Automatic Asset Identification for Assertion-Based SoC Security Verification
The ubiquitous presence and utilization of System-on-Chips (SoCs) have made them critical to our daily lives. As SoCs become more complex, their susceptibility to security threats has also increased. The comprehensive security assurance of an SoC system requires a deep knowledge of the design and se...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on computer-aided design of integrated circuits and systems 2024-10, Vol.43 (10), p.3264-3277 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3277 |
---|---|
container_issue | 10 |
container_start_page | 3264 |
container_title | IEEE transactions on computer-aided design of integrated circuits and systems |
container_volume | 43 |
creator | Ayalasomayajula, Avinash Farzana Dipu, Nusrat Tehranipoor, Mark M. Farahmandi, Farimah |
description | The ubiquitous presence and utilization of System-on-Chips (SoCs) have made them critical to our daily lives. As SoCs become more complex, their susceptibility to security threats has also increased. The comprehensive security assurance of an SoC system requires a deep knowledge of the design and security-critical assets that must be protected. As SoC applications vary, the assets vary in number, type, importance level, and form based on the various hardware blocks that construct the SoC and their complex interactions. Some assets are distinctive in their definition and characteristics, making them easily identifiable, such as encryption/decryption keys, logic locking keys, etc. However, other assets, such as system bus control registers that are internal to the design, require a more complex design analysis. Automatic identification of these security assets at the presilicon stage can help designers take the necessary precautions to protect them. Equipped with the security assets, designers can then incorporate techniques to protect these security assets against various threats. This article presents the variation among security assets based on hardware design and defines attributes to help classify them. Then, we introduce security asset identification framework (SAIF), an automated framework that can help identify security assets for a design at the register-transfer level (RTL). We introduce a set of metrics into SAIF to perform comprehensive vulnerability analysis and identify security assets that are prone to specific vulnerabilities. Finally, we report our findings on the effectiveness of SAIF for various open-source hardware designs and the National Institute of Standards and Technology (NIST) lightweight crypto designs. We show that SAIF can automatically identify critical security assets in a design with high accuracy and performance. Moreover, we analyze the security implications of the identified secondary assets to show their importance in presilicon security verification. |
doi_str_mv | 10.1109/TCAD.2024.3387875 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10497111</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10497111</ieee_id><sourcerecordid>3107254665</sourcerecordid><originalsourceid>FETCH-LOGICAL-c176t-38fa9a715e4d5ad2cce32c9d6610a53a54db5ab400ad9a7fe20ac9f45a340f023</originalsourceid><addsrcrecordid>eNpNkE1Lw0AQhhdRsFZ_gOAh4Dl1Zj-yyTHGr0LBQ6vXZbsfkGK7dTc59N-b2CKehpl53hl4CLlFmCFC9bBq6qcZBcpnjJWylOKMTLBiMuco8JxMgMoyB5BwSa5S2gAgF7SakEXdd2Gru9ZkdUquy-bW7brWt2aYhV3mQ_xdxLHLH3VyNluGJls608e2O2SfLv7R1-TC66_kbk51Sj5enlfNW754f5039SI3KIsuZ6XXlZYoHLdCW2qMY9RUtigQtGBacLsWes0BtB047yhoU3kuNOPggbIpuT_e3cfw3bvUqU3o4254qRiCpIIXhRgoPFImhpSi82of262OB4WgRmlqlKZGaeokbcjcHTOtc-4fzyuJiOwH-stosg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3107254665</pqid></control><display><type>article</type><title>Automatic Asset Identification for Assertion-Based SoC Security Verification</title><source>IEEE Electronic Library (IEL)</source><creator>Ayalasomayajula, Avinash ; Farzana Dipu, Nusrat ; Tehranipoor, Mark M. ; Farahmandi, Farimah</creator><creatorcontrib>Ayalasomayajula, Avinash ; Farzana Dipu, Nusrat ; Tehranipoor, Mark M. ; Farahmandi, Farimah</creatorcontrib><description>The ubiquitous presence and utilization of System-on-Chips (SoCs) have made them critical to our daily lives. As SoCs become more complex, their susceptibility to security threats has also increased. The comprehensive security assurance of an SoC system requires a deep knowledge of the design and security-critical assets that must be protected. As SoC applications vary, the assets vary in number, type, importance level, and form based on the various hardware blocks that construct the SoC and their complex interactions. Some assets are distinctive in their definition and characteristics, making them easily identifiable, such as encryption/decryption keys, logic locking keys, etc. However, other assets, such as system bus control registers that are internal to the design, require a more complex design analysis. Automatic identification of these security assets at the presilicon stage can help designers take the necessary precautions to protect them. Equipped with the security assets, designers can then incorporate techniques to protect these security assets against various threats. This article presents the variation among security assets based on hardware design and defines attributes to help classify them. Then, we introduce security asset identification framework (SAIF), an automated framework that can help identify security assets for a design at the register-transfer level (RTL). We introduce a set of metrics into SAIF to perform comprehensive vulnerability analysis and identify security assets that are prone to specific vulnerabilities. Finally, we report our findings on the effectiveness of SAIF for various open-source hardware designs and the National Institute of Standards and Technology (NIST) lightweight crypto designs. We show that SAIF can automatically identify critical security assets in a design with high accuracy and performance. Moreover, we analyze the security implications of the identified secondary assets to show their importance in presilicon security verification.