Presentation
Confidentiality Assurance: A Key Component of Hardware Security
DescriptionConfidentiality is a crucial element of the security triad, which also includes Integrity and Availability. Spectre-like vulnerabilities arise from improper implementation and transient execution, while improper AES implementation can expose signals. Currently, there is no reliable single sign-off method in the industry, making verification complex and involving multiple stages such as Simulation, Formal, and post-Si validation. Signing off on confidentiality is particularly challenging without verification in unknown scenarios, and there is no single method for early detection at the RTL stage.
The proposed new technology addresses these challenges by capturing Secure Data Transaction Intent across User Defined Signals and performing static analysis to identify Illegal Data Flow causing Security Violations. This approach facilitates early detection with minimal constraints during the RTL design phase and is scalable to full SoC-sized designs, thereby saving time and effort.
The proposed new technology addresses these challenges by capturing Secure Data Transaction Intent across User Defined Signals and performing static analysis to identify Illegal Data Flow causing Security Violations. This approach facilitates early detection with minimal constraints during the RTL design phase and is scalable to full SoC-sized designs, thereby saving time and effort.
Event Type
Engineering Poster
Networking
TimeWednesday, June 2512:15pm - 1:15pm PDT
LocationEngineering Posters, Level 2 Exhibit Hall



