Confidentiality Preserving Integer Programming for Global Routing Hamid Shojaei, Azadeh Davoodi, Parmesh Ramanathan Department of Electrical and Computer.

Slides:



Advertisements
Similar presentations
MIP-based Detailed Placer for Mixed-size Circuits Shuai Li, Cheng-Kok Koh ECE, Purdue University {li263,
Advertisements

Multilevel Hypergraph Partitioning Daniel Salce Matthew Zobel.
Optimization of Placement Solutions for Routability Wen-Hao Liu, Cheng-Kok Koh, and Yih-Lang Li DAC’13.
1 Advancing Supercomputer Performance Through Interconnection Topology Synthesis Yi Zhu, Michael Taylor, Scott B. Baden and Chung-Kuan Cheng Department.
Meng-Kai Hsu, Sheng Chou, Tzu-Hen Lin, and Yao-Wen Chang Electronics Engineering, National Taiwan University Routability Driven Analytical Placement for.
1 MERLIN A polynomial solution for the Traveling Salesman Problem Dr. Joachim Mertz, 2005.
Shuai Li and Cheng-Kok Koh School of Electrical and Computer Engineering, Purdue University West Lafayette, IN, Mixed Integer Programming Models.
Ripple: An Effective Routability-Driven Placer by Iterative Cell Movement Xu He, Tao Huang, Linfu Xiao, Haitong Tian, Guxin Cui and Evangeline F.Y. Young.
FastPlace: Efficient Analytical Placement using Cell Shifting, Iterative Local Refinement and a Hybrid Net Model FastPlace: Efficient Analytical Placement.
Chapter 3 The Greedy Method 3.
MCFRoute: A Detailed Router Based on Multi- Commodity Flow Method Xiaotao Jia, Yici Cai, Qiang Zhou, Gang Chen, Zhuoyuan Li, Zuowei Li.
Tirgul 12 Algorithm for Single-Source-Shortest-Paths (s-s-s-p) Problem Application of s-s-s-p for Solving a System of Difference Constraints.
Background: Scan-Based Delay Fault Testing Sequentially apply initialization, launch test vector pairs that differ by 1-bit shift A vector pair induces.
38 th Design Automation Conference, Las Vegas, June 19, 2001 Creating and Exploiting Flexibility in Steiner Trees Elaheh Bozorgzadeh, Ryan Kastner, Majid.
Chapter 10: Iterative Improvement
Computer Algorithms Integer Programming ECE 665 Professor Maciej Ciesielski By DFG.
2-Layer Crossing Minimisation Johan van Rooij. Overview Problem definitions NP-Hardness proof Heuristics & Performance Practical Computation One layer:
1 1 Slide LINEAR PROGRAMMING Introduction to Sensitivity Analysis Professor Ahmadi.
VLSI Physical Design Automation Prof. David Pan Office: ACES Lecture 18. Global Routing (II)
WISCAD – VLSI Design Automation GRIP: Scalable 3-D Global Routing using Integer Programming Tai-Hsuan Wu, Azadeh Davoodi Department of Electrical and Computer.
VLSI Physical Design: From Graph Partitioning to Timing Closure Chapter 5: Global Routing © KLMH Lienig 1 FLUTE: Fast Lookup Table Based RSMT Algorithm.
Graph-based consensus clustering for class discovery from gene expression data Zhiwen Yum, Hau-San Wong and Hongqiang Wang Bioinformatics, 2007.
LINEAR PROGRAMMING SIMPLEX METHOD.
MGR: Multi-Level Global Router Yue Xu and Chris Chu Department of Electrical and Computer Engineering Iowa State University ICCAD
A Topology-based ECO Routing Methodology for Mask Cost Minimization Po-Hsun Wu, Shang-Ya Bai, and Tsung-Yi Ho Department of Computer Science and Information.
A Parallel Integer Programming Approach to Global Routing Tai-Hsuan Wu, Azadeh Davoodi Department of Electrical and Computer Engineering Jeffrey Linderoth.
Optimization for Operation of Power Systems with Performance Guarantee
1 Chapter-4: Network Flow Modeling & Optimization Deep Medhi and Karthik Ramasamy August © D. Medhi & K. Ramasamy, 2007.
1 Outline:  Outline of the algorithm  MILP formulation  Experimental Results  Conclusions and Remarks Advances in solving scheduling problems with.
1 1 Slide © 2005 Thomson/South-Western Slides Prepared by JOHN S. LOUCKS ST. EDWARD’S UNIVERSITY.
Chapter 6 Linear Programming: The Simplex Method
Introduction to Job Shop Scheduling Problem Qianjun Xu Oct. 30, 2001.
Solving Hard Instances of FPGA Routing with a Congestion-Optimal Restrained-Norm Path Search Space Keith So School of Computer Science and Engineering.
