Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software

Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification pro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2024, Vol.19, p.3914-3926
Hauptverfasser: Rajendran, Sree Ranjani, Dipu, Nusrat Farzana, Tarek, Shams, Kamali, Hadi Mardani, Farahmandi, Farimah, Tehranipoor, Mark
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3926
container_issue
container_start_page 3914
container_title IEEE transactions on information forensics and security
container_volume 19
creator Rajendran, Sree Ranjani
Dipu, Nusrat Farzana
Tarek, Shams
Kamali, Hadi Mardani
Farahmandi, Farimah
Tehranipoor, Mark
description Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively. To enable more comprehensive verification of system-level properties, this paper presents a framework known as HUnTer ( H ardware Un derath T rigg er ) for identifying sets of instructions (sequences) at the processor unit (PU) that reveal the underlying hardware vulnerabilities. HUnTer automates (i) threat modeling, (ii) threat-based formal verification, (iii) generating counterexamples, and (iv) generating snippet code to exploit the vulnerability. Furthermore, the HUnTer framework defines a unique security coverage metric (HUnT_Coverage) to measure the performance and effectiveness of vulnerability exploits. To demonstrate the high effectiveness of the proposed framework, we conduct a wide variety of case studies using the HUnTer framework on RISC-V-based open-source SoC architecture and attains the security coverage of 86% as an average for 11 benchmarks of the Trust-Hub database.
doi_str_mv 10.1109/TIFS.2024.3372800
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIFS_2024_3372800</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10458674</ieee_id><sourcerecordid>3050303850</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-6ef3b88af221fb62841b142c02d9ae247d48b1d14ec5fff28f908b169c54f0c3</originalsourceid><addsrcrecordid>eNpNkE1Lw0AQhhdRsFZ_gOAh4Dl19iPbzUlqaW2h4KFVvC2bZNampEncTdT-exNaxMvM8PLMDDyE3FIYUQrxw2Y5X48YMDHifMwUwBkZ0CiSoQRGz_9myi_Jlfc7ACGoVAPyPvupi8rl5UfQbDGYJAfvH4PX8gvzog_XB9_g3odVGU63eR0sjMu-jcPgrS1KdCbpsCZHHzxhiabZBuvKNj1wTS6sKTzenPqQbOazzXQRrl6el9PJKkyZkE0o0fJEKWMZozaRTAmaUMFSYFlskIlxJlRCMyowjay1TNkYukDGaSQspHxI7o9na1d9tugbvataV3YfNYcIOHDV1SGhRyp1lfcOra5dvjfuoCno3p_u_enenz7563bujjs5Iv7jRaTkWPBfXmdsqw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3050303850</pqid></control><display><type>article</type><title>Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software</title><source>IEEE Electronic Library (IEL)</source><creator>Rajendran, Sree Ranjani ; Dipu, Nusrat Farzana ; Tarek, Shams ; Kamali, Hadi Mardani ; Farahmandi, Farimah ; Tehranipoor, Mark</creator><creatorcontrib>Rajendran, Sree Ranjani ; Dipu, Nusrat Farzana ; Tarek, Shams ; Kamali, Hadi Mardani ; Farahmandi, Farimah ; Tehranipoor, Mark</creatorcontrib><description>Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively. To enable more comprehensive verification of system-level properties, this paper presents a framework known as HUnTer ( H ardware Un derath T rigg er ) for identifying sets of instructions (sequences) at the processor unit (PU) that reveal the underlying hardware vulnerabilities. HUnTer automates (i) threat modeling, (ii) threat-based formal verification, (iii) generating counterexamples, and (iv) generating snippet code to exploit the vulnerability. Furthermore, the HUnTer framework defines a unique security coverage metric (HUnT_Coverage) to measure the performance and effectiveness of vulnerability exploits. To demonstrate the high effectiveness of the proposed framework, we conduct a wide variety of case studies using the HUnTer framework on RISC-V-based open-source SoC architecture and attains the security coverage of 86% as an average for 11 benchmarks of the Trust-Hub database.