Towards Scalable SoC Security Validation
Sujit Kumar Muduli Indian Institute of Technology, Kanpur
Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian - - PowerPoint PPT Presentation
Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian Institute of Technology, Kanpur Objective Proving confidentiality and integrity show execution traces are indistinguishable to untrusted entity Instance 1 Instance 2 AES
Sujit Kumar Muduli Indian Institute of Technology, Kanpur
Proving confidentiality and integrity
show execution traces are indistinguishable to untrusted entity
β "#$% ...
π =( π
...
π =( π
(Not secure)
πππ (π½, π·πΏππ§6) πππ (π½, π·πΏππ§8)
Goal : automated technique for finding 2-safety hyperproperty violations
Indistinguishability Test
Instance 1
ROM MMU
ππ«
Host Interface Access control
π«π³πππ
AES Engine RAM
Instance 2
ROM MMU
ππ«
Host Interface Access control
π«π³πππ
AES Engine RAM
security violation
Security Specification
Whitebox Fuzzing
System Model Instrumented RTL
Simulation Engine
Coverage info Test input
Trace Analyzer
A semi-formal technique to find 2-safety violations