Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian - - PowerPoint PPT Presentation

β–Ά
towards scalable soc security validation
SMART_READER_LITE
LIVE PREVIEW

Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian - - PowerPoint PPT Presentation

Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian Institute of Technology, Kanpur Objective Proving confidentiality and integrity show execution traces are indistinguishable to untrusted entity Instance 1 Instance 2 AES


slide-1
SLIDE 1

Towards Scalable SoC Security Validation

Sujit Kumar Muduli Indian Institute of Technology, Kanpur

slide-2
SLIDE 2

Objective

Proving confidentiality and integrity

show execution traces are indistinguishable to untrusted entity

β‰ "#$% ...

𝒔 =( 𝑏

...

𝒔 =( 𝑐

(Not secure)

𝑇𝑗𝑛 (𝐽, 𝐷𝐿𝑓𝑧6) 𝑇𝑗𝑛 (𝐽, 𝐷𝐿𝑓𝑧8)

Goal : automated technique for finding 2-safety hyperproperty violations

Indistinguishability Test

Instance 1

ROM MMU

𝝂𝑫

Host Interface Access control

𝑱

π‘«π‘³π’‡π’›πŸ‘

AES Engine RAM

Instance 2

ROM MMU

𝝂𝑫

Host Interface Access control

𝑱

π‘«π‘³π’‡π’›πŸ

AES Engine RAM

slide-3
SLIDE 3

Challenges

security violation

Security Specification

Whitebox Fuzzing

System Model Instrumented RTL

Simulation Engine

  • Symbolic simulation
  • Verilog simulation

Coverage info Test input

Trace Analyzer

A semi-formal technique to find 2-safety violations

  • 1. Specifying properties for end-to-end security.
  • 2. Specification and Model must capture adversarial effects.
  • 3. Scalability issue in verification process.