Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications

05/22/2022
by   Hasan Al Shaikh, et al.
0

The expansive globalization of the semiconductor supply chain has introduced numerous untrusted entities into different stages of a device's lifecycle. To make matters worse, the increase complexity in the design as well as aggressive time to market requirements of the newer generation of integrated circuits can lead either designers to unintentionally introduce security vulnerabilities or verification engineers to fail in detecting them earlier in the design lifecycle. These overlooked or undetected vulnerabilities can be exploited by malicious entities in subsequent stages of the lifecycle through an ever widening variety of hardware attacks. The ability to ascertain the provenance of these vulnerabilities, therefore, becomes a pressing issue when the security assurance across the whole lifecycle is required to be ensured. We posit that if there is a malicious or unintentional breach of security policies of a device, it will be reflected in the form of anomalies in the traditional design, verification and testing activities throughout the lifecycle. With that, a digital simulacrum of a device's lifecycle, called a digital twin (DT), can be formed by the data gathered from different stages to secure the lifecycle of the device. In this paper, we put forward a realization of intertwined relationships of security vulnerabilities with data available from the silicon lifecycle and formulate different components of an AI driven DT framework. The proposed DT framework leverages these relationships and relational learning to achieve Forward and Backward Trust Analysis functionalities enabling security aware management of the entire lifecycle. Finally, we provide potential future research avenues and challenges for realization of the digital twin framework to enable secure semiconductor lifecycle management.

READ FULL TEXT

page 1

page 3

page 9

page 18

page 28

research
02/01/2021

Using a Cyber Digital Twin for Continuous Automotive Security Requirements Verification

A Digital Twin (DT) is a digital representation of a physical object use...
research
02/25/2022

Security Attacks and Solutions for Digital Twins

Digital twins, being the virtual replicas of their physical counterparts...
research
02/14/2019

Injecting Software Vulnerabilities with Voltage Glitching

We show how voltage glitching can cause timing violations in CMOS behavi...
research
04/14/2022

Trust2Vec: Large-Scale IoT Trust Management System based on Signed Network Embeddings

A trust management system (TMS) is an integral component of any IoT netw...
research
01/04/2022

Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection

Globalization in the semiconductor industry enables fabless design house...
research
12/13/2021

A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics

Industrial components are of high importance because they control critic...
research
02/12/2022

Perspectives on risk prioritization of data center vulnerabilities using rank aggregation and multi-objective optimization

Nowadays, data has become an invaluable asset to entities and companies,...

Please sign up or login with your details

Forgot password? Click here to reset