Cryptology ePrint Archive: Report 2021/1014

SoC Security Properties and Rules

Nusrat Farzana and Farimah Farahmandi and Mark Tehranipoor

Abstract: A system-on-chip (SoC) security can be weakened by exploiting the potential vulnerabilities of the intellectual property (IP) cores used to implement the design and interaction among the IPs. These vulnerabilities not only increase the security verification effort but also can increase design complexity and time-to-market. The design and verification engineers should be knowledgeable about potential vulnerabilities and threat models at the early SoC design life cycle to protect their designs from potential attacks. However, currently, there is no publicly available repository that can be used as a base to develop such knowledge in practice. In this paper, we develop ‘SoC Security Property/Rule Database’ and make it available publicly to all researchers to facilitate and extend security verification effort to address this need. The database gathers a comprehensive security vulnerability and property list. It also provides all the corresponding design behavior that should be held in the design to ensure such vulnerabilities do not exist. The database contains 67 different vulnerability scenarios for which 105 corresponding security properties have been developed till now. This paper reviews the existing database and presents the methodologies we used to gather vulnerabilities and develop such comprehensive security properties. Additionally, this paper discusses the challenges for security verification and the utilization of this database to overcome the research challenges.

Category / Keywords: foundations / Vulnerabilities, Threat Models, Security Properties, Verification, Property Package, Assertion

Date: received 31 Jul 2021, last revised 4 Aug 2021

Contact author: ndipu at ufl edu

Available format(s): PDF | BibTeX Citation

Version: 20210806:072322 (All versions of this report)

Short URL: ia.cr/2021/1014


[ Cryptology ePrint archive ]