Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design

被引:5
作者
Ahmad, Baleegh [1 ]
Liu, Wei-Kai [2 ]
Collini, Luca [1 ]
Pearce, Hammond [1 ]
Fung, Jason M. [3 ]
Valamehr, Jonathan [3 ]
Bidmeshki, Mohammad [3 ]
Sapiecha, Piotr [3 ]
Brown, Steve [3 ]
Chakrabarty, Krishnendu [2 ]
Karri, Ramesh [1 ]
Tan, Benjamin [4 ]
机构
[1] NYU, New York, NY 10003 USA
[2] Duke Univ, Durham, NC USA
[3] Intel Corp, Santa Clara, CA USA
[4] Univ Calgary, Calgary, AB, Canada
来源
2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD | 2022年
基金
加拿大自然科学与工程研究理事会;
关键词
Hardware Security; CWE; RTL; Linting; BUGS;
D O I
10.1145/3508352.3549369
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns as early as possible, such as in RTL designs. In this work, we investigate the practical implications and feasibility of producing a set of security-specific scanners that operate on Verilog source files. The scanners indicate parts of code that might contain one of a set of MITRE's common weakness enumerations (CWEs). We explore the CWE database to characterize the scope and attributes of the CWEs and identify those that are amenable to static analysis. We prototype scanners and evaluate them on 11 open source designs - 4 system-on-chips (SoC) and 7 processor cores - and explore the nature of identified weaknesses. Our analysis reported 53 potential weaknesses in the OpenPiton SoC used in Hack@DAC-21, 11 of which we confirmed as security concerns.
引用
收藏
页数:9
相关论文
共 41 条
  • [11] Brant Christopher, 2021, CHALLENGES OPPORTUNI, V55, DOI 10.Comput.Surveys1145/3483790
  • [12] Dessouky G, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P213
  • [13] Dorsey Vernetta, 2020, Technical Report
  • [14] Gamma E, 1995, DESIGN PATTERNS ELEM
  • [15] Near-Threshold RISC-VCore With DSP Extensions for Scalable IoT Endpoint Devices
    Gautschi, Michael
    Schiavone, Pasquale Davide
    Traber, Andreas
    Loi, Igor
    Pullini, Antonio
    Rossi, Davide
    Flamand, Eric
    Gurkaynak, Frank K.
    Benini, Luca
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (10) : 2700 - 2713
  • [16] HACK@EVENT, 2022, HACK@DAC21-HacK@EVENT
  • [17] Continuous Linting with Automatic Debug
    Hansson, Daniel
    [J]. 2014 15TH INTERNATIONAL MICROPROCESSOR TEST AND VERIFICATION WORKSHOP (MTV 2014), 2015, : 70 - 72
  • [18] SoC interconnection protection through formal verification
    He, Jiaji
    Guo, Xiaolong
    Meade, Travis
    Dutta, Raj Gautam
    Zhao, Yiqiang
    Jin, Yier
    [J]. INTEGRATION-THE VLSI JOURNAL, 2019, 64 : 143 - 151
  • [19] Hicks M, 2015, ACM SIGPLAN NOTICES, V50, P517, DOI [10.1145/2694344.2694366, 10.1145/2775054.2694366]
  • [20] Hu W, 2016, COMPUTER, V49, P44, DOI 10.1109/MC.2016.225