Show simple item record

dc.contributor.authorStrzeszynski, Jan
dc.contributor.authorTong, Jianming
dc.contributor.authorLee, Kyungmi
dc.contributor.authorXiong, Nathan
dc.contributor.authorParashar, Angshuman
dc.contributor.authorEmer, Joel
dc.contributor.authorKrishna, Tushar
dc.contributor.authorYan, Mengjia
dc.date.accessioned2025-12-04T22:51:59Z
dc.date.available2025-12-04T22:51:59Z
dc.date.issued2025-10-18
dc.identifier.isbn979-8-4007-2198-4
dc.identifier.urihttps://hdl.handle.net/1721.1/164205
dc.descriptionHASP 2025, Seoul, Republic of Koreaen_US
dc.description.abstractOff-chip memory in ML accelerators is vulnerable to both hardware and software attack, which needs encryption and authentication. Precise performance modeling of it requires (1) representation of authentication blocks (AuthBlock) to cover the full design space of shapes and orientations, and (2) precise memory behavior modeling, as encryption and authentication mainly increase memory traffic. This paper introduces 𝑆 2Loop, a framework that resolves these challenges by introducing (1) flexible, all-level partitioning based AuthBlocks for ensuring full coverage of the entire design space, (2) a realistic layout-based memory model, and (3) an Mapping-LayoutAuthentication co-search algorithm to explore the drastic combinatorial design space to figure out optimal mapping, layout, and AuthBlock shape choice for multi-layer workloads. SquareLoop’s detailed memory model helps find better mapping to achieve 1.32× speedup on ResNet18 compared to the SotA SecureLoop, and our latency predictions are validated to within 7.3% of an RTL implementation. 𝑆 2𝐿𝑜𝑜𝑝 also achieve up-to 1.08×/1.82× overall speedup for authenticated ResNet18/MobileNet-V3 on various accelerators with AuthBlock and Mapping co-searching. We open-source 𝑆 2Loop to provide a powerful and validated tool for designing efficient, secure accelerators at https://github.com/maeri-project/squareloop.en_US
dc.publisherACM|Hardware and Architectural Support for Security and Privacy 2025en_US
dc.relation.isversionofhttps://doi.org/10.1145/3768725.3768732en_US
dc.rightsCreative Commons Attributionen_US
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en_US
dc.sourceAssociation for Computing Machineryen_US
dc.titleSquareLoop: Explore Optimal Authentication Block Strategy for MLen_US
dc.typeArticleen_US
dc.identifier.citationJan Strzeszynski, Jianming Tong, Kyungmi Lee, Nathan Xiong, Angshuman Parashar, Joel S. Emer, Tushar Krishna, and Mengjia Yan. 2025. SquareLoop: Explore Optimal Authentication Block Strategy for ML. In Proceedings of the 14th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP '25). Association for Computing Machinery, New York, NY, USA, 37–45.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.departmentMassachusetts Institute of Technology. Research Laboratory of Electronicsen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Mathematicsen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.identifier.mitlicensePUBLISHER_CC
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2025-11-01T07:58:12Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2025-11-01T07:58:13Z
mit.licensePUBLISHER_CC
mit.metadata.statusAuthority Work and Publication Information Neededen_US
๏ปฟ

Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record