| ||||
| ||||
![]() Title:Securing SoC: a Scalable Hardware Security Verification Methodology Authors:Muhammad Abdullah Al Faisal, Jaimini Nagar, Thorsten Dworzak, Sebastian Simon, Ulrich Heinkel and Djones Lettnin Conference:DVConEU 2024 Tags:Common Weakness Enumeration, Hardware Security Verification, Portable Test and Stimulus Standard and SoC Design Abstract: Modern System-on-Chips (SoCs) are vulnerable due to micro architectural weakness in Register Transfer Level (RTL) implementation, having significant security risk to the sensitive design asset. Various techniques like Formal-based verification, Fuzzing and Information Flow Tracking have been proposed to accomplish hardware security verification. Unfortunately, these techniques are not yet sufficiently developed to address the full range of potential weaknesses present in digital SoC designs. In this paper, we propose a novel and scalable hardware security verification methodology that formalize the security requirement, create use case scenarios and a comprehensive set of meaningful tests using the portable test and stimulus standard. The result shows that our proposed methodology could detect hardware weakness of the SoC design and incorporates stimuli coverage closure for quantitative assessment of test intent. Securing SoC: a Scalable Hardware Security Verification Methodology ![]() Securing SoC: a Scalable Hardware Security Verification Methodology | ||||
Copyright © 2002 – 2025 EasyChair |