Automating Security Verification
Securing Your SoCs:
Advanced Techniques for Security Verification
Three-Part On-Demand Video Series
Security concerns permeate our digital lives. From online financial or personal data transactions, to automobile control and even election tampering, protecting access has become a critical necessity for almost all applications. With semiconductor hardware forming the foundation of modern electronic systems, a hack here can be disastrous. Protecting hardware against the myriad of potential vulnerabilities is a complex engineering task. Verifying that it is indeed secure has proved even more challenging.
Security is a negative verification problem. Instead of ensuring that an item of functionality works as specified, engineers must demonstrate that functionality cannot be disrupted from any possible corruption of device behavior. Predicting all of the potential vulnerabilities across a modern System-on-Chip is all but impossible. New thinking is required to tackle this tough problem.
This three-part, 40-minute on-demand video series will discuss a solution developed by a leading semiconductor company using the Portable Stimulus Standard (PSS) to drive a Test Suite Synthesis tool equipped with AI Planning Algorithm technology. This semi-formal approach leverages similar ideas to formal verification but can be applied to large systems using simulation or emulation. The method examines the entire design search space for illegal access opportunities, enabling a thorough, high-coverage analysis of all possible vulnerabilities.
After discussing some hardware security fundamentals, including verification issues, we will review the use of PSS in this semi-formal manner, before detailing the security verification methodology and providing a worked example to show how it may be applied.
Part 1: Semiconductor security fundamentals and security verification
Part 2: A review of Portable Stimulus and why it is so effective for security verification
Part 3: A worked example demonstrating efficient, effective security verification
Sign up to View Parts 2 and 3
Please fill out the following form to view the video series.
Part 2: A review of Portable Stimulus and why it is so effective for security verification
Part 3: A worked example demonstrating efficient, effective security verification
For more information
Find out more about the Breker Security TrekApp.