skip to main content
research-article

Probabilistic Risk-Aware Scheduling with Deadline Constraint for Heterogeneous SoCs

Published:08 February 2022Publication History
Skip Abstract Section

Abstract

Hardware Trojans can compromise System-on-Chip (SoC) performance. Protection schemes implemented to combat these threats cannot guarantee 100% detection rate and may also introduce performance overhead. This paper defines the risk of running a job on an SoC as a function of the misdetection rate of the hardware Trojan detection methods implemented on the cores in the SoC. Given the user-defined deadlines of each job, our goal is to minimize the job-level risk as well as the deadline violation rate for both static and dynamic scheduling scenarios. We assume that there is no relationship between the execution time and risk of a task executed on a core. Our risk-aware scheduling algorithm first calculates the probability of possible task allocations and then uses it to derive the task-level deadlines. Each task is then allocated to the core with minimum risk that satisfies the task-level deadline. In addition, in dynamic scheduling, where multiple jobs are injected randomly, we propose to explicitly operate with a reduced virtual deadline to avoid possible future deadline violations. Simulations on randomly generated graphs show that our static scheduler has no deadline violations and achieves 5.1%–17.2% lower job-level risk than the popular Earliest Time First (ETF) algorithm when the deadline constraint is 1.2×–3.0× the makespan of ETF. In the dynamic case, the proposed algorithm achieves a violation rate comparable to that of Earliest Deadline First (EDF), an algorithm optimized for dynamic scenarios. Even when the injection rate is high, it outperforms EDF with 8.4%–10% lower risk when the deadline is 1.5×–3.0× the makespan of ETF.

