towards scalable soc security validation
play

Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian - PowerPoint PPT Presentation

Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian Institute of Technology, Kanpur Objective Proving confidentiality and integrity show execution traces are indistinguishable to untrusted entity Instance 1 Instance 2 AES


  1. Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian Institute of Technology, Kanpur

  2. Objective Proving confidentiality and integrity show execution traces are indistinguishable to untrusted entity Instance 1 Instance 2 AES Engine AES Engine ROM ROM 𝑫𝑳𝒇𝒛 πŸ‘ 𝑫𝑳𝒇𝒛 𝟐 RAM RAM Host Host 𝑱 𝑱 MMU MMU Interface Interface 𝑇𝑗𝑛 (𝐽, 𝐷𝐿𝑓𝑧 6 ) 𝒔 = ( 𝑏 ... 𝝂𝑫 𝝂𝑫 Access Access control control β‰  "#$ % ... 𝑇𝑗𝑛 (𝐽, 𝐷𝐿𝑓𝑧 8 ) 𝒔 = ( 𝑐 (Not secure) Indistinguishability Test Goal : automated technique for finding 2-safety hyperproperty violations

  3. Challenges System Security 1. Specifying properties for end-to-end security. Model Specification 2. Specification and Model must capture adversarial effects. Instrumented 3. Scalability issue in verification process. RTL Test input Simulation Engine Whitebox Symbolic simulation β€’ Fuzzing β€’ Verilog simulation Coverage info Trace Analyzer security violation A semi-formal technique to find 2-safety violations

Recommend


More recommend