Tags:Common Weakness Enumeration, Hardware Security Verification, Portable Test and Stimulus Standard and SoC Design
Abstract:
Modern System-on-Chips (SoCs) are vulnerable due to micro architectural weakness in Register Transfer Level (RTL) implementation, having significant security risk to the sensitive design asset. Various techniques like Formal-based verification, Fuzzing and Information Flow Tracking have been proposed to accomplish hardware security verification. Unfortunately, these techniques are not yet sufficiently developed to address the full range of potential weaknesses present in digital SoC designs. In this paper, we propose a novel and scalable hardware security verification methodology that formalize the security requirement, create use case scenarios and a comprehensive set of meaningful tests using the portable test and stimulus standard. The result shows that our proposed methodology could detect hardware weakness of the SoC design and incorporates stimuli coverage closure for quantitative assessment of test intent.
Securing SoC: a Scalable Hardware Security Verification Methodology