Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hendra Saputra is active.

Publication


Featured researches published by Hendra Saputra.


languages compilers and tools for embedded systems | 2002

Energy-conscious compilation based on voltage scaling

Hendra Saputra; Mahmut T. Kandemir; Narayanan Vijaykrishnan; Mary Jane Irwin; Jie S. Hu; Chung-Hsing Hsu; Ulrich Kremer

As energy consumption has become a majorconstraint in current system design, it is essential to look beyond the traditional low-power circuit and architectural optimizations. Further, software is becoming an increasing portion of embedded/portable systems. Consequently, optimizing the software in conjunction with the underlying low-power hardware features such as voltage scaling is vital.In this paper, we present two compiler-directed energy optimization strategies based on voltage scaling: static voltage scaling and dynamic voltage scaling. In static voltage scaling, the compiler determines a single supply voltage level for the entire input program. We primarily aim at improving the energy consumption of a given code without increasing its execution time. To accomplish this, we employ classical loop-level compiler optimizations. However, we use these optimizations to create opportunities for voltage scaling to save energy, rather than increase program performance.In dynamic voltage scaling, the compiler can select different supply voltage levels for different parts of the code. Our compilation strategy is based on integer linear programming and can accommodate energy/performance constraints. For a benchmark suite of array-based scientific codes and embedded video/image applications, our experiments show average energy savings of 31.8% when static voltage scaling is used. Our dynamic voltage scaling strategy saves 15.3% more energy than static voltage scaling when invoked under the same performance constraints.


design, automation, and test in europe | 2003

Masking the energy behavior of DES encryption [smart cards]

Hendra Saputra; Narayanan Vijaykrishnan; Mahmut Kandemir; Mary Jane Irwin; Richard R. Brooks; Soontae Kim; Wei Zhang

Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has drawn a lot of negative publicity for smart card usage. The power measurement techniques rely on the data-dependent energy behavior of the underlying system. Further, power analysis can be used to identify the specific portions of the program being executed to induce timing glitches that may in turn help to bypass key checking. Thus, it is important to mask the energy consumption when executing the encryption algorithms. In this work, we augment the instruction set architecture of a simple five-stage pipelined smart card processor with secure instructions to mask the energy differences due to key-related data-dependent computations in DES encryption. The secure versions operate on the normal and complementary versions of the operands simultaneously to mask the energy variations due to value dependent operations. However, this incurs the penalty of increased overall energy consumption in the data-path components. Consequently, we employ secure versions of instructions only for critical operations; that is we use secure instructions selectively, as directed by an optimizing compiler. Using a cycle-accurate energy simulator, we demonstrate the effectiveness of this enhancement. Our approach achieves the energy masking of critical operations consuming 83% less energy as compared to existing approaches employing dual rail circuits.


languages compilers and tools for embedded systems | 2002

Compiler-directed cache polymorphism

Jie S. Hu; Mahmut T. Kandemir; Narayanan Vijaykrishnan; Mary Jane Irwin; Hendra Saputra; Wei Zhang

Classical compiler optimizations assume a fixed cache architecture and modify the program to take best advantage of it. In some cases, this may not be the best strategy because each loop nest might work best with a different cache configuration and transforming a nest for a given fixed cache configuration may not be possible due to data dependences. Working with a fixed cache configuration can also increase energy consumption in loops where the best required configuration is smaller than the default (fixed) one. In this paper, we take an alternate approach and modify the cache configuration for each nest depending on the access pattern exhibited by the nest. We call this technique compiler-directed cache polymorphism (CDCP). More specifically, in this paper, we make the following contributions. First, we present an approach for analyzing data reuse properties of loop nests. Second, we give algorithms to simulate the footprints of array references in their reuse space. Third, based on our reuse analysis, we present an optimization algorithm to compute the cache configurations for each nest. Our experimental results show that CDCP is very effective in finding the near-optimal data cache configurations for different nests in array-intensive applications.


ieee computer society annual symposium on vlsi | 2005

A data-driven approach for embedded security

Hendra Saputra; Ozcan Ozturk; Narayanan Vijaykrishnan; Mahmut T. Kandemir; Richard R. Brooks

As embedded systems are being used in a wide variety of critical applications, providing security to data stored and processed in these systems has become an important issue. However, providing security incurs performance and power overheads that need to be limited in resource-constrained embedded environments. Consequently, architectural support to limit these overheads to be incurred only while storing or processing vital data is desirable. In this paper, we present an architecture that provides selective encryption protection for storage and processing protection to power analysis attacks for data marked as requiring security. Further, we show how the code can be transformed to reduce the overhead associated with protecting secure data.


