Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design

09/02/2022
by   Baleegh Ahmad, et al.
0

To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns as early as possible, such as in RTL designs. In this work, we investigate the practical implications and feasibility of producing a set of security-specific scanners that operate on Verilog source files. The scanners indicate parts of code that might contain one of a set of MITRE's common weakness enumerations (CWEs). We explore the CWE database to characterize the scope and attributes of the CWEs and identify those that are amenable to static analysis. We prototype scanners and evaluate them on 11 open source designs - 4 system-on-chips (SoC) and 7 processor cores - and explore the nature of identified weaknesses. Our analysis reported 53 potential weaknesses in the OpenPiton SoC used in Hack@DAC-21, 11 of which we confirmed as security concerns.

READ FULL TEXT
research
07/16/2019

Security Smells in Infrastructure as Code Scripts

Context: Security smells are coding patterns in source code that are ind...
research
03/08/2013

Security Assessment of Software Design using Neural Network

Security flaws in software applications today has been attributed mostly...
research
06/02/2020

Hardware Security in Spin-Based Computing-In-Memory: Analysis, Exploits, and Mitigation Techniques

Computing-in-memory (CIM) is proposed to alleviate the processor-memory ...
research
10/25/2020

Security Assessment of Interposer-based Chiplet Integration

With transistor scaling reaching its limits, interposer-based integratio...
research
10/26/2021

Exploring eFPGA-based Redaction for IP Protection

Recently, eFPGA-based redaction has been proposed as a promising solutio...
research
06/24/2023

LLM-assisted Generation of Hardware Assertions

The security of computer systems typically relies on a hardware root of ...
research
04/12/2021

Measurements of the Most Significant Software Security Weaknesses

In this work, we provide a metric to calculate the most significant soft...

Please sign up or login with your details

Forgot password? Click here to reset