</description><identifier>ISSN: 0278-0070</identifier><identifier>EISSN: 1937-4151</identifier><identifier>DOI: 10.1109/TCAD.2024.3387875</identifier><identifier>CODEN: ITCSDI</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Bus interconnections ; Computer-aided design (CAD) ; Design ; Design analysis ; Design standards ; Designers ; Encryption ; Hardware ; Measurement ; presilicon security verification ; Protection ; Random access memory ; Registers ; Security ; security assets ; security metrics ; System on chip ; Threat evaluation ; Threat modeling ; Verification ; vulnerability assessment</subject><ispartof>IEEE transactions on computer-aided design of integrated circuits and systems, 2024-10, Vol.43 (10), p.3264-3277</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c176t-38fa9a715e4d5ad2cce32c9d6610a53a54db5ab400ad9a7fe20ac9f45a340f023</cites><orcidid>0009-0005-5096-3766 ; 0009-0003-1915-0746</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10497111$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,778,782,794,27911,27912,54745</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10497111$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ayalasomayajula, Avinash</creatorcontrib><creatorcontrib>Farzana Dipu, Nusrat</creatorcontrib><creatorcontrib>Tehranipoor, Mark M.</creatorcontrib><creatorcontrib>Farahmandi, Farimah</creatorcontrib><title>Automatic Asset Identification for Assertion-Based SoC Security Verification</title><title>IEEE transactions on computer-aided design of integrated circuits and systems</title><addtitle>TCAD</addtitle><description>The ubiquitous presence and utilization of System-on-Chips (SoCs) have made them critical to our daily lives. As SoCs become more complex, their susceptibility to security threats has also increased. The comprehensive security assurance of an SoC system requires a deep knowledge of the design and security-critical assets that must be protected. As SoC applications vary, the assets vary in number, type, importance level, and form based on the various hardware blocks that construct the SoC and their complex interactions. Some assets are distinctive in their definition and characteristics, making them easily identifiable, such as encryption/decryption keys, logic locking keys, etc. However, other assets, such as system bus control registers that are internal to the design, require a more complex design analysis. Automatic identification of these security assets at the presilicon stage can help designers take the necessary precautions to protect them. Equipped with the security assets, designers can then incorporate techniques to protect these security assets against various threats. This article presents the variation among security assets based on hardware design and defines attributes to help classify them. Then, we introduce security asset identification framework (SAIF), an automated framework that can help identify security assets for a design at the register-transfer level (RTL). We introduce a set of metrics into SAIF to perform comprehensive vulnerability analysis and identify security assets that are prone to specific vulnerabilities. Finally, we report our findings on the effectiveness of SAIF for various open-source hardware designs and the National Institute of Standards and Technology (NIST) lightweight crypto designs. We show that SAIF can automatically identify critical security assets in a design with high accuracy and performance. Moreover, we analyze the security implications of the identified secondary assets to show their importance in presilicon security verification.</description><subject>Bus interconnections</subject><subject>Computer-aided design (CAD)</subject><subject>Design</subject><subject>Design analysis</subject><subject>Design standards</subject><subject>Designers</subject><subject>Encryption</subject><subject>Hardware</subject><subject>Measurement</subject><subject>presilicon security verification</subject><subject>Protection</subject><subject>Random access memory</subject><subject>Registers</subject><subject>Security</subject><subject>security assets</subject><subject>security metrics</subject><subject>System on chip</subject><subject>Threat evaluation</subject><subject>Threat modeling</subject><subject>Verification</subject><subject>vulnerability assessment</subject><issn>0278-0070</issn><issn>1937-4151</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkE1Lw0AQhhdRsFZ_gOAh4Dl1Zj-yyTHGr0LBQ6vXZbsfkGK7dTc59N-b2CKehpl53hl4CLlFmCFC9bBq6qcZBcpnjJWylOKMTLBiMuco8JxMgMoyB5BwSa5S2gAgF7SakEXdd2Gru9ZkdUquy-bW7brWt2aYhV3mQ_xdxLHLH3VyNluGJls608e2O2SfLv7R1-TC66_kbk51Sj5enlfNW754f5039SI3KIsuZ6XXlZYoHLdCW2qMY9RUtigQtGBacLsWes0BtB047yhoU3kuNOPggbIpuT_e3cfw3bvUqU3o4254qRiCpIIXhRgoPFImhpSi82of262OB4WgRmlqlKZGaeokbcjcHTOtc-4fzyuJiOwH-stosg</recordid><startdate>20241001</startdate><enddate>20241001</enddate><creator>Ayalasomayajula, Avinash</creator><creator>Farzana Dipu, Nusrat</creator><creator>Tehranipoor, Mark M.