Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software
Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification pro...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2024, Vol.19, p.3914-3926 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3926 |
---|---|
container_issue | |
container_start_page | 3914 |
container_title | IEEE transactions on information forensics and security |
container_volume | 19 |
creator | Rajendran, Sree Ranjani Dipu, Nusrat Farzana Tarek, Shams Kamali, Hadi Mardani Farahmandi, Farimah Tehranipoor, Mark |
description | Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively. To enable more comprehensive verification of system-level properties, this paper presents a framework known as HUnTer ( H ardware Un derath T rigg er ) for identifying sets of instructions (sequences) at the processor unit (PU) that reveal the underlying hardware vulnerabilities. HUnTer automates (i) threat modeling, (ii) threat-based formal verification, (iii) generating counterexamples, and (iv) generating snippet code to exploit the vulnerability. Furthermore, the HUnTer framework defines a unique security coverage metric (HUnT_Coverage) to measure the performance and effectiveness of vulnerability exploits. To demonstrate the high effectiveness of the proposed framework, we conduct a wide variety of case studies using the HUnTer framework on RISC-V-based open-source SoC architecture and attains the security coverage of 86% as an average for 11 benchmarks of the Trust-Hub database. |
doi_str_mv | 10.1109/TIFS.2024.3372800 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIFS_2024_3372800</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10458674</ieee_id><sourcerecordid>3050303850</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-6ef3b88af221fb62841b142c02d9ae247d48b1d14ec5fff28f908b169c54f0c3</originalsourceid><addsrcrecordid>eNpNkE1Lw0AQhhdRsFZ_gOAh4Dl19iPbzUlqaW2h4KFVvC2bZNampEncTdT-exNaxMvM8PLMDDyE3FIYUQrxw2Y5X48YMDHifMwUwBkZ0CiSoQRGz_9myi_Jlfc7ACGoVAPyPvupi8rl5UfQbDGYJAfvH4PX8gvzog_XB9_g3odVGU63eR0sjMu-jcPgrS1KdCbpsCZHHzxhiabZBuvKNj1wTS6sKTzenPqQbOazzXQRrl6el9PJKkyZkE0o0fJEKWMZozaRTAmaUMFSYFlskIlxJlRCMyowjay1TNkYukDGaSQspHxI7o9na1d9tugbvataV3YfNYcIOHDV1SGhRyp1lfcOra5dvjfuoCno3p_u_enenz7563bujjs5Iv7jRaTkWPBfXmdsqw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3050303850</pqid></control><display><type>article</type><title>Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software</title><source>IEEE Electronic Library (IEL)</source><creator>Rajendran, Sree Ranjani ; Dipu, Nusrat Farzana ; Tarek, Shams ; Kamali, Hadi Mardani ; Farahmandi, Farimah ; Tehranipoor, Mark</creator><creatorcontrib>Rajendran, Sree Ranjani ; Dipu, Nusrat Farzana ; Tarek, Shams ; Kamali, Hadi Mardani ; Farahmandi, Farimah ; Tehranipoor, Mark</creatorcontrib><description>Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively. To enable more comprehensive verification of system-level properties, this paper presents a framework known as HUnTer ( H ardware Un derath T rigg er ) for identifying sets of instructions (sequences) at the processor unit (PU) that reveal the underlying hardware vulnerabilities. HUnTer automates (i) threat modeling, (ii) threat-based formal verification, (iii) generating counterexamples, and (iv) generating snippet code to exploit the vulnerability. Furthermore, the HUnTer framework defines a unique security coverage metric (HUnT_Coverage) to measure the performance and effectiveness of vulnerability exploits. To demonstrate the high effectiveness of the proposed framework, we conduct a wide variety of case studies using the HUnTer framework on RISC-V-based open-source SoC architecture and attains the security coverage of 86% as an average for 11 benchmarks of the Trust-Hub database.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2024.3372800</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Codes ; Effectiveness ; Fuzzing ; Hardware ; Microprocessors ; RISC ; Security ; security properties ; security verification ; Software ; SW-exploitable hardware vulnerabilities ; System on chip ; System-on-chip (SoC) ; Testing ; Threat models ; Verification</subject><ispartof>IEEE transactions on information forensics and security, 2024, Vol.19, p.3914-3926</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-6ef3b88af221fb62841b142c02d9ae247d48b1d14ec5fff28f908b169c54f0c3</cites><orcidid>0009-0005-5096-3766 ; 0000-0001-7671-6409 ; 0000-0002-5917-5425 ; 0000-0002-7884-4049</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10458674$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,4010,27904,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10458674$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Rajendran, Sree Ranjani</creatorcontrib><creatorcontrib>Dipu, Nusrat Farzana</creatorcontrib><creatorcontrib>Tarek, Shams</creatorcontrib><creatorcontrib>Kamali, Hadi Mardani</creatorcontrib><creatorcontrib>Farahmandi, Farimah</creatorcontrib><creatorcontrib>Tehranipoor, Mark</creatorcontrib><title>Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively. To enable more comprehensive verification of system-level properties, this paper presents a framework known as HUnTer ( H ardware Un derath T rigg er ) for identifying sets of instructions (sequences) at the processor unit (PU) that reveal the underlying hardware vulnerabilities. HUnTer automates (i) threat modeling, (ii) threat-based formal verification, (iii) generating counterexamples, and (iv) generating snippet code to exploit the vulnerability. Furthermore, the HUnTer framework defines a unique security coverage metric (HUnT_Coverage) to measure the performance and effectiveness of vulnerability exploits. To demonstrate the high effectiveness of the proposed framework, we conduct a wide variety of case studies using the HUnTer framework on RISC-V-based open-source SoC architecture and attains the security coverage of 86% as an average for 11 benchmarks of the Trust-Hub database.