Introducing NSF’s Hammer Engineering Research Center: Hybrid Autonomous Manufacturing Moving from Evolution to Revolution (Hammer)
- Award ID(s):
- 2133630
- PAR ID:
- 10490023
- Publisher / Repository:
- Springer Link
- Date Published:
- Journal Name:
- JOM
- Volume:
- 75
- Issue:
- 4
- ISSN:
- 1047-4838
- Page Range / eLocation ID:
- 971 to 974
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
Untethered magnetic navigation of millirobots within a human body using a magnetic resonance imaging (MRI) scanner is a promising technology for minimally invasive surgery or drug delivery. Because MRI scanners have a large static magnetic field, they cannot generate torque on magnetic millirobots and must instead use gradient-based pulling. However, gradient values are too small to produce forces large enough to penetrate tissue. This letter presents a method to produce large pulsed forces on millirobots. A ferromagnetic sphere is placed inside a hollow robot body and can move back and forth. This movement is created by alternating the magnetic gradient direction. On the posterior side, a spring allows the sphere to change direction smoothly. On the anterior side, a hard rod creates a surface for the sphere to impact. This impact results in a large pulsed force. The purpose of this study was to understand the functioning of magnetic hammer actuation and control, as well as demonstrate the viability of this mechanism for tissue penetration. This letter begins with modeling and simulating this system. Next, different control strategies are presented and tested. The system successfully penetrated lamb brain samples. Finally, preliminary tests inside a clinical MRI scanner demonstrate the potential of this actuation system.more » « less
-
Process technology scaling and hardware architecture specialization have vastly increased the need for chip design space exploration, while optimizing for power, performance, and area. Hammer is an open-source, reusable physical design (PD) flow generator that reduces design effort and increases portability by enforcing a separation among design-, tool-, and process technology-specific concerns with a modular software architecture. In this work, we outline Hammer’s structure and highlight recent extensions that support both physical chip designers and hardware architects evaluating the merit and feasibility of their proposed designs. This is accomplished through the integration of more tools and process technologies—some open-source—and the designer-driven development of flow step generators. An evaluation of chip designs in process technologies ranging from 130nm down to 12nm across a series of RISC-V-based chips shows how Hammer-generated flows are reusable and enable efficient optimization for diverse applications.more » « less
-
Rowhammer is an increasingly threatening vulnerability that grants an attacker the ability to flip bits in memory without directly accessing them. Despite efforts to mitigate Rowhammer via software and defenses built directly into DRAM modules, more recent generations of DRAM are actually more susceptible to malicious bit-flips than their predecessors. This phenomenon has spawned numerous exploits, showing how Rowhammer acts as the basis for various vulnerabilities that target sensitive structures, such as Page Table Entries (PTEs) or opcodes, to grant control over a victim machine. However, in this paper, we consider Rowhammer as a more general vulnerability, presenting a novel exploit vector for Rowhammer that targets particular code patterns. We show that if victim code is designed to return benign data to an unprivileged user, and uses nested pointer dereferences, Rowhammer can flip these pointers to gain arbitrary read access in the victim's address space. Furthermore, we identify gadgets present in the Linux kernel, and demonstrate an end-to-end attack that precisely flips a targeted pointer. To do so we developed a number of improved Rowhammer primitives, including kernel memory massaging, Rowhammer synchronization, and testing for kernel flips, which may be of broader interest to the Rowhammer community. Compared to prior works' leakage rate of .3 bits/s, we show that such gadgets can be used to read out kernel data at a rate of 82.6 bits/s. By targeting code gadgets, this work expands the scope and attack surface exposed by Rowhammer. It is no longer sufficient for software defenses to selectively pad previously exploited memory structures in flip-safe memory, as any victim code that follows the pattern in question must be protected.more » « less
An official website of the United States government

