DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection

08/14/2023
by   Sudipta Paria, et al.
0

Securing critical assets in a bus-based System-On-Chip (SoC) is imperative to mitigate potential vulnerabilities and prevent unauthorized access, ensuring the integrity, availability, and confidentiality of the system. Ensuring security throughout the SoC design process is a formidable task owing to the inherent intricacies in SoC designs and the dispersion of assets across diverse IPs. Large Language Models (LLMs), exemplified by ChatGPT (OpenAI) and BARD (Google), have showcased remarkable proficiency across various domains, including security vulnerability detection and prevention in SoC designs. In this work, we propose DIVAS, a novel framework that leverages the knowledge base of LLMs to identify security vulnerabilities from user-defined SoC specifications, map them to the relevant Common Weakness Enumerations (CWEs), followed by the generation of equivalent assertions, and employ security measures through enforcement of security policies. The proposed framework is implemented using multiple ChatGPT and BARD models, and their performance was analyzed while generating relevant CWEs from the SoC specifications provided. The experimental results obtained from open-source SoC benchmarks demonstrate the efficacy of our proposed framework.

READ FULL TEXT

page 10

page 11

page 12

research
06/22/2022

Vulnerability Prioritization: An Offensive Security Approach

Organizations struggle to handle sheer number of vulnerabilities in thei...
research
08/05/2023

DiSPEL: Distributed Security Policy Enforcement for Bus-based SoC

The current zero trust model adopted in System-on-Chip (SoC) design is v...
research
01/18/2020

System-on-Chip Security Assertions

Assertions are widely used for functional validation as well as coverage...
research
07/11/2023

Formal and Fuzzing Amplification: Targeting Vulnerability Detection in 5G and Beyond

Softwarization and virtualization in 5G and beyond require rigorous test...
research
01/26/2022

Automatic detection of access control vulnerabilities via API specification processing

Objective. Insecure Direct Object Reference (IDOR) or Broken Object Leve...
research
06/30/2020

Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

The existence of a security vulnerability in a system does not necessari...
research
08/10/2020

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Attack graphs are one of the main techniques used to automate the risk a...

Please sign up or login with your details

Forgot password? Click here to reset