1 1 Slide Linear Programming (LP) Problem n A mathematical programming problem is one that seeks to maximize an objective function subject to constraints.
Barnett/Ziegler/Byleen Finite Mathematics 11e1 Learning Objectives for Section 6.4 The student will be able to set up and solve linear programming problems.
1 1 Slide © 2000 South-Western College Publishing/ITP Slides Prepared by JOHN LOUCKS.
Kerimcan OzcanMNGT 379 Operations Research1 Linear Programming: The Simplex Method Chapter 5.
1 1 © 2003 Thomson  /South-Western Slide Slides Prepared by JOHN S. LOUCKS St. Edward’s University.
1 1 © 2003 Thomson  /South-Western Slide Slides Prepared by JOHN S. LOUCKS St. Edward’s University.
UC San Diego / VLSI CAD Laboratory Incremental Multiple-Scan Chain Ordering for ECO Flip-Flop Insertion Andrew B. Kahng, Ilgweon Kang and Siddhartha Nath.
An Efficient Clustering Algorithm For Low Power Clock Tree Synthesis Rupesh S. Shelar Enterprise Microprocessor Group Intel Corporation, Hillsboro, OR.
New Modeling Techniques for the Global Routing Problem Anthony Vannelli Department of Electrical and Computer Engineering University of Waterloo Waterloo,
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
1 Exploring Custom Instruction Synthesis for Application-Specific Instruction Set Processors with Multiple Design Objectives Lin, Hai Fei, Yunsi ACM/IEEE.
Kwangsoo Han‡, Andrew B. Kahng‡† and Hyein Lee‡
Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
ECE556 Project Part 1 Azadeh Davoodi Spring 2015.
ARCHER:A HISTORY-DRIVEN GLOBAL ROUTING ALGORITHM Muhammet Mustafa Ozdal, Martin D. F. Wong ICCAD ’ 07.
Tao Lin Chris Chu TPL-Aware Displacement- driven Detailed Placement Refinement with Coloring Constraints ISPD ‘15.
1 Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction Chung-Wei Lin, Szu-Yu Chen, Chi-Feng Li, Yao-Wen Chang, Chia-Lin Yang National Taiwan.
DISTRIBUTION AND NETWORK MODELS (1/2)
Chapter 2 Introduction to Linear Programming n Linear Programming Problem n Problem Formulation n A Maximization Problem n Graphical Solution Procedure.
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
1 1 Slide © 2005 Thomson/South-Western Linear Programming: The Simplex Method n An Overview of the Simplex Method n Standard Form n Tableau Form n Setting.
Chapter 4 Linear Programming: The Simplex Method
Chapter 6 Linear Programming: The Simplex Method Section 4 Maximization and Minimization with Problem Constraints.
Chris Chu Iowa State University Yiu-Chung Wong Rio Design Automation
1 Iterative Integer Programming Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Sethavidh Gertphol and Viktor K. Prasanna University.
Min Li and Azadeh Davoodi
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
Routing Topology Algorithms Mustafa Ozdal 1. Introduction How to connect nets with multiple terminals? Net topologies needed before point-to-point routing.
Simplex Method Simplex: a linear-programming algorithm that can solve problems having more than two decision variables. The simplex technique involves.
Congestion Analysis for Global Routing via Integer Programming Hamid Shojaei, Azadeh Davoodi, and Jeffrey Linderoth* Department of Electrical and Computer.
(iii) Simplex method - I D Nagesh Kumar, IISc Water Resources Planning and Management: M3L3 Linear Programming and Applications.
1 Double-Patterning Aware DSA Template Guided Cut Redistribution for Advanced 1-D Gridded Designs Zhi-Wen Lin and Yao-Wen Chang National Taiwan University.
On the Relation Between Simulation-based and SAT-based Diagnosis CMPE 58Q Giray Kömürcü Boğaziçi University.
Lap Chi Lau we will only use slides 4 to 19
Topics in Algorithms Lap Chi Lau.
9.3 Linear programming and 2 x 2 games : A geometric approach
FLUTE: Fast Lookup Table Based RSMT Algorithm for VLSI Design
Presentation transcript:

Confidentiality Preserving Integer Programming for Global Routing Hamid Shojaei, Azadeh Davoodi, Parmesh Ramanathan Department of Electrical and Computer Engineering University of Wisconsin-Madison WISCAD Electronic Design Automation Lab

