Automap: Automated mapping of security properties between different levels of abstraction in design flow

B Ahmed, F Rahman, N Hooten… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
B Ahmed, F Rahman, N Hooten, F Farahmandi, M Tehranipoor
2021 IEEE/ACM International Conference On Computer Aided Design …, 2021ieeexplore.ieee.org
The security of system-on-chip (SoC) designs is threatened by many vulnerabilities
introduced by untrusted third-party IPs, and designers and CAD tools' lack of awareness of
security requirements. Ensuring the security of an SoC has become highly challenging due
to the diverse threat models, high design complexity, and lack of effective security-aware
verification solutions. Moreover, new security vulnerabilities are introduced during the
design transformation from higher to lower abstraction levels. As a result, security verification …
The security of system-on-chip (SoC) designs is threatened by many vulnerabilities introduced by untrusted third-party IPs, and designers and CAD tools' lack of awareness of security requirements. Ensuring the security of an SoC has become highly challenging due to the diverse threat models, high design complexity, and lack of effective security-aware verification solutions. Moreover, new security vulnerabilities are introduced during the design transformation from higher to lower abstraction levels. As a result, security verification becomes a major bottleneck that should be performed at every level of design abstraction. Reducing the verification effort by mapping the security properties at different design stages could be an efficient solution to lower the total verification time if the new vulnerabilities introduced at different abstraction levels are addressed properly. To address this challenge, we introduce AutoMap that, in addition to the mapping, extends and expands the security properties to identify new vulnerabilities introduced when the design moves from higher-to lower-level abstraction. Starting at the higher abstraction level with a defined set of security properties for the target threat models, AutoMap automatically maps the properties to the lower levels of abstraction to reduce the verification effort. Furthermore, it extends and expands the properties to cover new vulnerabilities introduced by design transformations and updates to the lower abstraction level. We demonstrate AutoMap's efficacy by applying it to AES, RSA, and SHA256 at C++, RTL, and gate-level. We show that AutoMap effectively facilitates the detection of security vulnerabilities from different sources during the design transformation.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果