design, automation, and test in europe | 2005

Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems

Ozcan Ozturk; Hendra Saputra; Mahmut T. Kandemir; Ibrahim Kolcu

As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space requirements, power, real-time predictability, and reliability. In particular, many modern embedded systems operate under tight memory space constraints. One way of satisfying these constraints is to compress executable code and data as much as possible. While research on code compression have studied efficient hardware and software based code strategies, many of these techniques do not take application behavior into account, that is, the same compression/decompression strategy is used irrespective of the application being optimized. This paper presents a code compression strategy based on control flow graph (CFG) representation of the embedded program. The idea is to start with a memory image wherein all basic blocks are compressed, and decompress only the blocks that are predicted to be needed in the near future. When the current access to a basic block is over, our approach also decides the point at which the block could be compressed. We propose several compression and decompression strategies that try to reduce memory requirements without excessively increasing the original instruction cycle counts.


languages, compilers, and tools for embedded systems | 2004

Code protection for resource-constrained embedded devices

Hendra Saputra; Guangyu Chen; Richard R. Brooks; Narayanan Vijaykrishnan; Mahmut T. Kandemir; Mary Jane Irwin

While the machine neutral Java bytecodes are attractive for code distribution in the highly heterogeneous embedded domain, the well-documented and standardized features also make it difficult to protect these codes. In fact, there are several tools to reverse engineer Java bytecodes. The focus of this work is the design of a substitution-based bytecode obfuscation approach that prevents code from being executed on unauthorized devices. Furthermore, we also improve the resilience of this substitution-based approach to frequency-based attacks. Using various Java class files, we show that our approach is 2.5 to 3 times less computationally intensive as compared to a traditional encryption based approach. Our experiments reveal that the protected class files could not execute on unauthorized clients.


compilers, architecture, and synthesis for embedded systems | 2003

Exploiting bank locality in multi-bank memories

Guilin Chen; Mahmut T. Kandemir; Hendra Saputra; Mary Jane Irwin

Bank locality can be defined as localizing the number of load/store accesses to a small set of memory banks at a given time. An optimizing compiler can modify a given input code to improve its bank locality. There are several practical advantages of enhancing bank locality, the most important of which is reduced memory energy consumption. Recent trends indicate that energy consumption is fast becoming a first-order design parameter as processor-based systems continue to become more complex and multi-functional. Off-chip memory energy consumption in particular can be a limiting factor in many embedded system designs. This paper presents a novel compiler-based strategy for maximizing the benefits of low-power operating modes available in some recent DRAM-based multi-bank memory systems. In this strategy, the compiler uses linear algebra to represent and optimize bank locality in a mathematical framework. We discuss that exploiting bank locality can be cast as loop (iteration space) and array layout (data space) transformations. We also present experimental data showing the effectiveness of our optimization strategy. Our results show that exploiting bank locality can result in large energy savings.


signal processing systems | 2003

Exploiting value locality for secure-energy aware communication

Hendra Saputra; Narayanan Vijaykrishnan; Mahmut T. Kandemir; Richard R. Brooks; Mary Jane Irwin

Minimizing energy consumption is important for prolonging the life of battery-powered sensor nodes. A major portion of a sensor power budget in a distributed sensor network is consumed by communication with adjacent nodes. Another issue with the communication of data among the sensor nodes is the possibility of leaking confidential sensed data to adversaries. The adoption of standard encryption techniques for protecting the transmitted data is not attractive in this environment as it is costly in terms of energy consumption. We present a new energy-efficient and secure communication protocol that exploits the locality of data transfer in distributed sensor networks. Our evaluation reveals that the proposed technique is specifically effective in sensor applications that involve frequent communications with a high data locality.


design, automation, and test in europe | 2003

Masking the Energy Behavior of DES Encryption

Hendra Saputra; Narayanan Vijaykrishnan; Mahmut T. Kandemir; Mary Jane Irwin; Richard R. Brooks; Soontae Kim; Wei Zhang


IEE Proceedings - Computers and Digital Techniques | 2003

Masking the energy behaviour of encryption algorithms

Hendra Saputra; Narayanan Vijaykrishnan; Mahmut Kandemir; Mary Jane Irwin; Richard R. Brooks

Collaboration


Dive into the Hendra Saputra's collaboration.

Top Co-Authors

Avatar

Mahmut T. Kandemir

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mary Jane Irwin

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Richard R. Brooks

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Wei Zhang

Virginia Commonwealth University

View shared research outputs
Top Co-Authors

Avatar

Jie S. Hu

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Mahmut Kandemir

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge