SoC interconnection protection through formal verification

被引:16
作者
He, Jiaji [1 ]
Guo, Xiaolong [2 ]
Meade, Travis [3 ]
Dutta, Raj Gautam [3 ]
Zhao, Yiqiang [1 ]
Jin, Yier [2 ]
机构
[1] Tianjin Univ, Sch Microelect, Tianjin 300072, Peoples R China
[2] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[3] Univ Cent Florida, Dept Elect Engn & Comp Sci, Orlando, FL 32816 USA
基金
中国国家自然科学基金;
关键词
Formal verification; Intellectual property; Hardware Trojan detection; SoC security; BUS;
D O I
10.1016/j.vlsi.2018.09.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The wide adoption of third-party hardware Intellectual Property (IP) cores including those from untrusted vendors have raised security concerns for system designers and end-users. Existing approaches to ensure the trustworthiness of individual IPs rarely consider the entire SoC design, especially the IP interactions through SoC bus. These methods can hardly identify malicious logic (or design flaws) distributed in multiple IPs whereas individual IPs fulfill security properties and can pass the security testing/verification. One possible solution is to treat the SoC as one IP core and try to verify security properties of the entire design. This method, however, suffers from scalability issues due to the large size of SoC designs with multiple IP cores integrated. In this paper, we present a scalable SoC bus verification framework trying to verify the security properties of SoC bus implementation where the bus protocol plays the role of the golden reference. More specifically, finite state machine (FSM) models will be constructed from the bus implementation and the trustworthiness will be verified based on the property set derived from the bus protocol and potential security threats. Along with IP level formal verification solutions, the proposed framework can help ensure the security of large-scale SoCs. Experimental results on ARM AMBA Bus demonstrate that our approach is applicable and scalable to prevent information leakage and denial-of-service (DoS) attack by verifying security properties.
引用
收藏
页码:143 / 151
页数:9
相关论文
共 25 条
[1]  
[Anonymous], 2017 IEEE INT S CIRC
[2]  
[Anonymous], P DATE US FOR CIT
[3]  
[Anonymous], IEEE T INF FORENSICS
[4]  
[Anonymous], 2017 IEEE INT S CIRC
[5]   Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis [J].
Chen, Xiaoming ;
Liu, Qiaoyi ;
Yao, Song ;
Wang, Jia ;
Xu, Qiang ;
Wang, Yu ;
Liu, Yongpan ;
Yang, Huazhong .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (07) :1370-1383
[6]  
Clarke EM, 1999, MODEL CHECKING, P1
[7]  
Coburn Joel., 2005, Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems, P78
[8]   Modelling and analysis of a commercial field bus protocol [J].
David, A ;
Yi, W .
EUROMICRO RTS 2000: 12TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS, PROCEEDINGS, 2000, :165-172
[9]  
Goel A, 2000, DES AUT CON, P196
[10]  
Guo XL, 2017, PROCEEDINGS OF THE 2017 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), P79, DOI 10.1109/AsianHOST.2017.8353999