Invited: Independent Verification and Validation of Security-Aware EDA Tools and IP. Tan, B., Garg, S., Karri, R., Liu, Y., Zuzak, M., Chakraborty, A., Srivastava, A., Aramoon, O., Xu, Q., Qu, G., Porter, A., Szep, J., & Savage, W. In 2021 58th ACM/IEEE Design Automation Conference (DAC), pages 1299–1302, December, 2021. ISSN: 0738-100X
doi  abstract   bibtex   
Secure silicon requires a seamless integration of new tools, new IP, and design flows to help designers protect integrated circuits from increasingly sophisticated attacks. Independent Validation and Verification (IV&V) of this integrated technology is important to ensure that the tools actually deliver on their security claims when used by independent parties (i.e., people who were not involved in designing the tools). This work discusses the principles and approaches for IV&V of such a complex design environment, including validation of the security strength of the various hardware security techniques, such as combinational and sequential logic locking, Trojan Detection, side-channel mitigation, and blockchain-based asset management. The main challenge in running an IV&V effort is to ensure that the process provides rigorous, methodical and provable evaluation of the claims of not only the component tools and IP, but whether such an integrated environment can produce security-hardened designs by a non-security expert. CCS Concepts • Hardware ${\}rightarrow$ Very large scale integration design; Methodologies for EDA; • Security and privacy ${\}rightarrow$ Security in hardware.
@inproceedings{tan_invited_2021,
	title = {Invited: {Independent} {Verification} and {Validation} of {Security}-{Aware} {EDA} {Tools} and {IP}},
	copyright = {All rights reserved},
	shorttitle = {Invited},
	doi = {10.1109/DAC18074.2021.9586302},
	abstract = {Secure silicon requires a seamless integration of new tools, new IP, and design flows to help designers protect integrated circuits from increasingly sophisticated attacks. Independent Validation and Verification (IV\&V) of this integrated technology is important to ensure that the tools actually deliver on their security claims when used by independent parties (i.e., people who were not involved in designing the tools). This work discusses the principles and approaches for IV\&V of such a complex design environment, including validation of the security strength of the various hardware security techniques, such as combinational and sequential logic locking, Trojan Detection, side-channel mitigation, and blockchain-based asset management. The main challenge in running an IV\&V effort is to ensure that the process provides rigorous, methodical and provable evaluation of the claims of not only the component tools and IP, but whether such an integrated environment can produce security-hardened designs by a non-security expert. CCS Concepts • Hardware \${\textbackslash}rightarrow\$ Very large scale integration design; Methodologies for EDA; • Security and privacy \${\textbackslash}rightarrow\$ Security in hardware.},
	booktitle = {2021 58th {ACM}/{IEEE} {Design} {Automation} {Conference} ({DAC})},
	author = {Tan, Benjamin and Garg, Siddharth and Karri, Ramesh and Liu, Yuntao and Zuzak, Michael and Chakraborty, Abhisek and Srivastava, Ankur and Aramoon, Omid and Xu, Qian and Qu, Gang and Porter, Adam and Szep, Jeno and Savage, Warren},
	month = dec,
	year = {2021},
	note = {ISSN: 0738-100X},
	keywords = {Design methodology, Electric potential, Hardware, Privacy, Security-aware electronic design automation, Silicon, Tools, Very large scale integration, blockchain, cryptography, hardware security, validation, verification},
	pages = {1299--1302},
}

Downloads: 0