</creator><creator>Farahmandi, Farimah</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0009-0005-5096-3766</orcidid><orcidid>https://orcid.org/0009-0003-1915-0746</orcidid></search><sort><creationdate>20241001</creationdate><title>Automatic Asset Identification for Assertion-Based SoC Security Verification</title><author>Ayalasomayajula, Avinash ; Farzana Dipu, Nusrat ; Tehranipoor, Mark M. ; Farahmandi, Farimah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c176t-38fa9a715e4d5ad2cce32c9d6610a53a54db5ab400ad9a7fe20ac9f45a340f023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Bus interconnections</topic><topic>Computer-aided design (CAD)</topic><topic>Design</topic><topic>Design analysis</topic><topic>Design standards</topic><topic>Designers</topic><topic>Encryption</topic><topic>Hardware</topic><topic>Measurement</topic><topic>presilicon security verification</topic><topic>Protection</topic><topic>Random access memory</topic><topic>Registers</topic><topic>Security</topic><topic>security assets</topic><topic>security metrics</topic><topic>System on chip</topic><topic>Threat evaluation</topic><topic>Threat modeling</topic><topic>Verification</topic><topic>vulnerability assessment</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ayalasomayajula, Avinash</creatorcontrib><creatorcontrib>Farzana Dipu, Nusrat</creatorcontrib><creatorcontrib>Tehranipoor, Mark M.</creatorcontrib><creatorcontrib>Farahmandi, Farimah</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ayalasomayajula, Avinash</au><au>Farzana Dipu, Nusrat</au><au>Tehranipoor, Mark M.</au><au>Farahmandi, Farimah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Automatic Asset Identification for Assertion-Based SoC Security Verification</atitle><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle><stitle>TCAD</stitle><date>2024-10-01</date><risdate>2024</risdate><volume>43</volume><issue>10</issue><spage>3264</spage><epage>3277</epage><pages>3264-3277</pages><issn>0278-0070</issn><eissn>1937-4151</eissn><coden>ITCSDI</coden><abstract>The ubiquitous presence and utilization of System-on-Chips (SoCs) have made them critical to our daily lives. As SoCs become more complex, their susceptibility to security threats has also increased. The comprehensive security assurance of an SoC system requires a deep knowledge of the design and security-critical assets that must be protected. As SoC applications vary, the assets vary in number, type, importance level, and form based on the various hardware blocks that construct the SoC and their complex interactions. Some assets are distinctive in their definition and characteristics, making them easily identifiable, such as encryption/decryption keys, logic locking keys, etc. However, other assets, such as system bus control registers that are internal to the design, require a more complex design analysis. Automatic identification of these security assets at the presilicon stage can help designers take the necessary precautions to protect them. Equipped with the security assets, designers can then incorporate techniques to protect these security assets against various threats. This article presents the variation among security assets based on hardware design and defines attributes to help classify them. Then, we introduce security asset identification framework (SAIF), an automated framework that can help identify security assets for a design at the register-transfer level (RTL). We introduce a set of metrics into SAIF to perform comprehensive vulnerability analysis and identify security assets that are prone to specific vulnerabilities. Finally, we report our findings on the effectiveness of SAIF for various open-source hardware designs and the National Institute of Standards and Technology (NIST) lightweight crypto designs. We show that SAIF can automatically identify critical security assets in a design with high accuracy and performance. Moreover, we analyze the security implications of the identified secondary assets to show their importance in presilicon security verification.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TCAD.2024.3387875</doi><tpages>14</tpages><orcidid>https://orcid.org/0009-0005-5096-3766</orcidid><orcidid>https://orcid.org/0009-0003-1915-0746</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0278-0070 |
ispartof | IEEE transactions on computer-aided design of integrated circuits and systems, 2024-10, Vol.43 (10), p.3264-3277 |
issn | 0278-0070 1937-4151 |
language | eng |
recordid | cdi_ieee_primary_10497111 |
source | IEEE Electronic Library (IEL) |
subjects | Bus interconnections Computer-aided design (CAD) Design Design analysis Design standards Designers Encryption Hardware Measurement presilicon security verification Protection Random access memory Registers Security security assets security metrics System on chip Threat evaluation Threat modeling Verification vulnerability assessment |
title | Automatic Asset Identification for Assertion-Based SoC Security Verification |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T19%3A01%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Automatic%20Asset%20Identification%20for%20Assertion-Based%20SoC%20Security%20Verification&rft.jtitle=IEEE%20transactions%20on%20computer-aided%20design%20of%20integrated%20circuits%20and%20systems&rft.au=Ayalasomayajula,%20Avinash&rft.date=2024-10-01&rft.volume=43&rft.issue=10&rft.spage=3264&rft.epage=3277&rft.pages=3264-3277&rft.issn=0278-0070&rft.eissn=1937-4151&rft.coden=ITCSDI&rft_id=info:doi/10.1109/TCAD.2024.3387875&rft_dat=%3Cproquest_RIE%3E3107254665%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3107254665&rft_id=info:pmid/&rft_ieee_id=10497111&rfr_iscdi=true |