</description><subject>Codes</subject><subject>Effectiveness</subject><subject>Fuzzing</subject><subject>Hardware</subject><subject>Microprocessors</subject><subject>RISC</subject><subject>Security</subject><subject>security properties</subject><subject>security verification</subject><subject>Software</subject><subject>SW-exploitable hardware vulnerabilities</subject><subject>System on chip</subject><subject>System-on-chip (SoC)</subject><subject>Testing</subject><subject>Threat models</subject><subject>Verification</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkE1Lw0AQhhdRsFZ_gOAh4Dl19iPbzUlqaW2h4KFVvC2bZNampEncTdT-exNaxMvM8PLMDDyE3FIYUQrxw2Y5X48YMDHifMwUwBkZ0CiSoQRGz_9myi_Jlfc7ACGoVAPyPvupi8rl5UfQbDGYJAfvH4PX8gvzog_XB9_g3odVGU63eR0sjMu-jcPgrS1KdCbpsCZHHzxhiabZBuvKNj1wTS6sKTzenPqQbOazzXQRrl6el9PJKkyZkE0o0fJEKWMZozaRTAmaUMFSYFlskIlxJlRCMyowjay1TNkYukDGaSQspHxI7o9na1d9tugbvataV3YfNYcIOHDV1SGhRyp1lfcOra5dvjfuoCno3p_u_enenz7563bujjs5Iv7jRaTkWPBfXmdsqw</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Rajendran, Sree Ranjani</creator><creator>Dipu, Nusrat Farzana</creator><creator>Tarek, Shams</creator><creator>Kamali, Hadi Mardani</creator><creator>Farahmandi, Farimah</creator><creator>Tehranipoor, Mark</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0009-0005-5096-3766</orcidid><orcidid>https://orcid.org/0000-0001-7671-6409</orcidid><orcidid>https://orcid.org/0000-0002-5917-5425</orcidid><orcidid>https://orcid.org/0000-0002-7884-4049</orcidid></search><sort><creationdate>2024</creationdate><title>Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software</title><author>Rajendran, Sree Ranjani ; Dipu, Nusrat Farzana ; Tarek, Shams ; Kamali, Hadi Mardani ; Farahmandi, Farimah ; Tehranipoor, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-6ef3b88af221fb62841b142c02d9ae247d48b1d14ec5fff28f908b169c54f0c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Codes</topic><topic>Effectiveness</topic><topic>Fuzzing</topic><topic>Hardware</topic><topic>Microprocessors</topic><topic>RISC</topic><topic>Security</topic><topic>security properties</topic><topic>security verification</topic><topic>Software</topic><topic>SW-exploitable hardware vulnerabilities</topic><topic>System on chip</topic><topic>System-on-chip (SoC)</topic><topic>Testing</topic><topic>Threat models</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rajendran, Sree Ranjani</creatorcontrib><creatorcontrib>Dipu, Nusrat Farzana</creatorcontrib><creatorcontrib>Tarek, Shams</creatorcontrib><creatorcontrib>Kamali, Hadi Mardani</creatorcontrib><creatorcontrib>Farahmandi, Farimah</creatorcontrib><creatorcontrib>Tehranipoor, Mark</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rajendran, Sree Ranjani</au><au>Dipu, Nusrat Farzana</au><au>Tarek, Shams</au><au>Kamali, Hadi Mardani</au><au>Farahmandi, Farimah</au><au>Tehranipoor, Mark</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2024</date><risdate>2024</risdate><volume>19</volume><spage>3914</spage><epage>3926</epage><pages>3914-3926</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively. To enable more comprehensive verification of system-level properties, this paper presents a framework known as HUnTer ( H ardware Un derath T rigg er ) for identifying sets of instructions (sequences) at the processor unit (PU) that reveal the underlying hardware vulnerabilities. HUnTer automates (i) threat modeling, (ii) threat-based formal verification, (iii) generating counterexamples, and (iv) generating snippet code to exploit the vulnerability. Furthermore, the HUnTer framework defines a unique security coverage metric (HUnT_Coverage) to measure the performance and effectiveness of vulnerability exploits. To demonstrate the high effectiveness of the proposed framework, we conduct a wide variety of case studies using the HUnTer framework on RISC-V-based open-source SoC architecture and attains the security coverage of 86% as an average for 11 benchmarks of the Trust-Hub database.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2024.3372800</doi><tpages>13</tpages><orcidid>https://orcid.org/0009-0005-5096-3766</orcidid><orcidid>https://orcid.org/0000-0001-7671-6409</orcidid><orcidid>https://orcid.org/0000-0002-5917-5425</orcidid><orcidid>https://orcid.org/0000-0002-7884-4049</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2024, Vol.19, p.3914-3926 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TIFS_2024_3372800 |
source | IEEE Electronic Library (IEL) |
subjects | Codes Effectiveness Fuzzing Hardware Microprocessors RISC Security security properties security verification Software SW-exploitable hardware vulnerabilities System on chip System-on-chip (SoC) Testing Threat models Verification |
title | Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T03%3A26%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Exploring%20the%20Abyss?%20Unveiling%20Systems-on-Chip%20Hardware%20Vulnerabilities%20Beneath%20Software&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Rajendran,%20Sree%20Ranjani&rft.date=2024&rft.volume=19&rft.spage=3914&rft.epage=3926&rft.pages=3914-3926&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2024.3372800&rft_dat=%3Cproquest_RIE%3E3050303850%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3050303850&rft_id=info:pmid/&rft_ieee_id=10458674&rfr_iscdi=true |