towards scalable soc security validation
play

Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian - PowerPoint PPT Presentation

Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian Institute of Technology, Kanpur Objective Proving confidentiality and integrity show execution traces are indistinguishable to untrusted entity Instance 1 Instance 2 AES


  1. Towards Scalable SoC Security Validation Sujit Kumar Muduli Indian Institute of Technology, Kanpur

  2. Objective Proving confidentiality and integrity show execution traces are indistinguishable to untrusted entity Instance 1 Instance 2 AES Engine AES Engine ROM ROM 𝑫𝑳𝒇𝒛 πŸ‘ 𝑫𝑳𝒇𝒛 𝟐 RAM RAM Host Host 𝑱 𝑱 MMU MMU Interface Interface 𝑇𝑗𝑛 (𝐽, 𝐷𝐿𝑓𝑧 6 ) 𝒔 = ( 𝑏 ... 𝝂𝑫 𝝂𝑫 Access Access control control β‰  "#$ % ... 𝑇𝑗𝑛 (𝐽, 𝐷𝐿𝑓𝑧 8 ) 𝒔 = ( 𝑐 (Not secure) Indistinguishability Test Goal : automated technique for finding 2-safety hyperproperty violations

  3. Challenges System Security 1. Specifying properties for end-to-end security. Model Specification 2. Specification and Model must capture adversarial effects. Instrumented 3. Scalability issue in verification process. RTL Test input Simulation Engine Whitebox Symbolic simulation β€’ Fuzzing β€’ Verilog simulation Coverage info Trace Analyzer security violation A semi-formal technique to find 2-safety violations

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend