Robust UVM framework for detection of hardware security vulnerabilities for security sub systems and cryptographic IPs
TimeTuesday, July 12th11:30am - 11:45am PDT
Location2010, Level 2
Event Type
Engineering Tracks
Front-End Design
Front-End Design
DescriptionToday there are more demonstrated attacks like never before that take advantage of hardware specific vulnerabilities which has led to confidentiality, integrity and availability of our systems getting compromised. Hardware fixes through software and firmware patches are expensive and risky and conventional functional verification does not guarantee a secure system. This necessitates a paradigm shift in existing hardware security verification methodologies. We present here a methodology using CWE database list to identify security holes and CAPEC attack database to exploit them. We categorize the hardware weaknesses present in CWE list first and then propose a
systematic UVM framework to identify and detect vulnerabilities at the RTL level.

The Common Weakness Enumeration (CWE) list is a community-developed list of weaknesses sponsored by U.S Defence Organizations and operated by MITRE Organization. There are 922 weaknesses listed in CWE list out of which 96 corresponds to hardware design weaknesses, which were released in 2020 and 2021, and it is being regularly updated. Our purpose is to explore the 96 hardware weaknesses and reduce it further into Register Transfer Level (RTL) categories to detect the hardware vulnerabilities using a systematic UVM framework. Each hardware weakness in CWE can be exploited by employing the attack patterns listed by Common Attack Pattern Enumeration and Classification (CAPEC) database. These abstract level attack patterns can be employed to strengthen hardware security. Attack patterns which we are going to explore focus on the exploitation of the physical hardware used in computing systems. The techniques defined by each pattern reflect the replacement, destruction, modification and exploitation of hardware components that make up a system in an attempt to achieve a desired negative technical impact. Attacks against hardware component fall into several broad categories depending upon the relative sophistication of the attacker and the type of systems that are targeted.