eda-ricercatore.github.io

Zhiyang Ong is an Electrical Engineering Ph.D. student at Texas A&M University. He is currently working on noise-based logic, and had worked on problems in VLSI formal verification, electronic design automation, and satisfiability modulo theories.

Follow me on GitHub

Preliminary Call for Participation: Secure ASIP Design Automation Group

We are exploring opportunities to design secure system-on-chips (SoCs) based on application-specific instruction set processors (ASIPs), develop design automation tools/software for design such secure SoCs, and publish research papers in the design automation of ASIPs for embedded computer vision and bioinformatics.

About the Secure ASIP Design Automation Group

It is an informal group that convenes online to present and discuss topics related to the design automation of secure ASIPs, develop benchmarks for security verification of ASIPs, develop design automation tools and retargetable compilers for ASIPs, and neuromorphic processors.

Topics of Interest

  • Retargetable compiler
    • Parallelizing, retargetable compilers
  • Microarchitecture of a RISC-V processor
    • Chisel-based single-cycle RISC-V processor
    • Chisel-based pipelined RISC-V processor
    • Chisel-based superscalar, out-of-order pipelined RISC-V processor
    • Chisel-based multi-core RISC-V processor
    • Chisel-based parameterizable multi-core RISC-V processor synthesis tool
    • Chisel-based multi-core RISC-V processor
    • Chisel-based parameterizable multi-core RISC-V processor synthesis tool
  • LLVM-based hardware/software partitioning tool
  • LLVM-based instruction synthesis tool
  • Deep learning processor
    • Or, neuromorphic processor for deep learning
    • Parameterizable deep learning processor synthesis tool
    • Target applications
      • Embedded computer vision
        • For autonomous driving vehicles
        • For consumer products, such as smart phones
      • Bioinformatics
  • Secure processor design
    • Specifications for security verification of RISC-V processors
      • Architectural level
      • Register-transfer level (RTL)
      • Logic level
  • Formal security verification
    • FIRRTL-based Equivalence checking
    • Model checking
    • Theorem proving
  • Post-quantum cryptoprocessor

Goals of the Secure ASIP Design Automation Group

To publish peer-reviewed conference or journal papers based on selected research topic(s).

Miscellaneous

We strongly encourage people from marginalized communities in their country of residence to join us.

This includes women, disabled people (e.g., people who are hearing impaired, visually impaired, dealing with learning disabilities, or dyslexic), and ethnic minorities.

Also, no matter your current schedule - whether you are a student, working full-time, or balancing both as a parent, we invite you to get in touch with us. We are committed to inclusive diversity, and we will endeavor to accommodate you.

Contact Information

If you are interested in joining the Secure ASIP Design Automation Group, please kindly email me using the email address found below.

echo "cukj -wb- 23wU4X5M589 TROJANS cqkH wuz2y of the Stanford" | awk '{ sub("23wU4X5M589","F.d_c_b. ") sub("Stanford","domain"); print $5, $2, $8; for (i=1; i<=1; i++) print "6\b"; print $9, $7, $6 }' | sed y/kqcbuHwM62z/gnotrzadqmc/ | tr 'q' ' ' | tr -d [:cntrl:] | tr -d 'r' | tr y "\n"

Hint: If you cannot parse the above expression, it is a series of UNIX commands. If you copy and past the expression into the shell prompt of a UNIX Terminal application, you can figure out my email address.

Return to Home Page

Return to Home Page

Author Information

The MIT License (MIT)

Copyright (c) <2018> Zhiyang Ong

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Email address: echo “cukj -wb- 23wU4X5M589 TROJANS cqkH wiuz2y 0f Mw Stanford” awk ‘{ sub(“23wU4X5M589”,”F.d_c_b. “) sub(“Stanford”,”d0mA1n”); print $5, $2, $8; for (i=1; i<=1; i++) print “6\b”; print $9, $7, $6 }’ sed y/kqcbuHwM62z/gnotrzadqmC/ tr ‘q’ ‘ ‘ tr -d [:cntrl:] tr -d ‘ir’ tr y “\n” Don’t compromise my computing accounts. You have been warned.