SHarPen: SoC Security Verification by Hardware Penetration Test

被引:5
作者
Al-Shaikh, Hasan [1 ]
Vafaei, Arash [1 ]
Rahman, Mridha Md Mashahedur [1 ]
Azar, Kimia Zamiri [1 ]
Rahman, Fahim [1 ]
Farahmandi, Farimah [1 ]
Tehranipoor, Mark [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
来源
2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC | 2023年
关键词
SoC Security Verification; Penetration Testing; BPSO; Cost Function;
D O I
10.1145/3566097.3567918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As modern SoC architectures incorporate many complex/heterogeneous intellectual properties (IPs), the protection of security assets has become imperative, and the number of vulnerabilities revealed is rising due to the increased number of attacks. Over the last few years, penetration testing (PT) has become an increasingly effective means of detecting software (SW) vulnerabilities. As of yet, no such technique has been applied to the detection of hardware vulnerabilities. This paper proposes a PT framework, SHarPen, for detecting hardware vulnerabilities, which facilitates the development of a SoC-level security verification framework. SHarPen proposes a formalism for performing gray-box hardware (HW) penetration testing instead of relying on coverage-based testing and provides an automation for mapping hardware vulnerabilities to logical/mathematical cost functions. SHarPen supports both simulation and FPGA-based prototyping, allowing us to automate security testing at different stages of the design process with high capabilities for identifying vulnerabilities in the targeted SoC.
引用
收藏
页码:579 / 584
页数:6
相关论文
共 29 条
[1]  
Adamov A, 2009, EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS, P178
[2]  
Ahmed A, 2018, INT TEST CONF P
[3]  
Alshahrani H., 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE), P1, DOI DOI 10.1109/LISAT.2018.8378035
[4]  
Anandakumar N. N., 2022, Cryptology ePrint Archive
[5]  
Azar K. Z., 2022, Cryptology ePrint Archive
[6]  
Bhunia S., 2018, HARDWARE TROJAN WAR, DOI [10.1007/978-3-319-68511-3, DOI 10.1007/978-3-319-68511-3]
[7]   DirectFuzz: Automated Test Generation for RTL Designs using Directed Graybox Fuzzing [J].
Canakci, Sadullah ;
Delshadtehrani, Leila ;
Eris, Furkan ;
Taylor, Michael Bedford ;
Egele, Manuel ;
Joshi, Ajay .
2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2021, :529-534
[8]  
Dessouky G, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P213
[9]  
Farzana N., 2019, ITC, P1
[10]   Hardware Penetration Testing Knocks Your SoCs Off [J].
Fischer, Mark ;
Langer, Fabian ;
Mono, Johannes ;
Nasenberg, Clemens ;
Albartus, Nils .
IEEE DESIGN & TEST, 2021, 38 (01) :14-21