Reusing Verification Assertions as Security Checkers for Hardware Trojan Detection

01/04/2022
by   Mohammad Eslami, et al.
0

Globalization in the semiconductor industry enables fabless design houses to reduce their costs, save time, and make use of newer technologies. However, the offshoring of Integrated Circuit (IC) fabrication has negative sides, including threats such as Hardware Trojans (HTs) - a type of malicious logic that is not trivial to detect. One aspect of IC design that is not affected by globalization is the need for thorough verification. Verification engineers devise complex assets to make sure designs are bug-free, including assertions. This knowledge is typically not reused once verification is over. The premise of this paper is that verification assets that already exist can be turned into effective security checkers for HT detection. For this purpose, we show how assertions can be used as online monitors. To this end, we propose a security metric and an assertion selection flow that leverages Cadence JasperGold Security Path Verification (SPV). The experimental results show that our approach scales for industry-size circuits by analyzing more than 100 assertions for different Intellectual Properties (IPs) of the OpenTitan System-on-Chip (SoC). Moreover, our detection solution is pragmatic since it does not rely on the HT activation mechanism.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/12/2018

Hardware Trojan Detection through Information Flow Security Verification

Semiconductor design houses are increasingly becoming dependent on third...
research
09/28/2018

UVM Based Reusable Verification IP for Wishbone Compliant SPI Master Core

The System on Chip design industry relies heavily on functional verifica...
research
04/01/2021

Solver-Aided Constant-Time Circuit Verification

We present Xenon, a solver-aided method for formally verifying that Veri...
research
01/25/2021

The Role of Cost in the Integration of Security Features in Integrated Circuits for Smart Cards

This essay investigates the role of cost in the development and producti...
research
02/17/2023

DETER: Design for Trust utilizing Rareness Reduction

Increasing design complexity and reduced time-to-market have motivated m...
research
05/22/2022

Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications

The expansive globalization of the semiconductor supply chain has introd...
research
12/04/2020

Optimising Design Verification Using Machine Learning: An Open Source Solution

With the complexity of Integrated Circuits increasing, design verificati...

Please sign up or login with your details

Forgot password? Click here to reset