2 Generate an optimization instance for an EDA problem (OP) Client Cloud CAD tool finds a Good Solution to OP (GSOP) Attacks GSOP OP Cloud-Based EDA

3 Mask the OP (MOP) MOP Transform back for a Good Solution to OP (GSOP) Generate an optimization instance (OP) GSMOP Client Cloud Find a Good Solution to MOP (GSMOP) Attacks GSOP OP Proposed Framework: Overview The above framework allows masking an EDA problem instance before it is transferred to the cloud and thus provides immunity to attacks at the cloud side ! Challenge: The masking process should ensure a good solution is still attainable using the same solver at the cloud side

4 Summary of Contributions A framework to mask an ILP model, corresponding to an instance of the global routing problem –masking preserves the solution quality Several attacks which can decipher layout and connectivity information from the unmasked problem Ability to explore the tradeoff between the increase in immunity and the corresponding increase in runtime to solve the masked problem instance

5 Global Routing - Problem Definition A design is modeled by a grid-graph –terminals of the nets are mapped to vertices –route of a net corresponds to a tree connecting its corresponding vertices and its wirelength is the number of edges of the tree –each edge has an associated capacity The goal is to route all the nets with smallest total wirelength while ensuring minimal over-usage of routing resources n1 n2 n4 n2 n3 n4

6 For each net n, one route should be selected –from a set of its promising candidate routes T n Objective: –minimize a linear combination of the total wirelength and the total over-usage of routing resources (higher priority for large M) S1S1 T1T1 S2S2 T2T2 o 10 An Integer Programming Model* *[GRIP, TCAD’11]

7 Masking An Optimization Instance: Example

8 Simple Attacks: Examples Number of nets –count the #1s in the equalities in the right-hand- side (RHS) vector of (OP) Edge capacities –RHS value in the inequality corresponding to the edge capacity constraints in (OP) Wirelength of a route –count the number of positive entries in the corresponding column in the left-hand-side (LHS) constraint matrix minus one A basic masking strategy to randomly shuffle the rows and columns in the LHS and RHS does not make the (OP) immune even to these simple attacks!

9 A Challenging Attack 1.Compute the weight wij –indicates if edges ei and ej are both included in one or more routing trees –higher wij means higher likelihood that ei and ej are close or even physically adjacent 2.Solve an optimization problem to retrieve the routing topology using the computed weights –binary variable yij=1 if edges ei and ej are estimated to share a vertex –solution is mapping of each routing tree (through its edge indexes) to the location on the grid

10 Masking Steps OP: optimization instance (after randomly shuffling the rows and columns) MOP1: further translates all equalities to inequalities by adding surplus variables MOP2: further hides 20% of the randomly-selected route selection variables by replacing x it with 1-x it MOP3-K%: further applies a masking heuristic to hide K% of the columns in the LHS matrix by replacing a rows with a linear combination of the other rows –K is the hiding factor –results for K=10% and 20% in our experiments We formally prove that the solution to each of these problem instances has the same quality as the original problem (OP) !

11 Simulation Setup (OP) created using the global routing tool CGRIP* –Ran CGRIP with a small time budget of only a few minutes to create candidate routes for the ISPD 2007 benchmark instances –Ran (OP) on multi-core machines (by running CPLEX in the multi-threaded mode) * [CGRIP—ICCAD’11]

12 Comparison: Simple Attacks Shown for one benchmark (a1) –similar for other benchmarks Simple attacks –Nets: number of nets –E-Cap: edge capacities –WL: wirelength of a candidate tree –Trees: number of trees per net by counting the non- zero entries in a route selection constraint

13 Comparison: Vulnerability Metric Challenging attack –V: vulnerability measured as the number of correctly restored grid edges in a routing topology attack –calculated by solving a (IP-VUL) formulation which aims to extract the routing grid especially at the highly- utilized routing regions

14 Increase in the hiding factor results in decrease in the vulnerability metric but increase in the CAD tool runtime No compromise in the global routing solution quality in all cases Tradeoff Analysis for a1

15 Conclusions Problem transformation provides designers to hide confidential design information as a way to provide trust to a third-party cloud provides –complementary to and compatible with other security-based techniques at the cloud’s side Used masking techniques to transform an ILP formulation describing a global routing instance such that –the transformed formulation is immune to a larger number of confidentiality attacks –there is no loss of quality of the routing solution Tradeoff exists between decrease in vulnerability to attacks and increase in runtime