Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mafijul Md. Islam is active.

Publication


Featured researches published by Mafijul Md. Islam.


international conference on parallel architectures and compilation techniques | 2009

Zero-Value Caches: Cancelling Loads that Return Zero

Mafijul Md. Islam; Per Stenström

The speed gap between processor and memory continues to limit performance. To address this problem, we explore the potential of eliminating Zero Loads — loads accessing memory locations that contain the value “zero” — to improve performance and energy dissipation. Our study shows that such loads comprise as many as 18% of the total number of dynamic loads. We show that a significant fraction of zero loads ends up on the critical memory-access path in out-of-order cores. We propose a non-speculative microarchitectural technique — Zero-Value Cache (ZVC) — to capitalize on zero loads and explore critical design options of such caches. We show that with modest investment, we can obtain speedups up to 78% and reduce the overall energy dissipation by up to 39%. Most importantly, zero-value caches never cause performance loss.


compilers architecture and synthesis for embedded systems | 2010

Characterization and exploitation of narrow-width loads: the narrow-width cache approach

Mafijul Md. Islam; Per Stenström

This paper exploits small-value locality to accelerate the execution of memory instructions. We find that narrow-width loads (NWLDs) --- loads with small-value operands of 8 bits or less --- comprise 26% of all executed loads across 40 applications of the SPEC benchmark suites. We establish that the frequency of NWLDs are almost independent of compiler and input data. We introduce narrow-width caches (NWC) to cache small-value memory words. NWCs provide a significant speedup for several memory-intensive applications with a negligible chip-area overhead. NWCs also reduce the overall energy dissipation and memory traffic.


Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security | 2016

A Risk Assessment Framework for Automotive Embedded Systems

Mafijul Md. Islam; Aljoscha Lautenbach; Christian Sandberg; Tomas Olovsson

The automotive industry is experiencing a paradigm shift towards autonomous and connected vehicles. Coupled with the increasing usage and complexity of electrical and/or electronic systems, this introduces new safety and security risks. Encouragingly, the automotive industry has relatively well-known and standardised safety risk management practices, but security risk management is still in its infancy. In order to facilitate the derivation of security requirements and security measures for automotive embedded systems, we propose a specifically tailored risk assessment framework, and we demonstrate its viability with an industry use-case. Some of the key features are alignment with existing processes for functional safety, and usability for non-security specialists. The framework begins with a threat analysis to identify the assets, and threats to those assets. The following risk assessment process consists of an estimation of the threat level and of the impact level. This step utilises several existing standards and methodologies, with changes where necessary. Finally, a security level is estimated which is used to formulate high-level security requirements. The strong alignment with existing standards and processes should make this framework well-suited for the needs in the automotive industry.


european dependable computing conference | 2014

Binary-Level Fault Injection for AUTOSAR Systems (Short Paper)

Mafijul Md. Islam; Nithilan Meenakshi Karunakaran; Johan Haraldsson; Fredrik Bernin; Johan Karlsson

Continuously growing complexity of the automotive Electrical and/or Electronic (E/E) systems has prompted major manufacturers (OEMs) and suppliers to embrace the AUTOSAR (Automotive Open System Architecture) standard. Furthermore, recent introduction of ISO 26262, a functional safety standard for road vehicles, has confronted the automotive industry with rigorous requirements. This has become even more challenging as AUTOSAR highly promotes COTS (Commercial Off-The-Shelf) software for which access to source code is either restricted or non-existent. This paper contributes with a method and prototype tool for binary-level fault injection (BLFI) for AUTOSAR-based systems. The proposed BLFI tool can assist in achieving functional safety by evaluating robustness of software at any AUTOSAR layer even though only binaries are available. The proposed technique is quite generic and is evaluated with a proof-of-concept implementation of an AUTOSAR-based application.


international conference on parallel processing | 2007

Loop-level Speculative Parallelism in Embedded Applications

Mafijul Md. Islam; A. Busck; M. Engbom; S. Lee; Michel Dubois; Stenstrom

As multi-core microprocessors are becoming widely adopted, the need to extract thread-level parallelism (TLP) from single-threaded applications in a seamless fashion increases. In this paper, we characterize the nature of TLP in embedded applications and study the limits of performance speedup using parallelizing compilers on platforms with and without support for thread-level speculation. First and somewhat expected, only two out of ten applications from the consumer and telecom domains of the EEMBC suite could be automatically parallelized on multi-core architectures without thread-level speculation (TLS) support. We systematically study the speedup obtained by parallelizing compiler technologies by factoring in the impact of the number of cores, thread decomposition strategies, and thread-management overhead. Overall, we have found that a TLS substrate is critical to uncover thread level parallelism and thread- management overhead must be low. On an eight-way multi-core system, it is possible to achieve a speedup of four, on average, for six out of the ten applications of EEMBC which we have analyzed.


