at least a 6km distance back to the gateway. The senor pod shells have a 2 mm thick shell to prevent the pod from shattering when coming into contact with the ground after being released from the planter, as calculated through the force of …


Automated Blind Control, Daniel Nahra, Matthew Lacek, Timothy Kurczewski, William Daulton Baksa Jan 2021

Automated Blind Control, Daniel Nahra, Matthew Lacek, Timothy Kurczewski, William Daulton Baksa

Williams Honors College, Honors Research Projects

The objective of this project would be to design and prototype an automated, light and temperature sensing window blinds system. The device would detect temperature, both inside and outside, and incoming sunlight to determine proper window blind position for maximum energy savings. The user would also have the ability to change the settings of the blind from a remote device to a setting that they desire at any given time


Design Project: Smart Headband, John Michel, Jack Durkin, Noah Lewis Jan 2021

Design Project: Smart Headband, John Michel, Jack Durkin, Noah Lewis

Williams Honors College, Honors Research Projects

Concussion in sports is a prevalent medical issue. It can be difficult for medical professionals to diagnose concussions. With the fast pace nature of many sports, and the damaging effects of concussions, it is important that any concussion risks are assessed immediately. There is a growing trend of wearable technology that collects data such as steps and provides the wearer with in-depth information regarding their performance. The Smart Headband project created a wearable that can record impact data and provide the wearer with a detailed analysis on their risk of sustaining a concussion. The Smart Headband uses accelerometers and gyroscopes …


A 2.56 Gbps Serial Wireline Transceiver That Supports An Auxiliary Channel And A Hybrid Line Driver To Compensate Large Channel Loss, Xiaoran Wang Aug 2020

A 2.56 Gbps Serial Wireline Transceiver That Supports An Auxiliary Channel And A Hybrid Line Driver To Compensate Large Channel Loss, Xiaoran Wang

Electrical Engineering Theses and Dissertations

Serial transceiver links are widely used for high-speed point-to-point communications. This dissertation describes two transceiver link designs for two different applications.

In serial wireline communications, security is an increasingly important factor to concern. Securing an information processing system at the application and system software layers is regarded as a necessary but incomplete defense against the cyber security threats. In this dissertation, an asynchronous serial transceiver that is capable of transmitting and receiving an auxiliary data stream concurrently with the primary data stream is described. The transceiver instantiates the auxiliary data stream by modulating the phase of the primary data without …


Investigating Single Precision Floating General Matrix Multiply In Heterogeneous Hardware, Steven Harris Aug 2020

Investigating Single Precision Floating General Matrix Multiply In Heterogeneous Hardware, Steven Harris

McKelvey School of Engineering Theses & Dissertations

The fundamental operation of matrix multiplication is ubiquitous across a myriad of disciplines. Yet, the identification of new optimizations for matrix multiplication remains relevant for emerging hardware architectures and heterogeneous systems. Frameworks such as OpenCL enable computation orchestration on existing systems, and its availability using the Intel High Level Synthesis compiler allows users to architect new designs for reconfigurable hardware using C/C++. Using the HARPv2 as a vehicle for exploration, we investigate the utility of several of the most notable matrix multiplication optimizations to better understand the performance portability of OpenCL and the implications for such optimizations on this and …


Formal Verification Of Divider And Square-Root Arithmetic Circuits Using Computer Algebra Methods, Atif Yasin Jul 2020

Formal Verification Of Divider And Square-Root Arithmetic Circuits Using Computer Algebra Methods, Atif Yasin

Doctoral Dissertations

A considerable progress has been made in recent years in verification of arithmetic circuits such as multipliers, fused multiply-adders, multiply-accumulate, and other components of arithmetic datapaths, both in integer and finite field domain. However, the verification of hardware dividers and square-root functions have received only a limited attention from the verification community, with a notable exception for theorem provers and other inductive, non-automated systems. Division, square root, and transcendental functions are all tied to the basic Intel architecture and proving correctness of such algorithms is of grave importance. Although belonging to the same iterative-subtract class of architectures, they widely differ …


Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse Jul 2020

Compound Effects Of Clock And Voltage Based Power Side-Channel Countermeasures, Jacqueline Lagasse

Masters Theses

The power side-channel attack, which allows an attacker to derive secret information from power traces, continues to be a major vulnerability in many critical systems. Numerous countermeasures have been proposed since its discovery as a serious vulnerability, including both hardware and software implementations. Each countermeasure has its own drawback, with some of the highly effective countermeasures incurring large overhead in area and power. In addition, many countermeasures are quite invasive to the design process, requiring modification of the design and therefore additional validation and testing to ensure its accuracy. Less invasive countermeasures that do not require directly modifying the system …