Data Flow Verification in SoC Using Formal Techniques

Hardware security is becoming increasingly critical in SoC designs. A SoC integrates several modules to form a larger system. To reduce the time-to-market and design efforts, reusable, pretested modules called intellectual properties (IPs) are incorporated in the design. Hence, designing mainly relies on interconnection of modules that may lead to unintentional functional paths. As SoC may contain several secure and non-secure modules, data propagation in the design must be carefully analyzed. There exist various forms of security attacks like tampering, repudiation and privilege elevation. These attacks may affect system manufacturers, system designers or the end users. A designer invests a lot on design in terms of both money and time, and SoC protection becomes highly important. Security Path Verification (SPV) App of JasperGold Tool by Cadence is used to check the sanctity of the data in the design. SPV uses formal techniques to verify the data propagation in the design.

[1]  Pao-Ann Hsiung,et al.  FVP: a formal verification platform for SoC , 2003, IEEE International [Systems-on-Chip] SOC Conference, 2003. Proceedings..

[2]  Chip-Hong Chang,et al.  20 Years of research on intellectual property protection , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).

[3]  Ziyad Hanna Challenging problems in industrial formal verification , 2014, 2014 Formal Methods in Computer-Aided Design (FMCAD).

[4]  Jiliang Zhang,et al.  A Practical Logic Obfuscation Technique for Hardware Security , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[5]  A. Basu,et al.  On the implementation of a Intellectual Property protection based on information hiding , 2012, 2012 5th International Conference on Computers and Devices for Communication (CODEC).

[6]  Yu Zheng,et al.  IIPS: Infrastructure IP for Secure SoC Design , 2015, IEEE Transactions on Computers.

[7]  Jeyavijayan Rajendran,et al.  Formal Security Verification of Third Party Intellectual Property Cores for Information Leakage , 2016, 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID).

[8]  Dominik Stoffel Formal Verification of Systems-on-Chip - Industrial Experiences and Scientific Perspectives , 2009, 2009 20th International Workshop on Database and Expert Systems Application.

[9]  Ramesh Karri,et al.  Security challenges during VLSI test , 2011, 2011 IEEE 9th International New Circuits and systems conference.

[10]  Amit Roy,et al.  DFT logic verification through property based formal methods — SOC to IP , 2010, Formal Methods in Computer Aided Design.