Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design

被引:5
作者
Ahmad, Baleegh [1 ]
Liu, Wei-Kai [2 ]
Collini, Luca [1 ]
Pearce, Hammond [1 ]
Fung, Jason M. [3 ]
Valamehr, Jonathan [3 ]
Bidmeshki, Mohammad [3 ]
Sapiecha, Piotr [3 ]
Brown, Steve [3 ]
Chakrabarty, Krishnendu [2 ]
Karri, Ramesh [1 ]
Tan, Benjamin [4 ]
机构
[1] NYU, New York, NY 10003 USA
[2] Duke Univ, Durham, NC USA
[3] Intel Corp, Santa Clara, CA USA
[4] Univ Calgary, Calgary, AB, Canada
来源
2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD | 2022年
基金
加拿大自然科学与工程研究理事会;
关键词
Hardware Security; CWE; RTL; Linting; BUGS;
D O I
10.1145/3508352.3549369
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns as early as possible, such as in RTL designs. In this work, we investigate the practical implications and feasibility of producing a set of security-specific scanners that operate on Verilog source files. The scanners indicate parts of code that might contain one of a set of MITRE's common weakness enumerations (CWEs). We explore the CWE database to characterize the scope and attributes of the CWEs and identify those that are amenable to static analysis. We prototype scanners and evaluate them on 11 open source designs - 4 system-on-chips (SoC) and 7 processor cores - and explore the nature of identified weaknesses. Our analysis reported 53 potential weaknesses in the OpenPiton SoC used in Hack@DAC-21, 11 of which we confirmed as security concerns.
引用
收藏
页数:9
相关论文
共 41 条
  • [1] Accellera Systems Initiative, 2021, DRAFT STAND SEC ANN
  • [2] [Anonymous], 2021, VER US GUID VER 4 20
  • [3] [Anonymous], 2022, SCR1 RISC V COR
  • [4] [Anonymous], 2022, IBEX RISC V COR
  • [5] [Anonymous], 2022, mor1kx-an OpenRISC processor IP core
  • [6] [Anonymous], 2022, VER DES AUT
  • [7] Ardeshiricham A, 2017, DES AUT TEST EUROPE, P1691, DOI 10.23919/DATE.2017.7927266
  • [8] Bening Lionel, 2001, PRINCIPLES VERIFIABL, DOI DOI 10.1007/0-306-47631-2_10
  • [9] Hunting Security Bugs in SoC Designs: Lessons Learned
    Bidmeshki, Mohammad Mahdi
    Zhang, Yunjie
    Zaman, Monir
    Zhou, Liwei
    Makris, Yiorgos
    [J]. IEEE DESIGN & TEST, 2021, 38 (01) : 22 - 29
  • [10] Formal Verification of Masked Hardware Implementations in the Presence of Glitches
    Bloem, Roderick
    Gross, Hannes
    Iusupov, Rinat
    Koenighofer, Bettina
    Mangard, Stefan
    Winter, Johannes
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 321 - 353