Energy Secure Systems Architecture - overview
Fourth Annual Offering:
Workshop on Energy-Secure System Architectures
June 15, 2014
Minneapolis, Minnesota (United States)
In conjunction with ISCA 2014
Organizers: Augusto Vega (IBM Research), Alper Buyuktosunoglu (IBM Research), Pradip Bose (IBM Research)
News: The preliminary program is available here!
The "power wall" has forced chip and system architects to design with smaller margins between nominal and worst-case operating points. Dynamic power and thermal management control loops have already become an integral part of chip and system design. New research papers in wearout and general reliability management have recently been published. These new generation management protocols have, however, opened up other sources of concern: e.g. control loop stability and robustness of the management protocols. The potential security holes exposed by the integrated control loops and system safety issues triggered by potential violations of power or thermal limits are other areas of concern. We seek to motivate the research community into adopting a holistic approach to mitigating the power wall and the concomitant reliability-security wall.
We have coined the term "Energy-Secure System Architectures" to cover the range of research being pursued within industry and academia in order to ensure robust and secure functionality, while meeting the energy-related constraints of the emerging "green computing" era. This segmented workshop offering, composed of lectures provided by experts in the areas of power/thermal management, reliability and security, provides a comprehensive view of the hardware and software aspects of Energy-Secure System Architectures. This is the fourth year of the offering of this workshop.
This full-day workshop is organized across the following sub-topics:
- Power and thermal management solutions for modern multi-core platforms.
- Robustness of system power/thermal managers: verification and design for verification.
- Reliability and security holes exposed by power/thermal management protocols.
- Guarded, two-level management protocols for safety and low verification complexity.
- Architectural implications of and system software support for energy-secure systems.
- Security and reliability issues in emerging low power memory technology.
Call for Lectures
We invite interested participants to send in a lecture proposal (30 mins minimum to 75 mins maximum). The submission should include a title and abstract, along with a bio-sketch of the speaker and the proposed talk duration. The deadline for submission is: April 11, 2014. Please send it to the co-organizers: Alper Buyuktosunoglu, Pradip Bose and Augusto Vega at: email@example.com, firstname.lastname@example.org and email@example.com. Notification of acceptance: April 25, 2014.