REFERENCES

  1. [1] Arabnejad Hamid, Barbosa Jorge G., and Prodan Radu. 2016. Low-time complexity budget–deadline constrained workflow scheduling on heterogeneous resources. Future Generation Computer Systems 55 (2016), 2940. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Arabnejad Vahid, Bubendorfer Kris, and Ng Bryan. 2019. Dynamic multi-workflow scheduling: A deadline and cost-aware approach for commercial clouds. Future Generation Computer Systems 100 (2019), 98108.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Arda Samet E., Krishnakumar Anish, Goksoy A. Alper, Kumbhare Nirmal, Mack Joshua, Sartor Anderson L., Akoglu Ali, Marculescu Radu, and Ogras Umit Y.. 2020. DS3: A system-level domain-specific System-on-Chip simulation framework. IEEE Trans. Comput. 69, 8 (2020), 12481262.Google ScholarGoogle Scholar
  4. [4] Bhunia Swarup, Hsiao Michael S., Banga Mainak, and Narasimhan Seetharam. 2014. Hardware Trojan attacks: Threat analysis and countermeasures. Proc. IEEE 102, 8 (2014), 12291247.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Bloom Gedare, Narahari Bhagirath, and Simha Rahul. 2009. OS support for detecting Trojan circuit attacks. In 2009 IEEE International Workshop on Hardware-Oriented Security and Trust. IEEE, 100103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Blythe James, Jain Sonal, Deelman Ewa, Gil Yolanda, Vahi Karan, Mandal Anirban, and Kennedy Ken. 2005. Task scheduling strategies for workflow-based applications in grids. In CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005., Vol. 2. IEEE, 759767. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Cao Shujin, Deng Kefeng, Ren Kaijun, Li Xiaoyong, Nie Tengfei, and Song Junqiang. 2019. A deadline-constrained scheduling algorithm for scientific workflows in clouds. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 98105.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Chakraborty Rajat Subhra, Narasimhan Seetharam, and Bhunia Swarup. [n.d.]. Hardware Trojan: Threats and emerging solutions. In 2009 IEEE International High Level Design Validation and Test Workshop. 166171.Google ScholarGoogle Scholar
  9. [9] Chakraborty Rajat Subhra, Pagliarini Samuel, Mathew Jimson, Rajendran Sree Ranjani, and Devi M. Nirmala. 2017. A flexible online checking technique to enhance hardware Trojan horse detectability by reliability analysis. IEEE Transactions on Emerging Topics in Computing 5, 2 (2017), 260270.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Cplex IBM ILOG. 2009. V12. 1: User’s manual for CPLEX. International Business Machines Corporation 46, 53 (2009), 157.Google ScholarGoogle Scholar
  11. [11] Denninnart Chavit, Salehi Mohsen Amini, Toosi Adel Nadjaran, and Li Xiangbo. 2018. Leveraging computational reuse for cost-and QoS-efficient task scheduling in clouds. In International Conference on Service-Oriented Computing. Springer, 828836.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Djigal Hamza, Feng Jun, Lu Jiamin, and Ge Jidong. 2020. IPPTS: An efficient algorithm for scientific workflow scheduling in heterogeneous computing systems. IEEE Transactions on Parallel and Distributed Systems 32, 5 (2020), 10571071.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Doly Shammi A., Chiriyath Alex, Mittelmann Hans D., Bliss Daniel W., and Ragi Shankarachary. 2020. A decision theoretic approach for waveform design in joint radar communications applications. In 2020 54th Asilomar Conference on Signals, Systems, and Computers. IEEE, 611.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Gross Donald. 2008. Fundamentals of Queueing Theory. John Wiley & Sons. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Guo Zhishan, Bhuiyan Ashikahmed, Liu Di, Khan Aamir, Saifullah Abusayeed, and Guan Nan. 2019. Energy-efficient real-time scheduling of DAGs on clustered multi-core platforms. In 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). IEEE, 156168.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Hoque Tamzidul, Wang Xinmu, Basak Abhishek, Karam Robert, and Bhunia Swarup. 2018. Hardware Trojan attacks in embedded memory. In 2018 IEEE 36th VLSI Test Symposium (VTS). IEEE, 16.Google ScholarGoogle Scholar
  17. [17] Huang Jia, Blech Jan Olaf, Raabe Andreas, Buckl Christian, and Knoll Alois. 2011. Analysis and optimization of fault-tolerant task scheduling on multiprocessor embedded systems. In Proceedings of the Seventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. 247256. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Huang Jing, Li Renfa, An Jiyao, Zeng Haibo, and Chang Wanli. 2021. A DVFS-weakly-dependent energy-efficient scheduling approach for deadline-constrained parallel applications on heterogeneous systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2021). DOI: DOI: https://doi.org/10.1109/tcad.2021.3049688Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Jiang Wei, Zhang Xia, Zhan Jinyu, Ma Yue, and Jiang Ke. 2017. Design optimization of secure message communication for energy-constrained distributed real-time systems. J. Parallel and Distrib. Comput. 