TY - GEN
T1 - Invited
T2 - 58th ACM/IEEE Design Automation Conference, DAC 2021
AU - Tan, Benjamin
AU - Garg, Siddharth
AU - Karri, Ramesh
AU - Liu, Yuntao
AU - Zuzak, Michael
AU - Chakraborty, Abhisek
AU - Srivastava, Ankur
AU - Aramoon, Omid
AU - Xu, Qian
AU - Qu, Gang
AU - Porter, Adam
AU - Szep, Jeno
AU - Savage, Warren
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021/12/5
Y1 - 2021/12/5
N2 - Secure silicon requires a seamless integration of new tools, new IP, and design flows to help designers protect integrated circuits from increasingly sophisticated attacks. Independent Validation and Verification (IVV) of this integrated technology is important to ensure that the tools actually deliver on their security claims when used by independent parties (i.e., people who were not involved in designing the tools). This work discusses the principles and approaches for IVV of such a complex design environment, including validation of the security strength of the various hardware security techniques, such as combinational and sequential logic locking, Trojan Detection, side-channel mitigation, and blockchain-based asset management. The main challenge in running an IVV effort is to ensure that the process provides rigorous, methodical and provable evaluation of the claims of not only the component tools and IP, but whether such an integrated environment can produce security-hardened designs by a non-security expert. CCS Concepts • Hardware Very large scale integration design; Methodologies for EDA; • Security and privacy Security in hardware.
AB - Secure silicon requires a seamless integration of new tools, new IP, and design flows to help designers protect integrated circuits from increasingly sophisticated attacks. Independent Validation and Verification (IVV) of this integrated technology is important to ensure that the tools actually deliver on their security claims when used by independent parties (i.e., people who were not involved in designing the tools). This work discusses the principles and approaches for IVV of such a complex design environment, including validation of the security strength of the various hardware security techniques, such as combinational and sequential logic locking, Trojan Detection, side-channel mitigation, and blockchain-based asset management. The main challenge in running an IVV effort is to ensure that the process provides rigorous, methodical and provable evaluation of the claims of not only the component tools and IP, but whether such an integrated environment can produce security-hardened designs by a non-security expert. CCS Concepts • Hardware Very large scale integration design; Methodologies for EDA; • Security and privacy Security in hardware.
KW - Security-aware electronic design automation
KW - blockchain
KW - cryptography
KW - hardware security
KW - validation
KW - verification
UR - http://www.scopus.com/inward/record.url?scp=85119398310&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85119398310&partnerID=8YFLogxK
U2 - 10.1109/DAC18074.2021.9586302
DO - 10.1109/DAC18074.2021.9586302
M3 - Conference contribution
AN - SCOPUS:85119398310
T3 - Proceedings - Design Automation Conference
SP - 1299
EP - 1302
BT - 2021 58th ACM/IEEE Design Automation Conference, DAC 2021
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 5 December 2021 through 9 December 2021
ER -