Abstract
Recent technological advancements enabled integration of a wide variety of Intellectual Property (IP) cores in a single chip, popularly known as System-on-a-Chip (SoC). Network-on-Chip (NoC) is a scalable solution that enables communication between a large number of IP cores in modern SoC designs. A typical SoC design methodology relies on third-party IPs to reduce cost and meet time-to-market constraints, leading to serious security concerns. NoC becomes an ideal target for attackers due to its distributed nature across the chip as well as its inherent ability in monitoring communications between the individual IP cores. This paper presents a comprehensive NoC trust validation framework using security assertions. It makes three important contributions. (1) We define a set of security vulnerabilities for NoC architectures, and propose security assertions to monitor these pre-silicon vulnerabilities. (2) In order to ensure that the generated assertions are valid, we utilize efficient test generation techniques to activate these security assertions. (3) We develop on-chip triggers based on synthesized security assertions as well as efficient security-aware signal selection techniques for effective post-silicon debug. Experimental results show that our proposed framework is scalable and effective in capturing security vulnerabilities as well as functional bugs with minor hardware overhead.
Similar content being viewed by others
Notes
Most NoC architectures facilitate flits, which is a further breakdown of a packet used for flow control purposes. We stick to the level of packets for the ease of explanation as our method remains the same at the flit level as well.
References
Parikh R, Bertacco V (2014) Forever: A complementary formal and runtime verification approach to correct noc functionality. ACM Trans Embed Comput Syst 13(3s):104:1–104:30. https://doi.org/10.1145/2514871
Abdel-Khalek R, Parikh R, DeOrio A, Bertacco V (2011) Functional correctness for cmp interconnects. In: ICCD, pp 352–359. http://doi.org/10.1109/ICCD.2011.6081423
Arteris (2009) Flexnoc resilience package. http://arteris.com/flexnoc-resilience-package-functional-safety, [Online]
Foster H, Lacey D, Krolnik A (2003) Assertion-Based Design, 2nd edn. Kluwer Academic Publishers, USA
Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1):10–25
Bhunia S, Tehranipoor M (2018) The Hardware Trojan War. Springer’18
Lyu Y, Mishra P (2020b) System-on-chip security assertions. https://arxiv.org/pdf/2001.06719.pdf
Mishra P, Farahmandi F (2019) Post-Silicon Validation and Debug. Springer
Mishra P, Morad R, Ziv A, Ray S (2017) Post-silicon validation in the soc era: A tutorial introduction. IEEE Design & Test 34(3):68–92
Love E, Jin Y, Makris Y (2011) Proof-carrying hardware intellectual property: A pathway to trusted module acquisition. IEEE TIFS 7(1):25–40
Guo X, Dutta RG, Mishra P, Jin Y (2016) Scalable soc trust verification using integrated theorem proving and model checking. In: HOST
Sepulveda J, Aboul-Hassan D, Sigl G, Becker B, Sauer M (2018) Towards the formal verification of security properties of a network-on-chip router. In: ETS
Witharana H, Lyu Y, Charles S, Mishra P (2022) A survey on assertion-based hardware verification. ACM Computing Surveys (CSUR)
Boule M, Zilic Z (2008) Automata-based assertion-checker synthesis of psl properties. TODAES 13(1):1–21
Gupta A (2002) Assertion-based verification turns the corner. IEEE Des Test Comput 19(4):131–132
Vasudevan S, Sheridan D, Patel S, Tcheng D, Tuohy B, Johnson D (2010) Goldmine: Automatic assertion generation using data mining and static analysis. In: DATE, pp 626–629
Bombieri N, Busato F, Danese A, Piccolboni L, Pravadelli G (2019) Mangrove: An inference-based dynamic invariant mining for gpu architectures. IEEE Trans on Comp 69(4):606–620
Danese A, Bertacco V, Pravadelli G (2018) Symbolic assertion mining for security validation. In: DATE, pp 1550–1555
Dubrova E, Näslund M, Carlsson G, Smeets B (2014) Keyed logic bist for trojan detection in soc. In: SoC
Boraten T, DiTomaso D, Kodi AK (2016) Secure model checkers for network-on-chip (noc) architectures. In: GLSVLSI
Charles S, Mishra P (2020) Lightweight and trust-aware routing in noc-based socs. In: 2020 ISVLSI, IEEE, pp 160–167
Charles S, Lyu Y, Mishra P (2019) Real-time detection and localization of dos attacks in noc based socs. In: DATE
Prodromou A, Panteli A, Nicopoulos C, Sazeides Y (2012) Nocalert: An on-line and real-time fault detection mechanism for network-on-chip architectures. In: MICRO
Wassel H, Gao Y, Jason K, Huffmire T, Kastner R, Chong F, Sherwood T (2013) Surfnoc: A low latency and provably non-interfering approach to secure networks-on-chip. In: ISCA
Charles S, Logan M, Mishra P (2020) Lightweight Anonymous Routing in NoC based SoCs. In: DATE
Intel (2016) Using tinycrypt library, intel developer zone. http://software.intel.com/en-us/node/734330
Rout S, Basu K, Deb S (2019a) Efficient post-silicon validation of network-on-chip using wireless links. In: VLSID, pp 371–376
Rout S, Patil SB, Chaudhari VI, Deb S (2019b) Efficient router architecture for trace reduction during noc post-silicon validation. In: SOCC, pp 230–235
Rout S, Badri M, Deb S (2020) Reutilization of trace buffers for performance enhancement of noc based mpsocs. In: ASP-DAC, pp 97–102
Sepúlveda J, Zankl A, Flórez D, Sigl G (2017) Towards protected mpsoc communication for information protection against a malicious noc. Procedia Computer Science 108:1103–1112
Ancajas DM, Chakraborty K, Roy S (2014) Fort-nocs: Mitigating the threat of a compromised noc. In: DAC
Hussain M, Malekpour A, Guo H, Parameswaran S (2018) Eetd: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip. In: ISVLSI
Pasricha S, Dutt N (2010) On-chip communication architectures: system on chip interconnect. Morgan Kaufmann
JYV MK, Swain AK, Kumar S, Sahoo SR, Mahapatra K (2018) Run time mitigation of performance degradation hardware trojan attacks in network on chip. In: ISVLSI
Biswas AK, Nandy S, Narayan R (2015) Router attack toward noc-enabled mpsoc and monitoring countermeasures against such threat. Circuits Systems Signal Process 34(10):3241–3290
Mukherjee R, Kroening D, Melham T (2015) Hardware verification using software analyzers. In: ISVLSI
Lyu Y, Mishra P (2020a) Automated test generation for activation of assertions in rtl models. In: ASP-DAC
Boule M, Zilic Z (2005) Incorporating efficient assertion checkers into hardware emulation. In: ICCD, pp 221–228. http://doi.org/10.1109/ICCD.2005.66
Kumar B, Basu K, Fujita M, Singh V (2020) Post-silicon gate-level error localization with effective and combined trace signal selection. IEEE Trans Comput-Aided Des Integr Circuits Syst 39(1):248–261. https://doi.org/10.1109/TCAD.2018.2883899
Monemi A, Tang JW, Palesi M, Marsono MN (2017) Pronoc: A low latency network-on-chip based many-core system-on-chip prototyping platform. MICPRO 54:60–74
Amin O, Ramzy Y, Ibrahem O, Fouad A, Mohamed K, Abdelsalam M (2016) System verilog assertions synthesis based compiler. In: MTV
Clifford W (2013) Yosys open synthesis suite. http://www.clifford.at/yosys/
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Funding
This work was partially supported by grants from National Science Foundation (CCF-1908131) and Semiconductor Research Corporation (2020-CT-2934).
Competing Interests
The authors have no relevant financial or non-financial interests to disclose.
Author Contributions
All authors contributed to the study conception and design. Manuscript preparation, experimental setup, and analysis were performed by Aruna Jayasena and Binod Kumar. The assertion validation part was performed by Hasini Witharana. The first draft of the manuscript was written by Subodha Charles and Prabhat Mishra and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Data Availability
All the data and the analysis results that were generated during the experiments are available in the manuscript.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jayasena, A., Kumar, B., Charles, S. et al. Network-on-Chip Trust Validation Using Security Assertions. J Hardw Syst Secur 6, 79–94 (2022). https://doi.org/10.1007/s41635-022-00129-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41635-022-00129-5