Hardware trojans in chips: A survey for detection and prevention

C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen - Sensors, 2020 - mdpi.com
Diverse and wide-range applications of integrated circuits (ICs) and the development of
Cyber Physical System (CPS), more and more third-party manufacturers are involved in the …

Llm for soc security: A paradigm shift

D Saha, S Tarek, K Yahyaei, SK Saha, J Zhou… - IEEE …, 2024 - ieeexplore.ieee.org
As the ubiquity and complexity of system-on-chip (SoC) designs increase across electronic
devices, incorporating security into an SoC design flow poses significant challenges …

Rtl-contest: Concolic testing on rtl for detecting security vulnerabilities

X Meng, S Kundu, AK Kanuparthi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This article presents RTL-ConTest, a register transfer-level (RTL) security vulnerability
detection algorithm, that extracts critical process flows from a RTL design and executes RTL …

SeVNoC: Security validation of system-on-chip designs with NoC fabrics

X Meng, K Raj, S Ray, K Basu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Modern System-on-Chip (SoC) designs include a variety of Network-on-Chip (NoC) fabrics
to implement coordination and communication of integrated hardware intellectual property …

Eisec: Exhaustive information flow security of hardware intellectual property utilizing symbolic execution

F Fowze, M Choudhury, D Forte - 2022 Asian Hardware …, 2022 - ieeexplore.ieee.org
Hardware IPs are assumed to be roots-of-trust in complex SoCs. However, their design and
security verification are still heavily dependent on manual expertise. Extensive research in …

Countering the path explosion problem in the symbolic execution of hardware designs

K Ryan, C Sturton - arXiv preprint arXiv:2304.05445, 2023 - arxiv.org
Symbolic execution is a powerful verification tool for hardware designs, but suffers from the
path explosion problem. We introduce a new approach, piecewise composition, which …

Accelerating hardware security verification and vulnerability detection through state space reduction

L Shen, D Mu, G Cao, M Qin, J Zhu, W Hu - Computers & Security, 2021 - Elsevier
Abstract Model checking is an effective technique for formal verification of hardware security
properties in order to detect security vulnerabilities. However, a major challenge lies in state …

Augmented Symbolic Execution for Information Flow in Hardware Designs

K Ryan, M Gregoire, C Sturton - arXiv preprint arXiv:2307.11884, 2023 - arxiv.org
We present SEIF, a methodology that combines static analysis with symbolic execution to
verify and explicate information flow paths in a hardware design. SEIF begins with a …

SEIF: Augmented Symbolic Execution for Information Flow in Hardware Designs

K Ryan, M Gregoire, C Sturton - … of the 12th International Workshop on …, 2023 - dl.acm.org
We present SEIF, an exploratory methodology for information flow verification based on
symbolic execution. SEIF begins with a statically built overapproximation of the information …

[PDF][PDF] Sylvia: Countering the Path Explosion Problem in the Symbolic Execution of Hardware Designs

K Ryan, C Sturton - 2023 Formal Methods in Computer-Aided …, 2023 - library.oapen.org
Symbolic execution is a powerful verification tool for hardware designs, in particular for
security validation. However, symbolic execution suffers from the path explosion problem in …