100 (2017), 115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Jin Yier and Sullivan Dean. 2014. Real-time trust evaluation in integrated circuits. In 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Kargahi Mehdi and Movaghar Ali. 2005. Non-preemptive earliest-deadline-first scheduling policy: A performance study. In 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, (Sep. 27). IEEE, 201208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Kooti Hessam, Mishra Deepak, and Bozorgzadeh Eli. 2011. Reconfiguration-aware real-time scheduling under QoS constraint. In 16th Asia and South Pacific Design Automation Conference (ASP-DAC’11). IEEE, 141146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Krishnakumar Anish, Arda Samet E., Goksoy A. Alper, Mandal Sumit K., Ogras Umit Y., Sartor Anderson L., and Marculescu Radu. 2020. Runtime task scheduling using imitation learning for heterogeneous many-core systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 39, 11 (2020), 40644077.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Li Xiangbo, Salehi Mohsen Amini, Bayoumi Magdy, and Buyya Rajkumar. 2016. CVSS: A cost-efficient and QoS-aware video streaming using cloud services. In 2016 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). IEEE, 106115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Li Xiangbo, Salehi Mohsen Amini, Bayoumi Magdy, Tzeng Nian-Feng, and Buyya Rajkumar. 2017. Cost-efficient and robust on-demand video transcoding using heterogeneous cloud services. IEEE Transactions on Parallel and Distributed Systems 29, 3 (2017), 556571.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Liu Chen, Rajendran Jeyavijayan, Yang Chengmo, and Karri Ramesh. 2014. Shielding heterogeneous MPSoCs from untrustworthy 3PIPs through security-driven task scheduling. IEEE Transactions on Emerging Topics in Computing 2, 4 (2014), 461472.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Mishra Sambit Kumar, Puthal Deepak, Rodrigues Joel JPC, Sahoo Bibhudatta, and Dutkiewicz Eryk. 2018. Sustainable service allocation using a metaheuristic technique in a fog server for industrial applications. IEEE Transactions on Industrial Informatics 14, 10 (2018), 44974506.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Nowroz Abdullah Nazma, Hu Kangqiao, Koushanfar Farinaz, and Reda Sherief. 2014. Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 33, 12 (2014), 17921805.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Pagani Santiago, Pathania Anuj, Shafique Muhammad, Chen Jian-Jia, and Henkel Jörg. 2016. Energy efficiency for clustered heterogeneous multicores. IEEE Transactions on Parallel and Distributed Systems 28, 5 (2016), 13151330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Qureshi Muhammad Shuaib, Qureshi Muhammad Bilal, Fayaz Muhammad, Mashwani Wali Khan, Belhaouari Samir Brahim, Hassan Saima, and Shah Asadullah. 2020. A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems. International Journal of Distributed Sensor Networks 16, 8 (2020), 1550147720932750.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Rossi Francesca, Beek Peter Van, and Walsh Toby. 2006. Handbook of Constraint Programming. Elsevier. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Safari Monireh and Khorsand Reihaneh. 2018. PL-DVFS: Combining power-aware list-based scheduling algorithm with DVFS technique for real-time tasks in cloud computing. The Journal of Supercomputing 74, 10 (2018), 55785600. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Saharawat Shalu and Kalra Mala. 2020. Deadline constrained energy-efficient workflow scheduling heuristic for cloud. In Proceedings of International Conference on IoT Inclusive Life (ICIIL’19), NITTTR Chandigarh, India. Springer, Singapore, 365382.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Sahoo Sampa, Sahoo Bibhudatta, and Turuk Ashok Kumar. 2019. A learning automata-based scheduling for deadline sensitive task in the cloud. IEEE Transactions on Services Computing (2019). DOI: DOI: https://doi.org/10.1109/TSC.2019.2906870Google ScholarGoogle Scholar
  35. [35] Sartor Anderson L., Krishnakumar Anish, Arda Samet E., Ogras Umit Y., and Marculescu Radu. 2020. HiLITE: Hierarchical and lightweight imitation learning for power management of embedded SoCs. IEEE Computer Architecture Letters 19, 1 (2020), 6367.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Sayadi Hossein, Makrani Hosein Mohammadi, Dinakarrao Sai Manoj Pudukotai, Mohsenin Tinoosh, Sasan Avesta, Rafatirad Setareh, and Homayoun Houman. 2019. 2smart: A two-stage machine learning-based approach for run-time specialized hardware-assisted malware detection. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 728733.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Shah Apurva and Kotecha Ketan. 2010. Efficient scheduling algorithms for real-time distributed systems. In 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC’10), (Oct. 28). IEEE, 4448.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Shakya Bicky, He Tony, Salmani Hassan, Forte Domenic, Bhunia Swarup, and Tehranipoor Mark. 2017. Benchmarking of hardware Trojans and maliciously affected circuits. Journal of Hardware and Systems Security 1, 1 (2017), 85102.