PCH framework for IP runtime security verification
Title | PCH framework for IP runtime security verification |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Guo, X., Dutta, R. G., He, J., Jin, Y. |
Conference Name | 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) |
ISBN Number | 978-1-5386-1421-1 |
Keywords | composability, formal verification, Foundries, Hardware, Hardware design languages, hardware runtime verification, high-level security assurance, integrated circuits, IP runtime security verification, malicious behavior detection, Mathematical model, Metrics, Microelectronics Security, PCH framework, post-silicon stage, pre-silicon stage, proof-carrying hardware framework, pubcrawl, resilience, Resiliency, Runtime, runtime formal verification framework, SAT solving methods, security, security of data, symbolic execution, Trusted Computing, untrusted IPs, untrusted third-party vendors |
Abstract | Untrusted third-party vendors and manufacturers have raised security concerns in hardware supply chain. Among all existing solutions, formal verification methods provide powerful solutions in detection malicious behaviors at the pre-silicon stage. However, little work have been done towards built-in hardware runtime verification at the post-silicon stage. In this paper, a runtime formal verification framework is proposed to evaluate the trust of hardware during its execution. This framework combines the symbolic execution and SAT solving methods to validate the user defined properties. The proposed framework has been demonstrated on an FPGA platform using an SoC design with untrusted IPs. The experimentation results show that the proposed approach can provide high-level security assurance for hardware at runtime. |
URL | https://ieeexplore.ieee.org/document/8353999/ |
DOI | 10.1109/AsianHOST.2017.8353999 |
Citation Key | guo_pch_2017 |
- post-silicon stage
- untrusted third-party vendors
- untrusted IPs
- Trusted Computing
- Symbolic Execution
- security of data
- security
- SAT solving methods
- runtime formal verification framework
- Runtime
- Resiliency
- resilience
- pubcrawl
- proof-carrying hardware framework
- pre-silicon stage
- composability
- PCH framework
- Microelectronics Security
- Metrics
- Mathematical model
- malicious behavior detection
- IP runtime security verification
- integrated circuits
- high-level security assurance
- hardware runtime verification
- Hardware design languages
- Hardware
- Foundries
- formal verification