2017
DOI: 10.1109/tvlsi.2017.2654506
|View full text |Cite
|
Sign up to set email alerts
|

Near-Threshold RISC-V Core With DSP Extensions for Scalable IoT Endpoint Devices

Abstract: Endpoint devices for Internet-of-Things not only need to work under extremely tight power envelope of a few milliwatts, but also need to be flexible in their computing capabilities, from a few kOPS to GOPS. Near-threshold (NT) operation can achieve higher energy efficiency, and the performance scalability can be gained through parallelism. In this paper we describe the design of an opensource RISC-V processor core specifically designed for NT operation in tightly coupled multi-core clusters. We introduce instr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
291
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 373 publications
(292 citation statements)
references
References 46 publications
(56 reference statements)
1
291
0
Order By: Relevance
“…We present the necessary architectural changes in an existing multi-core platform (Section 2). 2) Competitive experimental results for the proposed architecture applied to a low power multi-core system [4]. We provide a performance, power, and area analysis for an implementation in a 22 nm technology and compare against other systems (Section 4).…”
Section: ) a Register File Extension For Reduced Instruction Setmentioning
confidence: 99%
See 2 more Smart Citations
“…We present the necessary architectural changes in an existing multi-core platform (Section 2). 2) Competitive experimental results for the proposed architecture applied to a low power multi-core system [4]. We provide a performance, power, and area analysis for an implementation in a 22 nm technology and compare against other systems (Section 4).…”
Section: ) a Register File Extension For Reduced Instruction Setmentioning
confidence: 99%
“…The fundamental SSR usage follows the simple sequence outlined in Figure 4: address pattern configuration (1), enabling the stream semantics (2), computation (3), and disabling the stream semantics again (4). The configuration registers of the data mover are memory mapped and can be accessed by the processor via load and store instructions.…”
Section: Programming Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…With advances in Internet of Thing (IoT) applications and the expansion of mobile devices, energy consumption has become a primary focus of attention in integrated circuits design [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. While IoT applications cover a broad range of products from wearable devices, smart houses, automotive devices, smart meters to inspection tools and many others, more than 50% of the market is dominated by battery operated devices.…”
Section: Introductionmentioning
confidence: 99%
“…(1) we present PAGURUS, a flexible methodology to design a low-overhead DIFT shell that secures loosely coupled accelerators; a shell is a hardware circuit whose design is independent from the design of the accelerators, thus simplifying the integration of DIFT in heterogeneous SoCs; we analyze the performance and cost overhead of the shell by synthesizing and running it on FPGAs: the shell has a low impact on execution time and area of the accelerators; (2) we define the metric of information leakage for accelerators to quantitatively measure the security of the DIFT shell: we show that, for any given accelerator, it is possible to find the minimum number of tags (required by DIFT) so that no information leakage is possible; we also show that few tags interleaved in the accelerators data are often sufficient to guarantee the absence of information leakage; arXiv:1912.11153v1 [cs.CR] 18 Dec 2019 (3) we perform a design-space exploration where we consider performance, cost and information leakage as optimization goals for the accelerators design: this study shows how to strengthen the security of hardware-accelerated applications in exchange of lower performance and higher cost; (4) we present a case study where the DIFT shell has been used to protect an accelerator integrated on a embedded SoC [31] we extended with DIFT: this shows why a holistic DIFT approach is necessary for heterogeneous SoCs.…”
Section: Introductionmentioning
confidence: 99%