DocumentCode :
631379
Title :
An efficient algorithm for identifying security relevant logic and vulnerabilities in RTL designs
Author :
Palmer, David W. ; Manna, Parbati Kumar
Author_Institution :
Intel Corp., Hillsboro, OR, USA
fYear :
2013
fDate :
2-3 June 2013
Firstpage :
61
Lastpage :
66
Abstract :
For complex production hardware designs, a significant challenge is to decide where to look for security issues. Published approaches to information flow security analysis find all paths from signals for an asset to ports accessible by an adversary, such as a secret key to a point of disclosure. Although this can be beneficial in eliminating areas of the hardware designs that need not be reviewed, what is included is still overwhelmingly large for a proper review for security vulnerabilities. However, it is not necessary to review all of the paths, but instead to review access control mechanisms that limit information flow between adversary and asset. Our method of using multiple information flow paths allows us to identify access control mechanisms and evaluate whether they are used on every access to the asset. Our technique was used commercially in production hardware design to successfully find critical security issues before tape-in by pre-Si validation engineers at Intel.
Keywords :
access control; integrated circuit design; logic circuits; security of data; Intel; RTL designs; access control; complex production hardware; critical security; hardware designs; information flow security; pre-Si validation engineers; security relevant logic; security vulnerability; Decision support systems; Security; Hardware security; Validation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4799-0559-1
Type :
conf
DOI :
10.1109/HST.2013.6581567
Filename :
6581567
Link To Document :
بازگشت