• DocumentCode
    631379
  • Title

    An efficient algorithm for identifying security relevant logic and vulnerabilities in RTL designs

  • Author

    Palmer, David W. ; Manna, Parbati Kumar

  • Author_Institution
    Intel Corp., Hillsboro, OR, USA
  • fYear
    2013
  • fDate
    2-3 June 2013
  • Firstpage
    61
  • Lastpage
    66
  • Abstract
    For complex production hardware designs, a significant challenge is to decide where to look for security issues. Published approaches to information flow security analysis find all paths from signals for an asset to ports accessible by an adversary, such as a secret key to a point of disclosure. Although this can be beneficial in eliminating areas of the hardware designs that need not be reviewed, what is included is still overwhelmingly large for a proper review for security vulnerabilities. However, it is not necessary to review all of the paths, but instead to review access control mechanisms that limit information flow between adversary and asset. Our method of using multiple information flow paths allows us to identify access control mechanisms and evaluate whether they are used on every access to the asset. Our technique was used commercially in production hardware design to successfully find critical security issues before tape-in by pre-Si validation engineers at Intel.
  • Keywords
    access control; integrated circuit design; logic circuits; security of data; Intel; RTL designs; access control; complex production hardware; critical security; hardware designs; information flow security; pre-Si validation engineers; security relevant logic; security vulnerability; Decision support systems; Security; Hardware security; Validation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on
  • Conference_Location
    Austin, TX
  • Print_ISBN
    978-1-4799-0559-1
  • Type

    conf

  • DOI
    10.1109/HST.2013.6581567
  • Filename
    6581567