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2024.3372800</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Codes ; Effectiveness ; Fuzzing ; Hardware ; Microprocessors ; RISC ; Security ; security properties ; security verification ; Software ; SW-exploitable hardware vulnerabilities ; System on chip ; System-on-chip (SoC) ; Testing ; Threat models ; Verification</subject><ispartof>IEEE transactions on information forensics and security, 2024, Vol.19, p.3914-3926</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-6ef3b88af221fb62841b142c02d9ae247d48b1d14ec5fff28f908b169c54f0c3</cites><orcidid>0009-0005-5096-3766 ; 0000-0001-7671-6409 ; 0000-0002-5917-5425 ; 0000-0002-7884-4049</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10458674$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,4010,27904,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10458674$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Rajendran, Sree Ranjani</creatorcontrib><creatorcontrib>Dipu, Nusrat Farzana</creatorcontrib><creatorcontrib>Tarek, Shams</creatorcontrib><creatorcontrib>Kamali, Hadi Mardani</creatorcontrib><creatorcontrib>Farahmandi, Farimah</creatorcontrib><creatorcontrib>Tehranipoor, Mark</creatorcontrib><title>Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively. To enable more comprehensive verification of system-level properties, this paper presents a framework known as HUnTer ( H ardware Un derath T rigg er ) for identifying sets of instructions (sequences) at the processor unit (PU) that reveal the underlying hardware vulnerabilities. HUnTer automates (i) threat modeling, (ii) threat-based formal verification, (iii) generating counterexamples, and (iv) generating snippet code to exploit the vulnerability. Furthermore, the HUnTer framework defines a unique security coverage metric (HUnT_Coverage) to measure the performance and effectiveness of vulnerability exploits. To demonstrate the high effectiveness of the proposed framework, we conduct a wide variety of case studies using the HUnTer framework on RISC-V-based open-source SoC architecture and attains the security coverage of 86% as an average for 11 benchmarks of the Trust-Hub database.</description><subject>Codes</subject><subject>Effectiveness</subject><subject>Fuzzing</subject><subject>Hardware</subject><subject>Microprocessors</subject><subject>RISC</subject><subject>Security</subject><subject>security properties</subject><subject>security verification</subject><subject>Software</subject><subject>SW-exploitable hardware vulnerabilities</subject><subject>System on chip</subject><subject>System-on-chip (SoC)</subject><subject>Testing</subject><subject>Threat models</subject><subject>Verification</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkE1Lw0AQhhdRsFZ_gOAh4Dl19iPbzUlqaW2h4KFVvC2bZNampEncTdT-exNaxMvM8PLMDDyE3FIYUQrxw2Y5X48YMDHifMwUwBkZ0CiSoQRGz_9myi_Jlfc7ACGoVAPyPvupi8rl5UfQbDGYJAfvH4PX8gvzog_XB9_g3odVGU63eR0sjMu-jcPgrS1KdCbpsCZHHzxhiabZBuvKNj1wTS6sKTzenPqQbOazzXQRrl6el9PJKkyZkE0o0fJEKWMZozaRTAmaUMFSYFlskIlxJlRCMyowjay1TNkYukDGaSQspHxI7o9na1d9tugbvataV3YfNYcIOHDV1SGhRyp1lfcOra5dvjfuoCno3p_u_enenz7563bujjs5Iv7jRaTkWPBfXmdsqw</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Rajendran, Sree Ranjani</creator><creator>Dipu, Nusrat Farzana</creator><creator>Tarek, Shams</creator><creator>Kamali, Hadi Mardani</creator><creator>Farahmandi, Farimah</creator><creator>Tehranipoor, Mark</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0009-0005-5096-3766</orcidid><orcidid>https://orcid.org/0000-0001-7671-6409</orcidid><orcidid>https://orcid.org/0000-0002-5917-5425</orcidid><orcidid>https://orcid.org/0000-0002-7884-4049</orcidid></search><sort><creationdate>2024</creationdate><title>Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software</title><author>Rajendran, Sree Ranjani ; Dipu, Nusrat Farzana ; Tarek, Shams ; Kamali, Hadi Mardani ; Farahmandi, Farimah ; Tehranipoor, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-6ef3b88af221fb62841b142c02d9ae247d48b1d14ec5fff28f908b169c54f0c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Codes</topic><topic>Effectiveness</topic><topic>Fuzzing</topic><topic>Hardware</topic><topic>Microprocessors</topic><topic>RISC</topic><topic>Security</topic><topic>security properties</topic><topic>security verification</topic><topic>Software</topic><topic>SW-exploitable hardware vulnerabilities</topic><topic>System on chip</topic><topic>System-on-chip (SoC)</topic><topic>Testing</topic><topic>Threat models</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rajendran, Sree Ranjani</creatorcontrib><creatorcontrib>Dipu, Nusrat Farzana</creatorcontrib><creatorcontrib>Tarek, Shams</creatorcontrib><creatorcontrib>Kamali, Hadi Mardani</creatorcontrib><creatorcontrib>Farahmandi, Farimah</creatorcontrib><creatorcontrib>Tehranipoor, Mark</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rajendran, Sree Ranjani</au><au>Dipu, Nusrat Farzana</au><au>Tarek, Shams</au><au>Kamali, Hadi Mardani</au><au>Farahmandi, Farimah</au><au>Tehranipoor, Mark</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2024</date><risdate>2024</risdate><volume>19</volume><spage>3914</spage><epage>3926</epage><pages>3914-3926</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of decisive security requirements and properties from the perspective of the SoC designer, the system-level verification process, whose violation may lead to exploiting a hardware vulnerability, is not studied comprehensively. To enable more comprehensive verification of system-level properties, this paper presents a framework known as HUnTer ( H ardware Un derath T rigg er ) for identifying sets of instructions (sequences) at the processor unit (PU) that reveal the underlying hardware vulnerabilities. HUnTer automates (i) threat modeling, (ii) threat-based formal verification, (iii) generating counterexamples, and (iv) generating snippet code to exploit the vulnerability. Furthermore, the HUnTer framework defines a unique security coverage metric (HUnT_Coverage) to measure the performance and effectiveness of vulnerability exploits. To demonstrate the high effectiveness of the proposed framework, we conduct a wide variety of case studies using the HUnTer framework on RISC-V-based open-source SoC architecture and attains the security coverage of 86% as an average for 11 benchmarks of the Trust-Hub database.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2024.3372800</doi><tpages>13</tpages><orcidid>https://orcid.org/0009-0005-5096-3766</orcidid><orcidid>https://orcid.org/0000-0001-7671-6409</orcidid><orcidid>https://orcid.org/0000-0002-5917-5425</orcidid><orcidid>https://orcid.org/0000-0002-7884-4049</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2024, Vol.19, p.3914-3926
issn 1556-6013
1556-6021
language eng
recordid cdi_crossref_primary_10_1109_TIFS_2024_3372800
source IEEE Electronic Library (IEL)
subjects Codes
Effectiveness
Fuzzing
Hardware
Microprocessors
RISC
Security
security properties
security verification
Software
SW-exploitable hardware vulnerabilities
System on chip
System-on-chip (SoC)
Testing
Threat models
Verification
title Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T03%3A26%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Exploring%20the%20Abyss?%20Unveiling%20Systems-on-Chip%20Hardware%20Vulnerabilities%20Beneath%20Software&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Rajendran,%20Sree%20Ranjani&rft.date=2024&rft.volume=19&rft.spage=3914&rft.epage=3926&rft.pages=3914-3926&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2024.3372800&rft_dat=%3Cproquest_RIE%3E3050303850%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3050303850&rft_id=info:pmid/&rft_ieee_id=10458674&rfr_iscdi=true