SAE 2016 World Congress and Exhibition | 2016

Automatic Functionality Assignment to AUTOSAR Multicore Distributed Architectures

Florin Maticu; Paul Pop; Christian Axbrink; Mafijul Md. Islam

The automotive electronic architectures have moved from federated architectures, where one function is implemented in one ECU (Electronic Control Unit), to distributed architectures, where several functions may share resources on an ECU. In addition, multicore ECUs are being adopted because of better performance, cost, size, fault-tolerance and power consumption. In this paper we present an approach for the automatic software functionality assignment to multicore distributed architectures. We consider that the systems use the AUTomotive Open System ARchitecture (AUTOSAR). The functionality is modeled as a set of software components composed of subtasks, called runnables, in AUTOSAR terminology. We have proposed a Simulated Annealing metaheuristic optimization that decides: the (i) mapping of software components to multicore ECUs, (ii) the assignment of runnables to the ECU cores, (iii) the clustering of runnables into tasks and (iv) the mapping of tasks to “OS-Applications” (used to isolate mixed safety-criticality functions). We are interested to determine an implementation such that (1) the mapping constraints are satisfied, (2) the runnables are schedulable and (3) they are spatially and temporally isolated if they have different safety-criticality levels, (4) the overall communication bandwidth is minimized and (5) the utilization of the cores and ECUs is balanced. The proposed approach was evaluated on three realistic case studies.


IEEE Transactions on Computers | 2014

Characterizing and Exploiting Small-Value Memory Instructions

Mafijul Md. Islam; Per Stenström

This paper exploits small-value locality to accelerate the execution of memory instructions. We find that small-value loads-loads with small-value operands of 8 bits or less-are common across 52 applications from the desktop, embedded, and media domains. We show that the relative occurrences of small-value loads remain fairly stable during the program execution. Moreover, we establish that the frequency of small-value loads are almost independent of compiler and input data. We then introduce the concept of small-value caches (SVC) to compactly store small-value memory words. We show that SVCs provide significant speedup and reduce the overall energy dissipation with negligible chip-area overhead.


compilers, architecture, and synthesis for embedded systems | 2011

A unified approach to eliminate memory accesses early

Mafijul Md. Islam; Per Stenström

This paper introduces the notion of silent loads to classify load accesses that can be satisfied by already available values of the physical register file and proposes a new architectural concept to exploit such loads. The paper then unifies different approaches of eliminating memory accesses early by contributing with a new architectural scheme. We show that our unified approach covers previously proposed techniques of exploiting forwarded and small-value loads in addition to silent loads. Forwarded loads obtain values through load-to-load and store-to-load forwarding whereas small-value loads return small values that can be coded with 8 bits or less. We find that 22%, 31% and 24% of all dynamic loads are forwarded, small-value and silent, respectively. We demonstrate that the prevalence of such loads is mostly inherent in applications. We establish that a hypothetical scheme that encompasses all the categories can eliminate as many as 42% of all dynamic loads and about 18% of all committed stores. Finally, we contribute with a new architectural technique to implement the unified scheme. We show that our proposed scheme reduces execution time to provide noticeable speedup and reduces overall energy dissipation with very low area overhead.


international conference on computer safety reliability and security | 2015

Back-to-Back Fault Injection Testing in Model-Based Development

Peter Folkesson; Fatemeh Ayatolahi; Behrooz Sangchoolie; Jonny Vinter; Mafijul Md. Islam; Johan Karlsson

Today, embedded systems across industrial domains e.g., avionics, automotive are representatives of software-intensive systems with increasing reliance on software and growing complexity. It has become critically important to verify software in a time, resource and cost effective manner. Furthermore, industrial domains are striving to comply with the requirements of relevant safety standards. This paper proposes a novel workflow along with tool support to evaluate robustness of software in model-based development environment, assuming different abstraction levels of representing software. We then show the effectiveness of our technique, on a brake-by-wire application, by performing back-to-back fault injection testing between two different abstraction levels using MODIFI for the Simulink model and GOOFI-2 for the generated code running on the target microcontroller. Our proposed method and tool support facilitates not only verifying software during early phases of the development lifecycle but also fulfilling back-to-back testing requirements of ISO 26262 [1] when using model-based development.


Lecture Notes in Computer Science | 2013

Towards Benchmarking of Functional Safety in the Automotive Industry

Mafijul Md. Islam; Behrooz Sangchoolie; Fatemeh Ayatolahi; Daniel Skarin; Jonny Vinter; Fredrik Törner; Andreas Käck; Mattias Nyberg; Emilia Villani; Johan Haraldsson; Patrik Isaksson; Johan Karlsson

Functional safety is becoming increasingly important in the automotive industry to deal with the growing reliance on the electrical and/or electronic (E/E) systems and the associated complexities. The introduction of ISO 26262, a new standard for functional safety in road vehicles, has made it even more important to adopt a systematic approach of evaluating functional safety. However, standard assessment methods of benchmarking functional safety of automotive systems are not available as of today. This is where the BeSafe (Benchmarking of Functional Safety) project comes into the picture. BeSafe project aims to lay the foundation for benchmarking functional safety of automotive E/E systems. In this paper, we present a brief overview of the project along with the benchmark targets that we have identified as relevant for the automotive industry, assuming three abstraction layers (model, software, hardware). We then define and discuss a set of benchmark measures. Next, we propose a benchmark framework encompassing fault/error models, methods and the required tool support. This paper primarily focuses on functional safety benchmarking from the Safety Element out of Context (SEooC) viewpoint. Finally, we present some preliminary results and highlight potential future works.

Collaboration


Dive into the Mafijul Md. Islam's collaboration.

Top Co-Authors

Avatar

Per Stenström

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Johan Karlsson

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Behrooz Sangchoolie

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Erik J Ryman

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Fatemeh Ayatolahi

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jonny Vinter

SP Technical Research Institute of Sweden

View shared research outputs
Top Co-Authors

Avatar

Kasyab Parmesh Subramaniyan

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Per Larsson-Edefors

Chalmers University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge