Abstract
Hardware information flow analysis detects security vulnerabilities resulting from microarchitectural design flaws, design-for-test/debug (DfT/D) backdoors, and hardware Trojans. Though information flow violations can be manifested through a multitude of possible ways, prior research has only focused on detecting the existence of such vulnerabilities and no approach has been proposed to exhaustively activate all vulnerable points and reduce false positives. In this paper, we propose EXERTv2, a novel analysis framework that combines ATPG, SAT, and FSM analysis as well as FSM integration to detect information flow violations and perform exhaustive analysis that reports the complete set of integrity-violating input patterns for vulnerable control points. Compared with the original version of EXERT, the significant contribution of EXERTv2 is its algorithm for integrating FSMs, which simplifies the process of constraining multiple FSMs. The FSM analysis and integration, in particular, consider the behavior of all the FSMs in the design as a whole, which can be performed offline and helps resolve scalability limitations in prior approaches while remaining exhaustive. We also demonstrate EXERT’s usage in the application of fault injection vulnerability analysis and attacks. As a proof-of-concept, EXERTv2 is evaluated on multiple Trojan benchmarks from Trust-Hub and two additional ciphers. It detects rare Trojan triggers (activation probability \(\approx\) 1.4243e\(-\)70), generates all activation patterns within minutes, and shows a 15\(\times\) to 110\(\times\) faster runtime compared with Cadence Jasper Security Path Verification (SPV). EXERT is also applied to a larger RISC-V benchmark to identify instruction sequences with and without fault injection that result in privilege escalation.
Similar content being viewed by others
References
Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Des Test Comput 27(1):10–25
Zhang X, Tehranipoor M (2011) Case study: detecting hardware Trojans in third-party digital IP cores. In 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp 67–70
Kocher P, Horn J, Fogh A, Genkin D, Gruss D, Haas W, Hamburg M, Lipp M, Mangard S, Prescher T, Schwarz M, Yarom Y (2018) Spectre attacks: exploiting speculative execution. In 2019 IEEE Symposium on Security and Privacy (SP), pp 1–19
Lipp M, Schwarz M, Gruss D, Prescher T, Haas W, Fogh A, Horn J, Mangard S, Kocher P, Genkin D, Yarom Y, Hamburg M (2018) Meltdown: reading kernel memory from user space. In 27th USENIX Security Symposium (USENIX Security 18), (Baltimore, MD), pp 973–990. USENIX Association
Contreras GK, Nahiyan A, Bhunia S, Forte D, Tehranipoor M (2017) Security vulnerability analysis of design-for-test exploits for asset protection in SoCs. In 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), pp 617–622
Buhren R, Jacob H-N, Krachenfels T, Seifert J-P (2021) One glitch to rule them all: fault injection attacks against AMD’s secure encrypted virtualization. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS ’21, (New York, NY, USA), p 2875-2889. Association for Computing Machinery
Roy S, Millican SK, Agrawal VD (2021) Training neural network for machine intelligence in automatic test pattern generator. In 2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID), pp 316–321
Hu W, Mu D, Oberg J, Mao B, Tiwari M, Sherwood T, Kastner R (2014) Gate-level information flow tracking for security lattices. ACM Trans Des Autom Electron Syst 20
Ardeshiricham A, Hu W, Marxen J, Kastner R (2017) Register transfer level information flow tracking for provably secure hardware design. In Design. Automation Test in Europe Conference Exhibition (DATE) 2017:1691–1696
Zhang D, Wang Y, Suh GE, Myers AC (2015) A hardware design language for timing-sensitive information-flow security. SIGARCH Comput Archit News 43:503–516
Cruz J, Farahmandi F, Ahmed A, Mishra P (2018) Hardware trojan detection using ATPG and model checking. In 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), pp 91–96
Nahiyan A, Sadi M, Vittal R, Contreras G, Forte D, Tehranipoor M (2017) Hardware Trojan detection through information flow security verification. In 2017 IEEE International Test Conference (ITC), pp 1–10
Jasper security path verification app (2023). https://www.cadence.com/en_US/home/tools/system-design-and-verification/formal-and-static-verification/jasper-gold-verification-platform/
Goldstein L, Thigpen E (1980) SCOAP: Sandia controllability/observability analysis program. In 17th Design Automation Conference, pp 190–196
Salmani H (2017) COTD: reference-free hardware trojan detection and recovery based on controllability and observability in gate-level netlist. IEEE Transactions on Information Forensics and Security 12:338–350
Suh GE, Lee JW, Zhang D, Devadas S (2004) Secure program execution via dynamic information flow tracking. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XI, (New York, NY, USA), p 85-96. Association for Computing Machinery
Hu W, Ardeshiricham A, Kastner R (2021) Hardware information flow tracking. ACM Comput Surv 54
Synopsys TetraMAX II Speeds Test Generation (2016). https://news.synopsys.com/2016-07-12-Synopsys-TetraMAX-II-Speeds-Test-Generation-for-STMicroelectronics-SoC-Designs
Stephan P, Brayton R, Sangiovanni-Vincentelli A (1996) Combinational test generation using satisfiability. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 15(9):1167–1176
Eggersglüß S, Wille R, Drechsler R (2013) Improved SAT-based ATPG: more constraints, better compaction. In 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp 85–90
Meade T, Portillo J, Zhang S, Jin Y (2019) Neta: When IP fails, secrets leak. In Proceedings of the 24th Asia and South Pacific Design Automation Conference, ASPDAC ’19, (New York, NY, USA), p 90-95. Association for Computing Machinery
Wang L-T (2009) Chapter 3 - design for testability. In Electronic Design Automation (L.-T. Wang, Y.-W. Chang, and K.-T. T. Cheng, eds.), pp 97–172 Boston: Morgan Kaufmann
Reimann LM, Hanel L, Sisejkovic D, Merchant F, Leupers R (2021) QFlow: quantitative information flow for security-aware hardware design in Verilog. In 2021 IEEE 39th International Conference on Computer Design (ICCD), (Los Alamitos, CA, USA), pp 603–607 IEEE Computer Society
Guo X, Dutta RG, He J, Tehranipoor MM, Jin Y (2019) QIF-Verilog: quantitative information-flow based hardware description languages for pre-silicon security assessment. In 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp 91–100
Nahiyan A, Xiao K, Yang K, Jin Y, Forte D, Tehranipoor M (2016) AVFSM: a framework for identifying and mitigating vulnerabilities in FSMS. In 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp 1–6
The glucose SAT solver (2017). https://www.labri.fr/perso/lsimon/glucose/
Berkeley Logic Synthesis and Verification Group, ABC: A System for Sequential Synthesis and Verification (2012). http://www.eecs.berkeley.edu/~alanmi/abc/
Biere A, Heljanko K, Wieringa S (2011) AIGER 1.9 and beyond, Tech. Rep. 11/2, Institute for Formal Models and Verification, Johannes Kepler University, Altenbergerstr. 69, 4040 Linz, Austria
pyAiger: a python library for manipulating sequential and combinatorial circuits (2018). https://github.com/mvcisback/py-aiger
Xin-Feng Z, Jian-Dong W, Bin L, Jun-Wu Z, Jun W (2009) Methods to tackle state explosion problem in model checking. 2009 Third International Symposium on Intelligent Information Technology Application 2:329–331
Salmani H, Tehranipoor M, Karri R (2013) On design vulnerability analysis and trust benchmarks development. In 2013 IEEE 31st International Conference on Computer Design (ICCD), pp 471–474
Rajendran J, Vedula V, Karri R (2015) Detecting malicious modifications of data in third-party intellectual property cores. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp 1–6
PIC16F84A data sheet (2010). https://ww1.microchip.com/downloads/en/DeviceDoc/35007b.pdf
Daemen J, Massolino PMC, Mehrdad A, Rotella Y (2020) The Subterranean 2.0 cipher suite. IACR Trans Symmetric Cryptol 2020:262-294
Naito Y, Matsui M, Sugawara T, Suzuki D (2019) SAEB: a lightweight blockcipher-based AEAD mode of operation. Cryptology ePrint Archive. Paper 2019/700. https://eprint.iacr.org/2019/700
The RISC-V instruction set manual (2017). https://riscv.org/wp-content/uploads/2017/05/riscv-privileged-v1.10.pdf
Wu J, Fowze F, Forte D (2022) EXERT: exhaustive integrity analysis for information flow security. In 2022 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pp 1–6
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Funding
This research was partially supported by NSF under award # 2016624 and AFOSR under Award ID FA8650-20-C-1719.
Competing Interests
The authors declare no competing interests.
Author Contribution
Jiaming Wu and Domenic Forte wrote the whole manuscript. All authors reviewed the manuscript.
Availability of Data and Materials
Not applicable
Ethical Approval
Not applicable
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wu, J., Forte, D. EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration. J Hardw Syst Secur 7, 147–164 (2023). https://doi.org/10.1007/s41635-023-00141-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41635-023-00141-3