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Stavrinides Georgios L. and Karatza Helen D.. 2015. A cost-effective and QoS-aware approach to scheduling real-time workflow applications in PaaS and SaaS clouds. In 2015 3rd International Conference on Future Internet of Things and Cloud. IEEE, 231239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Stavrinides Georgios L. and Karatza Helen D.. 2016. Scheduling different types of applications in a SaaS cloud. In Proceedings of the 6th International Symposium on Business Modeling and Software Design (BMSD’16). 144151.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Stavrinides Georgios L. and Karatza Helen D.. 2018. Energy-aware scheduling of real-time workflow applications in clouds utilizing DVFS and approximate computations. In 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 3340.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Sun Yidan, Jiang Guiyuan, Lam Siew-Kei, and Ning Fangxin. 2019. Designing energy-efficient MPSoC with untrustworthy 3PIP cores. IEEE Transactions on Parallel and Distributed Systems 31, 1 (2019), 5163.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Tehranipoor Mohammad and Koushanfar Farinaz. 2010. A survey of hardware Trojan taxonomy and detection. IEEE Design & Test of Computers 27, 1 (2010), 1025. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Topcuoglu Haluk, Hariri Salim, and Wu Min-you. 2002. Performance-effective and low-complexity task scheduling for heterogeneous computing. IEEE Transactions on Parallel and Distributed Systems 13, 3 (2002), 260274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Vijayan Arunkumar, Tahoori Mehdi B., and Chakrabarty Krishnendu. 2020. Runtime identification of hardware Trojans by feature analysis on gate-level unstructured data and anomaly detection. ACM Transactions on Design Automation of Electronic Systems (TODAES) 25, 4 (2020), 123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Wu Quanwang, Ishikawa Fuyuki, Zhu Qingsheng, Xia Yunni, and Wen Junhao. 2017. Deadline-constrained cost optimization approaches for workflow scheduling in clouds. IEEE Transactions on Parallel and Distributed Systems 28, 12 (2017), 34013412.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Wu Tony F., Ganesan Karthik, Hu Yunqing Alexander, Wong H-S Philip, Wong Simon, and Mitra Subhasish. 2015. TPAD: Hardware Trojan prevention and detection for trusted integrated circuits. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 35, 4 (2015), 521534.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Xiao Kan, Forte Domenic, Jin Yier, Karri Ramesh, Bhunia Swarup, and Tehranipoor Mohammad. 2016. Hardware Trojans: Lessons learned after one decade of research. ACM Transactions on Design Automation of Electronic Systems (TODAES) 22, 1 (2016), 123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Xiaoyong Tang, Li Kenli, Zeng Zeng, and Veeravalli Bharadwaj. 2010. A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems. IEEE Trans. Comput. 60, 7 (2010), 10171029. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Xie Guoqi, Chen Yuekun, Xiao Xiongren, Xu Cheng, Li Renfa, and Li Keqin. 2017. Energy-efficient fault-tolerant scheduling of reliable parallel applications on heterogeneous distributed embedded systems. IEEE Transactions on Sustainable Computing 3, 3 (2017), 167181.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Xie Guoqi, Zeng Gang, Xiao Xiongren, Li Renfa, and Li Keqin. 2017. Energy-efficient scheduling algorithms for real-time parallel applications on heterogeneous distributed embedded systems. IEEE Transactions on Parallel and Distributed Systems 28, 12 (2017), 34263442.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52] Yassa Sonia, Chelouah Rachid, Kadima Hubert, and Granado Bertrand. 2013. Multi-objective approach for energy-aware workflow scheduling in cloud computing environments. The Scientific World Journal 2013. DOI: DOI: https://doi.org/10.1155/2013/350934Google ScholarGoogle ScholarCross RefCross Ref
  53. [53] Zhou Junlong, Sun Jin, Cong Peijin, Liu Zhe, Zhou Xiumin, Wei Tongquan, and Hu Shiyan. 2019. Security-critical energy-aware task scheduling for heterogeneous real-time MPSoCs in IoT. IEEE Transactions on Services Computing 13, 4 (2019), 745758.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Probabilistic Risk-Aware Scheduling with Deadline Constraint for Heterogeneous SoCs

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Embedded Computing Systems
        ACM Transactions on Embedded Computing Systems  Volume 21, Issue 2
        March 2022
        187 pages
        ISSN:1539-9087
        EISSN:1558-3465
        DOI:10.1145/3514174
        • Editor:
        • Tulika Mitra
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 February 2022
        • Accepted: 1 September 2021
        • Received: 1 August 2021
        Published in tecs Volume 21, Issue 2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format