Ensuring Hardware Robustness via Security Verification

dc.contributor.advisorBasu, Kanad
dc.contributor.advisorSchmidtke, David
dc.contributor.committeeMemberBhatia, Dinesh
dc.contributor.committeeMemberMakris, Yiorgos
dc.contributor.committeeMemberSaquib, Mohammad
dc.creatorMeng, Xingyu 1993-
dc.creator.orcid0000-0001-5787-0101
dc.date.accessioned2024-03-07T22:44:01Z
dc.date.available2024-03-07T22:44:01Z
dc.date.created2023-12
dc.date.issuedDecember 2023
dc.date.submittedDecember 2023
dc.date.updated2024-03-07T22:44:01Z
dc.description.abstractSystem-on-Chips (SoCs) play a pivotal role in modern computing systems, integrating multiple Intellectual Property (IP) cores to deliver diverse functionalities. However, this integration presents unique security challenges that can result in vulnerabilities escaping the verification phase and becoming potential exploits. Moreover, the integration of commercial off-the-shelf (COTS) components into system designs provides cost-effective solutions but introduces the risk of hidden malicious hardware. On the other hand, asynchronous events in complex SoC design introduce challenges for security verification. Furthermore, Network-on-Chip (NoC) architectures introduce new vulnerabilities during message transmission across on-chip networks. Although security properties are introduced to address these vulnerabilities, generating security properties for SoCs can be a daunting task, typically requiring extensive developer expertise and time. This dissertation extends and explores various approaches to current hardware verification in multiple aspects. First, we introduce RTL-ConTest, a Register Transfer Level (RTL) security vulnerability detection algorithm, that extracts critical process flows from a design and executes RTL-level Concolic testing to generate security test cases for identifying critical exploits. Second, we address the asynchronous resets by extending the concept of control flow graph (CFG) and extraction of reset-controlled events while avoiding combinatorial explosion. Third, by utilizing CFG extraction and security properties, we develop a framework for systematic detection of security violations in NoC designs resulting from vulnerabilities in NoC communication through formal state exploration. Fourth, We propose an information tracking framework to identify potential information flow violations in COTS integrated circuits by analyzing their designs and demonstrating their effectiveness in experimental results. Lastly, we introduce a language-based machine-learning framework that extracts essential security information from processor documentation and converts them into security constraints at the RTL level, enhancing the robustness and efficiency of security property generation.
dc.format.mimetypeapplication/pdf
dc.identifier.uri
dc.identifier.urihttps://hdl.handle.net/10735.1/10013
dc.language.isoEnglish
dc.subjectEngineering, Electronics and Electrical
dc.titleEnsuring Hardware Robustness via Security Verification
dc.typeThesis
dc.type.materialtext
thesis.degree.collegeSchool of Engineering and Computer Science
thesis.degree.departmentComputer Engineering
thesis.degree.grantorThe University of Texas at Dallas
thesis.degree.namePHD

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
MENG-PRIMARY-2023.pdf
Size:
9.42 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
license.txt
Size:
1.99 KB
Format:
Plain Text
Description:
No Thumbnail Available
Name:
proquest_license.txt
Size:
6.37 KB
Format:
Plain Text
Description: